{"id":244,"date":"2018-07-13T13:59:17","date_gmt":"2018-07-13T11:59:17","guid":{"rendered":"https:\/\/einformatyka.com.pl\/index.php\/koszyk\/"},"modified":"2018-07-13T13:59:17","modified_gmt":"2018-07-13T11:59:17","slug":"koszyk","status":"publish","type":"page","link":"https:\/\/einformatyka.com.pl\/index.php\/koszyk\/","title":{"rendered":"Koszyk"},"content":{"rendered":"<p>[woocommerce_cart]<\/p>\n<div class=\"sharedaddy sd-sharing-enabled\"><div class=\"robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing\"><h3 class=\"sd-title\">Share this:<\/h3><div class=\"sd-content\"><ul><li><a href=\"#\" class=\"sharing-anchor sd-button share-more\"><span>Share<\/span><\/a><\/li><li class=\"share-end\"><\/li><\/ul><div class=\"sharing-hidden\"><div class=\"inner\" style=\"display: none;\"><ul><li class=\"share-twitter\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-twitter-244\" class=\"share-twitter sd-button share-icon\" href=\"https:\/\/einformatyka.com.pl\/index.php\/koszyk\/?share=twitter\" target=\"_blank\" title=\"Click to share on Twitter\" ><span>Twitter<\/span><\/a><\/li><li class=\"share-print\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-print sd-button share-icon\" href=\"https:\/\/einformatyka.com.pl\/index.php\/koszyk\/\" target=\"_blank\" title=\"Click to print\" ><span>Print<\/span><\/a><\/li><li class=\"share-end\"><\/li><li class=\"share-facebook\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-facebook-244\" class=\"share-facebook sd-button share-icon\" href=\"https:\/\/einformatyka.com.pl\/index.php\/koszyk\/?share=facebook\" target=\"_blank\" title=\"Click to share on Facebook\" ><span>Facebook<\/span><\/a><\/li><li class=\"share-end\"><\/li><\/ul><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>[woocommerce_cart]<\/p>\n<div class=\"sharedaddy sd-sharing-enabled\"><div class=\"robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing\"><h3 class=\"sd-title\">Share this:<\/h3><div class=\"sd-content\"><ul><li><a href=\"#\" class=\"sharing-anchor sd-button share-more\"><span>Share<\/span><\/a><\/li><li class=\"share-end\"><\/li><\/ul><div class=\"sharing-hidden\"><div class=\"inner\" style=\"display: none;\"><ul><li class=\"share-twitter\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-twitter-244\" class=\"share-twitter sd-button share-icon\" href=\"https:\/\/einformatyka.com.pl\/index.php\/koszyk\/?share=twitter\" target=\"_blank\" title=\"Click to share on Twitter\" ><span>Twitter<\/span><\/a><\/li><li class=\"share-print\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-print sd-button share-icon\" href=\"https:\/\/einformatyka.com.pl\/index.php\/koszyk\/\" target=\"_blank\" title=\"Click to print\" ><span>Print<\/span><\/a><\/li><li class=\"share-end\"><\/li><li class=\"share-facebook\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-facebook-244\" class=\"share-facebook sd-button share-icon\" href=\"https:\/\/einformatyka.com.pl\/index.php\/koszyk\/?share=facebook\" target=\"_blank\" title=\"Click to share on Facebook\" ><span>Facebook<\/span><\/a><\/li><li class=\"share-end\"><\/li><\/ul><\/div><\/div><\/div><\/div><\/div>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"jetpack_post_was_ever_published":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Koszyk - Einformatyka<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/einformatyka.com.pl\/index.php\/koszyk\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Koszyk - Einformatyka\" \/>\n<meta property=\"og:description\" content=\"[woocommerce_cart]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/einformatyka.com.pl\/index.php\/koszyk\/\" \/>\n<meta property=\"og:site_name\" content=\"Einformatyka\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/einformatyka\/\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/einformatyka.com.pl\/index.php\/koszyk\/\",\"url\":\"https:\/\/einformatyka.com.pl\/index.php\/koszyk\/\",\"name\":\"Koszyk - Einformatyka\",\"isPartOf\":{\"@id\":\"https:\/\/einformatyka.com.pl\/#website\"},\"datePublished\":\"2018-07-13T11:59:17+00:00\",\"dateModified\":\"2018-07-13T11:59:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/einformatyka.com.pl\/index.php\/koszyk\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/einformatyka.com.pl\/index.php\/koszyk\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/einformatyka.com.pl\/index.php\/koszyk\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/einformatyka.com.pl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Koszyk\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/einformatyka.com.pl\/#website\",\"url\":\"https:\/\/einformatyka.com.pl\/\",\"name\":\"Einformatyka\",\"description\":\"Us\u0142ugi informatyczne\",\"publisher\":{\"@id\":\"https:\/\/einformatyka.com.pl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/einformatyka.com.pl\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/einformatyka.com.pl\/#organization\",\"name\":\"Einformatyka\",\"url\":\"https:\/\/einformatyka.com.pl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\/\/einformatyka.com.pl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i0.wp.com\/einformatyka.com.pl\/wp-content\/uploads\/2018\/06\/Einformatyka-logo-1.png?fit=3658%2C1122&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/einformatyka.com.pl\/wp-content\/uploads\/2018\/06\/Einformatyka-logo-1.png?fit=3658%2C1122&ssl=1\",\"width\":3658,\"height\":1122,\"caption\":\"Einformatyka\"},\"image\":{\"@id\":\"https:\/\/einformatyka.com.pl\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/einformatyka\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Koszyk - Einformatyka","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/einformatyka.com.pl\/index.php\/koszyk\/","og_locale":"pl_PL","og_type":"article","og_title":"Koszyk - Einformatyka","og_description":"[woocommerce_cart]","og_url":"https:\/\/einformatyka.com.pl\/index.php\/koszyk\/","og_site_name":"Einformatyka","article_publisher":"https:\/\/www.facebook.com\/einformatyka\/","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/einformatyka.com.pl\/index.php\/koszyk\/","url":"https:\/\/einformatyka.com.pl\/index.php\/koszyk\/","name":"Koszyk - Einformatyka","isPartOf":{"@id":"https:\/\/einformatyka.com.pl\/#website"},"datePublished":"2018-07-13T11:59:17+00:00","dateModified":"2018-07-13T11:59:17+00:00","breadcrumb":{"@id":"https:\/\/einformatyka.com.pl\/index.php\/koszyk\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/einformatyka.com.pl\/index.php\/koszyk\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/einformatyka.com.pl\/index.php\/koszyk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/einformatyka.com.pl\/"},{"@type":"ListItem","position":2,"name":"Koszyk"}]},{"@type":"WebSite","@id":"https:\/\/einformatyka.com.pl\/#website","url":"https:\/\/einformatyka.com.pl\/","name":"Einformatyka","description":"Us\u0142ugi informatyczne","publisher":{"@id":"https:\/\/einformatyka.com.pl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/einformatyka.com.pl\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/einformatyka.com.pl\/#organization","name":"Einformatyka","url":"https:\/\/einformatyka.com.pl\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/einformatyka.com.pl\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/einformatyka.com.pl\/wp-content\/uploads\/2018\/06\/Einformatyka-logo-1.png?fit=3658%2C1122&ssl=1","contentUrl":"https:\/\/i0.wp.com\/einformatyka.com.pl\/wp-content\/uploads\/2018\/06\/Einformatyka-logo-1.png?fit=3658%2C1122&ssl=1","width":3658,"height":1122,"caption":"Einformatyka"},"image":{"@id":"https:\/\/einformatyka.com.pl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/einformatyka\/"]}]}},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/Pabt0O-3W","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":333,"url":"https:\/\/einformatyka.com.pl\/index.php\/regulamin-sklepu-internetowego-einformatyka-inz-tomasz-radwan\/","url_meta":{"origin":244,"position":0},"title":"Regulamin sklepu internetowego Einformatyka inz. Tomasz Radwan","date":"2 sierpnia 2018","format":false,"excerpt":"\u00a71 Postanowienia wst\u0119pne \u00a0 Sklep internetowy Einformatyka, dost\u0119pny pod adresem internetowym https:\/\/einformatyka.com.pl , prowadzony jest przez Tomasza Radwana prowadz\u0105cego dzia\u0142alno\u015b\u0107 gospodarcz\u0105 pod firm\u0105 Einformatyka, wpisan\u0105 do Centralnej Ewidencji i Informacji o Dzia\u0142alno\u015bci Gospodarczej (CEIDG) prowadzonej przez ministra w\u0142a\u015bciwego ds. gospodarki, NIP 5492256712, REGON 362805950 Niniejszy Regulamin skierowany jest zar\u00f3wno do\u2026","rel":"","context":"Similar post","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/einformatyka.com.pl\/index.php\/wp-json\/wp\/v2\/pages\/244"}],"collection":[{"href":"https:\/\/einformatyka.com.pl\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/einformatyka.com.pl\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/einformatyka.com.pl\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/einformatyka.com.pl\/index.php\/wp-json\/wp\/v2\/comments?post=244"}],"version-history":[{"count":0,"href":"https:\/\/einformatyka.com.pl\/index.php\/wp-json\/wp\/v2\/pages\/244\/revisions"}],"wp:attachment":[{"href":"https:\/\/einformatyka.com.pl\/index.php\/wp-json\/wp\/v2\/media?parent=244"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}