{"id":107888,"date":"2024-11-21T06:21:52","date_gmt":"2024-11-21T06:21:52","guid":{"rendered":"https:\/\/www.42gears.com\/?p=107888"},"modified":"2025-09-19T09:33:11","modified_gmt":"2025-09-19T09:33:11","slug":"the-evolution-of-secure-communication-from-hieroglyphics-to-ztna","status":"publish","type":"post","link":"https:\/\/www.42gears.com\/nl\/blog\/the-evolution-of-secure-communication-from-hieroglyphics-to-ztna\/","title":{"rendered":"The Evolution of Secure Communication: From Hieroglyphics to ZTNA"},"content":{"rendered":"\n<p>In the realm of cybersecurity, a new paradigm is transforming how we approach secure access to business resources: Zero Trust Network Access (ZTNA). But to truly appreciate the significance of this technology, let&#8217;s embark on a journey through time, exploring how humans have safeguarded their most precious information throughout history.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-origin-of-secure-communications\"><strong>Origin of Secure Communications<\/strong><\/h2>\n\n\n\n<p>Imagine yourself in ancient Egypt, 3000 BCE. A pharaoh needs to send a confidential message to his general on the battlefield. How does he ensure the message remains a secret? The solution: hieroglyphics known only to a select few. This early form of encryption marks the birth of secure communication.<\/p>\n\n\n\n<p>Fast forward to 500 BCE in ancient Greece. The Spartan military employs the &#8220;scytale&#8221; &#8211; a cylinder wrapped with a strip of parchment. Messages written on the unwrapped parchment appear as gibberish, decipherable only when wrapped around a cylinder of the correct diameter. Here, we see the concept of &#8220;shared secrets&#8221; emerging &#8211; a precursor to modern encryption keys.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-in-the-middle-ages-smoke-signals-to-sealed-letters\"><strong>In the Middle Ages &#8211; Smoke Signals to Sealed Letters<\/strong><\/h2>\n\n\n\n<p>As civilizations grew more complex, so did their methods of secure communication. In medieval Europe, castle towers served as vantage points for smoke signal communications &#8211; a rudimentary form of network that relied on line-of-sight security.<\/p>\n\n\n\n<p>By the Renaissance, special wax seals on letters became the standard for ensuring message integrity and sender authentication. Breaking the seal would be a medieval data breach!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-modern-digital-age\"><strong>The Modern Digital Age<\/strong><\/h2>\n\n\n\n<p>As we enter the era of digital communication, the need for secure access to resources becomes increasingly critical. Let&#8217;s explore the evolution of secure access technologies:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2024\/11\/Evolution-ZTNA-Infographic-1.jpg\"><img decoding=\"async\" width=\"704\" height=\"1024\" src=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2024\/11\/Evolution-ZTNA-Infographic-1-704x1024.jpg\" alt=\"evolution of secure access technologies\" class=\"wp-image-107925\" style=\"width:840px;height:auto\" srcset=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2024\/11\/Evolution-ZTNA-Infographic-1-704x1024.jpg 704w, https:\/\/www.42gears.com\/wp-content\/uploads\/2024\/11\/Evolution-ZTNA-Infographic-1-206x300.jpg 206w, https:\/\/www.42gears.com\/wp-content\/uploads\/2024\/11\/Evolution-ZTNA-Infographic-1-768x1117.jpg 768w, https:\/\/www.42gears.com\/wp-content\/uploads\/2024\/11\/Evolution-ZTNA-Infographic-1-1056x1536.jpg 1056w, https:\/\/www.42gears.com\/wp-content\/uploads\/2024\/11\/Evolution-ZTNA-Infographic-1.jpg 1293w\" sizes=\"(max-width: 704px) 100vw, 704px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-ztna-the-innovation-in-secure-access\"><strong>ZTNA: The Innovation in Secure Access<\/strong><\/h2>\n\n\n\n<p>So, what makes Zero Trust Network Access the latest and greatest in this long lineage of secure communication technologies?<\/p>\n\n\n\n<p>ZTNA embodies a fundamental shift in security philosophy: &#8220;never trust, always verify.&#8221; Unlike traditional perimeter-based security models, ZTNA assumes that no user, device, or network should be trusted by default, even if they&#8217;re already inside the corporate network.<\/p>\n\n\n\n<p>Key principles of ZTNA include:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Continuous authentication and authorization<\/li>\n\n\n\n<li>Least privilege access<\/li>\n\n\n\n<li>Micro-segmentation of resources<\/li>\n\n\n\n<li>Device posture checking<\/li>\n\n\n\n<li>Encryption of all traffic<\/li>\n<\/ol>\n\n\n\n<p>Imagine a medieval castle where, instead of relying solely on the strength of its outer walls, every room, hallway, and treasure chest requires separate verification. That&#8217;s ZTNA in action.<\/p>\n\n\n\n<p>In practice, ZTNA might look like this: A marketing executive working from a caf\u00e9 needs to access sensitive customer data.&nbsp;<\/p>\n\n\n\n<p>With ZTNA:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Her identity is verified (not just her password, but potentially biometrics or behavioral patterns)<\/li>\n\n\n\n<li>Her device&#8217;s security posture is checked<\/li>\n\n\n\n<li>The network she&#8217;s on is analyzed for potential threats<\/li>\n\n\n\n<li>She&#8217;s granted access only to the specific data she needs, nothing more<\/li>\n\n\n\n<li>Her session is continuously monitored for anomalies<\/li>\n<\/ol>\n\n\n\n<p>This granular, dynamic approach to security is what sets ZTNA apart from its predecessors. It&#8217;s not just about keeping the bad guys out; it&#8217;s about ensuring that even those inside the system can only access what they absolutely need.<\/p>\n\n\n\n<p>As we face an increasingly complex threat landscape, with remote work becoming the norm and cloud services proliferating, ZTNA represents a paradigm shift in how we approach security. It&#8217;s the latest chapter in humanity&#8217;s ongoing quest to protect our most valuable information &#8211; a quest that began with hieroglyphics and smoke signals, and now continues in the digital realm.<\/p>\n\n\n\n<p>The pharaohs of ancient Egypt could scarcely have imagined a world where information travels at the speed of light across global networks. Yet, the fundamental need to secure that information remains unchanged. ZTNA is our modern answer to this age-old challenge, providing a level of security and flexibility that our ancestors could only dream of.<\/p>\n\n\n\n<p>As we look to the future, one thing is certain: the evolution of secure communication is far from over. ZTNA is just the latest milestone in this fascinating journey &#8211; and who knows what groundbreaking technologies the next chapter will bring?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the realm of cybersecurity, a new paradigm is transforming how we approach secure access to business resources: Zero Trust Network Access (ZTNA). But to truly appreciate the significance of this technology, let&#8217;s embark on a journey through time, exploring how humans have safeguarded their most precious information throughout history. Origin of Secure Communications Imagine&hellip;<\/p>\n","protected":false},"author":20,"featured_media":107901,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"latest-blog-template.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-107888","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.6 (Yoast SEO v24.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>From Smoke Signals to Zero Trust Network Access: How Secure Communication Evolved Over Time<\/title>\n<meta name=\"description\" content=\"From hieroglyphics to ZTNA, trace the history of secure communication and see how Zero Trust Network Access is revolutionizing network security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.42gears.com\/blog\/the-evolution-of-secure-communication-from-hieroglyphics-to-ztna\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Evolution of Secure Communication: From Hieroglyphics to ZTNA\" \/>\n<meta property=\"og:description\" content=\"From hieroglyphics to ZTNA, trace the history of secure communication and see how Zero Trust Network Access is revolutionizing network security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.42gears.com\/blog\/the-evolution-of-secure-communication-from-hieroglyphics-to-ztna\/\" \/>\n<meta property=\"og:site_name\" content=\"42Gears Mobility Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/42gears\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-21T06:21:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-19T09:33:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2024\/11\/Featured-Image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"540\" \/>\n\t<meta property=\"og:image:height\" content=\"290\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Prakash Gupta\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@42Gears\" \/>\n<meta name=\"twitter:site\" content=\"@42Gears\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Prakash Gupta\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.42gears.com\/blog\/the-evolution-of-secure-communication-from-hieroglyphics-to-ztna\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/the-evolution-of-secure-communication-from-hieroglyphics-to-ztna\/\"},\"author\":{\"name\":\"Prakash Gupta\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/99a687bf44604d18e4d5540944abf253\"},\"headline\":\"The Evolution of Secure Communication: From Hieroglyphics to ZTNA\",\"datePublished\":\"2024-11-21T06:21:52+00:00\",\"dateModified\":\"2025-09-19T09:33:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/the-evolution-of-secure-communication-from-hieroglyphics-to-ztna\/\"},\"wordCount\":663,\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/the-evolution-of-secure-communication-from-hieroglyphics-to-ztna\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2024\/11\/Featured-Image.jpg\",\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"nl\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.42gears.com\/blog\/the-evolution-of-secure-communication-from-hieroglyphics-to-ztna\/\",\"url\":\"https:\/\/www.42gears.com\/blog\/the-evolution-of-secure-communication-from-hieroglyphics-to-ztna\/\",\"name\":\"From Smoke Signals to Zero Trust Network Access: How Secure Communication Evolved Over Time\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/the-evolution-of-secure-communication-from-hieroglyphics-to-ztna\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/the-evolution-of-secure-communication-from-hieroglyphics-to-ztna\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2024\/11\/Featured-Image.jpg\",\"datePublished\":\"2024-11-21T06:21:52+00:00\",\"dateModified\":\"2025-09-19T09:33:11+00:00\",\"description\":\"From hieroglyphics to ZTNA, trace the history of secure communication and see how Zero Trust Network Access is revolutionizing network security.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/the-evolution-of-secure-communication-from-hieroglyphics-to-ztna\/#breadcrumb\"},\"inLanguage\":\"nl\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.42gears.com\/blog\/the-evolution-of-secure-communication-from-hieroglyphics-to-ztna\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl\",\"@id\":\"https:\/\/www.42gears.com\/blog\/the-evolution-of-secure-communication-from-hieroglyphics-to-ztna\/#primaryimage\",\"url\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2024\/11\/Featured-Image.jpg\",\"contentUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2024\/11\/Featured-Image.jpg\",\"width\":540,\"height\":290,\"caption\":\"Evolution of secure communication hieroglyphics to ZTNA\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.42gears.com\/blog\/the-evolution-of-secure-communication-from-hieroglyphics-to-ztna\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.42gears.com\/nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Evolution of Secure Communication: From Hieroglyphics to ZTNA\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.42gears.com\/#website\",\"url\":\"https:\/\/www.42gears.com\/\",\"name\":\"42Gears Mobility Systems\",\"description\":\"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown\",\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.42gears.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.42gears.com\/#organization\",\"name\":\"MDM - 42Gears\",\"url\":\"https:\/\/www.42gears.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"contentUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"width\":499,\"height\":330,\"caption\":\"MDM - 42Gears\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/42gears\",\"https:\/\/x.com\/42Gears\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/99a687bf44604d18e4d5540944abf253\",\"name\":\"Prakash Gupta\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/19ecf3794c4052f6e09f343b434e63eaf0afa6dec268a6f29f47bbe6bb074c38?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/19ecf3794c4052f6e09f343b434e63eaf0afa6dec268a6f29f47bbe6bb074c38?s=96&d=mm&r=g\",\"caption\":\"Prakash Gupta\"},\"description\":\"Prakash heads the technology and product development division at 42Gears. He likes to be actively involved in building market-leading computing solutions and has published 3 US patents.\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"From Smoke Signals to Zero Trust Network Access: How Secure Communication Evolved Over Time","description":"From hieroglyphics to ZTNA, trace the history of secure communication and see how Zero Trust Network Access is revolutionizing network security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.42gears.com\/blog\/the-evolution-of-secure-communication-from-hieroglyphics-to-ztna\/","og_locale":"nl_NL","og_type":"article","og_title":"The Evolution of Secure Communication: From Hieroglyphics to ZTNA","og_description":"From hieroglyphics to ZTNA, trace the history of secure communication and see how Zero Trust Network Access is revolutionizing network security.","og_url":"https:\/\/www.42gears.com\/blog\/the-evolution-of-secure-communication-from-hieroglyphics-to-ztna\/","og_site_name":"42Gears Mobility Systems","article_publisher":"https:\/\/www.facebook.com\/42gears","article_published_time":"2024-11-21T06:21:52+00:00","article_modified_time":"2025-09-19T09:33:11+00:00","og_image":[{"width":540,"height":290,"url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2024\/11\/Featured-Image.jpg","type":"image\/jpeg"}],"author":"Prakash Gupta","twitter_card":"summary_large_image","twitter_creator":"@42Gears","twitter_site":"@42Gears","twitter_misc":{"Written by":"Prakash Gupta","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.42gears.com\/blog\/the-evolution-of-secure-communication-from-hieroglyphics-to-ztna\/#article","isPartOf":{"@id":"https:\/\/www.42gears.com\/blog\/the-evolution-of-secure-communication-from-hieroglyphics-to-ztna\/"},"author":{"name":"Prakash Gupta","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/99a687bf44604d18e4d5540944abf253"},"headline":"The Evolution of Secure Communication: From Hieroglyphics to ZTNA","datePublished":"2024-11-21T06:21:52+00:00","dateModified":"2025-09-19T09:33:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.42gears.com\/blog\/the-evolution-of-secure-communication-from-hieroglyphics-to-ztna\/"},"wordCount":663,"publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"image":{"@id":"https:\/\/www.42gears.com\/blog\/the-evolution-of-secure-communication-from-hieroglyphics-to-ztna\/#primaryimage"},"thumbnailUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2024\/11\/Featured-Image.jpg","articleSection":["Uncategorized"],"inLanguage":"nl"},{"@type":"WebPage","@id":"https:\/\/www.42gears.com\/blog\/the-evolution-of-secure-communication-from-hieroglyphics-to-ztna\/","url":"https:\/\/www.42gears.com\/blog\/the-evolution-of-secure-communication-from-hieroglyphics-to-ztna\/","name":"From Smoke Signals to Zero Trust Network Access: How Secure Communication Evolved Over Time","isPartOf":{"@id":"https:\/\/www.42gears.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.42gears.com\/blog\/the-evolution-of-secure-communication-from-hieroglyphics-to-ztna\/#primaryimage"},"image":{"@id":"https:\/\/www.42gears.com\/blog\/the-evolution-of-secure-communication-from-hieroglyphics-to-ztna\/#primaryimage"},"thumbnailUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2024\/11\/Featured-Image.jpg","datePublished":"2024-11-21T06:21:52+00:00","dateModified":"2025-09-19T09:33:11+00:00","description":"From hieroglyphics to ZTNA, trace the history of secure communication and see how Zero Trust Network Access is revolutionizing network security.","breadcrumb":{"@id":"https:\/\/www.42gears.com\/blog\/the-evolution-of-secure-communication-from-hieroglyphics-to-ztna\/#breadcrumb"},"inLanguage":"nl","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.42gears.com\/blog\/the-evolution-of-secure-communication-from-hieroglyphics-to-ztna\/"]}]},{"@type":"ImageObject","inLanguage":"nl","@id":"https:\/\/www.42gears.com\/blog\/the-evolution-of-secure-communication-from-hieroglyphics-to-ztna\/#primaryimage","url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2024\/11\/Featured-Image.jpg","contentUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2024\/11\/Featured-Image.jpg","width":540,"height":290,"caption":"Evolution of secure communication hieroglyphics to ZTNA"},{"@type":"BreadcrumbList","@id":"https:\/\/www.42gears.com\/blog\/the-evolution-of-secure-communication-from-hieroglyphics-to-ztna\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.42gears.com\/nl\/"},{"@type":"ListItem","position":2,"name":"The Evolution of Secure Communication: From Hieroglyphics to ZTNA"}]},{"@type":"WebSite","@id":"https:\/\/www.42gears.com\/#website","url":"https:\/\/www.42gears.com\/","name":"42Gears Mobility Systems","description":"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown","publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.42gears.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl"},{"@type":"Organization","@id":"https:\/\/www.42gears.com\/#organization","name":"MDM - 42Gears","url":"https:\/\/www.42gears.com\/","logo":{"@type":"ImageObject","inLanguage":"nl","@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","contentUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","width":499,"height":330,"caption":"MDM - 42Gears"},"image":{"@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/42gears","https:\/\/x.com\/42Gears"]},{"@type":"Person","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/99a687bf44604d18e4d5540944abf253","name":"Prakash Gupta","image":{"@type":"ImageObject","inLanguage":"nl","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/19ecf3794c4052f6e09f343b434e63eaf0afa6dec268a6f29f47bbe6bb074c38?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/19ecf3794c4052f6e09f343b434e63eaf0afa6dec268a6f29f47bbe6bb074c38?s=96&d=mm&r=g","caption":"Prakash Gupta"},"description":"Prakash heads the technology and product development division at 42Gears. He likes to be actively involved in building market-leading computing solutions and has published 3 US patents."}]}},"author_meta":{"ID":"20","user_nicename":"prakash","user_email":"prakash@42gears.com","user_registered":"2020-06-19 10:40:31","display_name":"Prakash Gupta","first_name":"Prakash","last_name":"Gupta"},"featured_image_url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2024\/11\/Featured-Image.jpg","_links":{"self":[{"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/posts\/107888","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/comments?post=107888"}],"version-history":[{"count":7,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/posts\/107888\/revisions"}],"predecessor-version":[{"id":124187,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/posts\/107888\/revisions\/124187"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/media\/107901"}],"wp:attachment":[{"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/media?parent=107888"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/categories?post=107888"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/tags?post=107888"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}