{"id":10,"name":"Douglas Rausch","url":"","description":"","link":"https:\/\/cybersecurity.bellevue.edu\/index.php\/author\/doug-rausch\/","slug":"doug-rausch","avatar_urls":{"24":"https:\/\/secure.gravatar.com\/avatar\/7cb82f2ce9ce26970b4e928fc27109fa929e296d3c1d346fe3e7c3dc11816162?s=24&d=mm&r=g","48":"https:\/\/secure.gravatar.com\/avatar\/7cb82f2ce9ce26970b4e928fc27109fa929e296d3c1d346fe3e7c3dc11816162?s=48&d=mm&r=g","96":"https:\/\/secure.gravatar.com\/avatar\/7cb82f2ce9ce26970b4e928fc27109fa929e296d3c1d346fe3e7c3dc11816162?s=96&d=mm&r=g"},"meta":{"jetpack_donation_warning_dismissed":false},"mpp_avatar":{"24":"https:\/\/cybersecurity.bellevue.edu\/wp-content\/uploads\/2019\/11\/Color-8x10-11.jpg","48":"https:\/\/cybersecurity.bellevue.edu\/wp-content\/uploads\/2019\/11\/Color-8x10-11.jpg","96":"https:\/\/cybersecurity.bellevue.edu\/wp-content\/uploads\/2019\/11\/Color-8x10-11.jpg","150":"https:\/\/cybersecurity.bellevue.edu\/wp-content\/uploads\/2019\/11\/Color-8x10-11.jpg","300":"https:\/\/cybersecurity.bellevue.edu\/wp-content\/uploads\/2019\/11\/Color-8x10-11.jpg","full":"https:\/\/cybersecurity.bellevue.edu\/wp-content\/uploads\/2019\/11\/Color-8x10-11.jpg"},"_links":{"self":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/users\/10","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/users"}]}}