{"version":"1.0","provider_name":"Positioning Magazine","provider_url":"https:\/\/positioningmag.com","author_name":"admin","author_url":"https:\/\/positioningmag.com\/author\/admin","title":"Cyber voices : May 2008 \u0e08\u0e31\u0e1a\u0e42\u0e06\u0e29\u0e13\u0e32\u0e0a\u0e19\u0e01\u0e31\u0e19 \u0e14\u0e31\u0e19\u0e01\u0e23\u0e30\u0e17\u0e39\u0e49\u0e23\u0e49\u0e2d\u0e19\u0e41\u0e23\u0e07","type":"rich","width":600,"height":338,"html":"
Cyber voices : May 2008 \u0e08\u0e31\u0e1a\u0e42\u0e06\u0e29\u0e13\u0e32\u0e0a\u0e19\u0e01\u0e31\u0e19 \u0e14\u0e31\u0e19\u0e01\u0e23\u0e30\u0e17\u0e39\u0e49\u0e23\u0e49\u0e2d\u0e19\u0e41\u0e23\u0e07<\/a><\/blockquote>\n