{"id":401,"date":"2020-10-18T12:20:41","date_gmt":"2020-10-18T10:20:41","guid":{"rendered":"https:\/\/webs.uab.cat\/hpc4eas\/biblio\/analysis-of-parallel-application-checkpoint-storage-for-system-configuration\/"},"modified":"2020-10-18T12:20:41","modified_gmt":"2020-10-18T10:20:41","slug":"analysis-of-parallel-application-checkpoint-storage-for-system-configuration","status":"publish","type":"biblio","link":"https:\/\/webs.uab.cat\/hpc4eas\/biblio\/analysis-of-parallel-application-checkpoint-storage-for-system-configuration\/","title":{"rendered":"Analysis of parallel application checkpoint storage for system configuration"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":20,"featured_media":0,"template":"","class_list":["post-401","biblio","type-biblio","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/webs.uab.cat\/hpc4eas\/wp-json\/wp\/v2\/biblio\/401","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webs.uab.cat\/hpc4eas\/wp-json\/wp\/v2\/biblio"}],"about":[{"href":"https:\/\/webs.uab.cat\/hpc4eas\/wp-json\/wp\/v2\/types\/biblio"}],"author":[{"embeddable":true,"href":"https:\/\/webs.uab.cat\/hpc4eas\/wp-json\/wp\/v2\/users\/20"}],"wp:attachment":[{"href":"https:\/\/webs.uab.cat\/hpc4eas\/wp-json\/wp\/v2\/media?parent=401"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}