{"ad_unit_id":"App_Resource_Sidebar_Upper","resource":{"id":36493631,"author_id":13071223,"title":"Seguridad y Wi-fi Publico ","created_at":"2022-05-03T15:53:15Z","updated_at":"2022-05-03T23:39:28Z","sample":false,"description":"En esta presentación, revisaremos las consideraciones al navegar en redes Wi-fi públicas ","alerts_enabled":true,"cached_tag_list":"wi-fi, tecnología, seguridad, ciberseguridad, informatica","deleted_at":null,"hidden":false,"average_rating":null,"demote":false,"private":false,"copyable":true,"score":20,"artificial_base_score":0,"recalculate_score":false,"profane":false,"hide_summary":false,"tag_list":["wi-fi","tecnología","seguridad","ciberseguridad","informatica"],"admin_tag_list":[],"study_aid_type":"SlideSet","show_path":"/slide_sets/36493631","folder_id":44003886,"public_author":{"id":13071223,"profile":{"name":"Julio9688","about":null,"avatar_service":"google","locale":"es-ES","google_author_link":null,"user_type_id":240,"escaped_name":"Julio Sanchez","full_name":"Julio Sanchez","badge_classes":"ubadge ubadge-educator "}}},"width":300,"height":250,"rtype":"SlideSet","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"rsubject","value":"Tecnología"},{"key":"env","value":"production"},{"key":"rtype","value":"SlideSet"},{"key":"rmode","value":"canonical"},{"key":"sequence","value":1},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}
{"ad_unit_id":"App_Resource_Sidebar_Lower","resource":{"id":36493631,"author_id":13071223,"title":"Seguridad y Wi-fi Publico ","created_at":"2022-05-03T15:53:15Z","updated_at":"2022-05-03T23:39:28Z","sample":false,"description":"En esta presentación, revisaremos las consideraciones al navegar en redes Wi-fi públicas ","alerts_enabled":true,"cached_tag_list":"wi-fi, tecnología, seguridad, ciberseguridad, informatica","deleted_at":null,"hidden":false,"average_rating":null,"demote":false,"private":false,"copyable":true,"score":20,"artificial_base_score":0,"recalculate_score":false,"profane":false,"hide_summary":false,"tag_list":["wi-fi","tecnología","seguridad","ciberseguridad","informatica"],"admin_tag_list":[],"study_aid_type":"SlideSet","show_path":"/slide_sets/36493631","folder_id":44003886,"public_author":{"id":13071223,"profile":{"name":"Julio9688","about":null,"avatar_service":"google","locale":"es-ES","google_author_link":null,"user_type_id":240,"escaped_name":"Julio Sanchez","full_name":"Julio Sanchez","badge_classes":"ubadge ubadge-educator "}}},"width":300,"height":250,"rtype":"SlideSet","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"rsubject","value":"Tecnología"},{"key":"env","value":"production"},{"key":"rtype","value":"SlideSet"},{"key":"rmode","value":"canonical"},{"key":"sequence","value":1},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}