{"id":1792,"date":"2014-01-30T10:00:15","date_gmt":"2014-01-30T09:00:15","guid":{"rendered":"http:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/?p=1792"},"modified":"2014-01-30T10:00:15","modified_gmt":"2014-01-30T09:00:15","slug":"el-efecto-2038","status":"publish","type":"post","link":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/el-efecto-2038","title":{"rendered":"El efecto 2038"},"content":{"rendered":"<p>Aunque a\u00fan nos queda lejos, como cultura general, quer\u00eda hablar del que se est\u00e1 dando en llamar \u00abefecto 2038\u00bb.<\/p>\n<p>Todos conocemos el famoso efecto 2000 (Y2K) que auguraba grandes <img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-1799\" title=\"inesem-efecto-2038\" src=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/01\/inesem-efecto-2038-343x257-custom.jpg\" alt=\"\" width=\"343\" height=\"257\" \/>cat\u00e1strofes debido a los problemas que se plantear\u00edan en los ordenadores en el cambio de siglo al trabajar solo con 2 d\u00edgitos en las fechas para los a\u00f1os.<\/p>\n<p>Pasaron tan terribles fechas y todo sigui\u00f3 funcionando correctamente (gracias a Dios).<\/p>\n<p>Pues bien, haciendo cuentas vemos que para 2038 vamos a tener un problema m\u00e1s gordo si cabe.<\/p>\n<p>El problema es el siguiente. Seg\u00fan la norma IEEE 1003 much\u00edsimos ordenadores, bases de datos, sistemas de control, etc. almacenan las fechas siguiendo el criterio de tomar como inicio de los tiempos el 1 de enero de 1970 y guardar los segundos transcurridos desde ese momento hasta la actualidad.<\/p>\n<p>Bien por poner un ejemplo en los sistemas de 32 bits, el valor mayor que puede almacenar es un n\u00famero de 31 bits (m\u00e1s un bit para el signo).<\/p>\n<p>Haciendo unos simples c\u00e1lculos vemos que en binario con 31 bits el n\u00famero mas grande que podemos representar es el 2147482648 y siguiendo la norma de el modelo de fecha citado si al 1 de enero de 1970 le sumamos esos segundos podemos llegar como m\u00e1ximo al 19 de enero de 2038 a las 03:14:07. A partir de ah\u00ed el contador no funciona, ya que se har\u00eda negativo y por tanto reflejar\u00eda la fecha de 13 de diciembre de 1901.<\/p>\n<p>Lo bueno de esto es que a\u00fan falta mucho para esa fecha, pero sin duda llegar\u00e1. Para esa fecha lo normal es que todos los sistemas (o al menos la mayor\u00eda), trabajen con 64 bits o sabe Dios a donde evolucionaremos.<\/p>\n<p>Esperemos no tener que sufrir el \u00abefecto 2038\u00bb.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>El efecto 2038<\/p>\n","protected":false},"author":70,"featured_media":1799,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"class_list":["post-1792","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-redes-sistemas-y-seguridad"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>El efecto 2038<\/title>\n<meta name=\"description\" content=\"El efecto 2038\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/el-efecto-2038\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"El efecto 2038\" \/>\n<meta property=\"og:description\" content=\"El efecto 2038\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/el-efecto-2038\" \/>\n<meta property=\"og:site_name\" content=\"Canal Inform\u00e1tica y TICS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/InesemBusinessSchool\/\" \/>\n<meta property=\"article:published_time\" content=\"2014-01-30T09:00:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/01\/inesem-efecto-2038.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"480\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Juan Iruela\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@inesem\" \/>\n<meta name=\"twitter:site\" content=\"@inesem\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Juan Iruela\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/el-efecto-2038#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/el-efecto-2038\"},\"author\":{\"name\":\"Juan Iruela\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/3e3c2ff598dcbfd18aef8da3a40b71df\"},\"headline\":\"El efecto 2038\",\"datePublished\":\"2014-01-30T09:00:15+00:00\",\"dateModified\":\"2014-01-30T09:00:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/el-efecto-2038\"},\"wordCount\":294,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/el-efecto-2038#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/01\/inesem-efecto-2038.jpg\",\"keywords\":[\"efecto 2038\"],\"articleSection\":[\"Redes, Sistemas y Seguridad\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/el-efecto-2038#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/el-efecto-2038\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/el-efecto-2038\",\"name\":\"El efecto 2038\",\"isPartOf\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/el-efecto-2038#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/el-efecto-2038#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/01\/inesem-efecto-2038.jpg\",\"datePublished\":\"2014-01-30T09:00:15+00:00\",\"dateModified\":\"2014-01-30T09:00:15+00:00\",\"description\":\"El efecto 2038\",\"breadcrumb\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/el-efecto-2038#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/el-efecto-2038\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/el-efecto-2038#primaryimage\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/01\/inesem-efecto-2038.jpg\",\"contentUrl\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/01\/inesem-efecto-2038.jpg\",\"width\":480,\"height\":360},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/el-efecto-2038#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Redes, Sistemas y Seguridad\",\"item\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/categorias\/redes-sistemas-y-seguridad\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"El efecto 2038\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#website\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/\",\"name\":\"Canal Inform\u00e1tica y TICS\",\"description\":\"Canal de Noticias gestionado por el Departamento Docente de Inform\u00e1tica y TICS de INESEM\",\"publisher\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization\",\"name\":\"Canal Inform\u00e1tica y TICS\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Canal Inform\u00e1tica y TICS\"},\"image\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/InesemBusinessSchool\/\",\"https:\/\/x.com\/inesem\",\"http:\/\/www.linkedin.com\/company\/2370697\",\"https:\/\/www.youtube.com\/user\/inesembusinesschool\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/3e3c2ff598dcbfd18aef8da3a40b71df\",\"name\":\"Juan Iruela\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/comercio-hosteleria-turismo\/wp-content\/blogs.dir\/6\/files\/2013\/09\/Juan-Iruela_avatar.jpg\",\"contentUrl\":\"https:\/\/www.inesem.es\/revistadigital\/comercio-hosteleria-turismo\/wp-content\/blogs.dir\/6\/files\/2013\/09\/Juan-Iruela_avatar.jpg\",\"caption\":\"Juan Iruela\"},\"description\":\"Ingeniero T\u00e9cnico en Inform\u00e1tica por la Universidad de Granada. C.A.P. por la Universidad de Granada. Formador de Formadores y Formador de Formadores Especialidad Tele formaci\u00f3n. Microsoft Certified Solution Developer en Visual Studio .NET. Certificado en CISCO, Oracle y Linux. Profesor en el departamento de Nuevas tecnolog\u00edas de INESEM.\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/autores\/juan-iruela\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"El efecto 2038","description":"El efecto 2038","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/el-efecto-2038","og_locale":"es_ES","og_type":"article","og_title":"El efecto 2038","og_description":"El efecto 2038","og_url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/el-efecto-2038","og_site_name":"Canal Inform\u00e1tica y TICS","article_publisher":"https:\/\/www.facebook.com\/InesemBusinessSchool\/","article_published_time":"2014-01-30T09:00:15+00:00","og_image":[{"width":480,"height":360,"url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/01\/inesem-efecto-2038.jpg","type":"image\/jpeg"}],"author":"Juan Iruela","twitter_card":"summary_large_image","twitter_creator":"@inesem","twitter_site":"@inesem","twitter_misc":{"Escrito por":"Juan Iruela","Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/el-efecto-2038#article","isPartOf":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/el-efecto-2038"},"author":{"name":"Juan Iruela","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/3e3c2ff598dcbfd18aef8da3a40b71df"},"headline":"El efecto 2038","datePublished":"2014-01-30T09:00:15+00:00","dateModified":"2014-01-30T09:00:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/el-efecto-2038"},"wordCount":294,"commentCount":0,"publisher":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization"},"image":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/el-efecto-2038#primaryimage"},"thumbnailUrl":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/01\/inesem-efecto-2038.jpg","keywords":["efecto 2038"],"articleSection":["Redes, Sistemas y Seguridad"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/el-efecto-2038#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/el-efecto-2038","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/el-efecto-2038","name":"El efecto 2038","isPartOf":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/el-efecto-2038#primaryimage"},"image":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/el-efecto-2038#primaryimage"},"thumbnailUrl":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/01\/inesem-efecto-2038.jpg","datePublished":"2014-01-30T09:00:15+00:00","dateModified":"2014-01-30T09:00:15+00:00","description":"El efecto 2038","breadcrumb":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/el-efecto-2038#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/el-efecto-2038"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/el-efecto-2038#primaryimage","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/01\/inesem-efecto-2038.jpg","contentUrl":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/01\/inesem-efecto-2038.jpg","width":480,"height":360},{"@type":"BreadcrumbList","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/el-efecto-2038#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/"},{"@type":"ListItem","position":2,"name":"Redes, Sistemas y Seguridad","item":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/categorias\/redes-sistemas-y-seguridad"},{"@type":"ListItem","position":3,"name":"El efecto 2038"}]},{"@type":"WebSite","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#website","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/","name":"Canal Inform\u00e1tica y TICS","description":"Canal de Noticias gestionado por el Departamento Docente de Inform\u00e1tica y TICS de INESEM","publisher":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization","name":"Canal Inform\u00e1tica y TICS","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Canal Inform\u00e1tica y TICS"},"image":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/InesemBusinessSchool\/","https:\/\/x.com\/inesem","http:\/\/www.linkedin.com\/company\/2370697","https:\/\/www.youtube.com\/user\/inesembusinesschool\/"]},{"@type":"Person","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/3e3c2ff598dcbfd18aef8da3a40b71df","name":"Juan Iruela","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/image\/","url":"https:\/\/www.inesem.es\/revistadigital\/comercio-hosteleria-turismo\/wp-content\/blogs.dir\/6\/files\/2013\/09\/Juan-Iruela_avatar.jpg","contentUrl":"https:\/\/www.inesem.es\/revistadigital\/comercio-hosteleria-turismo\/wp-content\/blogs.dir\/6\/files\/2013\/09\/Juan-Iruela_avatar.jpg","caption":"Juan Iruela"},"description":"Ingeniero T\u00e9cnico en Inform\u00e1tica por la Universidad de Granada. C.A.P. por la Universidad de Granada. Formador de Formadores y Formador de Formadores Especialidad Tele formaci\u00f3n. Microsoft Certified Solution Developer en Visual Studio .NET. Certificado en CISCO, Oracle y Linux. Profesor en el departamento de Nuevas tecnolog\u00edas de INESEM.","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/autores\/juan-iruela"}]}},"autor_name":{"name":"Juan Iruela"},"featured_image":{"attachment_meta":{"width":480,"height":360,"file":"2014\/01\/inesem-efecto-2038.jpg","sizes":{"thumbnail":{"file":"inesem-efecto-2038-345x180.jpg","width":345,"height":180,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/01\/inesem-efecto-2038-345x180.jpg"},"medium":{"file":"inesem-efecto-2038-175x131.jpg","width":175,"height":131,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/01\/inesem-efecto-2038-175x131.jpg"},"thumb-small":{"file":"inesem-efecto-2038-59x42.jpg","width":59,"height":42,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/01\/inesem-efecto-2038-59x42.jpg"},"thumb-standard":{"file":"inesem-efecto-2038-110x110.jpg","width":110,"height":110,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/01\/inesem-efecto-2038-110x110.jpg"},"thumb-medium":{"file":"inesem-efecto-2038-196x166.jpg","width":196,"height":166,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/01\/inesem-efecto-2038-196x166.jpg"},"thumb-large":{"file":"inesem-efecto-2038-283x190.jpg","width":283,"height":190,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/01\/inesem-efecto-2038-283x190.jpg"},"thumb-anteriores":{"file":"inesem-efecto-2038-230x163.jpg","width":230,"height":163,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/01\/inesem-efecto-2038-230x163.jpg"},"thumb-inverso":{"file":"inesem-efecto-2038-369x261.jpg","width":369,"height":261,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/01\/inesem-efecto-2038-369x261.jpg"},"thumb-cercano":{"file":"inesem-efecto-2038-650x200.jpg","width":650,"height":200,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/01\/inesem-efecto-2038-650x200.jpg"},"thumb-slider":{"file":"inesem-efecto-2038-574x430.jpg","width":574,"height":430,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/01\/inesem-efecto-2038-574x430.jpg"},"thumb-busqueda":{"file":"inesem-efecto-2038-580x375.jpg","width":580,"height":375,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/01\/inesem-efecto-2038-580x375.jpg"},"advps-thumb-one":{"file":"inesem-efecto-2038-600x220.jpg","width":600,"height":220,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/01\/inesem-efecto-2038-600x220.jpg"}},"image_meta":{"aperture":0,"credit":"","camera":"","caption":"","created_timestamp":0,"copyright":"","focal_length":0,"iso":0,"shutter_speed":0,"title":"","orientation":0,"keywords":[]}}},"_links":{"self":[{"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/posts\/1792"}],"collection":[{"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/users\/70"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/comments?post=1792"}],"version-history":[{"count":0,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/posts\/1792\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/media\/1799"}],"wp:attachment":[{"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/media?parent=1792"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/categories?post=1792"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}