{"id":4119,"date":"2017-09-19T12:26:35","date_gmt":"2017-09-19T10:26:35","guid":{"rendered":"http:\/\/integralfacilitation.de\/wp-content\/uploads\/2017\/09\/arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119.jpg"},"modified":"2017-09-19T12:31:43","modified_gmt":"2017-09-19T10:31:43","slug":"arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119","status":"inherit","type":"attachment","link":"https:\/\/www.visualfacilitators.com\/de\/arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119\/","title":{"rendered":"Arbeitsbeispiel Graphic Recording Christian Rath"},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}}},"class_list":["post-4119","attachment","type-attachment","status-inherit","hentry"],"description":{"rendered":"<p class=\"attachment\"><a href='https:\/\/www.visualfacilitators.com\/wp-content\/uploads\/2017\/09\/arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119.jpg'><img decoding=\"async\" width=\"300\" height=\"122\" src=\"https:\/\/www.visualfacilitators.com\/wp-content\/uploads\/2017\/09\/arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-300x122.jpg\" class=\"attachment-medium size-medium\" alt=\"-\" srcset=\"https:\/\/www.visualfacilitators.com\/wp-content\/uploads\/2017\/09\/arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-300x122.jpg 300w, https:\/\/www.visualfacilitators.com\/wp-content\/uploads\/2017\/09\/arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-768x313.jpg 768w, https:\/\/www.visualfacilitators.com\/wp-content\/uploads\/2017\/09\/arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-1024x417.jpg 1024w, https:\/\/www.visualfacilitators.com\/wp-content\/uploads\/2017\/09\/arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-669x272.jpg 669w, https:\/\/www.visualfacilitators.com\/wp-content\/uploads\/2017\/09\/arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-200x81.jpg 200w, https:\/\/www.visualfacilitators.com\/wp-content\/uploads\/2017\/09\/arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-400x163.jpg 400w, https:\/\/www.visualfacilitators.com\/wp-content\/uploads\/2017\/09\/arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-600x244.jpg 600w, https:\/\/www.visualfacilitators.com\/wp-content\/uploads\/2017\/09\/arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-800x326.jpg 800w, https:\/\/www.visualfacilitators.com\/wp-content\/uploads\/2017\/09\/arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-1200x488.jpg 1200w, https:\/\/www.visualfacilitators.com\/wp-content\/uploads\/2017\/09\/arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119.jpg 1280w\" sizes=\"(max-width: 300px) 100vw, 300px\" title=\"-\"><\/a><\/p>\n-"},"caption":{"rendered":"<p>&#8211;<\/p>\n"},"alt_text":"","media_type":"image","mime_type":"image\/jpeg","media_details":{"width":1280,"height":521,"file":"2017\/09\/arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119.jpg","sizes":{"thumbnail":{"file":"arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-150x150.jpg","width":150,"height":150,"mime_type":"image\/jpeg","source_url":"https:\/\/www.visualfacilitators.com\/wp-content\/uploads\/2017\/09\/arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-150x150.jpg"},"medium":{"file":"arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-300x122.jpg","width":300,"height":122,"mime_type":"image\/jpeg","source_url":"https:\/\/www.visualfacilitators.com\/wp-content\/uploads\/2017\/09\/arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-300x122.jpg"},"medium_large":{"file":"arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-768x313.jpg","width":768,"height":313,"mime_type":"image\/jpeg","source_url":"https:\/\/www.visualfacilitators.com\/wp-content\/uploads\/2017\/09\/arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-768x313.jpg"},"large":{"file":"arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-1024x417.jpg","width":1024,"height":417,"mime_type":"image\/jpeg","source_url":"https:\/\/www.visualfacilitators.com\/wp-content\/uploads\/2017\/09\/arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-1024x417.jpg"},"portfolio-full":{"file":"arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-940x400.jpg","width":940,"height":400,"mime_type":"image\/jpeg","source_url":"https:\/\/www.visualfacilitators.com\/wp-content\/uploads\/2017\/09\/arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-940x400.jpg"},"portfolio-one":{"file":"arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-540x272.jpg","width":540,"height":272,"mime_type":"image\/jpeg","source_url":"https:\/\/www.visualfacilitators.com\/wp-content\/uploads\/2017\/09\/arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-540x272.jpg"},"portfolio-two":{"file":"arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-460x295.jpg","width":460,"height":295,"mime_type":"image\/jpeg","source_url":"https:\/\/www.visualfacilitators.com\/wp-content\/uploads\/2017\/09\/arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-460x295.jpg"},"portfolio-three":{"file":"arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-300x214.jpg","width":300,"height":214,"mime_type":"image\/jpeg","source_url":"https:\/\/www.visualfacilitators.com\/wp-content\/uploads\/2017\/09\/arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-300x214.jpg"},"portfolio-five":{"file":"arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-177x142.jpg","width":177,"height":142,"mime_type":"image\/jpeg","source_url":"https:\/\/www.visualfacilitators.com\/wp-content\/uploads\/2017\/09\/arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-177x142.jpg"},"blog-large":{"file":"arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-669x272.jpg","width":669,"height":272,"mime_type":"image\/jpeg","source_url":"https:\/\/www.visualfacilitators.com\/wp-content\/uploads\/2017\/09\/arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-669x272.jpg"},"blog-medium":{"file":"arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-320x202.jpg","width":320,"height":202,"mime_type":"image\/jpeg","source_url":"https:\/\/www.visualfacilitators.com\/wp-content\/uploads\/2017\/09\/arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-320x202.jpg"},"recent-posts":{"file":"arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-700x441.jpg","width":700,"height":441,"mime_type":"image\/jpeg","source_url":"https:\/\/www.visualfacilitators.com\/wp-content\/uploads\/2017\/09\/arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-700x441.jpg"},"recent-works-thumbnail":{"file":"arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-66x66.jpg","width":66,"height":66,"mime_type":"image\/jpeg","source_url":"https:\/\/www.visualfacilitators.com\/wp-content\/uploads\/2017\/09\/arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-66x66.jpg"},"200":{"file":"arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-200x81.jpg","width":200,"height":81,"mime_type":"image\/jpeg","source_url":"https:\/\/www.visualfacilitators.com\/wp-content\/uploads\/2017\/09\/arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-200x81.jpg"},"400":{"file":"arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-400x163.jpg","width":400,"height":163,"mime_type":"image\/jpeg","source_url":"https:\/\/www.visualfacilitators.com\/wp-content\/uploads\/2017\/09\/arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-400x163.jpg"},"600":{"file":"arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-600x244.jpg","width":600,"height":244,"mime_type":"image\/jpeg","source_url":"https:\/\/www.visualfacilitators.com\/wp-content\/uploads\/2017\/09\/arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-600x244.jpg"},"800":{"file":"arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-800x326.jpg","width":800,"height":326,"mime_type":"image\/jpeg","source_url":"https:\/\/www.visualfacilitators.com\/wp-content\/uploads\/2017\/09\/arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-800x326.jpg"},"1200":{"file":"arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-1200x488.jpg","width":1200,"height":488,"mime_type":"image\/jpeg","source_url":"https:\/\/www.visualfacilitators.com\/wp-content\/uploads\/2017\/09\/arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119-1200x488.jpg"},"full":{"file":"arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119.jpg","width":1280,"height":521,"mime_type":"image\/jpeg","source_url":"https:\/\/www.visualfacilitators.com\/wp-content\/uploads\/2017\/09\/arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119.jpg"}},"image_meta":{"aperture":"1.8","credit":"","camera":"ILCE-7","caption":"","created_timestamp":"1416395494","copyright":"","focal_length":"55","iso":"100","shutter_speed":"0.016666666666667","title":"","orientation":"1","keywords":[]}},"post":null,"source_url":"https:\/\/www.visualfacilitators.com\/wp-content\/uploads\/2017\/09\/arbeitsbeispiel_cyber-security-graphic-recording-visual-facilitators_20141119.jpg","_links":{"self":[{"href":"https:\/\/www.visualfacilitators.com\/de\/wp-json\/wp\/v2\/media\/4119","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.visualfacilitators.com\/de\/wp-json\/wp\/v2\/media"}],"about":[{"href":"https:\/\/www.visualfacilitators.com\/de\/wp-json\/wp\/v2\/types\/attachment"}],"author":[{"embeddable":true,"href":"https:\/\/www.visualfacilitators.com\/de\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.visualfacilitators.com\/de\/wp-json\/wp\/v2\/comments?post=4119"}]}}