[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"nav-categories":3,"article-blockchain-based-data-security-taking-over-key-industries":70},{"data":4},[5,37,57,64],{"name":6,"slug":7,"categories":8},"Productivity","productivity",[9,13,17,21,25,29,33],{"id":10,"title":11,"slug":12},17,"Branding","branding",{"id":14,"title":15,"slug":16},19,"Marketing","marketing",{"id":18,"title":19,"slug":20},20,"Work","work",{"id":22,"title":23,"slug":24},34,"Community","community",{"id":26,"title":27,"slug":28},21,"For newbies","for-newbies",{"id":30,"title":31,"slug":32},24,"Investment","investment",{"id":34,"title":35,"slug":36},22,"Finance","finance",{"name":38,"slug":39,"categories":40},"Tech","tech",[41,45,49,53],{"id":42,"title":43,"slug":44},28,"Technology","technology",{"id":46,"title":47,"slug":48},32,"Artificial Intelligence","artificial-intelligence",{"id":50,"title":51,"slug":52},26,"Security and protection","security-and-protection",{"id":54,"title":55,"slug":56},31,"YouTube Blog","youtube-blog",{"name":58,"slug":59,"categories":60},"News","news",[61],{"id":62,"title":58,"slug":63},18,"quasanews",{"name":65,"slug":66,"categories":67},"Business","business",[68],{"id":69,"title":65,"slug":66},16,{"post":71,"published_news":95,"popular_news":163,"categories":233},{"title":72,"description":73,"meta_title":72,"meta_description":74,"meta_keywords":75,"text":76,"slug":77,"created_at":78,"publish_at":79,"formatted_created_at":80,"category_id":30,"links":81,"view_type":85,"video_url":83,"views":86,"likes":87,"lang":88,"comments_count":87,"category":89},"Blockchain-Based Data Security Taking Over Key Industries","With digital assaults continuously on the ascent, key enterprises are currently being compelled to use new systems and technologies to guarantee that information and resources stay secured.","With digital assaults continuously on the ascent, key enterprises are currently being compelled to use...","Blockchain-Based Data Security, business, Taking Over Key Industries","\u003Cp>Hello!\u003C/p>\n\n\u003Cp>With digital assaults continuously on the ascent, key enterprises are currently being compelled to use new systems and technologies to guarantee that information and resources stay secured.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-16/tttttt-4.webp\" type=\"image/webp\">\u003Cimg alt=\"Blockchain-Based Data Security Taking Over Key Industries\" class=\"image-align-left\" height=\"180\" src=\"https://cdn.quasa.io/photos/foto-16/tttttt-4.jpeg\" width=\"300\" />\u003C/picture>A standout amongst the most prevalent technologies driving this charge is blockchain which is as of now being used inside various parts.\u003C/p>\n\n\u003Cp>The medicinal services field specifically has been implementing \u003Ca href=\"https://quasa.io/media/data-scientists-are-falling-in-love-with-blockchain-technology-why\">blockchain\u003C/a> as they move toward an information driven control with respect to the respectability, security and capacity of touchy patient information, for example, electronic wellbeing records (EHRs).\u003C/p>\n\n\u003Cp>Be that as it may, careless information security among endeavors has made patient information an obvious objective for cybercriminals, making blockchain the ideal solution.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-16/ttttt-14.webp\" type=\"image/webp\">\u003Cimg alt=\"Blockchain-Based Data Security Taking Over Key Industries\" class=\"image-align-left\" height=\"200\" src=\"https://cdn.quasa.io/photos/foto-16/ttttt-14.jpeg\" width=\"300\" />\u003C/picture>Electronic patient information may start from any number of sources &mdash;, for example, medicinal services suppliers, wearable gadgets, and individual wellness trackers.\u003C/p>\n\n\u003Cp>The Affordable Care Act has commanded and given financing to medicinal services suppliers to change into utilizing this information to building electronic wellbeing records.\u003C/p>\n\n\u003Cp>Be that as it may, there&rsquo;s no official widespread convention for sharing and anchoring EHRs.\u003C/p>\n\n\u003Cp>As indicated by the Chamber of Digital Commerce organizer, Perrianne Boring, blockchain technology is a possibly very encouraging innovation for the social insurance field as it gives an extraordinary dimension of protection, security, and confirmation abilities.\u003C/p>\n\n\u003Ch3>Locking Down Patient Data\u003C/h3>\n\n\u003Cp>As per the WEF Global Risks Report, the worldwide economy may have endured $8 trillion in misfortunes due to cybercrime. Blockchain has so far powered the digital money industry, and back, social insurance and land pioneers see the technology as a conceivable cybersecurity solution. It can conceivably enable organizations to restrain their introduction to vindictive online on-screen characters just as give inheritance arrange get to the board.\u003C/p>\n\n\u003Cp>One of the main trend-setters in blockchain technology has been ALTR.\u003C/p>\n\n\u003Cp>In June 2018, ALTR made a sprinkle in the medicinal services scene with its declaration of multi-million-dollar subsidizing to progress is blockchain cybersecurity activity.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-16/oo-5.webp\" type=\"image/webp\">\u003Cimg alt=\"Blockchain-Based Data Security Taking Over Key Industries\" class=\"image-align-left\" height=\"180\" src=\"https://cdn.quasa.io/photos/foto-16/oo-5.jpeg\" width=\"279\" />\u003C/picture>The organization&rsquo;s exclusive Altrchain technology, a blockchain subsidiary, is the principal &ldquo;business programming bundle&rdquo; available for big business security.\u003C/p>\n\n\u003Cp>&ldquo;Our stage screens all inquiries that come in and information that streams out,&rdquo;&nbsp;\u003Cstrong>says Dave Sikora\u003C/strong>, CEO at ALTR. &ldquo;This perceivability empowers associations to see profoundly the connection among clients and information, just as distinguish dangers.&rdquo;\u003C/p>\n\n\u003Cp>With medicinal services and patient information proceeding to end up a focused on resource for digital offenders, search for more social insurance associations to implement comparative blockchain technologies into their security methodologies to all the more likely comprehend information and distinguish potential imperfections in their security framework.\u003C/p>\n\n\u003Ch3>Manufacturing the Road Ahead\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-16/oo-6.webp\" type=\"image/webp\">\u003Cimg alt=\"Blockchain-Based Data Security Taking Over Key Industries\" class=\"image-align-left\" height=\"150\" src=\"https://cdn.quasa.io/photos/foto-16/oo-6.jpeg\" width=\"300\" />\u003C/picture>Programming as a Service (\u003Ca href=\"https://quasa.io/media/best-5-saas-product-development-ideas-for-startups\">SaaS\u003C/a>), cloud and miniaturized scale administrations, local portable applications, new advanced risk vectors and the Internet of Things (IoT) are on the whole quickly changing and developing.\u003C/p>\n\n\u003Cp>To date,&nbsp;blockchain development technology&nbsp;that is appropriate for anchoring very delicate information is an incredibly uncommon ware.\u003C/p>\n\n\u003Cp>Giver Concierge, a specialist organization in the ripeness industry, uncovered in October that it is working with ALTR to anchor patient information. The creative information security procurement applies blockchain to Frtyl, the world&rsquo;s biggest administration that joins facilities with guardians looking for gave eggs, sperm, fetuses and surrogates.. The private blockchain technology is being utilized to ensure very delicate wellbeing and therapeutic information from unapproved get to.\u003C/p>\n\n\u003Cp>Moreover, it gives a sealed record of all information get to solicitations and reactions just as managerial and sporadic action. Their technology gives the &ldquo;advanced truth,&rdquo; making all partners in the chain reliable.\u003C/p>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-16/oo-4.webp\" type=\"image/webp\">\u003Cimg alt=\"Blockchain-Based Data Security Taking Over Key Industries\" class=\"image-align-left\" height=\"168\" src=\"https://cdn.quasa.io/photos/foto-16/oo-4.jpeg\" width=\"299\" />\u003C/picture>This new application for blockchain technology sections and imitates information with the end goal that cybercriminals discover it for all intents and purposes difficult to take or adjust information. . Information engineers structured it to beat the monetary motivation for the robbery of private information and end the ceaseless cycle of feline and mouse that commonly leaves computerized information security merchants and professionals on the losing side of the cybersecurity fight.\u003C/p>\n\n\u003Ch3>The Case for Blockchain\u003C/h3>\n\n\u003Cp>\u003Cpicture class=\"image-align-left\">\u003Csource srcset=\"https://cdn.quasa.io/photos/foto-16/t-1.webp\" type=\"image/webp\">\u003Cimg alt=\"Blockchain-Based Data Security Taking Over Key Industries\" class=\"image-align-left\" height=\"172\" src=\"https://cdn.quasa.io/photos/foto-16/t-1.png\" width=\"300\" />\u003C/picture>The Department of Health and Human Services (HHS) perceives the capability of blockchain for the security-delicate social insurance information.\u003C/p>\n\n\u003Cp>To assist the headway of the technology, the office facilitated the HHS Blockchain Challenge, granting prominent contestants, for example, Deloitte, IBM, MIT and The Mayo Clinic.\u003C/p>\n\n\u003Cp>The honor victors gave the HHS conceivable&nbsp;blockchain service&nbsp;for information, for example, medical coverage claims, installment information and Medicaid applications just as the trading of information between partners.\u003C/p>\n\n\u003Cp>Later on, imaginative blockchain plans will enable undertakings to consent to government ordered protection and trust prerequisites while giving a cybersecurity system that is practically impervious to assault by cybercriminals.\u003C/p>\n\n\u003Cp>Associations, for example, the Donor Concierge joint effort are one of the principal applications for blockchain as a ground-breaking information security system to help the critical work of drug. As indicated by delegates, the technology won&rsquo;t just protect delicate information, however it will likewise furnish the two patients and care suppliers with significant serenity and a superior in general involvement.\u003C/p>\n\n\u003Cp>Thank you!\u003Cbr />\nJoin us on social networks!\u003Cbr />\nSee you!\u003C/p>","blockchain-based-data-security-taking-over-key-industries","2022-11-07T14:14:52.000000Z","2022-11-08T08:30:00.000000Z","08.11.2022",{"image":82,"image_webp":83,"thumb":84,"thumb_webp":84},"https://cdn.quasa.io/images/news/3CtYrsTFfgoFcFlFleGuoipL5UG6c5XnS2cVfpRb.webp",null,"https://cdn.quasa.io/thumbs/news-thumb/images/news/3CtYrsTFfgoFcFlFleGuoipL5UG6c5XnS2cVfpRb.webp","large",4436,0,"en",{"id":30,"title":31,"slug":32,"meta_title":90,"meta_description":91,"meta_keywords":92,"deleted_at":83,"created_at":93,"updated_at":94,"lang":88},"Quasa Media Blog about Growth Hacking in Investing","Investments and life hacks. Forecasts and investment trends in Quasa Media.","Investment, IPO, bonds, Gold, invest. Investments, investor","2021-12-10T10:41:35.000000Z","2024-08-25T15:37:37.000000Z",[96,111,124,137,150],{"title":97,"description":98,"slug":99,"created_at":100,"publish_at":101,"formatted_created_at":102,"category":103,"links":104,"view_type":109,"video_url":83,"views":34,"likes":87,"lang":88,"comments_count":87,"is_pinned":110},"The Post-Human Date: When Your AI Falls in Love for You","Imagine a new episode of Black Mirror: a guy and a girl match on Tinder. They flirt, they banter, they exchange spicy texts for days. Finally, they settle on a date—Friday night, 8:00 PM, at that trendy new bistro. They book the table.","the-post-human-date-when-your-ai-falls-in-love-for-you","2026-04-11T20:04:51.000000Z","2026-04-18T11:04:00.000000Z","18.04.2026",{"title":27,"slug":28},{"image":105,"image_webp":106,"thumb":107,"thumb_webp":108},"https://cdn.quasa.io/images/news/hsPF6lO9iq1GZiDFtVrWsQt3Hox2KAlc76aC1vfK.jpg","https://cdn.quasa.io/images/news/hsPF6lO9iq1GZiDFtVrWsQt3Hox2KAlc76aC1vfK.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/hsPF6lO9iq1GZiDFtVrWsQt3Hox2KAlc76aC1vfK.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/hsPF6lO9iq1GZiDFtVrWsQt3Hox2KAlc76aC1vfK.webp","small",false,{"title":112,"description":113,"slug":114,"created_at":115,"publish_at":116,"formatted_created_at":102,"category":117,"links":118,"view_type":109,"video_url":83,"views":123,"likes":87,"lang":88,"comments_count":87,"is_pinned":110},"Why Does Starbucks Call Its Sizes Tall, Grande, and Venti Instead of Small, Medium, and Large?","This article complements the original branding piece perfectly — it’s practical, insightful, and easy to share. It also gives readers an “aha” moment they can immediately apply to their own business.","why-does-starbucks-call-its-sizes-tall-grande-and-venti-instead-of-small-medium-and-large","2026-04-11T19:43:23.000000Z","2026-04-18T09:26:00.000000Z",{"title":65,"slug":66},{"image":119,"image_webp":120,"thumb":121,"thumb_webp":122},"https://cdn.quasa.io/images/news/9b9ZOqyvaHEyiO6JgpS5NeBzggD5JFTySw4XjXoZ.jpg","https://cdn.quasa.io/images/news/9b9ZOqyvaHEyiO6JgpS5NeBzggD5JFTySw4XjXoZ.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/9b9ZOqyvaHEyiO6JgpS5NeBzggD5JFTySw4XjXoZ.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/9b9ZOqyvaHEyiO6JgpS5NeBzggD5JFTySw4XjXoZ.webp",30,{"title":125,"description":126,"slug":127,"created_at":128,"publish_at":129,"formatted_created_at":102,"category":130,"links":131,"view_type":109,"video_url":83,"views":136,"likes":87,"lang":88,"comments_count":87,"is_pinned":110},"Teledildonics: How Hackers Are Literally Screwing With Your Sex Life","There’s a new buzzword lighting up the tech world: teledildonics (also known as cyberdildonics). If you haven’t heard it yet, buckle up — it’s exactly what it sounds like.","teledildonics-how-hackers-are-literally-screwing-with-your-sex-life","2026-04-11T19:14:27.000000Z","2026-04-18T06:03:00.000000Z",{"title":43,"slug":44},{"image":132,"image_webp":133,"thumb":134,"thumb_webp":135},"https://cdn.quasa.io/images/news/a4n7mDL8au9AEvOOwf7deFcgSdmvOgYpWcQpjEhH.jpg","https://cdn.quasa.io/images/news/a4n7mDL8au9AEvOOwf7deFcgSdmvOgYpWcQpjEhH.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/a4n7mDL8au9AEvOOwf7deFcgSdmvOgYpWcQpjEhH.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/a4n7mDL8au9AEvOOwf7deFcgSdmvOgYpWcQpjEhH.webp",51,{"title":138,"description":139,"slug":140,"created_at":141,"publish_at":142,"formatted_created_at":102,"category":143,"links":144,"view_type":109,"video_url":83,"views":149,"likes":87,"lang":88,"comments_count":87,"is_pinned":110},"The $10 Million Deal That Turned Crocs Into a Fashion Empire: The Untold Story of Jibbitz","Most people still think of Crocs as the ugly, utilitarian foam clogs worn by nurses, boat owners, and dads at the barbecue.","the-10-million-deal-that-turned-crocs-into-a-fashion-empire-the-untold-story-of-jibbitz","2026-04-11T18:59:06.000000Z","2026-04-18T03:51:00.000000Z",{"title":65,"slug":66},{"image":145,"image_webp":146,"thumb":147,"thumb_webp":148},"https://cdn.quasa.io/images/news/AkkdFllveIxcELNjTsDNxL63qMLaSzI1i1gvPQAW.jpg","https://cdn.quasa.io/images/news/AkkdFllveIxcELNjTsDNxL63qMLaSzI1i1gvPQAW.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/AkkdFllveIxcELNjTsDNxL63qMLaSzI1i1gvPQAW.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/AkkdFllveIxcELNjTsDNxL63qMLaSzI1i1gvPQAW.webp",62,{"title":151,"description":152,"slug":153,"created_at":154,"publish_at":154,"formatted_created_at":155,"category":156,"links":157,"view_type":109,"video_url":83,"views":162,"likes":87,"lang":88,"comments_count":87,"is_pinned":110},"OpenAI Claps Back Hard at Anthropic with GPT-5.4-Cyber: Real Cyber Defense for the Actual World, Not Just the Elite","OpenAI just threw a gauntlet at Anthropic.On April 14, 2026, the company launched GPT-5.4-Cyber — a specialized, cyber-permissive version of GPT-5.4 — and massively scaled its Trusted Access for Cyber (TAC) program.","openai-claps-back-hard-at-anthropic-with-gpt-5-4-cyber-real-cyber-defense-for-the-actual-world-not-just-the-elite","2026-04-17T12:30:07.000000Z","17.04.2026",{"title":47,"slug":48},{"image":158,"image_webp":159,"thumb":160,"thumb_webp":161},"https://cdn.quasa.io/images/news/bFelVXIpMp7CXVmFyQLEeWiZVfp503jaUSNFZAin.jpg","https://cdn.quasa.io/images/news/bFelVXIpMp7CXVmFyQLEeWiZVfp503jaUSNFZAin.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/bFelVXIpMp7CXVmFyQLEeWiZVfp503jaUSNFZAin.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/bFelVXIpMp7CXVmFyQLEeWiZVfp503jaUSNFZAin.webp",139,[164,177,192,204,219],{"title":165,"description":166,"slug":167,"created_at":168,"publish_at":169,"formatted_created_at":170,"category":171,"links":172,"view_type":109,"video_url":83,"views":175,"likes":176,"lang":88,"comments_count":87,"is_pinned":110},"The Anatomy of an Entrepreneur","Entrepreneur is a French word that means an enterpriser. Enterprisers are people who undertake a business or enterprise with the chance of earning profits or suffering from loss.","the-anatomy-of-an-entrepreneur","2021-08-04T15:18:21.000000Z","2025-12-14T06:09:00.000000Z","14.12.2025",{"title":65,"slug":66},{"image":173,"image_webp":83,"thumb":174,"thumb_webp":174},"https://cdn.quasa.io/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/mVsXPTMuHZuI7UXCsENgL1Qwp1uSOf7Rz3uVPMfm.webp",70670,2,{"title":178,"description":179,"slug":180,"created_at":181,"publish_at":182,"formatted_created_at":183,"category":184,"links":185,"view_type":85,"video_url":83,"views":190,"likes":191,"lang":88,"comments_count":87,"is_pinned":110},"Advertising on QUASA","QUASA MEDIA is read by more than 400 thousand people a month. We offer to place your article, add a link or order the writing of an article for publication.","advertising-on-quasa","2022-07-06T07:33:02.000000Z","2025-12-15T17:33:02.000000Z","15.12.2025",{"title":58,"slug":63},{"image":186,"image_webp":187,"thumb":188,"thumb_webp":189},"https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/45SvmdsTQbiyc3nxgbyHY1mpVbisYyub2BCHjqBL.webp",70429,4,{"title":193,"description":194,"slug":195,"created_at":196,"publish_at":197,"formatted_created_at":198,"category":199,"links":200,"view_type":109,"video_url":83,"views":203,"likes":191,"lang":88,"comments_count":87,"is_pinned":110},"What is a Startup?","A startup is not a new company, not a tech company, nor a new tech company. You can be a new tech company, if your goal is not to grow high and fast; then, you are not a startup. ","what-is-a-startup","2021-08-04T12:05:17.000000Z","2025-12-17T13:02:00.000000Z","17.12.2025",{"title":65,"slug":66},{"image":201,"image_webp":83,"thumb":202,"thumb_webp":202},"https://cdn.quasa.io/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/EOsQhSW3VXyG7a6NPdE1oZd00xfJXe3bjY5aJGb7.webp",68071,{"title":205,"description":206,"slug":207,"created_at":208,"publish_at":209,"formatted_created_at":210,"category":211,"links":212,"view_type":109,"video_url":83,"views":217,"likes":176,"lang":88,"comments_count":218,"is_pinned":110},"Top 5 Tips to Make More Money as a Content Creator","Content creators are one of the most desired job titles right now. Who wouldn’t want to earn a living online?","top-5-tips-to-make-more-money-as-a-content-creator","2022-01-17T17:31:51.000000Z","2026-01-17T11:30:00.000000Z","17.01.2026",{"title":19,"slug":20},{"image":213,"image_webp":214,"thumb":215,"thumb_webp":216},"https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/gP8kiumBPpJmQv6SMieXiX1tDetx43VwFfO1P4Ca.webp",42069,1,{"title":220,"description":221,"slug":222,"created_at":223,"publish_at":224,"formatted_created_at":225,"category":226,"links":227,"view_type":85,"video_url":83,"views":232,"likes":176,"lang":88,"comments_count":87,"is_pinned":110},"8 Logo Design Tips for Small Businesses","Your logo tells the story of your business and the values you stand for.","8-logo-design-tips-for-small-businesses","2021-12-04T21:59:52.000000Z","2025-05-05T03:30:00.000000Z","05.05.2025",{"title":15,"slug":16},{"image":228,"image_webp":229,"thumb":230,"thumb_webp":231},"https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.jpg","https://cdn.quasa.io/thumbs/news-thumb/images/news/Wbx2NtS1CnTupgoQbpFMGspJ5jm4uob2hDOq33r0.webp",41179,[234,235,236,237,238,239,240,241,242,243,244,245,246],{"title":23,"slug":24},{"title":47,"slug":48},{"title":55,"slug":56},{"title":43,"slug":44},{"title":51,"slug":52},{"title":31,"slug":32},{"title":35,"slug":36},{"title":27,"slug":28},{"title":19,"slug":20},{"title":15,"slug":16},{"title":58,"slug":63},{"title":11,"slug":12},{"title":65,"slug":66}]