{"id":10775,"date":"2021-04-15T02:00:27","date_gmt":"2021-04-15T09:00:27","guid":{"rendered":"https:\/\/softwareengineeringdaily.com\/?p=10775"},"modified":"2021-04-15T12:08:22","modified_gmt":"2021-04-15T19:08:22","slug":"gold-fig-labs-cloud-infrastructure-security-with-vikrum-nijjar-and-greg-soltis","status":"publish","type":"post","link":"https:\/\/softwareengineeringdaily.com\/2021\/04\/15\/gold-fig-labs-cloud-infrastructure-security-with-vikrum-nijjar-and-greg-soltis\/","title":{"rendered":"Gold Fig Labs: Cloud Infrastructure Security with Vikrum Nijjar and Greg Soltis"},"content":{"rendered":"<p><img decoding=\"async\" data-attachment-id=\"2475\" data-permalink=\"https:\/\/softwareengineeringdaily.com\/2016\/04\/19\/googles-container-management-brendan-burns\/brendan-burns\/\" data-orig-file=\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2016\/04\/brendan-burns.jpg?fit=175%2C175&amp;ssl=1\" data-orig-size=\"175,175\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"brendan-burns\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2016\/04\/brendan-burns.jpg?fit=175%2C175&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2016\/04\/brendan-burns.jpg?fit=175%2C175&amp;ssl=1\" class=\"alignright size-full wp-image-2475\" style=\"border-radius: 50%; border: 1px solid #000000; max-width: 175px; max-height: 175px;\" src=\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2021\/04\/GoldFigLabs_sq.png?resize=175%2C175\" width=\"175\" height=\"175\" data-recalc-dims=\"1\" \/><\/p>\n<p><span style=\"font-weight: 400;\">IT infrastructure are the components required to operate IT environments, like networks, virtual machines or containers, an operating system, hardware, data storage, etc\u2026. As companies build out different deployment environments with infrastructure configurations, they must maintain the different environments, replicate them, and update them. The management of infrastructure, often automated to some extent, is referred to as Infrastructure as Code (IaC).\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The company Gold Fig Labs helps growing companies better understand their deployed infrastructure beyond the basic IaC principles. Gold Fig Labs developed 2 main tools to deliver the clearest view of infrastructure security and compliance. Their tool Checkup provides periodic security and best practices reports for AWS accounts. The report details specific, actionable, and relevant advice to improve security posture. Their other tool, Introspector, is a unique security and auditing tool that provides in-depth analysis of larger cloud deployments with complex regulatory requirements and custom internal policies.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this episode we talk with Vikrum Nijjar and Greg Soltis. Vikrum is co-founder and CEO at Gold Fig Labs. He was previously an angel investor with Angel and special advisor for Google\u2019s onboarding acquisitions, compliance, and security.\u00a0 Greg is co-founder and CTO at Gold Fig Labs. Previously he was a senior software engineer at Google and a software engineer at Firebase. We discuss the principles of IaC, how Gold Fig Labs helps customers go beyond what IaC intends, and the complexity of cloud infrastructure security and regulatory compliance.<\/span><\/p>\n<p>Sponsorship inquiries:\u00a0<a href=\"mailto:sponsor@softwareengineeringdaily.com\" target=\"_blank\" rel=\"noopener noreferrer\">sponsor@softwareengineeringdaily.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>IT infrastructure are the components required to operate IT environments, like networks, virtual machines or containers, an operating system, hardware, data storage, etc\u2026. As companies build out different deployment environments with infrastructure configurations, they must maintain the different environments, replicate them, and update them. The management of infrastructure, often automated to some extent, is referred<\/p>\n","protected":false},"author":3,"featured_media":10793,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"Gold Fig Labs: Cloud Infrastructure Security with Vikrum Nijjar and Greg Soltis @goldfiglabs @gsoltis @vikrum5000","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[1363,1079,2143,14],"tags":[4605,4607,4603,4602,4604,4606,4608,4601],"class_list":["post-10775","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-all-episodes","category-cloud-engineering","category-exclusive-content","category-podcast","tag-checkup","tag-cloud-infrastructure-security","tag-gold-fig-labs","tag-greg-soltis","tag-iac-principles","tag-introspector","tag-regulatory-compliance","tag-vikrum-nijjar"],"jetpack_publicize_connections":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Gold Fig Labs: Cloud Infrastructure Security with Vikrum Nijjar and Greg Soltis - Software Engineering Daily<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/softwareengineeringdaily.com\/2021\/04\/15\/gold-fig-labs-cloud-infrastructure-security-with-vikrum-nijjar-and-greg-soltis\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gold Fig Labs: Cloud Infrastructure Security with Vikrum Nijjar and Greg Soltis - Software Engineering Daily\" \/>\n<meta property=\"og:description\" content=\"IT infrastructure are the components required to operate IT environments, like networks, virtual machines or containers, an operating system, hardware, data storage, etc\u2026. As companies build out different deployment environments with infrastructure configurations, they must maintain the different environments, replicate them, and update them. The management of infrastructure, often automated to some extent, is referred\" \/>\n<meta property=\"og:url\" content=\"http:\/\/softwareengineeringdaily.com\/2021\/04\/15\/gold-fig-labs-cloud-infrastructure-security-with-vikrum-nijjar-and-greg-soltis\/\" \/>\n<meta property=\"og:site_name\" content=\"Software Engineering Daily\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-15T09:00:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-15T19:08:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2021\/04\/GoldFigLabs.png?fit=2642%2C1262\" \/>\n\t<meta property=\"og:image:width\" content=\"2642\" \/>\n\t<meta property=\"og:image:height\" content=\"1262\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"SE Daily\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@software_daily\" \/>\n<meta name=\"twitter:site\" content=\"@software_daily\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"SE Daily\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"http:\/\/softwareengineeringdaily.com\/2021\/04\/15\/gold-fig-labs-cloud-infrastructure-security-with-vikrum-nijjar-and-greg-soltis\/#article\",\"isPartOf\":{\"@id\":\"http:\/\/softwareengineeringdaily.com\/2021\/04\/15\/gold-fig-labs-cloud-infrastructure-security-with-vikrum-nijjar-and-greg-soltis\/\"},\"author\":{\"name\":\"SE Daily\",\"@id\":\"https:\/\/softwareengineeringdaily.com\/#\/schema\/person\/822f06fe7d6f895baba29a9c0a3aa6c8\"},\"headline\":\"Gold Fig Labs: Cloud Infrastructure Security with Vikrum Nijjar and Greg Soltis\",\"datePublished\":\"2021-04-15T09:00:27+00:00\",\"dateModified\":\"2021-04-15T19:08:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\/\/softwareengineeringdaily.com\/2021\/04\/15\/gold-fig-labs-cloud-infrastructure-security-with-vikrum-nijjar-and-greg-soltis\/\"},\"wordCount\":254,\"publisher\":{\"@id\":\"https:\/\/softwareengineeringdaily.com\/#organization\"},\"image\":{\"@id\":\"http:\/\/softwareengineeringdaily.com\/2021\/04\/15\/gold-fig-labs-cloud-infrastructure-security-with-vikrum-nijjar-and-greg-soltis\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2021\/04\/GoldFigLabs.png?fit=2642%2C1262&ssl=1\",\"keywords\":[\"Checkup\",\"cloud infrastructure security\",\"Gold Fig Labs\",\"Greg Soltis\",\"IaC principles\",\"Introspector\",\"regulatory compliance\",\"Vikrum Nijjar\"],\"articleSection\":[\"All Content\",\"Cloud Engineering\",\"Exclusive Content\",\"Podcast\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/softwareengineeringdaily.com\/2021\/04\/15\/gold-fig-labs-cloud-infrastructure-security-with-vikrum-nijjar-and-greg-soltis\/\",\"url\":\"http:\/\/softwareengineeringdaily.com\/2021\/04\/15\/gold-fig-labs-cloud-infrastructure-security-with-vikrum-nijjar-and-greg-soltis\/\",\"name\":\"Gold Fig Labs: Cloud Infrastructure Security with Vikrum Nijjar and Greg Soltis - Software Engineering Daily\",\"isPartOf\":{\"@id\":\"https:\/\/softwareengineeringdaily.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\/\/softwareengineeringdaily.com\/2021\/04\/15\/gold-fig-labs-cloud-infrastructure-security-with-vikrum-nijjar-and-greg-soltis\/#primaryimage\"},\"image\":{\"@id\":\"http:\/\/softwareengineeringdaily.com\/2021\/04\/15\/gold-fig-labs-cloud-infrastructure-security-with-vikrum-nijjar-and-greg-soltis\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2021\/04\/GoldFigLabs.png?fit=2642%2C1262&ssl=1\",\"datePublished\":\"2021-04-15T09:00:27+00:00\",\"dateModified\":\"2021-04-15T19:08:22+00:00\",\"breadcrumb\":{\"@id\":\"http:\/\/softwareengineeringdaily.com\/2021\/04\/15\/gold-fig-labs-cloud-infrastructure-security-with-vikrum-nijjar-and-greg-soltis\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/softwareengineeringdaily.com\/2021\/04\/15\/gold-fig-labs-cloud-infrastructure-security-with-vikrum-nijjar-and-greg-soltis\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/softwareengineeringdaily.com\/2021\/04\/15\/gold-fig-labs-cloud-infrastructure-security-with-vikrum-nijjar-and-greg-soltis\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2021\/04\/GoldFigLabs.png?fit=2642%2C1262&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2021\/04\/GoldFigLabs.png?fit=2642%2C1262&ssl=1\",\"width\":2642,\"height\":1262},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/softwareengineeringdaily.com\/2021\/04\/15\/gold-fig-labs-cloud-infrastructure-security-with-vikrum-nijjar-and-greg-soltis\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/softwareengineeringdaily.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gold Fig Labs: Cloud Infrastructure Security with Vikrum Nijjar and Greg Soltis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/softwareengineeringdaily.com\/#website\",\"url\":\"https:\/\/softwareengineeringdaily.com\/\",\"name\":\"Software Engineering Daily\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/softwareengineeringdaily.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/softwareengineeringdaily.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/softwareengineeringdaily.com\/#organization\",\"name\":\"Software Engineering Daily\",\"url\":\"https:\/\/softwareengineeringdaily.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/softwareengineeringdaily.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2024\/01\/cropped-sed_website_banner.png?fit=549%2C169&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2024\/01\/cropped-sed_website_banner.png?fit=549%2C169&ssl=1\",\"width\":549,\"height\":169,\"caption\":\"Software Engineering Daily\"},\"image\":{\"@id\":\"https:\/\/softwareengineeringdaily.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/software_daily\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/softwareengineeringdaily.com\/#\/schema\/person\/822f06fe7d6f895baba29a9c0a3aa6c8\",\"name\":\"SE Daily\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/softwareengineeringdaily.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/87cddb92997841dafa04aa675bbdaca4?s=96&d=retro&r=pg\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/87cddb92997841dafa04aa675bbdaca4?s=96&d=retro&r=pg\",\"caption\":\"SE Daily\"},\"description\":\"The SE Daily podcast.\",\"sameAs\":[\"https:\/\/softwareengineeringdaily.com\"],\"url\":\"https:\/\/softwareengineeringdaily.com\/author\/erikawho\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Gold Fig Labs: Cloud Infrastructure Security with Vikrum Nijjar and Greg Soltis - Software Engineering Daily","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/softwareengineeringdaily.com\/2021\/04\/15\/gold-fig-labs-cloud-infrastructure-security-with-vikrum-nijjar-and-greg-soltis\/","og_locale":"en_US","og_type":"article","og_title":"Gold Fig Labs: Cloud Infrastructure Security with Vikrum Nijjar and Greg Soltis - Software Engineering Daily","og_description":"IT infrastructure are the components required to operate IT environments, like networks, virtual machines or containers, an operating system, hardware, data storage, etc\u2026. As companies build out different deployment environments with infrastructure configurations, they must maintain the different environments, replicate them, and update them. The management of infrastructure, often automated to some extent, is referred","og_url":"http:\/\/softwareengineeringdaily.com\/2021\/04\/15\/gold-fig-labs-cloud-infrastructure-security-with-vikrum-nijjar-and-greg-soltis\/","og_site_name":"Software Engineering Daily","article_published_time":"2021-04-15T09:00:27+00:00","article_modified_time":"2021-04-15T19:08:22+00:00","og_image":[{"width":2642,"height":1262,"url":"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2021\/04\/GoldFigLabs.png?fit=2642%2C1262","type":"image\/png"}],"author":"SE Daily","twitter_card":"summary_large_image","twitter_creator":"@software_daily","twitter_site":"@software_daily","twitter_misc":{"Written by":"SE Daily","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"http:\/\/softwareengineeringdaily.com\/2021\/04\/15\/gold-fig-labs-cloud-infrastructure-security-with-vikrum-nijjar-and-greg-soltis\/#article","isPartOf":{"@id":"http:\/\/softwareengineeringdaily.com\/2021\/04\/15\/gold-fig-labs-cloud-infrastructure-security-with-vikrum-nijjar-and-greg-soltis\/"},"author":{"name":"SE Daily","@id":"https:\/\/softwareengineeringdaily.com\/#\/schema\/person\/822f06fe7d6f895baba29a9c0a3aa6c8"},"headline":"Gold Fig Labs: Cloud Infrastructure Security with Vikrum Nijjar and Greg Soltis","datePublished":"2021-04-15T09:00:27+00:00","dateModified":"2021-04-15T19:08:22+00:00","mainEntityOfPage":{"@id":"http:\/\/softwareengineeringdaily.com\/2021\/04\/15\/gold-fig-labs-cloud-infrastructure-security-with-vikrum-nijjar-and-greg-soltis\/"},"wordCount":254,"publisher":{"@id":"https:\/\/softwareengineeringdaily.com\/#organization"},"image":{"@id":"http:\/\/softwareengineeringdaily.com\/2021\/04\/15\/gold-fig-labs-cloud-infrastructure-security-with-vikrum-nijjar-and-greg-soltis\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2021\/04\/GoldFigLabs.png?fit=2642%2C1262&ssl=1","keywords":["Checkup","cloud infrastructure security","Gold Fig Labs","Greg Soltis","IaC principles","Introspector","regulatory compliance","Vikrum Nijjar"],"articleSection":["All Content","Cloud Engineering","Exclusive Content","Podcast"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"http:\/\/softwareengineeringdaily.com\/2021\/04\/15\/gold-fig-labs-cloud-infrastructure-security-with-vikrum-nijjar-and-greg-soltis\/","url":"http:\/\/softwareengineeringdaily.com\/2021\/04\/15\/gold-fig-labs-cloud-infrastructure-security-with-vikrum-nijjar-and-greg-soltis\/","name":"Gold Fig Labs: Cloud Infrastructure Security with Vikrum Nijjar and Greg Soltis - Software Engineering Daily","isPartOf":{"@id":"https:\/\/softwareengineeringdaily.com\/#website"},"primaryImageOfPage":{"@id":"http:\/\/softwareengineeringdaily.com\/2021\/04\/15\/gold-fig-labs-cloud-infrastructure-security-with-vikrum-nijjar-and-greg-soltis\/#primaryimage"},"image":{"@id":"http:\/\/softwareengineeringdaily.com\/2021\/04\/15\/gold-fig-labs-cloud-infrastructure-security-with-vikrum-nijjar-and-greg-soltis\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2021\/04\/GoldFigLabs.png?fit=2642%2C1262&ssl=1","datePublished":"2021-04-15T09:00:27+00:00","dateModified":"2021-04-15T19:08:22+00:00","breadcrumb":{"@id":"http:\/\/softwareengineeringdaily.com\/2021\/04\/15\/gold-fig-labs-cloud-infrastructure-security-with-vikrum-nijjar-and-greg-soltis\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/softwareengineeringdaily.com\/2021\/04\/15\/gold-fig-labs-cloud-infrastructure-security-with-vikrum-nijjar-and-greg-soltis\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/softwareengineeringdaily.com\/2021\/04\/15\/gold-fig-labs-cloud-infrastructure-security-with-vikrum-nijjar-and-greg-soltis\/#primaryimage","url":"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2021\/04\/GoldFigLabs.png?fit=2642%2C1262&ssl=1","contentUrl":"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2021\/04\/GoldFigLabs.png?fit=2642%2C1262&ssl=1","width":2642,"height":1262},{"@type":"BreadcrumbList","@id":"http:\/\/softwareengineeringdaily.com\/2021\/04\/15\/gold-fig-labs-cloud-infrastructure-security-with-vikrum-nijjar-and-greg-soltis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/softwareengineeringdaily.com\/"},{"@type":"ListItem","position":2,"name":"Gold Fig Labs: Cloud Infrastructure Security with Vikrum Nijjar and Greg Soltis"}]},{"@type":"WebSite","@id":"https:\/\/softwareengineeringdaily.com\/#website","url":"https:\/\/softwareengineeringdaily.com\/","name":"Software Engineering Daily","description":"","publisher":{"@id":"https:\/\/softwareengineeringdaily.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/softwareengineeringdaily.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/softwareengineeringdaily.com\/#organization","name":"Software Engineering Daily","url":"https:\/\/softwareengineeringdaily.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/softwareengineeringdaily.com\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2024\/01\/cropped-sed_website_banner.png?fit=549%2C169&ssl=1","contentUrl":"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2024\/01\/cropped-sed_website_banner.png?fit=549%2C169&ssl=1","width":549,"height":169,"caption":"Software Engineering Daily"},"image":{"@id":"https:\/\/softwareengineeringdaily.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/software_daily"]},{"@type":"Person","@id":"https:\/\/softwareengineeringdaily.com\/#\/schema\/person\/822f06fe7d6f895baba29a9c0a3aa6c8","name":"SE Daily","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/softwareengineeringdaily.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/87cddb92997841dafa04aa675bbdaca4?s=96&d=retro&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/87cddb92997841dafa04aa675bbdaca4?s=96&d=retro&r=pg","caption":"SE Daily"},"description":"The SE Daily podcast.","sameAs":["https:\/\/softwareengineeringdaily.com"],"url":"https:\/\/softwareengineeringdaily.com\/author\/erikawho\/"}]}},"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2021\/04\/GoldFigLabs.png?fit=2642%2C1262&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p7GuoD-2NN","_links":{"self":[{"href":"https:\/\/softwareengineeringdaily.com\/wp-json\/wp\/v2\/posts\/10775"}],"collection":[{"href":"https:\/\/softwareengineeringdaily.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/softwareengineeringdaily.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/softwareengineeringdaily.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/softwareengineeringdaily.com\/wp-json\/wp\/v2\/comments?post=10775"}],"version-history":[{"count":0,"href":"https:\/\/softwareengineeringdaily.com\/wp-json\/wp\/v2\/posts\/10775\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/softwareengineeringdaily.com\/wp-json\/wp\/v2\/media\/10793"}],"wp:attachment":[{"href":"https:\/\/softwareengineeringdaily.com\/wp-json\/wp\/v2\/media?parent=10775"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/softwareengineeringdaily.com\/wp-json\/wp\/v2\/categories?post=10775"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/softwareengineeringdaily.com\/wp-json\/wp\/v2\/tags?post=10775"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}