{"image_url":null,"width":"100%","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fbleis-tift.hatenablog.com%2Fentry%2F20071016%2F1192533058\" title=\"Java \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 - \u3050\u308b\u3050\u308b\uff5e\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","url":"https://bleis-tift.hatenablog.com/entry/20071016/1192533058","categories":["Java","Book","Security"],"type":"rich","height":"190","provider_name":"Hatena Blog","author_url":"https://blog.hatena.ne.jp/bleis-tift/","author_name":"bleis-tift","published":"2007-10-16 20:10:58","blog_url":"https://bleis-tift.hatenablog.com/","blog_title":"\u3050\u308b\u3050\u308b\uff5e","title":"Java \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3","description":"Java \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u4e00\u901a\u308a\u8aad\u307f\u7d42\u3048\u305f\u3002\u3053\u306e\u672c\u3092\u4e00\u5e74\u524d\u306b\u8cb7\u3063\u3066\u305f\u3089\u30fb\u30fb\u30fb \u3053\u3063\u3061\u3067\u3082\u3044\u3044\u3051\u3069\u3001\u3084\u3063\u3071\u308a\u5370\u5237\u7269\u306f\u9055\u3046\u306d\u3002","provider_url":"https://hatena.blog","version":"1.0"}