{"id":26914,"date":"2022-07-26T15:31:18","date_gmt":"2022-07-26T13:31:18","guid":{"rendered":"https:\/\/www.5fsoftware.de\/2022\/07\/26\/5fsoftware-becomes-a-member-of-the-it-security-cluster-e-v\/"},"modified":"2025-10-16T21:07:44","modified_gmt":"2025-10-16T19:07:44","slug":"5fsoftware-becomes-a-member-of-the-it-security-cluster-e-v","status":"publish","type":"post","link":"https:\/\/www.5fsoftware.de\/en\/2022\/07\/26\/5fsoftware-becomes-a-member-of-the-it-security-cluster-e-v\/","title":{"rendered":"5FSoftware Becomes a Member of the IT Security Cluster E.V."},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1456px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p><strong><em>It is well known that the corridors of <a href=\"https:\/\/www.techbase.de\/\" target=\"_blank\" rel=\"noopener\">Techbase Regensburg<\/a> invite networking. This has been confirmed once again in this case: 5FSoftware is pleased to be accepted into the network of the <a href=\"https:\/\/www.it-sicherheitscluster.de\/\" target=\"_blank\" rel=\"noopener\">IT Security Cluster e.V.<\/a> and looks forward to the membership with excitement. <\/em><\/strong><\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-margin-top:-30px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1456px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:-4px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-2\"><p>The IT Security Cluster e.V. promotes the further development and research of data protection, IT security and information security. For this purpose, IT companies, users, research and training institutions, and lawyers have joined forces.<\/p>\n<p>The cluster sees itself as a multiplier in these fields and contributes to this through numerous events, working groups, as well as training and further education courses. The information security management system <a href=\"https:\/\/cisis12.de\/\" target=\"_blank\" rel=\"noopener\">CISIS12\u00ae<\/a> (ISIS12V3) was developed specifically for small and medium-sized organizations (SMEs). In addition, the IT Security Cluster e.V. is active in start-up funding as a consortium partner of the Digital Founders Initiative Oberpfalz (DGO).<\/p>\n<p>More information at <a href=\"https:\/\/www.it-sicherheitscluster.de\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.it-sicherheitscluster.de\/<\/a>.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":17,"featured_media":24183,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[142,143],"tags":[],"class_list":["post-26914","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-other","category-partnership"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>5FSoftware becomes a member of the IT Security Cluster e.V.<\/title>\n<meta name=\"description\" content=\"5FSoftware becomes a member of the IT Security Cluster e.V. \u2013 5F is pleased to be accepted into the network and looks forward to the future with excitement.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.5fsoftware.de\/en\/2022\/07\/26\/5fsoftware-becomes-a-member-of-the-it-security-cluster-e-v\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5FSoftware becomes a member of the IT Security Cluster e.V.\" \/>\n<meta property=\"og:description\" content=\"5FSoftware becomes a member of the IT Security Cluster e.V. \u2013 5F is pleased to be accepted into the network and looks forward to the future with excitement.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.5fsoftware.de\/en\/2022\/07\/26\/5fsoftware-becomes-a-member-of-the-it-security-cluster-e-v\/\" \/>\n<meta property=\"og:site_name\" content=\"5FSoftware | Plattform f\u00fcr Datenaustausch und Kommunikation\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-26T13:31:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-16T19:07:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.5fsoftware.de\/wp-content\/uploads\/5FSoftware-Mitgliedschaft-im-IT-Cluster.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"831\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lennart Mahling\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lennart Mahling\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.5fsoftware.de\/en\/2022\/07\/26\/5fsoftware-becomes-a-member-of-the-it-security-cluster-e-v\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.5fsoftware.de\/en\/2022\/07\/26\/5fsoftware-becomes-a-member-of-the-it-security-cluster-e-v\/\"},\"author\":{\"name\":\"Lennart Mahling\",\"@id\":\"https:\/\/www.5fsoftware.de\/en\/#\/schema\/person\/af42cb79d19fcfed404b68d2f7fefe7f\"},\"headline\":\"5FSoftware Becomes a Member of the IT Security Cluster E.V.\",\"datePublished\":\"2022-07-26T13:31:18+00:00\",\"dateModified\":\"2025-10-16T19:07:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.5fsoftware.de\/en\/2022\/07\/26\/5fsoftware-becomes-a-member-of-the-it-security-cluster-e-v\/\"},\"wordCount\":1276,\"publisher\":{\"@id\":\"https:\/\/www.5fsoftware.de\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.5fsoftware.de\/en\/2022\/07\/26\/5fsoftware-becomes-a-member-of-the-it-security-cluster-e-v\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.5fsoftware.de\/wp-content\/uploads\/5FSoftware-Mitgliedschaft-im-IT-Cluster.jpg\",\"articleSection\":[\"Other\",\"Partnership\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.5fsoftware.de\/en\/2022\/07\/26\/5fsoftware-becomes-a-member-of-the-it-security-cluster-e-v\/\",\"url\":\"https:\/\/www.5fsoftware.de\/en\/2022\/07\/26\/5fsoftware-becomes-a-member-of-the-it-security-cluster-e-v\/\",\"name\":\"5FSoftware becomes a member of the IT Security Cluster e.V.\",\"isPartOf\":{\"@id\":\"https:\/\/www.5fsoftware.de\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.5fsoftware.de\/en\/2022\/07\/26\/5fsoftware-becomes-a-member-of-the-it-security-cluster-e-v\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.5fsoftware.de\/en\/2022\/07\/26\/5fsoftware-becomes-a-member-of-the-it-security-cluster-e-v\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.5fsoftware.de\/wp-content\/uploads\/5FSoftware-Mitgliedschaft-im-IT-Cluster.jpg\",\"datePublished\":\"2022-07-26T13:31:18+00:00\",\"dateModified\":\"2025-10-16T19:07:44+00:00\",\"description\":\"5FSoftware becomes a member of the IT Security Cluster e.V. \u2013 5F is pleased to be accepted into the network and looks forward to the future with excitement.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.5fsoftware.de\/en\/2022\/07\/26\/5fsoftware-becomes-a-member-of-the-it-security-cluster-e-v\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.5fsoftware.de\/en\/2022\/07\/26\/5fsoftware-becomes-a-member-of-the-it-security-cluster-e-v\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.5fsoftware.de\/en\/2022\/07\/26\/5fsoftware-becomes-a-member-of-the-it-security-cluster-e-v\/#primaryimage\",\"url\":\"https:\/\/www.5fsoftware.de\/wp-content\/uploads\/5FSoftware-Mitgliedschaft-im-IT-Cluster.jpg\",\"contentUrl\":\"https:\/\/www.5fsoftware.de\/wp-content\/uploads\/5FSoftware-Mitgliedschaft-im-IT-Cluster.jpg\",\"width\":1200,\"height\":831,\"caption\":\"5FSoftware \u2013 Member of the IT Security Cluster\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.5fsoftware.de\/en\/2022\/07\/26\/5fsoftware-becomes-a-member-of-the-it-security-cluster-e-v\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.5fsoftware.de\/en\/5f-cloud-platform-for-data-exchange-and-communication\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5FSoftware Becomes a Member of the IT Security Cluster E.V.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.5fsoftware.de\/en\/#website\",\"url\":\"https:\/\/www.5fsoftware.de\/en\/\",\"name\":\"5FSoftware | Plattform f\u00fcr Datenaustausch und Kommunikation\",\"description\":\"5F | Die Plattform f\u00fcr Kanzleien und Unternehmen \u2013 zur effizienten und sicheren Zusammenarbeit mit Mandanten, Kunden und Lieferanten.\",\"publisher\":{\"@id\":\"https:\/\/www.5fsoftware.de\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.5fsoftware.de\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.5fsoftware.de\/en\/#organization\",\"name\":\"5FSoftware | Plattform f\u00fcr Datenaustausch und Kommunikation\",\"url\":\"https:\/\/www.5fsoftware.de\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.5fsoftware.de\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.5fsoftware.de\/wp-content\/uploads\/5Flogo-blau-1000x1000-1.png\",\"contentUrl\":\"https:\/\/www.5fsoftware.de\/wp-content\/uploads\/5Flogo-blau-1000x1000-1.png\",\"width\":1000,\"height\":1000,\"caption\":\"5FSoftware | Plattform f\u00fcr Datenaustausch und Kommunikation\"},\"image\":{\"@id\":\"https:\/\/www.5fsoftware.de\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.instagram.com\/5fsoftware\/\",\"https:\/\/www.linkedin.com\/company\/5fsoftware-gmbh\/mycompany\/?viewAsMember=true\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.5fsoftware.de\/en\/#\/schema\/person\/af42cb79d19fcfed404b68d2f7fefe7f\",\"name\":\"Lennart Mahling\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.5fsoftware.de\/wp-content\/uploads\/Avatar-Lennart_01-144x142.jpeg\",\"url\":\"https:\/\/www.5fsoftware.de\/wp-content\/uploads\/Avatar-Lennart_01-144x142.jpeg\",\"contentUrl\":\"https:\/\/www.5fsoftware.de\/wp-content\/uploads\/Avatar-Lennart_01-144x142.jpeg\",\"caption\":\"Lennart Mahling\"},\"description\":\"Technischer Redakteur bei 5FSoftware\",\"url\":\"https:\/\/www.5fsoftware.de\/en\/author\/lennart-mahling\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5FSoftware becomes a member of the IT Security Cluster e.V.","description":"5FSoftware becomes a member of the IT Security Cluster e.V. \u2013 5F is pleased to be accepted into the network and looks forward to the future with excitement.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.5fsoftware.de\/en\/2022\/07\/26\/5fsoftware-becomes-a-member-of-the-it-security-cluster-e-v\/","og_locale":"en_US","og_type":"article","og_title":"5FSoftware becomes a member of the IT Security Cluster e.V.","og_description":"5FSoftware becomes a member of the IT Security Cluster e.V. \u2013 5F is pleased to be accepted into the network and looks forward to the future with excitement.","og_url":"https:\/\/www.5fsoftware.de\/en\/2022\/07\/26\/5fsoftware-becomes-a-member-of-the-it-security-cluster-e-v\/","og_site_name":"5FSoftware | Plattform f\u00fcr Datenaustausch und Kommunikation","article_published_time":"2022-07-26T13:31:18+00:00","article_modified_time":"2025-10-16T19:07:44+00:00","og_image":[{"width":1200,"height":831,"url":"https:\/\/www.5fsoftware.de\/wp-content\/uploads\/5FSoftware-Mitgliedschaft-im-IT-Cluster.jpg","type":"image\/jpeg"}],"author":"Lennart Mahling","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lennart Mahling","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.5fsoftware.de\/en\/2022\/07\/26\/5fsoftware-becomes-a-member-of-the-it-security-cluster-e-v\/#article","isPartOf":{"@id":"https:\/\/www.5fsoftware.de\/en\/2022\/07\/26\/5fsoftware-becomes-a-member-of-the-it-security-cluster-e-v\/"},"author":{"name":"Lennart Mahling","@id":"https:\/\/www.5fsoftware.de\/en\/#\/schema\/person\/af42cb79d19fcfed404b68d2f7fefe7f"},"headline":"5FSoftware Becomes a Member of the IT Security Cluster E.V.","datePublished":"2022-07-26T13:31:18+00:00","dateModified":"2025-10-16T19:07:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.5fsoftware.de\/en\/2022\/07\/26\/5fsoftware-becomes-a-member-of-the-it-security-cluster-e-v\/"},"wordCount":1276,"publisher":{"@id":"https:\/\/www.5fsoftware.de\/en\/#organization"},"image":{"@id":"https:\/\/www.5fsoftware.de\/en\/2022\/07\/26\/5fsoftware-becomes-a-member-of-the-it-security-cluster-e-v\/#primaryimage"},"thumbnailUrl":"https:\/\/www.5fsoftware.de\/wp-content\/uploads\/5FSoftware-Mitgliedschaft-im-IT-Cluster.jpg","articleSection":["Other","Partnership"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.5fsoftware.de\/en\/2022\/07\/26\/5fsoftware-becomes-a-member-of-the-it-security-cluster-e-v\/","url":"https:\/\/www.5fsoftware.de\/en\/2022\/07\/26\/5fsoftware-becomes-a-member-of-the-it-security-cluster-e-v\/","name":"5FSoftware becomes a member of the IT Security Cluster e.V.","isPartOf":{"@id":"https:\/\/www.5fsoftware.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.5fsoftware.de\/en\/2022\/07\/26\/5fsoftware-becomes-a-member-of-the-it-security-cluster-e-v\/#primaryimage"},"image":{"@id":"https:\/\/www.5fsoftware.de\/en\/2022\/07\/26\/5fsoftware-becomes-a-member-of-the-it-security-cluster-e-v\/#primaryimage"},"thumbnailUrl":"https:\/\/www.5fsoftware.de\/wp-content\/uploads\/5FSoftware-Mitgliedschaft-im-IT-Cluster.jpg","datePublished":"2022-07-26T13:31:18+00:00","dateModified":"2025-10-16T19:07:44+00:00","description":"5FSoftware becomes a member of the IT Security Cluster e.V. \u2013 5F is pleased to be accepted into the network and looks forward to the future with excitement.","breadcrumb":{"@id":"https:\/\/www.5fsoftware.de\/en\/2022\/07\/26\/5fsoftware-becomes-a-member-of-the-it-security-cluster-e-v\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.5fsoftware.de\/en\/2022\/07\/26\/5fsoftware-becomes-a-member-of-the-it-security-cluster-e-v\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.5fsoftware.de\/en\/2022\/07\/26\/5fsoftware-becomes-a-member-of-the-it-security-cluster-e-v\/#primaryimage","url":"https:\/\/www.5fsoftware.de\/wp-content\/uploads\/5FSoftware-Mitgliedschaft-im-IT-Cluster.jpg","contentUrl":"https:\/\/www.5fsoftware.de\/wp-content\/uploads\/5FSoftware-Mitgliedschaft-im-IT-Cluster.jpg","width":1200,"height":831,"caption":"5FSoftware \u2013 Member of the IT Security Cluster"},{"@type":"BreadcrumbList","@id":"https:\/\/www.5fsoftware.de\/en\/2022\/07\/26\/5fsoftware-becomes-a-member-of-the-it-security-cluster-e-v\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.5fsoftware.de\/en\/5f-cloud-platform-for-data-exchange-and-communication\/"},{"@type":"ListItem","position":2,"name":"5FSoftware Becomes a Member of the IT Security Cluster E.V."}]},{"@type":"WebSite","@id":"https:\/\/www.5fsoftware.de\/en\/#website","url":"https:\/\/www.5fsoftware.de\/en\/","name":"5FSoftware | Plattform f\u00fcr Datenaustausch und Kommunikation","description":"5F | Die Plattform f\u00fcr Kanzleien und Unternehmen \u2013 zur effizienten und sicheren Zusammenarbeit mit Mandanten, Kunden und Lieferanten.","publisher":{"@id":"https:\/\/www.5fsoftware.de\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.5fsoftware.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.5fsoftware.de\/en\/#organization","name":"5FSoftware | Plattform f\u00fcr Datenaustausch und Kommunikation","url":"https:\/\/www.5fsoftware.de\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.5fsoftware.de\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.5fsoftware.de\/wp-content\/uploads\/5Flogo-blau-1000x1000-1.png","contentUrl":"https:\/\/www.5fsoftware.de\/wp-content\/uploads\/5Flogo-blau-1000x1000-1.png","width":1000,"height":1000,"caption":"5FSoftware | Plattform f\u00fcr Datenaustausch und Kommunikation"},"image":{"@id":"https:\/\/www.5fsoftware.de\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.instagram.com\/5fsoftware\/","https:\/\/www.linkedin.com\/company\/5fsoftware-gmbh\/mycompany\/?viewAsMember=true"]},{"@type":"Person","@id":"https:\/\/www.5fsoftware.de\/en\/#\/schema\/person\/af42cb79d19fcfed404b68d2f7fefe7f","name":"Lennart Mahling","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.5fsoftware.de\/wp-content\/uploads\/Avatar-Lennart_01-144x142.jpeg","url":"https:\/\/www.5fsoftware.de\/wp-content\/uploads\/Avatar-Lennart_01-144x142.jpeg","contentUrl":"https:\/\/www.5fsoftware.de\/wp-content\/uploads\/Avatar-Lennart_01-144x142.jpeg","caption":"Lennart Mahling"},"description":"Technischer Redakteur bei 5FSoftware","url":"https:\/\/www.5fsoftware.de\/en\/author\/lennart-mahling\/"}]}},"_links":{"self":[{"href":"https:\/\/www.5fsoftware.de\/en\/wp-json\/wp\/v2\/posts\/26914","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.5fsoftware.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.5fsoftware.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.5fsoftware.de\/en\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.5fsoftware.de\/en\/wp-json\/wp\/v2\/comments?post=26914"}],"version-history":[{"count":3,"href":"https:\/\/www.5fsoftware.de\/en\/wp-json\/wp\/v2\/posts\/26914\/revisions"}],"predecessor-version":[{"id":26934,"href":"https:\/\/www.5fsoftware.de\/en\/wp-json\/wp\/v2\/posts\/26914\/revisions\/26934"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.5fsoftware.de\/en\/wp-json\/wp\/v2\/media\/24183"}],"wp:attachment":[{"href":"https:\/\/www.5fsoftware.de\/en\/wp-json\/wp\/v2\/media?parent=26914"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.5fsoftware.de\/en\/wp-json\/wp\/v2\/categories?post=26914"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.5fsoftware.de\/en\/wp-json\/wp\/v2\/tags?post=26914"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}