{"version":"1.0","provider_name":"CHM","provider_url":"https:\/\/computerhistory.org","author_name":"mespinosa","author_url":"https:\/\/computerhistory.org\/blog\/author\/mespinosa\/","title":"Core Magazine, 2016","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"tw5uKBSDAA\"><a href=\"https:\/\/computerhistory.org\/publications\/core-magazine-2016\/\">Core Magazine, 2016<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/computerhistory.org\/publications\/core-magazine-2016\/embed\/#?secret=tw5uKBSDAA\" width=\"600\" height=\"338\" title=\"&#8220;Core Magazine, 2016&#8221; &#8212; CHM\" data-secret=\"tw5uKBSDAA\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/computerhistory.org\/wp-content\/uploads\/2019\/07\/core-16.jpg","thumbnail_width":980,"thumbnail_height":653,"description":"Appreciate the role of women in tech with stories about Ada Lovelace, Jane McGonigal, and Raspberry pi. \ufeff Download PDF Explore this issue of Core as contributors Ursula Martin (Oxford University), Marie Hicks (Illinois Institute of Technology), Dag Spicer (CHM), and Marguerite Gong Hancock (CHM) take a critical look at the significance and changing roles [&hellip;]"}