handleFeed({"widgets":[{"fid":"catalyst-live","developerId":"df3c0546-a793-4aa3-bfd1-5fee7ecd6aad","avgUserRating":4,"publishedOn":1239390225000,"id":"386db9ed-05cb-43d5-a8ff-39a75e112771","createdOn":1239380960000,"description":"News and highlights from Burton Group and the Catalyst Conference.","subscriptionCountTotal":11,"name":"Catalyst Live","usrRatingCount":1,"thumbUrl":"http://img.widgetbox.com/thumbs/195/386db9ed-05cb-43d5-a8ff-39a75e112771.jpg?83","developerName":"Burton","viewUrl":"http://www.widgetbox.com/widget/386db9ed-05cb-43d5-a8ff-39a75e112771"},{"fid":"pipes-burton-group","developerId":"df3c0546-a793-4aa3-bfd1-5fee7ecd6aad","avgUserRating":4,"publishedOn":1237304717000,"id":"f41f41af-b77c-4100-963c-82f3ca96f6a7","createdOn":1237304714000,"description":"Burton Group widget with contributions across all Burton Group blogs.","subscriptionCountTotal":8,"name":"Burton Group","usrRatingCount":1,"thumbUrl":"http://img.widgetbox.com/thumbs/e85/f41f41af-b77c-4100-963c-82f3ca96f6a7.png?22","developerName":"Burton","viewUrl":"http://www.widgetbox.com/widget/f41f41af-b77c-4100-963c-82f3ca96f6a7"},{"fid":"security-and-risk-management-blog","developerId":"df3c0546-a793-4aa3-bfd1-5fee7ecd6aad","avgUserRating":4,"publishedOn":1235511258000,"id":"4e543d3a-f11b-45b0-beaa-15035a57f45e","createdOn":1235511255000,"description":"The Security and Risk Management Blog provides commentary on the security marketplace, helping IT security teams\u2019 strategy in project selection and execution. ","subscriptionCountTotal":16,"name":"Security and Risk Management Blog","usrRatingCount":1,"thumbUrl":"http://img.widgetbox.com/thumbs/75c/4e543d3a-f11b-45b0-beaa-15035a57f45e.png?5","developerName":"Burton","viewUrl":"http://www.widgetbox.com/widget/4e543d3a-f11b-45b0-beaa-15035a57f45e"},{"fid":"network-and-telecom-blog","developerId":"df3c0546-a793-4aa3-bfd1-5fee7ecd6aad","avgUserRating":0,"publishedOn":1235511062000,"id":"acba497a-31fa-4ef5-85bf-940f7b4ed812","createdOn":1235511059000,"description":"The Network and Telecom Blog covers the latest news around emerging mobile devices and security, 802.11n, enterprise network architecture, and WANs. ","subscriptionCountTotal":10,"name":"Network and Telecom Blog","usrRatingCount":0,"thumbUrl":"http://img.widgetbox.com/thumbs/bb8/acba497a-31fa-4ef5-85bf-940f7b4ed812.png?5","developerName":"Burton","viewUrl":"http://www.widgetbox.com/widget/acba497a-31fa-4ef5-85bf-940f7b4ed812"},{"fid":"identity-and-privacy-blog","developerId":"df3c0546-a793-4aa3-bfd1-5fee7ecd6aad","avgUserRating":0,"publishedOn":1235508331000,"id":"9f39a084-6200-4260-bf73-eb6446135605","createdOn":1235508329000,"description":"The Identity Management Blog provides market coverage of how vendors, standards groups, and society are transforming the way enterprises use identity information. ","subscriptionCountTotal":8,"name":"Identity and Privacy Blog","usrRatingCount":0,"thumbUrl":"http://img.widgetbox.com/thumbs/027/9f39a084-6200-4260-bf73-eb6446135605.png?5","developerName":"Burton","viewUrl":"http://www.widgetbox.com/widget/9f39a084-6200-4260-bf73-eb6446135605"}],"search":"/Tag/burton group"})
