{"ad_unit_id":"App_Resource_Sidebar_Upper","resource":{"id":3463856,"author_id":1649049,"title":"SEGURIDAD EN REDES WI-FI","created_at":"2015-09-14T20:42:39Z","updated_at":"2016-10-06T00:31:34Z","sample":false,"description":"Mapa mental del vídeo sobre introducción de seguridad en redes WIFI","alerts_enabled":true,"cached_tag_list":"seguridad, redes, wifi","deleted_at":null,"hidden":false,"average_rating":null,"demote":false,"private":false,"copyable":true,"score":16,"artificial_base_score":0,"recalculate_score":false,"profane":false,"hide_summary":false,"tag_list":["seguridad","redes","wifi"],"admin_tag_list":[],"study_aid_type":"MindMap","show_path":"/mind_maps/3463856","folder_id":2610339,"public_author":{"id":1649049,"profile":{"name":"lacevedo","about":null,"avatar_service":"google","locale":"es-ES","google_author_link":"https://plus.google.com/+LUISANGELACEVEDOVELEZ","user_type_id":247,"escaped_name":"Luis Angel Acevedo Velez","full_name":"Luis Angel Acevedo Velez","badge_classes":""}}},"width":300,"height":250,"rtype":"MindMap","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"rsubject","value":"Telematica"},{"key":"rlevel","value":"Teoría General de Sistemas"},{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}
{"ad_unit_id":"App_Resource_Sidebar_Lower","resource":{"id":3463856,"author_id":1649049,"title":"SEGURIDAD EN REDES WI-FI","created_at":"2015-09-14T20:42:39Z","updated_at":"2016-10-06T00:31:34Z","sample":false,"description":"Mapa mental del vídeo sobre introducción de seguridad en redes WIFI","alerts_enabled":true,"cached_tag_list":"seguridad, redes, wifi","deleted_at":null,"hidden":false,"average_rating":null,"demote":false,"private":false,"copyable":true,"score":16,"artificial_base_score":0,"recalculate_score":false,"profane":false,"hide_summary":false,"tag_list":["seguridad","redes","wifi"],"admin_tag_list":[],"study_aid_type":"MindMap","show_path":"/mind_maps/3463856","folder_id":2610339,"public_author":{"id":1649049,"profile":{"name":"lacevedo","about":null,"avatar_service":"google","locale":"es-ES","google_author_link":"https://plus.google.com/+LUISANGELACEVEDOVELEZ","user_type_id":247,"escaped_name":"Luis Angel Acevedo Velez","full_name":"Luis Angel Acevedo Velez","badge_classes":""}}},"width":300,"height":250,"rtype":"MindMap","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"rsubject","value":"Telematica"},{"key":"rlevel","value":"Teoría General de Sistemas"},{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}