{"id":15761,"date":"2023-11-29T02:00:12","date_gmt":"2023-11-29T10:00:12","guid":{"rendered":"https:\/\/softwareengineeringdaily.com\/?p=15761"},"modified":"2023-11-29T05:10:15","modified_gmt":"2023-11-29T13:10:15","slug":"the-right-to-be-forgotten-with-gal-ringel","status":"publish","type":"post","link":"https:\/\/softwareengineeringdaily.com\/2023\/11\/29\/the-right-to-be-forgotten-with-gal-ringel\/","title":{"rendered":"The Right to Be Forgotten with Gal Ringel"},"content":{"rendered":"<p><a href=\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2023\/11\/6uYm6qAS_400x400.jpg\"><img fetchpriority=\"high\" decoding=\"async\" data-attachment-id=\"15643\" data-permalink=\"https:\/\/softwareengineeringdaily.com\/2023\/11\/07\/temporal-with-max-fateev\/max\/\" data-orig-file=\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2023\/10\/max.png?fit=218%2C258&amp;ssl=1\" data-orig-size=\"218,258\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"max\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2023\/10\/max.png?fit=218%2C258&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2023\/10\/max.png?fit=218%2C258&amp;ssl=1\" class=\"size-full wp-image-15643 alignright\" src=\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2023\/11\/Gal-Ringel.jpg?resize=218%2C258&#038;ssl=1\" alt=\"\" width=\"218\" height=\"258\" data-recalc-dims=\"1\" \/><\/a><\/p>\n<div>\n<div>Data breaches at major companies are so now common that they hardly make the news. The Wikipedia page on data breaches lists over 350 between 2004 and 2023. The Equifax breach in 2017 was especially notable because over 160 million records were leaked, and much of the data was acquired by Equifax without individuals&#8217; knowledge or consent. Data breaches are increasingly costly to companies and to affected users who must deal with the ensuing identity theft.<\/div>\n<p>&nbsp;<\/p>\n<\/div>\n<div style=\"text-align: justify;\">\n<p>In 2018 the European Union implemented the General Data Protection Regulation, or GDPR. Despite its mild name, the GDPR had major consequences for individuals&#8217; rights to control their data, and for companies that operate in the EU. Among other things, it gives the right to have personal data removed from a company\u2019s records. This is the so-called &#8220;right to be forgotten&#8221;.<\/p>\n<\/div>\n<div style=\"text-align: justify;\"><a href=\"https:\/\/twitter.com\/GalRingel\">Gal Ringel<\/a> is the Co-Founder and CEO of <a href=\"https:\/\/www.mineos.ai\">Mine<\/a>, which allows users to identify which companies have their data, and it automates the process of removing data on behalf of its users. In this way, Mine aims to reduce online exposure and minimize risk for anyone using online services. Gal joins the show today to talk about his company, the impact of GDPR, and how his experience in military intelligence, venture capital, and tech led him to co-found the company.<\/div>\n<p><a href=\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2023\/03\/jordi.png\"><img decoding=\"async\" data-attachment-id=\"14908\" data-permalink=\"https:\/\/softwareengineeringdaily.com\/2023\/03\/28\/hardening-c-with-bjarne-stroustrup\/jordi-3\/\" data-orig-file=\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2023\/03\/jordi.png?fit=218%2C258&amp;ssl=1\" data-orig-size=\"218,258\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"jordi\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2023\/03\/jordi.png?fit=218%2C258&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2023\/03\/jordi.png?fit=218%2C258&amp;ssl=1\" class=\"size-full wp-image-14908 alignleft\" src=\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2023\/03\/jordi.png?resize=218%2C258&#038;ssl=1\" alt=\"\" width=\"218\" height=\"258\" data-recalc-dims=\"1\" \/><\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.linkedin.com\/in\/jordimoncompanys\/\"><span style=\"font-weight: 400;\">Jordi Mon Companys<\/span><\/a><span style=\"font-weight: 400;\"> is a product manager and marketer that specializes in software delivery, developer experience, cloud native and open source. He has developed his career at companies like GitLab, Weaveworks, Harness and other platform and devtool providers. His interests range from software supply chain security to open source innovation. You can reach out to him on Twitter at <\/span><a href=\"https:\/\/twitter.com\/JordiMonPMM\"><span style=\"font-weight: 400;\">@jordimonpmm<\/span><\/a><\/p>\n<div><\/div>\n<div><a href=\"http:\/\/softwareengineeringdaily.com\/wp-content\/uploads\/2023\/11\/Mine-transcript-txt-11222023.txt\">Please click here to see the transcript of this episode<\/a>.<\/div>\n<div><\/div>\n<div>Sponsorship inquiries: sponsor@softwareengineeringdaily.com<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Data breaches at major companies are so now common that they hardly make the news. The Wikipedia page on data breaches lists over 350 between 2004 and 2023. The Equifax breach in 2017 was especially notable because over 160 million records were leaked, and much of the data was acquired by Equifax without individuals&#8217; knowledge<\/p>\n","protected":false},"author":94,"featured_media":15928,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"The Right to Be Forgotten with Gal Ringel","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[1363,1081,2143,5755,5763,14],"tags":[5869,5867,2117,5870,5868,5871],"class_list":["post-15761","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-all-episodes","category-data","category-exclusive-content","category-hosts","category-jordi-mon-companys","category-podcast","tag-data-breach","tag-gal-ringel","tag-gdpr","tag-identity-theft","tag-mineos","tag-online-exposure"],"jetpack_publicize_connections":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Right to Be Forgotten with Gal Ringel - Software Engineering Daily<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/softwareengineeringdaily.com\/2023\/11\/29\/the-right-to-be-forgotten-with-gal-ringel\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Right to Be Forgotten with Gal Ringel - Software Engineering Daily\" \/>\n<meta property=\"og:description\" content=\"Data breaches at major companies are so now common that they hardly make the news. The Wikipedia page on data breaches lists over 350 between 2004 and 2023. The Equifax breach in 2017 was especially notable because over 160 million records were leaked, and much of the data was acquired by Equifax without individuals&#8217; knowledge\" \/>\n<meta property=\"og:url\" content=\"https:\/\/softwareengineeringdaily.com\/2023\/11\/29\/the-right-to-be-forgotten-with-gal-ringel\/\" \/>\n<meta property=\"og:site_name\" content=\"Software Engineering Daily\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-29T10:00:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-29T13:10:15+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/softwareengineeringdaily.com\/wp-content\/uploads\/2023\/11\/MineOS.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"315\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"SEDaily\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@software_daily\" \/>\n<meta name=\"twitter:site\" content=\"@software_daily\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"SEDaily\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/softwareengineeringdaily.com\/2023\/11\/29\/the-right-to-be-forgotten-with-gal-ringel\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/softwareengineeringdaily.com\/2023\/11\/29\/the-right-to-be-forgotten-with-gal-ringel\/\"},\"author\":{\"name\":\"SEDaily\",\"@id\":\"https:\/\/softwareengineeringdaily.com\/#\/schema\/person\/f1a6631864960c74ef79dae73df8984c\"},\"headline\":\"The Right to Be Forgotten with Gal Ringel\",\"datePublished\":\"2023-11-29T10:00:12+00:00\",\"dateModified\":\"2023-11-29T13:10:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/softwareengineeringdaily.com\/2023\/11\/29\/the-right-to-be-forgotten-with-gal-ringel\/\"},\"wordCount\":296,\"publisher\":{\"@id\":\"https:\/\/softwareengineeringdaily.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/softwareengineeringdaily.com\/2023\/11\/29\/the-right-to-be-forgotten-with-gal-ringel\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2023\/11\/MineOS.png?fit=600%2C315&ssl=1\",\"keywords\":[\"Data breach\",\"Gal Ringel\",\"GDPR\",\"identity theft\",\"MineOS\",\"online exposure\"],\"articleSection\":[\"All Content\",\"Data\",\"Exclusive Content\",\"Hosts\",\"Jordi Mon Companys\",\"Podcast\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/softwareengineeringdaily.com\/2023\/11\/29\/the-right-to-be-forgotten-with-gal-ringel\/\",\"url\":\"https:\/\/softwareengineeringdaily.com\/2023\/11\/29\/the-right-to-be-forgotten-with-gal-ringel\/\",\"name\":\"The Right to Be Forgotten with Gal Ringel - Software Engineering Daily\",\"isPartOf\":{\"@id\":\"https:\/\/softwareengineeringdaily.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/softwareengineeringdaily.com\/2023\/11\/29\/the-right-to-be-forgotten-with-gal-ringel\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/softwareengineeringdaily.com\/2023\/11\/29\/the-right-to-be-forgotten-with-gal-ringel\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2023\/11\/MineOS.png?fit=600%2C315&ssl=1\",\"datePublished\":\"2023-11-29T10:00:12+00:00\",\"dateModified\":\"2023-11-29T13:10:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/softwareengineeringdaily.com\/2023\/11\/29\/the-right-to-be-forgotten-with-gal-ringel\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/softwareengineeringdaily.com\/2023\/11\/29\/the-right-to-be-forgotten-with-gal-ringel\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/softwareengineeringdaily.com\/2023\/11\/29\/the-right-to-be-forgotten-with-gal-ringel\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2023\/11\/MineOS.png?fit=600%2C315&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2023\/11\/MineOS.png?fit=600%2C315&ssl=1\",\"width\":600,\"height\":315},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/softwareengineeringdaily.com\/2023\/11\/29\/the-right-to-be-forgotten-with-gal-ringel\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/softwareengineeringdaily.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Right to Be Forgotten with Gal Ringel\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/softwareengineeringdaily.com\/#website\",\"url\":\"https:\/\/softwareengineeringdaily.com\/\",\"name\":\"Software Engineering Daily\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/softwareengineeringdaily.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/softwareengineeringdaily.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/softwareengineeringdaily.com\/#organization\",\"name\":\"Software Engineering Daily\",\"url\":\"https:\/\/softwareengineeringdaily.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/softwareengineeringdaily.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2024\/01\/cropped-sed_website_banner.png?fit=549%2C169&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2024\/01\/cropped-sed_website_banner.png?fit=549%2C169&ssl=1\",\"width\":549,\"height\":169,\"caption\":\"Software Engineering Daily\"},\"image\":{\"@id\":\"https:\/\/softwareengineeringdaily.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/software_daily\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/softwareengineeringdaily.com\/#\/schema\/person\/f1a6631864960c74ef79dae73df8984c\",\"name\":\"SEDaily\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/softwareengineeringdaily.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/96a9ce2f21db7050dc801bc0505cb90b?s=96&d=retro&r=pg\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/96a9ce2f21db7050dc801bc0505cb90b?s=96&d=retro&r=pg\",\"caption\":\"SEDaily\"},\"url\":\"https:\/\/softwareengineeringdaily.com\/author\/sed-production\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Right to Be Forgotten with Gal Ringel - Software Engineering Daily","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/softwareengineeringdaily.com\/2023\/11\/29\/the-right-to-be-forgotten-with-gal-ringel\/","og_locale":"en_US","og_type":"article","og_title":"The Right to Be Forgotten with Gal Ringel - Software Engineering Daily","og_description":"Data breaches at major companies are so now common that they hardly make the news. The Wikipedia page on data breaches lists over 350 between 2004 and 2023. The Equifax breach in 2017 was especially notable because over 160 million records were leaked, and much of the data was acquired by Equifax without individuals&#8217; knowledge","og_url":"https:\/\/softwareengineeringdaily.com\/2023\/11\/29\/the-right-to-be-forgotten-with-gal-ringel\/","og_site_name":"Software Engineering Daily","article_published_time":"2023-11-29T10:00:12+00:00","article_modified_time":"2023-11-29T13:10:15+00:00","og_image":[{"width":600,"height":315,"url":"http:\/\/softwareengineeringdaily.com\/wp-content\/uploads\/2023\/11\/MineOS.png","type":"image\/png"}],"author":"SEDaily","twitter_card":"summary_large_image","twitter_creator":"@software_daily","twitter_site":"@software_daily","twitter_misc":{"Written by":"SEDaily","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/softwareengineeringdaily.com\/2023\/11\/29\/the-right-to-be-forgotten-with-gal-ringel\/#article","isPartOf":{"@id":"https:\/\/softwareengineeringdaily.com\/2023\/11\/29\/the-right-to-be-forgotten-with-gal-ringel\/"},"author":{"name":"SEDaily","@id":"https:\/\/softwareengineeringdaily.com\/#\/schema\/person\/f1a6631864960c74ef79dae73df8984c"},"headline":"The Right to Be Forgotten with Gal Ringel","datePublished":"2023-11-29T10:00:12+00:00","dateModified":"2023-11-29T13:10:15+00:00","mainEntityOfPage":{"@id":"https:\/\/softwareengineeringdaily.com\/2023\/11\/29\/the-right-to-be-forgotten-with-gal-ringel\/"},"wordCount":296,"publisher":{"@id":"https:\/\/softwareengineeringdaily.com\/#organization"},"image":{"@id":"https:\/\/softwareengineeringdaily.com\/2023\/11\/29\/the-right-to-be-forgotten-with-gal-ringel\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2023\/11\/MineOS.png?fit=600%2C315&ssl=1","keywords":["Data breach","Gal Ringel","GDPR","identity theft","MineOS","online exposure"],"articleSection":["All Content","Data","Exclusive Content","Hosts","Jordi Mon Companys","Podcast"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/softwareengineeringdaily.com\/2023\/11\/29\/the-right-to-be-forgotten-with-gal-ringel\/","url":"https:\/\/softwareengineeringdaily.com\/2023\/11\/29\/the-right-to-be-forgotten-with-gal-ringel\/","name":"The Right to Be Forgotten with Gal Ringel - Software Engineering Daily","isPartOf":{"@id":"https:\/\/softwareengineeringdaily.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/softwareengineeringdaily.com\/2023\/11\/29\/the-right-to-be-forgotten-with-gal-ringel\/#primaryimage"},"image":{"@id":"https:\/\/softwareengineeringdaily.com\/2023\/11\/29\/the-right-to-be-forgotten-with-gal-ringel\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2023\/11\/MineOS.png?fit=600%2C315&ssl=1","datePublished":"2023-11-29T10:00:12+00:00","dateModified":"2023-11-29T13:10:15+00:00","breadcrumb":{"@id":"https:\/\/softwareengineeringdaily.com\/2023\/11\/29\/the-right-to-be-forgotten-with-gal-ringel\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/softwareengineeringdaily.com\/2023\/11\/29\/the-right-to-be-forgotten-with-gal-ringel\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/softwareengineeringdaily.com\/2023\/11\/29\/the-right-to-be-forgotten-with-gal-ringel\/#primaryimage","url":"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2023\/11\/MineOS.png?fit=600%2C315&ssl=1","contentUrl":"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2023\/11\/MineOS.png?fit=600%2C315&ssl=1","width":600,"height":315},{"@type":"BreadcrumbList","@id":"https:\/\/softwareengineeringdaily.com\/2023\/11\/29\/the-right-to-be-forgotten-with-gal-ringel\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/softwareengineeringdaily.com\/"},{"@type":"ListItem","position":2,"name":"The Right to Be Forgotten with Gal Ringel"}]},{"@type":"WebSite","@id":"https:\/\/softwareengineeringdaily.com\/#website","url":"https:\/\/softwareengineeringdaily.com\/","name":"Software Engineering Daily","description":"","publisher":{"@id":"https:\/\/softwareengineeringdaily.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/softwareengineeringdaily.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/softwareengineeringdaily.com\/#organization","name":"Software Engineering Daily","url":"https:\/\/softwareengineeringdaily.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/softwareengineeringdaily.com\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2024\/01\/cropped-sed_website_banner.png?fit=549%2C169&ssl=1","contentUrl":"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2024\/01\/cropped-sed_website_banner.png?fit=549%2C169&ssl=1","width":549,"height":169,"caption":"Software Engineering Daily"},"image":{"@id":"https:\/\/softwareengineeringdaily.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/software_daily"]},{"@type":"Person","@id":"https:\/\/softwareengineeringdaily.com\/#\/schema\/person\/f1a6631864960c74ef79dae73df8984c","name":"SEDaily","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/softwareengineeringdaily.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/96a9ce2f21db7050dc801bc0505cb90b?s=96&d=retro&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/96a9ce2f21db7050dc801bc0505cb90b?s=96&d=retro&r=pg","caption":"SEDaily"},"url":"https:\/\/softwareengineeringdaily.com\/author\/sed-production\/"}]}},"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2023\/11\/MineOS.png?fit=600%2C315&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p7GuoD-46d","_links":{"self":[{"href":"https:\/\/softwareengineeringdaily.com\/wp-json\/wp\/v2\/posts\/15761"}],"collection":[{"href":"https:\/\/softwareengineeringdaily.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/softwareengineeringdaily.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/softwareengineeringdaily.com\/wp-json\/wp\/v2\/users\/94"}],"replies":[{"embeddable":true,"href":"https:\/\/softwareengineeringdaily.com\/wp-json\/wp\/v2\/comments?post=15761"}],"version-history":[{"count":0,"href":"https:\/\/softwareengineeringdaily.com\/wp-json\/wp\/v2\/posts\/15761\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/softwareengineeringdaily.com\/wp-json\/wp\/v2\/media\/15928"}],"wp:attachment":[{"href":"https:\/\/softwareengineeringdaily.com\/wp-json\/wp\/v2\/media?parent=15761"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/softwareengineeringdaily.com\/wp-json\/wp\/v2\/categories?post=15761"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/softwareengineeringdaily.com\/wp-json\/wp\/v2\/tags?post=15761"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}