{"id":21,"date":"2010-12-28T06:52:45","date_gmt":"2010-12-28T06:52:45","guid":{"rendered":"http:\/\/www.asc-cybernetics.org\/2011\/?page_id=21"},"modified":"2011-07-31T05:54:16","modified_gmt":"2011-07-31T05:54:16","slug":"people","status":"publish","type":"page","link":"https:\/\/www.asc-cybernetics.org\/2011\/?page_id=21","title":{"rendered":"People"},"content":{"rendered":"<p>This page offers access to details about the members of the conference community, including <a href=\"http:\/\/www.asc-cybernetics.org\/2011\/?page_id=759\">participants<\/a>, <a href=\"http:\/\/www.asc-cybernetics.org\/2011\/?page_id=34\">organizers<\/a>, helpers as well as <a href=\"http:\/\/www.asc-cybernetics.org\/2011\/?page_id=163\">international advisors<\/a>. If you would like to <a href=\"http:\/\/www.asc-cybernetics.org\/2011\/?page_id=69\">join us<\/a>, and to participate in or support this event, please do not hesitate to contact us via email at <a href=\"mailto:secretary@asc-cybernetics.org?SUBJECT=2011 ASC Conference on Listening\">secretary@asc-cybernetics.org<\/a> or <a href=\"http:\/\/www.asc-cybernetics.org\/2011\/?page_id=79\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This page offers access to details about the members of the conference community, including participants, organizers, helpers as well as international advisors. If you would like to join us, and to participate in or support this event, please do not &hellip; <a href=\"https:\/\/www.asc-cybernetics.org\/2011\/?page_id=21\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":70,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-21","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.asc-cybernetics.org\/2011\/index.php?rest_route=\/wp\/v2\/pages\/21","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.asc-cybernetics.org\/2011\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.asc-cybernetics.org\/2011\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.asc-cybernetics.org\/2011\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.asc-cybernetics.org\/2011\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=21"}],"version-history":[{"count":7,"href":"https:\/\/www.asc-cybernetics.org\/2011\/index.php?rest_route=\/wp\/v2\/pages\/21\/revisions"}],"predecessor-version":[{"id":1411,"href":"https:\/\/www.asc-cybernetics.org\/2011\/index.php?rest_route=\/wp\/v2\/pages\/21\/revisions\/1411"}],"wp:attachment":[{"href":"https:\/\/www.asc-cybernetics.org\/2011\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=21"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}