{"version":"1.0","provider_name":"Viz Note Vietnamese - AI Insights &amp; Software Industry Updates","provider_url":"https:\/\/www.viz-note.com\/vi","author_name":"vpadmin","author_url":"https:\/\/www.viz-note.com\/vi\/author\/vpadmin\/","title":"M\u00f4 h\u00ecnh b\u1ea3o m\u1eadt b\u1eb1ng UML: H\u01b0\u1edbng d\u1eabn to\u00e0n di\u1ec7n \ud83d\udee1\ufe0f","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"RLjNEfjRB9\"><a href=\"https:\/\/www.viz-note.com\/vi\/security-modeling-using-uml\/\">H\u01b0\u1edbng d\u1eabn UML: M\u00f4 h\u00ecnh b\u1ea3o m\u1eadt b\u1eb1ng Ng\u00f4n ng\u1eef m\u00f4 h\u00ecnh h\u00f3a th\u1ed1ng nh\u1ea5t<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.viz-note.com\/vi\/security-modeling-using-uml\/embed\/#?secret=RLjNEfjRB9\" width=\"600\" height=\"338\" title=\"&#8220;H\u01b0\u1edbng d\u1eabn UML: M\u00f4 h\u00ecnh b\u1ea3o m\u1eadt b\u1eb1ng Ng\u00f4n ng\u1eef m\u00f4 h\u00ecnh h\u00f3a th\u1ed1ng nh\u1ea5t&#8221; &#8212; Viz Note Vietnamese - AI Insights &amp; Software Industry Updates\" data-secret=\"RLjNEfjRB9\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.viz-note.com\/vi\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.viz-note.com\/vi\/wp-content\/uploads\/sites\/10\/2026\/03\/security-modeling-uml-infographic-hand-drawn.jpg","thumbnail_width":1664,"thumbnail_height":928,"description":"H\u1ecdc c\u00e1ch \u00e1p d\u1ee5ng Ng\u00f4n ng\u1eef M\u00f4 h\u00ecnh h\u00f3a T\u1ed5ng h\u1ee3p cho ki\u1ebfn tr\u00fac b\u1ea3o m\u1eadt. Bao g\u1ed3m m\u00f4 h\u00ecnh h\u00f3a m\u1ed1i \u0111e d\u1ecda, c\u00e1c tr\u01b0\u1eddng h\u1ee3p s\u1eed d\u1ee5ng v\u00e0 c\u00e1c th\u1ef1c h\u00e0nh t\u1ed1t nh\u1ea5t cho thi\u1ebft k\u1ebf h\u1ec7 th\u1ed1ng an to\u00e0n."}