{"id":407,"date":"2024-04-21T22:25:55","date_gmt":"2024-04-21T22:25:55","guid":{"rendered":"https:\/\/computingculture.com\/simondon\/?post_type=podcast&#038;p=407"},"modified":"2024-04-24T22:26:09","modified_gmt":"2024-04-24T22:26:09","slug":"april-21-2024","status":"publish","type":"podcast","link":"https:\/\/computingculture.com\/simondon\/podcast\/april-21-2024\/","title":{"rendered":"April 21, 2024"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":378,"menu_order":14,"comment_status":"closed","ping_status":"closed","template":"","meta":{"episode_type":"audio","audio_file":"https:\/\/computingculture.com\/simondon\/wp-content\/uploads\/2024\/04\/April-21-2024.mp3","cover_image":"","cover_image_id":"","duration":"1:14:34","filesize":"63.51M","date_recorded":"2024-04-24 22:25:55","explicit":"","block":"","itunes_episode_number":"","itunes_title":"","itunes_season_number":"","itunes_episode_type":"","filesize_raw":"66590496"},"tags":[],"series":[8],"class_list":["post-407","podcast","type-podcast","status-publish","has-post-thumbnail","hentry","series-merleau-ponty-structure-of-behavior","entry"],"episode_featured_image":"https:\/\/computingculture.com\/simondon\/wp-content\/uploads\/2024\/01\/m-p_logo.jpg","episode_player_image":"https:\/\/computingculture.com\/simondon\/wp-content\/uploads\/2023\/12\/m-p_logo.jpg","download_link":"https:\/\/computingculture.com\/simondon\/podcast-download\/407\/april-21-2024.mp3","player_link":"https:\/\/computingculture.com\/simondon\/podcast-player\/407\/april-21-2024.mp3","audio_player":"<audio class=\"wp-audio-shortcode\" id=\"audio-407-1\" preload=\"none\" style=\"width: 100%;\" controls=\"controls\"><source type=\"audio\/mpeg\" src=\"https:\/\/computingculture.com\/simondon\/podcast-player\/407\/april-21-2024.mp3?_=1\" \/><a href=\"https:\/\/computingculture.com\/simondon\/podcast-player\/407\/april-21-2024.mp3\">https:\/\/computingculture.com\/simondon\/podcast-player\/407\/april-21-2024.mp3<\/a><\/audio>","episode_data":{"playerMode":"dark","subscribeUrls":{"apple_podcasts":{"key":"apple_podcasts","url":"https:\/\/podcasts.apple.com\/us\/podcast\/maurice-merleau-ponty-|-the-structure-of-behavior\/id1722079944","label":"Apple Podcasts","class":"apple_podcasts","icon":"apple-podcasts.png"},"stitcher":{"key":"stitcher","url":"","label":"Stitcher","class":"stitcher","icon":"stitcher.png"},"google_podcasts":{"key":"google_podcasts","url":"","label":"Google Podcasts","class":"google_podcasts","icon":"google-podcasts.png"},"spotify":{"key":"spotify","url":"https:\/\/open.spotify.com\/show\/6yH4xIRtVtmiISHGqtztuS","label":"Spotify","class":"spotify","icon":"spotify.png"}},"rssFeedUrl":"https:\/\/computingculture.com\/simondon\/feed\/podcast\/merleau-ponty-structure-of-behavior","embedCode":"<blockquote class=\"wp-embedded-content\" data-secret=\"NOj8JMbE22\"><a href=\"https:\/\/computingculture.com\/simondon\/podcast\/april-21-2024\/\">April 21, 2024<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/computingculture.com\/simondon\/podcast\/april-21-2024\/embed\/#?secret=NOj8JMbE22\" width=\"500\" height=\"350\" title=\"&#8220;April 21, 2024&#8221; &#8212; The DGQC Simondon Reading Group podcast page\" data-secret=\"NOj8JMbE22\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/computingculture.com\/simondon\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n"},"_links":{"self":[{"href":"https:\/\/computingculture.com\/simondon\/wp-json\/wp\/v2\/podcast\/407","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computingculture.com\/simondon\/wp-json\/wp\/v2\/podcast"}],"about":[{"href":"https:\/\/computingculture.com\/simondon\/wp-json\/wp\/v2\/types\/podcast"}],"author":[{"embeddable":true,"href":"https:\/\/computingculture.com\/simondon\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/computingculture.com\/simondon\/wp-json\/wp\/v2\/comments?post=407"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/computingculture.com\/simondon\/wp-json\/wp\/v2\/media\/378"}],"wp:attachment":[{"href":"https:\/\/computingculture.com\/simondon\/wp-json\/wp\/v2\/media?parent=407"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/computingculture.com\/simondon\/wp-json\/wp\/v2\/tags?post=407"},{"taxonomy":"series","embeddable":true,"href":"https:\/\/computingculture.com\/simondon\/wp-json\/wp\/v2\/series?post=407"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}