{"id":8071,"date":"2015-06-29T14:17:49","date_gmt":"2015-06-29T13:17:49","guid":{"rendered":"http:\/\/sites.cardiff.ac.uk\/piracylessons\/?p=8071"},"modified":"2015-06-29T14:27:06","modified_gmt":"2015-06-29T13:27:06","slug":"the-cgpcs-in-15-steps-explained","status":"publish","type":"post","link":"http:\/\/sites.cardiff.ac.uk\/piracylessons\/2015\/06\/29\/the-cgpcs-in-15-steps-explained\/","title":{"rendered":"The CGPCS: in 15 steps explained"},"content":{"rendered":"<p>In a new Powerpoint presentation by the EEAS the work of the CGPCS is explained in 15 easy steps. The presentation discusses how the CGPCS was designed, how it functions\u00a0and why it worked so well in containing piracy. It also discusses the link between the CGPCS and the broader UN architecture (view the entire presentation <a href=\"http:\/\/sites.cardiff.ac.uk\/piracylessons\/files\/2015\/06\/CGPCS-Internet-release.pdf\">here<\/a>).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a new Powerpoint presentation by the EEAS the work of the CGPCS is explained in 15 easy steps. The presentation discusses how the CGPCS was designed, how it functions\u00a0and why it worked so well in containing piracy. It also &hellip; <a href=\"http:\/\/sites.cardiff.ac.uk\/piracylessons\/2015\/06\/29\/the-cgpcs-in-15-steps-explained\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":310,"featured_media":8074,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":["post-8071","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-reflections"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/sites.cardiff.ac.uk\/piracylessons\/files\/2015\/06\/CGPCS-explained.png?fit=480%2C360","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4C7f9-26b","meta_box":[],"_links":{"self":[{"href":"http:\/\/sites.cardiff.ac.uk\/piracylessons\/wp-json\/wp\/v2\/posts\/8071","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/sites.cardiff.ac.uk\/piracylessons\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/sites.cardiff.ac.uk\/piracylessons\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/sites.cardiff.ac.uk\/piracylessons\/wp-json\/wp\/v2\/users\/310"}],"replies":[{"embeddable":true,"href":"http:\/\/sites.cardiff.ac.uk\/piracylessons\/wp-json\/wp\/v2\/comments?post=8071"}],"version-history":[{"count":3,"href":"http:\/\/sites.cardiff.ac.uk\/piracylessons\/wp-json\/wp\/v2\/posts\/8071\/revisions"}],"predecessor-version":[{"id":8080,"href":"http:\/\/sites.cardiff.ac.uk\/piracylessons\/wp-json\/wp\/v2\/posts\/8071\/revisions\/8080"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/sites.cardiff.ac.uk\/piracylessons\/wp-json\/wp\/v2\/media\/8074"}],"wp:attachment":[{"href":"http:\/\/sites.cardiff.ac.uk\/piracylessons\/wp-json\/wp\/v2\/media?parent=8071"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/sites.cardiff.ac.uk\/piracylessons\/wp-json\/wp\/v2\/categories?post=8071"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/sites.cardiff.ac.uk\/piracylessons\/wp-json\/wp\/v2\/tags?post=8071"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}