{"version":"1.0","provider_name":"El Instituto del Fracaso","provider_url":"https:\/\/thefailureinstitute.com\/es","author_name":"reports","author_url":"https:\/\/thefailureinstitute.com\/es\/author\/reports\/","title":"Vulnerability & Deeper connections - The Failure Institute","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"MItkG9ml1m\"><a href=\"https:\/\/thefailureinstitute.com\/es\/reports\/vulnerability-deeper-connections\/\">Vulnerabilidad y conexiones m\u00e1s profundas<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/thefailureinstitute.com\/es\/reports\/vulnerability-deeper-connections\/embed\/#?secret=MItkG9ml1m\" width=\"600\" height=\"338\" title=\"&#8220;Vulnerability &#038; Deeper connections&#8221; &#8212; The Failure Institute\" data-secret=\"MItkG9ml1m\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>","thumbnail_url":"https:\/\/thefailureinstitute.com\/wp-content\/uploads\/2020\/09\/Report-vulnerability.jpg","thumbnail_width":1142,"thumbnail_height":599,"description":"How to embrace vulnerability and why it connects us in an authentic way Modules Intro \u00bb Quarantine dilemma Darkness or light Sane insanity What is vulnerability \u00bb Vulnerability as authenticity Awareness and trust Vulnerability at work \u00bb Vulnerable leadership \u00bb Building empathetic relationships \u00bb Introduction We want to introduce our live experience subject with an [&hellip;]"}