{"version":"1.0","type":"video","provider_name":"media.ccc.de","provider_url":"https://media.ccc.de","width":640,"height":360,"title":"When hacker uses ELK stack for visualization","author":"Milan Gabor","thumbnail_url":"https://static.media.ccc.de/media/conferences/mrmcd/mrmcd15/7038-sd.jpg","html":"\u003ciframe src=\"https://media.ccc.de/v/MRMCD15-7038-when_hacker_uses_elk_stack_for_visualization/oembed\" width=\"640\" height=\"360\" frameborder=\"0\" title=\"When hacker uses ELK stack for visualization\" allowfullscreen scrolling=\"no\"\u003e\u003c/iframe\u003e\n"}