{"id":2,"name":"WV8JCR","url":"https:\/\/kb.w8par.org","description":"Computer Science\/Software Development\/Networking\/Security\/HAM: WV8JCR.","link":"https:\/\/kb.w8par.org\/?author=2","slug":"jrichard","avatar_urls":{"24":"https:\/\/secure.gravatar.com\/avatar\/2648247623c953f792e9638389b0a9d844901e3b2c939f0ef46ffaa3744bb76f?s=24&d=mm&r=g","48":"https:\/\/secure.gravatar.com\/avatar\/2648247623c953f792e9638389b0a9d844901e3b2c939f0ef46ffaa3744bb76f?s=48&d=mm&r=g","96":"https:\/\/secure.gravatar.com\/avatar\/2648247623c953f792e9638389b0a9d844901e3b2c939f0ef46ffaa3744bb76f?s=96&d=mm&r=g"},"meta":[],"_links":{"self":[{"href":"https:\/\/kb.w8par.org\/index.php?rest_route=\/wp\/v2\/users\/2","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kb.w8par.org\/index.php?rest_route=\/wp\/v2\/users"}]}}