{"id":1321,"date":"2015-12-04T13:58:15","date_gmt":"2015-12-04T13:58:15","guid":{"rendered":"http:\/\/staging.nsfocusglobal.com\/?p=1321"},"modified":"2015-12-04T13:58:15","modified_gmt":"2015-12-04T13:58:15","slug":"modern-ddos-attacks-when-moores-law-meets-darwins-theory-of-evolution","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/modern-ddos-attacks-when-moores-law-meets-darwins-theory-of-evolution\/","title":{"rendered":"Modern DDoS attacks:  When Moore\u2019s law meets Darwin\u2019s Theory of Evolution"},"content":{"rendered":"<p><strong>Track:\u00a0 General Security<a href=\"http:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/stock-photo-68636367-data-security-concept-a01.jpg\"><br \/>\n<\/a><\/strong><\/p>\n<p><strong><em>Author: Dave Martin,\u00a0Director of Product Marketing, NSFOCUS<\/em><\/strong><\/p>\n<p><a href=\"http:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/Cybersecurity_image.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignright wp-image-1328\" src=\"http:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/Cybersecurity_image-300x225.jpg\" alt=\"DDoS attacks\" width=\"361\" height=\"270\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/Cybersecurity_image-300x225.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/Cybersecurity_image-1024x768.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/Cybersecurity_image-768x576.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/Cybersecurity_image.jpg 1200w\" sizes=\"(max-width: 361px) 100vw, 361px\" \/><\/a><\/p>\n<p>What would happen if you combined Moore\u2019s law with Darwin\u2019s Theory of Evolution and applied them to DDoS attacks?\u00a0 Unfortunately, modern DDoS attacks seem to embody this idea perfectly as both the frequency and complexity of these attacks have become truly staggering in just a short amount of time.<\/p>\n<p><!--more--><\/p>\n<p>Darwin\u2019s general premise is that the complex evolves from the simple\u2026but gradually, over an extended period of time.\u00a0 Moore\u2019s law states that the number of transistors in an IC doubles approximately every 2 years \u2013 a phenomenal rate of growth.\u00a0 Today\u2019s DDoS attacks blend both of these ideas and they have never been more frequent, complex and damaging to organizations of any size.<\/p>\n<p>DDoS attacks have evolved at an alarming rate, from very simple volumetric or application layer attacks to complex, multi-layered threats that not only seek to disrupt service, but also to distract from other damaging exploits like theft of vital data or the installation of backdoors for more sophisticated Advanced Persistent Threats (APT). The early days of hacking required some amount of technical skill and a detailed understanding of the underlying network and application protocols to create an attack.\u00a0 Today, there are massive, automated botnets available for rent ranging from $10s to $100s USD monthly and capable of generating up to multiple Gbps worth of attack traffic. They can be combined or used in combination with other amplification techniques to generate an overwhelming amount of attack traffic.\u00a0 These botnets increasingly use sophisticated, complex, multi-layer attacks but can be controlled with a simple web GUI front-end.\u00a0 A single credit card number or PayPal account and the IP address (or addresses) of the victim are often all that is needed to launch massive attacks capable of disrupting critical online systems.<\/p>\n<p>Fortunately, it is not all doom and gloom. DDoS mitigation techniques have also evolved and today the DDoS mitigation solution market is made up of dozens of companies who collectively invest billions of dollars in the research and development of advanced countermeasures.\u00a0 The accuracy and effectiveness of these solutions certainly differ but there is no denying that specialized DDoS technology is being deployed by organizations of all sizes in order to insulate themselves against this growing threat.<\/p>\n<p>&nbsp;<\/p>\n<p><em><strong><a href=\"http:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2016\/02\/DM.jpg\"><img decoding=\"async\" class=\"alignleft wp-image-1919\" src=\"http:\/\/staging.nsfocusglobal.com\/wp-content\/uploads\/2016\/02\/DM.jpg\" alt=\"DM\" width=\"150\" height=\"150\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/02\/DM.jpg 299w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2016\/02\/DM-150x150.jpg 150w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a>Dave Martin<\/strong><\/em> brings to NSFOCUS more than 20 years of experience with IT security and networking technologies in a variety of engineering, product marketing, product management and business development roles.\u00a0 He currently serves as a Director of Product Marketing responsible for market positioning, go-to-market strategy and product release.\u00a0 Prior to joining NSFOCUS Mr. Martin has held executive and technical positions at companies including Edgewater Networks, Nokia, Ipsilon Networks and Newbridge Networks.\u00a0 Mr. Martin is a US Patent holder, a recognized security and networking expert and regular speaker at trade shows, partner conferences, insight panels, webinars and other industry events.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Track:\u00a0 General Security Author: Dave Martin,\u00a0Director of Product Marketing, NSFOCUS What would happen if you combined Moore\u2019s law with Darwin\u2019s Theory of Evolution and applied them to DDoS attacks?\u00a0 Unfortunately, modern DDoS attacks seem to embody this idea perfectly as both the frequency and complexity of these attacks have become truly staggering in just a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":35910,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3],"tags":[60,93,371,372,375,719],"class_list":["post-1321","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-advanced-persistent-threats","tag-apt","tag-ddos","tag-ddos-attack","tag-ddos-attacks","tag-vital-data"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Modern DDoS attacks: When Moore\u2019s law meets Darwin\u2019s Theory of Evolution - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Modern DDoS attacks: When Moore\u2019s law meets Darwin\u2019s Theory of Evolution - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Track:\u00a0 General Security Author: Dave Martin,\u00a0Director of Product Marketing, NSFOCUS What would happen if you combined Moore\u2019s law with Darwin\u2019s Theory of\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/modern-ddos-attacks-when-moores-law-meets-darwins-theory-of-evolution\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2015-12-04T13:58:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/Cybersecurity_image-300x225-1.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Modern DDoS attacks: When Moore\u2019s law meets Darwin\u2019s Theory of Evolution - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Track:\u00a0 General Security Author: Dave Martin,\u00a0Director of Product Marketing, NSFOCUS What would happen if you combined Moore\u2019s law with Darwin\u2019s Theory of\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/Cybersecurity_image-300x225-1.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/modern-ddos-attacks-when-moores-law-meets-darwins-theory-of-evolution\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/modern-ddos-attacks-when-moores-law-meets-darwins-theory-of-evolution\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Modern DDoS attacks: When Moore\u2019s law meets Darwin\u2019s Theory of Evolution\",\"datePublished\":\"2015-12-04T13:58:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/modern-ddos-attacks-when-moores-law-meets-darwins-theory-of-evolution\\\/\"},\"wordCount\":493,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/modern-ddos-attacks-when-moores-law-meets-darwins-theory-of-evolution\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2015\\\/12\\\/Cybersecurity_image-300x225-1.jpg\",\"keywords\":[\"Advanced Persistent Threats\",\"APT\",\"DDoS\",\"DDoS attack\",\"DDoS attacks\",\"vital data\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/modern-ddos-attacks-when-moores-law-meets-darwins-theory-of-evolution\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/modern-ddos-attacks-when-moores-law-meets-darwins-theory-of-evolution\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/modern-ddos-attacks-when-moores-law-meets-darwins-theory-of-evolution\\\/\",\"name\":\"Modern DDoS attacks: When Moore\u2019s law meets Darwin\u2019s Theory of Evolution - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/modern-ddos-attacks-when-moores-law-meets-darwins-theory-of-evolution\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/modern-ddos-attacks-when-moores-law-meets-darwins-theory-of-evolution\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2015\\\/12\\\/Cybersecurity_image-300x225-1.jpg\",\"datePublished\":\"2015-12-04T13:58:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/modern-ddos-attacks-when-moores-law-meets-darwins-theory-of-evolution\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/modern-ddos-attacks-when-moores-law-meets-darwins-theory-of-evolution\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/modern-ddos-attacks-when-moores-law-meets-darwins-theory-of-evolution\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2015\\\/12\\\/Cybersecurity_image-300x225-1.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2015\\\/12\\\/Cybersecurity_image-300x225-1.jpg\",\"width\":300,\"height\":225,\"caption\":\"Red open padlock among blue locked ones.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/modern-ddos-attacks-when-moores-law-meets-darwins-theory-of-evolution\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Modern DDoS attacks: When Moore\u2019s law meets Darwin\u2019s Theory of Evolution\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Modern DDoS attacks: When Moore\u2019s law meets Darwin\u2019s Theory of Evolution - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Modern DDoS attacks: When Moore\u2019s law meets Darwin\u2019s Theory of Evolution - NSFOCUS","og_description":"Track:\u00a0 General Security Author: Dave Martin,\u00a0Director of Product Marketing, NSFOCUS What would happen if you combined Moore\u2019s law with Darwin\u2019s Theory of","og_url":"https:\/\/nsfocusglobal.com\/modern-ddos-attacks-when-moores-law-meets-darwins-theory-of-evolution\/","og_site_name":"NSFOCUS","article_published_time":"2015-12-04T13:58:15+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/Cybersecurity_image-300x225-1.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Modern DDoS attacks: When Moore\u2019s law meets Darwin\u2019s Theory of Evolution - NSFOCUS","twitter_description":"Track:\u00a0 General Security Author: Dave Martin,\u00a0Director of Product Marketing, NSFOCUS What would happen if you combined Moore\u2019s law with Darwin\u2019s Theory of","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/Cybersecurity_image-300x225-1.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/modern-ddos-attacks-when-moores-law-meets-darwins-theory-of-evolution\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/modern-ddos-attacks-when-moores-law-meets-darwins-theory-of-evolution\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Modern DDoS attacks: When Moore\u2019s law meets Darwin\u2019s Theory of Evolution","datePublished":"2015-12-04T13:58:15+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/modern-ddos-attacks-when-moores-law-meets-darwins-theory-of-evolution\/"},"wordCount":493,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/modern-ddos-attacks-when-moores-law-meets-darwins-theory-of-evolution\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/Cybersecurity_image-300x225-1.jpg","keywords":["Advanced Persistent Threats","APT","DDoS","DDoS attack","DDoS attacks","vital data"],"articleSection":["Blog"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/modern-ddos-attacks-when-moores-law-meets-darwins-theory-of-evolution\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/modern-ddos-attacks-when-moores-law-meets-darwins-theory-of-evolution\/","url":"https:\/\/nsfocusglobal.com\/modern-ddos-attacks-when-moores-law-meets-darwins-theory-of-evolution\/","name":"Modern DDoS attacks: When Moore\u2019s law meets Darwin\u2019s Theory of Evolution - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/modern-ddos-attacks-when-moores-law-meets-darwins-theory-of-evolution\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/modern-ddos-attacks-when-moores-law-meets-darwins-theory-of-evolution\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/Cybersecurity_image-300x225-1.jpg","datePublished":"2015-12-04T13:58:15+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/modern-ddos-attacks-when-moores-law-meets-darwins-theory-of-evolution\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/modern-ddos-attacks-when-moores-law-meets-darwins-theory-of-evolution\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/modern-ddos-attacks-when-moores-law-meets-darwins-theory-of-evolution\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/Cybersecurity_image-300x225-1.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2015\/12\/Cybersecurity_image-300x225-1.jpg","width":300,"height":225,"caption":"Red open padlock among blue locked ones."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/modern-ddos-attacks-when-moores-law-meets-darwins-theory-of-evolution\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Modern DDoS attacks: When Moore\u2019s law meets Darwin\u2019s Theory of Evolution"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/1321","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=1321"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/1321\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/35910"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=1321"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=1321"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=1321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}