{"id":1993,"date":"2014-10-17T07:40:31","date_gmt":"2014-10-17T05:40:31","guid":{"rendered":"http:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/?p=1993"},"modified":"2021-04-12T09:21:55","modified_gmt":"2021-04-12T07:21:55","slug":"como-saltarse-el-bloqueo-chino-a-las-redes-sociales","status":"publish","type":"post","link":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-saltarse-el-bloqueo-chino-a-las-redes-sociales","title":{"rendered":"Como saltarse el bloqueo chino a las redes sociales"},"content":{"rendered":"<p>A ra\u00edz de las recientes protestas, el r\u00e9gimen comunista chino ha bloqueado las principales redes sociales con el fin de restringir la informaci\u00f3n.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright  wp-image-1997\" style=\"line-height: 24px; font-size: 16px;\" title=\"inesem-firechat\" src=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/10\/inesem-firechat-367x360-custom.jpg\" alt=\"\" width=\"367\" height=\"360\" \/><\/p>\n<p>Precisamente a la sociedad de Hong Kong es seguramente una de las que m\u00e1s usen internet y sus recursos. El estudiante l\u00edder de las protesta indicaba que\u00a0\u00ab<em>Yo consulto mi tel\u00e9fono cada 5 \u00f3 6 minutos para saber qu\u00e9 pasa<\/em>\u00ab.<\/p>\n<p>Es cierto que China lleva a\u00f1os imponiendo restricciones a todo lo que suponga libertad en la red desde <strong>Google, Youtube<\/strong> hasta por supuesto <strong>Facebook<\/strong> o <strong>Whatsapp<\/strong> han venido sufriendo restricciones.<\/p>\n<p>Pero en estos momentos de tensi\u00f3n, estas restricciones han hecho que incluso hasta las aplicaciones \u00abdel r\u00e9gimen\u00bb hayan sido bloqueadas de modo que no pudiera salir informaci\u00f3n de las protestas de la llamada \u00ab<strong><em>Revoluci\u00f3n de los Paraguas<\/em><\/strong>\u00ab.<\/p>\n<p>Sin embargo, \u00bfqui\u00e9n le pone puertas al campo?. Pues eso, los j\u00f3venes para saltarse este bloqueo, han empezado a usar una aplicaci\u00f3n llamada Firechat.<\/p>\n<p>A trav\u00e9s de esta aplicaci\u00f3n se puede chatear usando <strong>bluetooth<\/strong> con lo que se salta las restricciones impuestas en los servidores web.<\/p>\n<p>Para hacernos una idea entre este domingo y el lunes Firechat fue descargada 100.000 desde Hong Kong, seg\u00fan contabiliz\u00f3 la empresa constructora de la aplicaci\u00f3n.<\/p>\n<p>En realidad, esta t\u00e1ctica ya se us\u00f3 en Taiwan durante la llamada revuelta de los Girasoles en el 2013, donde <strong>Firechat<\/strong> fue una herramienta primordial para mantenerse en contacto.<\/p>\n<p>En un pa\u00eds donde la mayor\u00eda de servidores web est\u00e1n controlados por el gobierno, agudizar el ingenio permite \u00abser mas libre\u00bb.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Como saltarse el bloqueo chino a las redes sociales<\/p>\n","protected":false},"author":70,"featured_media":1997,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"class_list":["post-1993","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-redes-sistemas-y-seguridad"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Como saltarse el bloqueo chino a las redes sociales<\/title>\n<meta name=\"description\" content=\"Como saltarse el bloqueo chino a las redes sociales\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-saltarse-el-bloqueo-chino-a-las-redes-sociales\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Como saltarse el bloqueo chino a las redes sociales\" \/>\n<meta property=\"og:description\" content=\"Como saltarse el bloqueo chino a las redes sociales\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-saltarse-el-bloqueo-chino-a-las-redes-sociales\" \/>\n<meta property=\"og:site_name\" content=\"Canal Inform\u00e1tica y TICS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/InesemBusinessSchool\/\" \/>\n<meta property=\"article:published_time\" content=\"2014-10-17T05:40:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-12T07:21:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/10\/inesem-firechat.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1020\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Juan Iruela\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@inesem\" \/>\n<meta name=\"twitter:site\" content=\"@inesem\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Juan Iruela\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-saltarse-el-bloqueo-chino-a-las-redes-sociales#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-saltarse-el-bloqueo-chino-a-las-redes-sociales\"},\"author\":{\"name\":\"Juan Iruela\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/3e3c2ff598dcbfd18aef8da3a40b71df\"},\"headline\":\"Como saltarse el bloqueo chino a las redes sociales\",\"datePublished\":\"2014-10-17T05:40:31+00:00\",\"dateModified\":\"2021-04-12T07:21:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-saltarse-el-bloqueo-chino-a-las-redes-sociales\"},\"wordCount\":277,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-saltarse-el-bloqueo-chino-a-las-redes-sociales#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/10\/inesem-firechat.jpg\",\"keywords\":[\"Firechat\"],\"articleSection\":[\"Redes, Sistemas y Seguridad\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-saltarse-el-bloqueo-chino-a-las-redes-sociales#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-saltarse-el-bloqueo-chino-a-las-redes-sociales\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-saltarse-el-bloqueo-chino-a-las-redes-sociales\",\"name\":\"Como saltarse el bloqueo chino a las redes sociales\",\"isPartOf\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-saltarse-el-bloqueo-chino-a-las-redes-sociales#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-saltarse-el-bloqueo-chino-a-las-redes-sociales#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/10\/inesem-firechat.jpg\",\"datePublished\":\"2014-10-17T05:40:31+00:00\",\"dateModified\":\"2021-04-12T07:21:55+00:00\",\"description\":\"Como saltarse el bloqueo chino a las redes sociales\",\"breadcrumb\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-saltarse-el-bloqueo-chino-a-las-redes-sociales#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-saltarse-el-bloqueo-chino-a-las-redes-sociales\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-saltarse-el-bloqueo-chino-a-las-redes-sociales#primaryimage\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/10\/inesem-firechat.jpg\",\"contentUrl\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/10\/inesem-firechat.jpg\",\"width\":1020,\"height\":1000},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-saltarse-el-bloqueo-chino-a-las-redes-sociales#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Redes, Sistemas y Seguridad\",\"item\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/categorias\/redes-sistemas-y-seguridad\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Como saltarse el bloqueo chino a las redes sociales\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#website\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/\",\"name\":\"Canal Inform\u00e1tica y TICS\",\"description\":\"Canal de Noticias gestionado por el Departamento Docente de Inform\u00e1tica y TICS de INESEM\",\"publisher\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization\",\"name\":\"Canal Inform\u00e1tica y TICS\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Canal Inform\u00e1tica y TICS\"},\"image\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/InesemBusinessSchool\/\",\"https:\/\/x.com\/inesem\",\"http:\/\/www.linkedin.com\/company\/2370697\",\"https:\/\/www.youtube.com\/user\/inesembusinesschool\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/3e3c2ff598dcbfd18aef8da3a40b71df\",\"name\":\"Juan Iruela\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/comercio-hosteleria-turismo\/wp-content\/blogs.dir\/6\/files\/2013\/09\/Juan-Iruela_avatar.jpg\",\"contentUrl\":\"https:\/\/www.inesem.es\/revistadigital\/comercio-hosteleria-turismo\/wp-content\/blogs.dir\/6\/files\/2013\/09\/Juan-Iruela_avatar.jpg\",\"caption\":\"Juan Iruela\"},\"description\":\"Ingeniero T\u00e9cnico en Inform\u00e1tica por la Universidad de Granada. C.A.P. por la Universidad de Granada. Formador de Formadores y Formador de Formadores Especialidad Tele formaci\u00f3n. Microsoft Certified Solution Developer en Visual Studio .NET. Certificado en CISCO, Oracle y Linux. Profesor en el departamento de Nuevas tecnolog\u00edas de INESEM.\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/autores\/juan-iruela\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Como saltarse el bloqueo chino a las redes sociales","description":"Como saltarse el bloqueo chino a las redes sociales","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-saltarse-el-bloqueo-chino-a-las-redes-sociales","og_locale":"es_ES","og_type":"article","og_title":"Como saltarse el bloqueo chino a las redes sociales","og_description":"Como saltarse el bloqueo chino a las redes sociales","og_url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-saltarse-el-bloqueo-chino-a-las-redes-sociales","og_site_name":"Canal Inform\u00e1tica y TICS","article_publisher":"https:\/\/www.facebook.com\/InesemBusinessSchool\/","article_published_time":"2014-10-17T05:40:31+00:00","article_modified_time":"2021-04-12T07:21:55+00:00","og_image":[{"width":1020,"height":1000,"url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/10\/inesem-firechat.jpg","type":"image\/jpeg"}],"author":"Juan Iruela","twitter_card":"summary_large_image","twitter_creator":"@inesem","twitter_site":"@inesem","twitter_misc":{"Escrito por":"Juan Iruela","Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-saltarse-el-bloqueo-chino-a-las-redes-sociales#article","isPartOf":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-saltarse-el-bloqueo-chino-a-las-redes-sociales"},"author":{"name":"Juan Iruela","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/3e3c2ff598dcbfd18aef8da3a40b71df"},"headline":"Como saltarse el bloqueo chino a las redes sociales","datePublished":"2014-10-17T05:40:31+00:00","dateModified":"2021-04-12T07:21:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-saltarse-el-bloqueo-chino-a-las-redes-sociales"},"wordCount":277,"commentCount":0,"publisher":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization"},"image":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-saltarse-el-bloqueo-chino-a-las-redes-sociales#primaryimage"},"thumbnailUrl":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/10\/inesem-firechat.jpg","keywords":["Firechat"],"articleSection":["Redes, Sistemas y Seguridad"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-saltarse-el-bloqueo-chino-a-las-redes-sociales#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-saltarse-el-bloqueo-chino-a-las-redes-sociales","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-saltarse-el-bloqueo-chino-a-las-redes-sociales","name":"Como saltarse el bloqueo chino a las redes sociales","isPartOf":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-saltarse-el-bloqueo-chino-a-las-redes-sociales#primaryimage"},"image":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-saltarse-el-bloqueo-chino-a-las-redes-sociales#primaryimage"},"thumbnailUrl":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/10\/inesem-firechat.jpg","datePublished":"2014-10-17T05:40:31+00:00","dateModified":"2021-04-12T07:21:55+00:00","description":"Como saltarse el bloqueo chino a las redes sociales","breadcrumb":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-saltarse-el-bloqueo-chino-a-las-redes-sociales#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-saltarse-el-bloqueo-chino-a-las-redes-sociales"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-saltarse-el-bloqueo-chino-a-las-redes-sociales#primaryimage","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/10\/inesem-firechat.jpg","contentUrl":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/10\/inesem-firechat.jpg","width":1020,"height":1000},{"@type":"BreadcrumbList","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-saltarse-el-bloqueo-chino-a-las-redes-sociales#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/"},{"@type":"ListItem","position":2,"name":"Redes, Sistemas y Seguridad","item":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/categorias\/redes-sistemas-y-seguridad"},{"@type":"ListItem","position":3,"name":"Como saltarse el bloqueo chino a las redes sociales"}]},{"@type":"WebSite","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#website","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/","name":"Canal Inform\u00e1tica y TICS","description":"Canal de Noticias gestionado por el Departamento Docente de Inform\u00e1tica y TICS de INESEM","publisher":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization","name":"Canal Inform\u00e1tica y TICS","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Canal Inform\u00e1tica y TICS"},"image":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/InesemBusinessSchool\/","https:\/\/x.com\/inesem","http:\/\/www.linkedin.com\/company\/2370697","https:\/\/www.youtube.com\/user\/inesembusinesschool\/"]},{"@type":"Person","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/3e3c2ff598dcbfd18aef8da3a40b71df","name":"Juan Iruela","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/image\/","url":"https:\/\/www.inesem.es\/revistadigital\/comercio-hosteleria-turismo\/wp-content\/blogs.dir\/6\/files\/2013\/09\/Juan-Iruela_avatar.jpg","contentUrl":"https:\/\/www.inesem.es\/revistadigital\/comercio-hosteleria-turismo\/wp-content\/blogs.dir\/6\/files\/2013\/09\/Juan-Iruela_avatar.jpg","caption":"Juan Iruela"},"description":"Ingeniero T\u00e9cnico en Inform\u00e1tica por la Universidad de Granada. C.A.P. por la Universidad de Granada. Formador de Formadores y Formador de Formadores Especialidad Tele formaci\u00f3n. Microsoft Certified Solution Developer en Visual Studio .NET. Certificado en CISCO, Oracle y Linux. Profesor en el departamento de Nuevas tecnolog\u00edas de INESEM.","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/autores\/juan-iruela"}]}},"autor_name":{"name":"Juan Iruela"},"featured_image":{"attachment_meta":{"width":1020,"height":1000,"file":"2014\/10\/inesem-firechat.jpg","sizes":{"thumbnail":{"file":"inesem-firechat-345x180.jpg","width":345,"height":180,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/10\/inesem-firechat-345x180.jpg"},"medium":{"file":"inesem-firechat-175x172.jpg","width":175,"height":172,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/10\/inesem-firechat-175x172.jpg"},"medium_large":{"file":"inesem-firechat-768x753.jpg","width":768,"height":753,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/10\/inesem-firechat-768x753.jpg"},"thumb-small":{"file":"inesem-firechat-59x42.jpg","width":59,"height":42,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/10\/inesem-firechat-59x42.jpg"},"thumb-standard":{"file":"inesem-firechat-110x110.jpg","width":110,"height":110,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/10\/inesem-firechat-110x110.jpg"},"thumb-medium":{"file":"inesem-firechat-196x166.jpg","width":196,"height":166,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/10\/inesem-firechat-196x166.jpg"},"thumb-large":{"file":"inesem-firechat-283x190.jpg","width":283,"height":190,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/10\/inesem-firechat-283x190.jpg"},"thumb-anteriores":{"file":"inesem-firechat-230x163.jpg","width":230,"height":163,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/10\/inesem-firechat-230x163.jpg"},"thumb-inverso":{"file":"inesem-firechat-369x261.jpg","width":369,"height":261,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/10\/inesem-firechat-369x261.jpg"},"thumb-cercano":{"file":"inesem-firechat-650x200.jpg","width":650,"height":200,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/10\/inesem-firechat-650x200.jpg"},"thumb-slider":{"file":"inesem-firechat-574x430.jpg","width":574,"height":430,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/10\/inesem-firechat-574x430.jpg"},"thumb-busqueda":{"file":"inesem-firechat-580x375.jpg","width":580,"height":375,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/10\/inesem-firechat-580x375.jpg"},"advps-thumb-one":{"file":"inesem-firechat-600x220.jpg","width":600,"height":220,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2014\/10\/inesem-firechat-600x220.jpg"}},"image_meta":{"aperture":0,"credit":"","camera":"","caption":"","created_timestamp":0,"copyright":"","focal_length":0,"iso":0,"shutter_speed":0,"title":"","orientation":1,"keywords":[]}}},"_links":{"self":[{"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/posts\/1993"}],"collection":[{"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/users\/70"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/comments?post=1993"}],"version-history":[{"count":0,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/posts\/1993\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/media\/1997"}],"wp:attachment":[{"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/media?parent=1993"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/categories?post=1993"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}