{"id":4676,"date":"2016-08-09T16:02:28","date_gmt":"2016-08-09T19:02:28","guid":{"rendered":"https:\/\/ostec.blog\/seguridad-perimetral\/o-que-e-hotspot"},"modified":"2020-08-28T10:49:15","modified_gmt":"2020-08-28T13:49:15","slug":"hotspot-concepto-y-terminologia","status":"publish","type":"post","link":"https:\/\/ostec.blog\/es\/seguridad-perimetral\/hotspot-concepto-y-terminologia\/","title":{"rendered":"\u00bfQu\u00e9 es hotspot? Concepto y terminolog\u00eda"},"content":{"rendered":"<p>El Internet, que arranc\u00f3 en el segmento gubernamental y acad\u00e9mico (universidades), pronto se esparci\u00f3 por las empresas, y actualmente est\u00e1 en buena parte de las residencias, siendo bastante dif\u00edcil imaginar el d\u00eda a d\u00eda sin este recurso.<\/p>\n<p>Con el paso del tiempo muchos servicios f\u00edsicos fueron migrados a lo virtual, as\u00ed como nuevos servicios y productos, nunca antes pensados, fueron desarrollados por las facilidades y cercan\u00eda que permite el Internet.<\/p>\n<p>Ante el desaf\u00edo de mantenerse conectado, surgi\u00f3 el t\u00e9rmino hotspot, que permite a los usuarios utilizar Internet en lugares p\u00fablicos (m\u00e1s comunes) o privados, a trav\u00e9s de la tecnolog\u00eda inal\u00e1mbrica. Estos accesos se explotan de forma distinta, pudiendo ser cobrados, o estar disponibles gratuitamente.<\/p>\n<p>Es com\u00fan comercios, caf\u00e9s, espacios p\u00fablicos, aeropuertos, hoteles, hospitales, restaurantes y otros establecimientos, brindando acceso a internet para sus clientes, de modo a proporcionar confort virtual a los usuarios que frecuentan sus ambientes.<\/p>\n<p>Por lo tanto, en una definici\u00f3n bastante clara, hotspot es el nombre utilizado para un sitio f\u00edsico donde las personas pueden tener acceso a Internet. Contin\u00fae leyendo este art\u00edculo para entender mejor lo que es hotspot, as\u00ed como su concepto y terminolog\u00eda. \u00a1Compru\u00e9belo!<\/p>\n<h2>Seguridad para hotspots<\/h2>\n<p>El mayor aspecto a considerar en la utilizaci\u00f3n de hotspot se refiere a la seguridad. Esto es as\u00ed por qu\u00e9 quien ofrece este tipo de servicio tiene acceso a todo tr\u00e1fico realizado por un dispositivo, y muchas veces no hay como garantizar la idoneidad, o incluso que no tenga alg\u00fan tercero controlando el ambiente de forma no autorizada.<\/p>\n<p>Muchos incidentes de seguridad ocurren con usuarios despu\u00e9s de hacer uso de internet en lugares p\u00fablicos, por lo que hay personas malintencionadas que buscan vulnerabilidades en estas redes, ya trav\u00e9s de estas buscan informaciones que puedan ser utilizadas para promover actividades il\u00edcitas a trav\u00e9s de internet.<\/p>\n<p>De esta manera, al utilizar un hotspot, cuidado con el tipo de uso que se realizar\u00e1, evite conectar en bancos y otras aplicaciones\/sitios que pueden ser muy importantes para usted. La percepci\u00f3n de valor es relevante, pues para algunas personas el uso de redes sociales puede ser fundamental, y el compromiso de \u00e9sta puede causar trastornos representativos.<\/p>\n<p>Sin embargo, si el acceso es s\u00f3lo para verificaci\u00f3n de noticias, utilizar una aplicaci\u00f3n para llamar a un taxi, ver un video, o cualquier otra cosa de menor importancia, el hotspot puede ser una alternativa interesante, especialmente si el usuario no tiene un plan de datos contratado junto a la operadora de celular, o el mismo es limitado.<\/p>\n<h2>Formatos de disponibilidad de hotspot<\/h2>\n<p>Un hotspot no necesita necesariamente ser gratuito; el mayor ejemplo son algunas redes de hoteles, aeropuertos y etc., que ofrecen acceso mediante la compra de vouchers limitados por tiempo, o hacen asociaciones con empresas terceras, especialmente proveedores de internet, garantizando acceso para clientes y personas interesadas en el servicio.<\/p>\n<p>Muchas personas confunden hotspot con punto gratuito de acceso a Internet, especialmente porque la mayor\u00eda de sus accesos deben estar asociados a lugares p\u00fablicos que ofrecen este tipo de servicio para atraer a m\u00e1s visitantes, especialmente centros comerciales.<\/p>\n<p>[rev_slider hotspot-seguro]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>El Internet, que arranc\u00f3 en el segmento gubernamental y acad\u00e9mico (universidades), pronto se esparci\u00f3 por las empresas, y actualmente est\u00e1 en buena parte de las residencias, siendo bastante dif\u00edcil imaginar el d\u00eda a d\u00eda sin este recurso. Con el paso del tiempo muchos servicios f\u00edsicos fueron migrados a lo virtual, as\u00ed como nuevos servicios y [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":12836,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[395],"tags":[],"class_list":["post-4676","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguridad-perimetral"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u00bfQu\u00e9 es hotspot? Concepto y terminolog\u00eda - OSTEc Blog<\/title>\n<meta name=\"description\" content=\"Conozca lo que es hotspot, as\u00ed como su concepto y terminolog\u00eda, asociado al proceso de liberaci\u00f3n de acceso inal\u00e1mbrico para clientes y visitantes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/hotspot-concepto-y-terminologia\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00bfQu\u00e9 es hotspot? Concepto y terminolog\u00eda - OSTEc Blog\" \/>\n<meta property=\"og:description\" content=\"Conozca lo que es hotspot, as\u00ed como su concepto y terminolog\u00eda, asociado al proceso de liberaci\u00f3n de acceso inal\u00e1mbrico para clientes y visitantes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/hotspot-concepto-y-terminologia\/\" \/>\n<meta property=\"og:site_name\" content=\"OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ostec\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-09T19:02:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-28T13:49:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/08\/Mulher-com-smartphone-em-m\u00e3os.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"928\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Labbo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ostecsecurity\" \/>\n<meta name=\"twitter:site\" content=\"@ostecsecurity\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/hotspot-concepto-y-terminologia\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/hotspot-concepto-y-terminologia\/\"},\"author\":{\"name\":\"Labbo\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f\"},\"headline\":\"\u00bfQu\u00e9 es hotspot? Concepto y terminolog\u00eda\",\"datePublished\":\"2016-08-09T19:02:28+00:00\",\"dateModified\":\"2020-08-28T13:49:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/hotspot-concepto-y-terminologia\/\"},\"wordCount\":552,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/hotspot-concepto-y-terminologia\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/08\/Mulher-com-smartphone-em-m\u00e3os.jpg\",\"articleSection\":[\"Seguridad perimetral\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/hotspot-concepto-y-terminologia\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/hotspot-concepto-y-terminologia\/\",\"url\":\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/hotspot-concepto-y-terminologia\/\",\"name\":\"\u00bfQu\u00e9 es hotspot? Concepto y terminolog\u00eda - OSTEc Blog\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/hotspot-concepto-y-terminologia\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/hotspot-concepto-y-terminologia\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/08\/Mulher-com-smartphone-em-m\u00e3os.jpg\",\"datePublished\":\"2016-08-09T19:02:28+00:00\",\"dateModified\":\"2020-08-28T13:49:15+00:00\",\"description\":\"Conozca lo que es hotspot, as\u00ed como su concepto y terminolog\u00eda, asociado al proceso de liberaci\u00f3n de acceso inal\u00e1mbrico para clientes y visitantes.\",\"breadcrumb\":{\"@id\":\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/hotspot-concepto-y-terminologia\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/hotspot-concepto-y-terminologia\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/hotspot-concepto-y-terminologia\/#primaryimage\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/08\/Mulher-com-smartphone-em-m\u00e3os.jpg\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/08\/Mulher-com-smartphone-em-m\u00e3os.jpg\",\"width\":928,\"height\":534,\"caption\":\"Mulher segurando um smartphone em suas m\u00e3os\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ostec.blog\/es\/seguridad-perimetral\/hotspot-concepto-y-terminologia\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/ostec.blog\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00bfQu\u00e9 es hotspot? Concepto y terminolog\u00eda\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ostec.blog\/#website\",\"url\":\"https:\/\/ostec.blog\/\",\"name\":\"OSTEC | Seguran\u00e7a digital de resultados\",\"description\":\"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.\",\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ostec.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ostec.blog\/#organization\",\"name\":\"OSTEC Business Security\",\"url\":\"https:\/\/ostec.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"width\":251,\"height\":67,\"caption\":\"OSTEC Business Security\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ostec\",\"https:\/\/x.com\/ostecsecurity\",\"https:\/\/www.instagram.com\/ostecsecurity\/\",\"https:\/\/linkedin.com\/company\/ostec-security\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f\",\"name\":\"Labbo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g\",\"caption\":\"Labbo\"},\"url\":\"https:\/\/ostec.blog\/es\/author\/labbo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u00bfQu\u00e9 es hotspot? Concepto y terminolog\u00eda - OSTEc Blog","description":"Conozca lo que es hotspot, as\u00ed como su concepto y terminolog\u00eda, asociado al proceso de liberaci\u00f3n de acceso inal\u00e1mbrico para clientes y visitantes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ostec.blog\/es\/seguridad-perimetral\/hotspot-concepto-y-terminologia\/","og_locale":"es_ES","og_type":"article","og_title":"\u00bfQu\u00e9 es hotspot? Concepto y terminolog\u00eda - OSTEc Blog","og_description":"Conozca lo que es hotspot, as\u00ed como su concepto y terminolog\u00eda, asociado al proceso de liberaci\u00f3n de acceso inal\u00e1mbrico para clientes y visitantes.","og_url":"https:\/\/ostec.blog\/es\/seguridad-perimetral\/hotspot-concepto-y-terminologia\/","og_site_name":"OSTEC | Seguran\u00e7a digital de resultados","article_publisher":"https:\/\/www.facebook.com\/ostec","article_published_time":"2016-08-09T19:02:28+00:00","article_modified_time":"2020-08-28T13:49:15+00:00","og_image":[{"width":928,"height":534,"url":"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/08\/Mulher-com-smartphone-em-m\u00e3os.jpg","type":"image\/jpeg"}],"author":"Labbo","twitter_card":"summary_large_image","twitter_creator":"@ostecsecurity","twitter_site":"@ostecsecurity","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ostec.blog\/es\/seguridad-perimetral\/hotspot-concepto-y-terminologia\/#article","isPartOf":{"@id":"https:\/\/ostec.blog\/es\/seguridad-perimetral\/hotspot-concepto-y-terminologia\/"},"author":{"name":"Labbo","@id":"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f"},"headline":"\u00bfQu\u00e9 es hotspot? Concepto y terminolog\u00eda","datePublished":"2016-08-09T19:02:28+00:00","dateModified":"2020-08-28T13:49:15+00:00","mainEntityOfPage":{"@id":"https:\/\/ostec.blog\/es\/seguridad-perimetral\/hotspot-concepto-y-terminologia\/"},"wordCount":552,"commentCount":0,"publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"image":{"@id":"https:\/\/ostec.blog\/es\/seguridad-perimetral\/hotspot-concepto-y-terminologia\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/08\/Mulher-com-smartphone-em-m\u00e3os.jpg","articleSection":["Seguridad perimetral"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ostec.blog\/es\/seguridad-perimetral\/hotspot-concepto-y-terminologia\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ostec.blog\/es\/seguridad-perimetral\/hotspot-concepto-y-terminologia\/","url":"https:\/\/ostec.blog\/es\/seguridad-perimetral\/hotspot-concepto-y-terminologia\/","name":"\u00bfQu\u00e9 es hotspot? Concepto y terminolog\u00eda - OSTEc Blog","isPartOf":{"@id":"https:\/\/ostec.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ostec.blog\/es\/seguridad-perimetral\/hotspot-concepto-y-terminologia\/#primaryimage"},"image":{"@id":"https:\/\/ostec.blog\/es\/seguridad-perimetral\/hotspot-concepto-y-terminologia\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/08\/Mulher-com-smartphone-em-m\u00e3os.jpg","datePublished":"2016-08-09T19:02:28+00:00","dateModified":"2020-08-28T13:49:15+00:00","description":"Conozca lo que es hotspot, as\u00ed como su concepto y terminolog\u00eda, asociado al proceso de liberaci\u00f3n de acceso inal\u00e1mbrico para clientes y visitantes.","breadcrumb":{"@id":"https:\/\/ostec.blog\/es\/seguridad-perimetral\/hotspot-concepto-y-terminologia\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ostec.blog\/es\/seguridad-perimetral\/hotspot-concepto-y-terminologia\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/es\/seguridad-perimetral\/hotspot-concepto-y-terminologia\/#primaryimage","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/08\/Mulher-com-smartphone-em-m\u00e3os.jpg","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2016\/08\/Mulher-com-smartphone-em-m\u00e3os.jpg","width":928,"height":534,"caption":"Mulher segurando um smartphone em suas m\u00e3os"},{"@type":"BreadcrumbList","@id":"https:\/\/ostec.blog\/es\/seguridad-perimetral\/hotspot-concepto-y-terminologia\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/ostec.blog\/es\/"},{"@type":"ListItem","position":2,"name":"\u00bfQu\u00e9 es hotspot? Concepto y terminolog\u00eda"}]},{"@type":"WebSite","@id":"https:\/\/ostec.blog\/#website","url":"https:\/\/ostec.blog\/","name":"OSTEC | Seguran\u00e7a digital de resultados","description":"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.","publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ostec.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/ostec.blog\/#organization","name":"OSTEC Business Security","url":"https:\/\/ostec.blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","width":251,"height":67,"caption":"OSTEC Business Security"},"image":{"@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ostec","https:\/\/x.com\/ostecsecurity","https:\/\/www.instagram.com\/ostecsecurity\/","https:\/\/linkedin.com\/company\/ostec-security"]},{"@type":"Person","@id":"https:\/\/ostec.blog\/#\/schema\/person\/399c5da334130a35cfb243a9c0e5d11f","name":"Labbo","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/85e96904a64ff6e523f78e80d83c7b89?s=96&d=mm&r=g","caption":"Labbo"},"url":"https:\/\/ostec.blog\/es\/author\/labbo\/"}]}},"_links":{"self":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts\/4676","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/comments?post=4676"}],"version-history":[{"count":0,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts\/4676\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/media\/12836"}],"wp:attachment":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/media?parent=4676"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/categories?post=4676"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/tags?post=4676"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}