{"version":"1.0","provider_name":"Ulys","provider_url":"https:\/\/www.ulys.net\/nl\/","author_name":"Ulys","author_url":"https:\/\/www.ulys.net\/nl\/","title":"Juridische instrumenten om cloud computing te beveiligen - Ulys","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"758RQzuqK0\"><a href=\"https:\/\/www.ulys.net\/nl\/conferences\/juridische-instrumenten-om-cloud-computing-te-beveiligen\/\">Juridische instrumenten om cloud computing te beveiligen<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.ulys.net\/nl\/conferences\/juridische-instrumenten-om-cloud-computing-te-beveiligen\/embed\/#?secret=758RQzuqK0\" width=\"600\" height=\"338\" title=\"&#8220;Juridische instrumenten om cloud computing te beveiligen&#8221; &#8212; Ulys\" data-secret=\"758RQzuqK0\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.ulys.net\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.ulys.net\/wp-content\/uploads\/2017\/07\/featured-images\/conferences-pictures\/cloud.jpg","thumbnail_width":1,"thumbnail_height":1,"description":"Cloud computing zou een revolutie berekenen bedrijven. Dit concept kan nu het gebruik van geheugen en computationele capaciteiten van computers en servers in de wereld besteden, maakt het mogelijk voor bedrijven om een enorme rekenkracht aanpassing hebben bovendien demand. Maar als de wolk heeft vele voordelen, zoals nieuwe technologische vooruitgang omvat een aantal risico&#8217;s die... Bekijk Artikel"}