{"id":1,"date":"2019-08-15T18:44:02","date_gmt":"2019-08-15T18:44:02","guid":{"rendered":"http:\/\/scholarblogs.emory.edu\/vulnerability\/?p=1"},"modified":"2019-08-19T16:15:40","modified_gmt":"2019-08-19T20:15:40","slug":"hello-world","status":"publish","type":"post","link":"https:\/\/scholarblogs.emory.edu\/vulnerability\/2019\/08\/15\/hello-world\/","title":{"rendered":"Welcome to the VHC blog!"},"content":{"rendered":"<p>This blog will feature excerpts from Professor Martha Fineman&#8217;s published and unpublished work, original blog posts from <a href=\"http:\/\/web.gs.emory.edu\/vulnerability\/\">Vulnerability and the Human Condition<\/a> affiliates, information on upcoming events, and a unique window into VHC workshops &#8211; a privilege until now only accessible to those who have been able to attend VHC workshops or to access the Feminism and Legal Theory Archive at Emory Law.<\/p>\n<p>Stay tuned for more!<\/p>\n<p>You can connect with us in the comments here, and on <a href=\"https:\/\/www.facebook.com\/VulnerabilityAndTheHumanCondition\/\">Facebook<\/a>, <a href=\"https:\/\/twitter.com\/vhcinitiative\">Twitter<\/a>, and <a href=\"https:\/\/soundcloud.com\/voicesinvulnerability\">SoundCloud<\/a>.\u00a0<\/p>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This blog will feature excerpts from Professor Martha Fineman&#8217;s published and unpublished work, original blog posts from Vulnerability and the Human Condition affiliates, information on upcoming events, and a unique window into VHC workshops &#8211; a privilege until now only accessible to those who have been able to attend VHC workshops or to access the &hellip; <a href=\"https:\/\/scholarblogs.emory.edu\/vulnerability\/2019\/08\/15\/hello-world\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Welcome to the VHC blog!<\/span><\/a><\/p>\n","protected":false},"author":6159,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/scholarblogs.emory.edu\/vulnerability\/wp-json\/wp\/v2\/posts\/1","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scholarblogs.emory.edu\/vulnerability\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/scholarblogs.emory.edu\/vulnerability\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/scholarblogs.emory.edu\/vulnerability\/wp-json\/wp\/v2\/users\/6159"}],"replies":[{"embeddable":true,"href":"https:\/\/scholarblogs.emory.edu\/vulnerability\/wp-json\/wp\/v2\/comments?post=1"}],"version-history":[{"count":2,"href":"https:\/\/scholarblogs.emory.edu\/vulnerability\/wp-json\/wp\/v2\/posts\/1\/revisions"}],"predecessor-version":[{"id":17,"href":"https:\/\/scholarblogs.emory.edu\/vulnerability\/wp-json\/wp\/v2\/posts\/1\/revisions\/17"}],"wp:attachment":[{"href":"https:\/\/scholarblogs.emory.edu\/vulnerability\/wp-json\/wp\/v2\/media?parent=1"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/scholarblogs.emory.edu\/vulnerability\/wp-json\/wp\/v2\/categories?post=1"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/scholarblogs.emory.edu\/vulnerability\/wp-json\/wp\/v2\/tags?post=1"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}