{"id":1398,"date":"2007-07-11T20:40:18","date_gmt":"2007-07-12T08:40:18","guid":{"rendered":"http:\/\/www.horace.org\/blog\/2007\/07\/11\/workspace-spying\/"},"modified":"2007-07-12T06:02:49","modified_gmt":"2007-07-12T18:02:49","slug":"workspace-spying","status":"publish","type":"post","link":"https:\/\/www.horace.org\/blog\/2007\/07\/11\/workspace-spying\/","title":{"rendered":"Workspace spying"},"content":{"rendered":"<p>Today I helped one of my superior spy on another colleague&#8217;s workspace in the network.\u00a0 The spying does not involve any hacking or illegal activities.\u00a0 All you need to know is where his files are stored in the network.\u00a0 We suspect this guy is lying about his work progress.\u00a0 In his status report, he claims everything is on-track, but we found out he haven&#8217;t touch his files for almost a week.\u00a0 The network is the only place any work can be done relate to the project, so what has he been doing?<\/p>\n<p>Spying others workspace is probably the worst way of progress tracking.\u00a0 It violates the trust among colleagues.\u00a0 In normal situations, I would rather have the objectives stated clearly, ask him to make a release of his work and assign someone to do the audit.\u00a0 Yet, sometimes spying unavoidable and it is the last resort to get things under control.<\/p>\n<p>The guy whom we spied on works in a remote office and is already laid off a few months ago.\u00a0 His last day of work is the end of this month.\u00a0 Somehow the managers high up think they can squeeze productivity out of him for whatever reason.\u00a0 When we ask for more body, we got this guy suppose to worth two man months of human resources.\u00a0 This guy is already fired, so we can&#8217;t threaten to fire him again for their poor job.\u00a0 His termination package is not tied to his performance, so we cannot give any incentive for him to work hard.\u00a0 Before he walk out of the door, he already got job offers with huge pay raise lining up.\u00a0 Only idiots would think zombies can get any real work done.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today I helped one of my superior spy on another colleague&#8217;s workspace in the network.\u00a0 The spying does not involve any hacking or illegal activities.\u00a0 All you need to know is where his files are stored in the network.\u00a0 We suspect this guy is lying about his work progress.\u00a0 In his status report, he claims &hellip; <a href=\"https:\/\/www.horace.org\/blog\/2007\/07\/11\/workspace-spying\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Workspace spying<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"lc_iscn_info":[],"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":["post-1398","post","type-post","status-publish","format-standard","hentry","category-_scribble"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Workspace spying  - \u54f2\u5b50\u6232 Philosophist\u2019s Camp<\/title>\n<meta name=\"description\" content=\"Today I helped one of my superior spy on another colleague&#039;s workspace in the network.\u00a0 The spying does not involve any hacking or illegal activities.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.horace.org\/blog\/2007\/07\/11\/workspace-spying\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Workspace spying  - \u54f2\u5b50\u6232 Philosophist\u2019s Camp\" \/>\n<meta property=\"og:description\" content=\"Today I helped one of my superior spy on another colleague&#039;s workspace in the network.\u00a0 The spying does not involve any hacking or illegal activities.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.horace.org\/blog\/2007\/07\/11\/workspace-spying\/\" \/>\n<meta property=\"og:site_name\" content=\"\u54f2\u5b50\u6232 Philosophist\u2019s Camp\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/horace.org\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/horace.org\" \/>\n<meta property=\"article:published_time\" content=\"2007-07-12T08:40:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2007-07-12T18:02:49+00:00\" \/>\n<meta name=\"author\" content=\"hevangel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@horaceorg\" \/>\n<meta name=\"twitter:site\" content=\"@horaceorg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"hevangel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/2007\\\/07\\\/11\\\/workspace-spying\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/2007\\\/07\\\/11\\\/workspace-spying\\\/\"},\"author\":{\"name\":\"hevangel\",\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/#\\\/schema\\\/person\\\/c8d9e8e7a71d343b4b2c4ef4365cdb4c\"},\"headline\":\"Workspace spying\",\"datePublished\":\"2007-07-12T08:40:18+00:00\",\"dateModified\":\"2007-07-12T18:02:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/2007\\\/07\\\/11\\\/workspace-spying\\\/\"},\"wordCount\":288,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/#\\\/schema\\\/person\\\/c8d9e8e7a71d343b4b2c4ef4365cdb4c\"},\"articleSection\":[\"Daily Scribble\"],\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.horace.org\\\/blog\\\/2007\\\/07\\\/11\\\/workspace-spying\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/2007\\\/07\\\/11\\\/workspace-spying\\\/\",\"url\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/2007\\\/07\\\/11\\\/workspace-spying\\\/\",\"name\":\"Workspace spying - \u54f2\u5b50\u6232 Philosophist\u2019s Camp\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/#website\"},\"datePublished\":\"2007-07-12T08:40:18+00:00\",\"dateModified\":\"2007-07-12T18:02:49+00:00\",\"description\":\"Today I helped one of my superior spy on another colleague's workspace in the network.\u00a0 The spying does not involve any hacking or illegal activities.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/2007\\\/07\\\/11\\\/workspace-spying\\\/#breadcrumb\"},\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.horace.org\\\/blog\\\/2007\\\/07\\\/11\\\/workspace-spying\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/2007\\\/07\\\/11\\\/workspace-spying\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Workspace spying\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/\",\"name\":\"\u54f2\u5b50\u6232 Philosophist\u2019s Camp\",\"description\":\"\u860b\u679c\u65e5\u5831\u4f5c\u8005 - \u9673\u99ac\uff1a\u66f8\u8a55\uff0c\u5f71\u8a55\uff0c\u52d5\u6f2b\uff0c\u65c5\u884c\uff0c\u54f2\u5b78\u7b46\u8a18\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/#\\\/schema\\\/person\\\/c8d9e8e7a71d343b4b2c4ef4365cdb4c\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-CA\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/#\\\/schema\\\/person\\\/c8d9e8e7a71d343b4b2c4ef4365cdb4c\",\"name\":\"hevangel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.horace.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/spocky.jpg?fit=1313%2C1259&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.horace.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/spocky.jpg?fit=1313%2C1259&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.horace.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/spocky.jpg?fit=1313%2C1259&ssl=1\",\"width\":1313,\"height\":1259,\"caption\":\"hevangel\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.horace.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/spocky.jpg?fit=1313%2C1259&ssl=1\"},\"sameAs\":[\"http:\\\/\\\/www.horace.org\",\"https:\\\/\\\/www.facebook.com\\\/horace.org\"],\"url\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/author\\\/hevangel-2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Workspace spying  - \u54f2\u5b50\u6232 Philosophist\u2019s Camp","description":"Today I helped one of my superior spy on another colleague's workspace in the network.\u00a0 The spying does not involve any hacking or illegal activities.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.horace.org\/blog\/2007\/07\/11\/workspace-spying\/","og_locale":"en_US","og_type":"article","og_title":"Workspace spying  - \u54f2\u5b50\u6232 Philosophist\u2019s Camp","og_description":"Today I helped one of my superior spy on another colleague's workspace in the network.\u00a0 The spying does not involve any hacking or illegal activities.\u00a0","og_url":"https:\/\/www.horace.org\/blog\/2007\/07\/11\/workspace-spying\/","og_site_name":"\u54f2\u5b50\u6232 Philosophist\u2019s Camp","article_publisher":"https:\/\/www.facebook.com\/horace.org","article_author":"https:\/\/www.facebook.com\/horace.org","article_published_time":"2007-07-12T08:40:18+00:00","article_modified_time":"2007-07-12T18:02:49+00:00","author":"hevangel","twitter_card":"summary_large_image","twitter_creator":"@horaceorg","twitter_site":"@horaceorg","twitter_misc":{"Written by":"hevangel","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.horace.org\/blog\/2007\/07\/11\/workspace-spying\/#article","isPartOf":{"@id":"https:\/\/www.horace.org\/blog\/2007\/07\/11\/workspace-spying\/"},"author":{"name":"hevangel","@id":"https:\/\/www.horace.org\/blog\/#\/schema\/person\/c8d9e8e7a71d343b4b2c4ef4365cdb4c"},"headline":"Workspace spying","datePublished":"2007-07-12T08:40:18+00:00","dateModified":"2007-07-12T18:02:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.horace.org\/blog\/2007\/07\/11\/workspace-spying\/"},"wordCount":288,"commentCount":2,"publisher":{"@id":"https:\/\/www.horace.org\/blog\/#\/schema\/person\/c8d9e8e7a71d343b4b2c4ef4365cdb4c"},"articleSection":["Daily Scribble"],"inLanguage":"en-CA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.horace.org\/blog\/2007\/07\/11\/workspace-spying\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.horace.org\/blog\/2007\/07\/11\/workspace-spying\/","url":"https:\/\/www.horace.org\/blog\/2007\/07\/11\/workspace-spying\/","name":"Workspace spying - \u54f2\u5b50\u6232 Philosophist\u2019s Camp","isPartOf":{"@id":"https:\/\/www.horace.org\/blog\/#website"},"datePublished":"2007-07-12T08:40:18+00:00","dateModified":"2007-07-12T18:02:49+00:00","description":"Today I helped one of my superior spy on another colleague's workspace in the network.\u00a0 The spying does not involve any hacking or illegal activities.\u00a0","breadcrumb":{"@id":"https:\/\/www.horace.org\/blog\/2007\/07\/11\/workspace-spying\/#breadcrumb"},"inLanguage":"en-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.horace.org\/blog\/2007\/07\/11\/workspace-spying\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.horace.org\/blog\/2007\/07\/11\/workspace-spying\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.horace.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Workspace spying"}]},{"@type":"WebSite","@id":"https:\/\/www.horace.org\/blog\/#website","url":"https:\/\/www.horace.org\/blog\/","name":"\u54f2\u5b50\u6232 Philosophist\u2019s Camp","description":"\u860b\u679c\u65e5\u5831\u4f5c\u8005 - \u9673\u99ac\uff1a\u66f8\u8a55\uff0c\u5f71\u8a55\uff0c\u52d5\u6f2b\uff0c\u65c5\u884c\uff0c\u54f2\u5b78\u7b46\u8a18","publisher":{"@id":"https:\/\/www.horace.org\/blog\/#\/schema\/person\/c8d9e8e7a71d343b4b2c4ef4365cdb4c"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.horace.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-CA"},{"@type":["Person","Organization"],"@id":"https:\/\/www.horace.org\/blog\/#\/schema\/person\/c8d9e8e7a71d343b4b2c4ef4365cdb4c","name":"hevangel","image":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/i0.wp.com\/www.horace.org\/blog\/wp-content\/uploads\/2021\/11\/spocky.jpg?fit=1313%2C1259&ssl=1","url":"https:\/\/i0.wp.com\/www.horace.org\/blog\/wp-content\/uploads\/2021\/11\/spocky.jpg?fit=1313%2C1259&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.horace.org\/blog\/wp-content\/uploads\/2021\/11\/spocky.jpg?fit=1313%2C1259&ssl=1","width":1313,"height":1259,"caption":"hevangel"},"logo":{"@id":"https:\/\/i0.wp.com\/www.horace.org\/blog\/wp-content\/uploads\/2021\/11\/spocky.jpg?fit=1313%2C1259&ssl=1"},"sameAs":["http:\/\/www.horace.org","https:\/\/www.facebook.com\/horace.org"],"url":"https:\/\/www.horace.org\/blog\/author\/hevangel-2\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/pwn21-my","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":4527,"url":"https:\/\/www.horace.org\/blog\/2010\/06\/23\/dac-technical-review-day-45\/","url_meta":{"origin":1398,"position":0},"title":"DAC Technical Review (Day 4,5)","author":"hevangel","date":"June 23, 2010","format":false,"excerpt":"The exhibition floor is over in day 4 and 5. In day 4, I attended user track presentation on verification and a technical session on What input language for HLS. In day 5, I attended a workshop on Software Engineering using Agile Software Development technics User track presentation on verification\u2026","rel":"","context":"In &quot;Daily Scribble&quot;","block_context":{"text":"Daily Scribble","link":"https:\/\/www.horace.org\/blog\/category\/_scribble\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":4512,"url":"https:\/\/www.horace.org\/blog\/2010\/06\/15\/dac-2010-day-1-technical-review\/","url_meta":{"origin":1398,"position":1},"title":"DAC 2010 Technical Report (Day 1)","author":"hevangel","date":"June 15, 2010","format":false,"excerpt":"Today is the report of my first day in DAC. I signed up to a full day technical workshop Choosing Advanced Verification Methodology. After the workshop ended at 3:30p, I managed to checked out a few companies in the exhibition floor Vennsa Technologyies, Agnisys Inc and Veritools Advanced Verification Methodology\u2026","rel":"","context":"In &quot;Daily Scribble&quot;","block_context":{"text":"Daily Scribble","link":"https:\/\/www.horace.org\/blog\/category\/_scribble\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":3360,"url":"https:\/\/www.horace.org\/blog\/2009\/08\/20\/unwired\/","url_meta":{"origin":1398,"position":2},"title":"Unwired","author":"hevangel","date":"August 20, 2009","format":false,"excerpt":"I have been living without a land line for many years. Why do someone need a land line if no one ever call that number? I think the next line to cut would be cable TV. Who want limit his freedom by watching TV according to the network's schedule anyways?\u2026","rel":"","context":"In &quot;News Clips&quot;","block_context":{"text":"News Clips","link":"https:\/\/www.horace.org\/blog\/category\/_reference\/_newsclips\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":4874,"url":"https:\/\/www.horace.org\/blog\/2010\/10\/02\/windows-7\/","url_meta":{"origin":1398,"position":3},"title":"Windows 7","author":"hevangel","date":"October 2, 2010","format":false,"excerpt":"I have been hanging on my Windows XP for many years, much longer than my usual upgrade cycle. Everybody hates Vista, so I follow the crowd and skipped a generation of the Microsoft OS. Now I have a new computer, it's time to upgrade to the last OS, Windows 7.\u2026","rel":"","context":"In &quot;Product Reviews&quot;","block_context":{"text":"Product Reviews","link":"https:\/\/www.horace.org\/blog\/category\/_reviews\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.horace.org\/blog\/wp-content\/uploads\/2010\/09\/win7u.jpg?fit=500%2C625&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":51,"url":"https:\/\/www.horace.org\/blog\/2005\/04\/07\/network-simulator\/","url_meta":{"origin":1398,"position":4},"title":"network simulator","author":"hevangel","date":"April 7, 2005","format":false,"excerpt":"I have been sturggling with ns2 for the past 24 hours. ns2 is an open source network simulation implemented in tcl and C++. It suppose to be one of the most popular academic reseach tool in communication network. My problem right now is the compliation doesn't seem right, when I\u2026","rel":"","context":"In &quot;Daily Scribble&quot;","block_context":{"text":"Daily Scribble","link":"https:\/\/www.horace.org\/blog\/category\/_scribble\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":3961,"url":"https:\/\/www.horace.org\/blog\/2010\/01\/13\/google-warns-of-china-exit-over-hacking\/","url_meta":{"origin":1398,"position":5},"title":"Google Warns of China Exit Over Hacking","author":"hevangel","date":"January 13, 2010","format":false,"excerpt":"Bravo to Google. They really live up to their corporate motto: \"Don't do evil\". They have the guts say no to the Chinese government. No one know where history will lead, but Google may very well trigger the fall of the communist party. By JESSICA E. VASCELLARO, JASON DEAN and\u2026","rel":"","context":"In &quot;News Clips&quot;","block_context":{"text":"News Clips","link":"https:\/\/www.horace.org\/blog\/category\/_reference\/_newsclips\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_likes_enabled":false,"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/posts\/1398","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/comments?post=1398"}],"version-history":[{"count":0,"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/posts\/1398\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/media?parent=1398"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/categories?post=1398"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/tags?post=1398"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}