{"ad_unit_id":"App_Resource_Sidebar_Upper","resource":{"id":6997082,"author_id":3311134,"title":"CERT-RMM","created_at":"2016-11-15T09:29:41Z","updated_at":"2016-11-16T00:34:22Z","sample":false,"description":"La recuperación frente a incidentes es uno de los temas que más ha tomado importancia al interior de las empresas mediante CERT-RM","alerts_enabled":true,"cached_tag_list":"ti, informática, cert-rmm","deleted_at":null,"hidden":false,"average_rating":null,"demote":false,"private":false,"copyable":true,"score":16,"artificial_base_score":0,"recalculate_score":true,"profane":false,"hide_summary":false,"tag_list":["ti","informática","cert-rmm"],"admin_tag_list":[],"study_aid_type":"MindMap","show_path":"/mind_maps/6997082","folder_id":6376703,"public_author":{"id":3311134,"profile":{"name":"isaac.hmaldonado","about":"","avatar_service":"gravatar","locale":"es-ES","google_author_link":null,"user_type_id":231,"escaped_name":"Yithzak HMaldonado","full_name":"Yithzak HMaldonado","badge_classes":""}}},"width":300,"height":250,"rtype":"MindMap","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"rsubject","value":"Modelados de Gestión Informática"},{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}
{"ad_unit_id":"App_Resource_Sidebar_Lower","resource":{"id":6997082,"author_id":3311134,"title":"CERT-RMM","created_at":"2016-11-15T09:29:41Z","updated_at":"2016-11-16T00:34:22Z","sample":false,"description":"La recuperación frente a incidentes es uno de los temas que más ha tomado importancia al interior de las empresas mediante CERT-RM","alerts_enabled":true,"cached_tag_list":"ti, informática, cert-rmm","deleted_at":null,"hidden":false,"average_rating":null,"demote":false,"private":false,"copyable":true,"score":16,"artificial_base_score":0,"recalculate_score":true,"profane":false,"hide_summary":false,"tag_list":["ti","informática","cert-rmm"],"admin_tag_list":[],"study_aid_type":"MindMap","show_path":"/mind_maps/6997082","folder_id":6376703,"public_author":{"id":3311134,"profile":{"name":"isaac.hmaldonado","about":"","avatar_service":"gravatar","locale":"es-ES","google_author_link":null,"user_type_id":231,"escaped_name":"Yithzak HMaldonado","full_name":"Yithzak HMaldonado","badge_classes":""}}},"width":300,"height":250,"rtype":"MindMap","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"rsubject","value":"Modelados de Gestión Informática"},{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}