{"id":1568,"date":"2013-08-15T04:46:19","date_gmt":"2013-08-15T04:46:19","guid":{"rendered":"http:\/\/asc-cybernetics.org\/2013\/?p=1568"},"modified":"2013-08-15T04:46:19","modified_gmt":"2013-08-15T04:46:19","slug":"work-session-1-1","status":"publish","type":"post","link":"https:\/\/asc-cybernetics.org\/2013\/?p=1568","title":{"rendered":"Work Session 1.1"},"content":{"rendered":"<p>Here are some impression form work session 1.1 and the following presentations.<\/p>\n<div id=\"attachment_1565\" style=\"width: 620px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/asc-cybernetics.org\/2013\/wp-content\/uploads\/2013\/08\/groupwork1.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1565\" src=\"https:\/\/asc-cybernetics.org\/2013\/wp-content\/uploads\/2013\/08\/groupwork1.jpg\" alt=\"Group work during work session 1.1\" width=\"620\" height=\"412\" class=\"size-full wp-image-1565\" srcset=\"https:\/\/asc-cybernetics.org\/2013\/wp-content\/uploads\/2013\/08\/groupwork1.jpg 620w, https:\/\/asc-cybernetics.org\/2013\/wp-content\/uploads\/2013\/08\/groupwork1-300x199.jpg 300w\" sizes=\"auto, (max-width: 620px) 100vw, 620px\" \/><\/a><p id=\"caption-attachment-1565\" class=\"wp-caption-text\">Group work during work session 1.1<\/p><\/div>\n<div id=\"attachment_1566\" style=\"width: 620px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/asc-cybernetics.org\/2013\/wp-content\/uploads\/2013\/08\/groupwork2.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1566\" src=\"https:\/\/asc-cybernetics.org\/2013\/wp-content\/uploads\/2013\/08\/groupwork2.jpg\" alt=\"More group work during work session 1.1\" width=\"620\" height=\"412\" class=\"size-full wp-image-1566\" srcset=\"https:\/\/asc-cybernetics.org\/2013\/wp-content\/uploads\/2013\/08\/groupwork2.jpg 620w, https:\/\/asc-cybernetics.org\/2013\/wp-content\/uploads\/2013\/08\/groupwork2-300x199.jpg 300w\" sizes=\"auto, (max-width: 620px) 100vw, 620px\" \/><\/a><p id=\"caption-attachment-1566\" class=\"wp-caption-text\">More group work during work session 1.1<\/p><\/div>\n<div id=\"attachment_1567\" style=\"width: 620px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/asc-cybernetics.org\/2013\/wp-content\/uploads\/2013\/08\/presentation1.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1567\" src=\"https:\/\/asc-cybernetics.org\/2013\/wp-content\/uploads\/2013\/08\/presentation1.jpg\" alt=\"A presentation after session 1.1\" width=\"620\" height=\"412\" class=\"size-full wp-image-1567\" srcset=\"https:\/\/asc-cybernetics.org\/2013\/wp-content\/uploads\/2013\/08\/presentation1.jpg 620w, https:\/\/asc-cybernetics.org\/2013\/wp-content\/uploads\/2013\/08\/presentation1-300x199.jpg 300w\" sizes=\"auto, (max-width: 620px) 100vw, 620px\" \/><\/a><p id=\"caption-attachment-1567\" class=\"wp-caption-text\">A presentation after session 1.1<\/p><\/div>\n<div id=\"attachment_1564\" style=\"width: 620px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/asc-cybernetics.org\/2013\/wp-content\/uploads\/2013\/08\/presentation2.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1564\" src=\"https:\/\/asc-cybernetics.org\/2013\/wp-content\/uploads\/2013\/08\/presentation2.jpg\" alt=\"Another presentation after session 1.1\" width=\"620\" height=\"412\" class=\"size-full wp-image-1564\" srcset=\"https:\/\/asc-cybernetics.org\/2013\/wp-content\/uploads\/2013\/08\/presentation2.jpg 620w, https:\/\/asc-cybernetics.org\/2013\/wp-content\/uploads\/2013\/08\/presentation2-300x199.jpg 300w\" sizes=\"auto, (max-width: 620px) 100vw, 620px\" \/><\/a><p id=\"caption-attachment-1564\" class=\"wp-caption-text\">Another presentation after session 1.1<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Here are some impression form work session 1.1 and the following presentations.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1568","post","type-post","status-publish","format-standard","hentry","category-uncategorized","item-wrap"],"_links":{"self":[{"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=\/wp\/v2\/posts\/1568","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1568"}],"version-history":[{"count":1,"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=\/wp\/v2\/posts\/1568\/revisions"}],"predecessor-version":[{"id":1569,"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=\/wp\/v2\/posts\/1568\/revisions\/1569"}],"wp:attachment":[{"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1568"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1568"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1568"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}