{"version":"1.0","provider_name":"Cybermediana","provider_url":"https:\/\/www.cybermedian.com\/pl","author_name":"vpadmin","author_url":"https:\/\/www.cybermedian.com\/pl\/author\/vpadmin\/","title":"Prosty przewodnik po analizie przypadk\u00f3w u\u017cycia - Cybermediana","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"mcxR9LAgR6\"><a href=\"https:\/\/www.cybermedian.com\/pl\/a-simple-guide-to-use-case-analysis\/\">Prosty przewodnik po analizie przypadk\u00f3w u\u017cycia<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.cybermedian.com\/pl\/a-simple-guide-to-use-case-analysis\/embed\/#?secret=mcxR9LAgR6\" width=\"600\" height=\"338\" title=\"&#8222;Prosty przewodnik po analizie przypadk\u00f3w u\u017cycia&#8221; &#8212; Cybermediana\" data-secret=\"mcxR9LAgR6\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.cybermedian.com\/pl\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/images.visual-paradigm.com\/docs\/vp_user_guide\/11\/94\/2575\/474\/select_open_use_case_details_25099.png","thumbnail_width":"488","thumbnail_height":"220","description":"Use case modeling is a technique for capturing, modeling, and specifying system requirements that correspond to a set of behaviors that the system may perform when interacting with actors. These behaviors produce observable results and help achieve their goals. Use cases are named for the specific user goals of the principal actors, which in turn describe or explain the general order of activities and events, as well as variations in special conditions, exceptions, or error conditions, through textual description."}