{"id":4026,"date":"2021-06-07T12:01:57","date_gmt":"2021-06-07T10:01:57","guid":{"rendered":"http:\/\/10.128.3.28\/?p=4026"},"modified":"2025-01-23T08:47:27","modified_gmt":"2025-01-23T07:47:27","slug":"cenits-colabora-en-las-jornadas-nacionales-de-investigacion-en-ciberseguridad-jnic","status":"publish","type":"post","link":"https:\/\/computaex.es\/en\/colaboracion\/cenits-colabora-en-las-jornadas-nacionales-de-investigacion-en-ciberseguridad-jnic\/","title":{"rendered":"C\u00e9nitS colabora en las Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad (JNIC)"},"content":{"rendered":"<p>El mi\u00e9rcoles 9 y el jueves 10 de junio van a celebrarse de forma virtual las VI Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad (<a class=\"views-ajax-processed-processed\" href=\"https:\/\/\/en\/2021.jnic.es\/\">JNIC<\/a>), cuyo objetivo es promover el contacto, el intercambio y la discusi\u00f3n de ideas, conocimientos y experiencias entre la red acad\u00e9mica e investigadora, y profesionales y empresas. En esta ocasi\u00f3n la\u00a0<a class=\"views-ajax-processed-processed\" href=\"https:\/\/\/en\/2021.jnic.es\/inscripcion\/\">inscripci\u00f3n<\/a>\u00a0es gratuita, al tratarse de un evento online.<\/p>\n<p><a class=\"views-ajax-processed-processed\" href=\"http:\/\/www.cenits.es\/cenits\">C\u00e9nitS<\/a>\u00a0forma parte del comit\u00e9 de transferencia tecnol\u00f3gica. En concreto,\u00a0<a class=\"views-ajax-processed-processed\" href=\"https:\/\/\/en\/drive.google.com\/file\/d\/1cN0Jg_0wKkBxbhY4Pf9684IdBBoXbLJQ\/\">COMPUTAEX ha propuesto un desaf\u00edo<\/a>\u00a0en el marco del certamen de retos cient\u00edficos consistente en analizar y dise\u00f1ar un sistema basado en blockchain (p\u00fablico, privado o h\u00edbrido) para garantizar la confidencialidad e integridad de la informaci\u00f3n gen\u00e9tica.<\/p>\n<p>Jos\u00e9 Luis Gonz\u00e1lez, Director General de C\u00e9nits y Felipe Lemus, Responsable de la Unidad Funcional de redes y comunicaciones del Centro, han colaborado tambi\u00e9n en la publicaci\u00f3n \u00ab<em>Aplicaci\u00f3n de control de acceso y t\u00e9cnicas de Blockchain para el control de datos gen\u00e9ticos<\/em>\u00ab, realizada conjuntamente con Isabel Rom\u00e1n, Germ\u00e1n Madinabeitia, Rafael Estepa, Jes\u00fas Diaz-Verdejo y Antonio Estepa, que ser\u00e1 presentada en la sesi\u00f3n dedicada a la transferencia tecnol\u00f3gica.<\/p>\n<p>Del mismo modo, Felipe Lemus presentar\u00e1 adem\u00e1s el trabajo \u00ab<em>Despliegue de t\u00e9cnicas SDNFV para la detecci\u00f3n, gesti\u00f3n y mitigaci\u00f3n de amenazas a la seguridad de centros de supercomputaci\u00f3n (HPC)<\/em>\u00ab, publicado junto a David Cort\u00e9s, profesor de la Escuela Polit\u00e9cnica de C\u00e1ceres y Jos\u00e9 Luis Gonz\u00e1lez.<\/p>\n<p>Las JNIC se centran en los \u00faltimos avances cient\u00edficos en la materia, suponiendo un foro de debate en el que presentar perspectivas y enfoques innovadores en ciberseguridad, posibilitando adem\u00e1s la conexi\u00f3n entre la acci\u00f3n investigadora e innovadora y el desarrollo de productos y servicios de valor para la sociedad. Como en anteriores ediciones, las jornadas se estructuran en tres \u00e1reas fundamentales: Investigaci\u00f3n en ciberseguridad, Docencia e innovaci\u00f3n educativa en ciberseguridad, y\u00a0<a class=\"views-ajax-processed-processed\" href=\"https:\/\/\/en\/transferencia.jnic.es\/\">Transferencia tecnol\u00f3gica<\/a>\u00a0(certamen de retos cient\u00edficos). Las versiones extendidas de los mejores art\u00edculos recibidos, sobre investigaci\u00f3n y formaci\u00f3n en innovaci\u00f3n educativa, ser\u00e1n propuestas para special issues de revistas indexadas en el JCR (Journal Citation Reports).<\/p>\n<p>La VI edici\u00f3n de estas Jornadas supone la consolidaci\u00f3n de las mismas, tras las ediciones de\u00a0<a class=\"views-ajax-processed-processed\" href=\"http:\/\/\/en\/jornadasciberseguridad.riasc.unileon.es\/\">Le\u00f3n<\/a>\u00a0(2015),\u00a0<a class=\"views-ajax-processed-processed\" href=\"http:\/\/\/en\/ucys.ugr.es\/jnic2016\/\">Granada<\/a>\u00a0(2016),\u00a0<a class=\"views-ajax-processed-processed\" href=\"http:\/\/\/en\/2017.jnic.es\/\">Madrid<\/a>\u00a0(2017),\u00a0<a class=\"views-ajax-processed-processed\" href=\"http:\/\/\/en\/2018.jnic.es\/\">San Sebasti\u00e1n<\/a>\u00a0(2018) y\u00a0<a class=\"views-ajax-processed-processed\" href=\"https:\/\/\/en\/2019.jnic.es\/\">C\u00e1ceres<\/a>\u00a0(2019), \u00e9sta \u00faltima\u00a0<a class=\"views-ajax-processed-processed\" href=\"http:\/\/www.cenits.es\/noticias\/22052019-computaex-participa-organizacion-v-jornadas-nacionales-investigacion\">organizada conjuntamente por COMPUTAEX<\/a>, la Universidad de Extremadura (<a class=\"views-ajax-processed-processed\" href=\"https:\/\/www.unex.es\/\">UEx<\/a>), y la\u00a0<a class=\"views-ajax-processed-processed\" href=\"https:\/\/www.ucm.es\/\">Universidad Complutense de Madrid<\/a>, con la colaboraci\u00f3n del Instituto Nacional de Ciberseguridad (<a class=\"views-ajax-processed-processed\" href=\"https:\/\/www.incibe.es\/\">INCIBE<\/a>).<\/p>\n<p>Ver\u00a0<a class=\"views-ajax-processed-processed\" href=\"https:\/\/\/en\/2021.jnic.es\/programa\/\">programa del evento<\/a>.<br \/>\nVer\u00a0<a class=\"views-ajax-processed-processed\" href=\"https:\/\/\/en\/2021.jnic.es\/comites\/\">comit\u00e9s de las JNIC<\/a>.<br \/>\nVer\u00a0<a class=\"views-ajax-processed-processed\" href=\"https:\/\/\/en\/drive.google.com\/file\/d\/1cN0Jg_0wKkBxbhY4Pf9684IdBBoXbLJQ\/\">reto cient\u00edfico propuesto por C\u00e9nitS-COMPUTAEX<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>El mi\u00e9rcoles 9 y el jueves 10 de junio van a celebrarse de forma virtual las VI Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad (JNIC), cuyo objetivo es promover el contacto, &#8230;<\/p>","protected":false},"author":1,"featured_media":4027,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[78],"tags":[],"class_list":["post-4026","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-colaboracion"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>C\u00e9nitS colabora en las Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad (JNIC) - Fundaci\u00f3n COMPUTAEX<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/computaex.es\/en\/colaboracion\/cenits-colabora-en-las-jornadas-nacionales-de-investigacion-en-ciberseguridad-jnic\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"C\u00e9nitS colabora en las Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad (JNIC) - Fundaci\u00f3n COMPUTAEX\" \/>\n<meta property=\"og:description\" content=\"El mi\u00e9rcoles 9 y el jueves 10 de junio van a celebrarse de forma virtual las VI Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad (JNIC), cuyo objetivo es promover el contacto, ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/computaex.es\/en\/colaboracion\/cenits-colabora-en-las-jornadas-nacionales-de-investigacion-en-ciberseguridad-jnic\/\" \/>\n<meta property=\"og:site_name\" content=\"Fundaci\u00f3n COMPUTAEX\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/m.facebook.com\/computaex\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-07T10:01:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-23T07:47:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/computaex.es\/wp-content\/uploads\/2025\/01\/20210607_jnic.png\" \/>\n\t<meta property=\"og:image:width\" content=\"185\" \/>\n\t<meta property=\"og:image:height\" content=\"69\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"COMPUTAEX\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@computaex\" \/>\n<meta name=\"twitter:site\" content=\"@computaex\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"COMPUTAEX\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/computaex.es\/colaboracion\/cenits-colabora-en-las-jornadas-nacionales-de-investigacion-en-ciberseguridad-jnic\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/computaex.es\/colaboracion\/cenits-colabora-en-las-jornadas-nacionales-de-investigacion-en-ciberseguridad-jnic\/\"},\"author\":{\"name\":\"COMPUTAEX\",\"@id\":\"https:\/\/computaex.es\/#\/schema\/person\/56c40e6e76e66bddcd36a39cb6d96e54\"},\"headline\":\"C\u00e9nitS colabora en las Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad (JNIC)\",\"datePublished\":\"2021-06-07T10:01:57+00:00\",\"dateModified\":\"2025-01-23T07:47:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/computaex.es\/colaboracion\/cenits-colabora-en-las-jornadas-nacionales-de-investigacion-en-ciberseguridad-jnic\/\"},\"wordCount\":462,\"publisher\":{\"@id\":\"https:\/\/computaex.es\/#organization\"},\"image\":{\"@id\":\"https:\/\/computaex.es\/colaboracion\/cenits-colabora-en-las-jornadas-nacionales-de-investigacion-en-ciberseguridad-jnic\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/computaex.es\/wp-content\/uploads\/2025\/01\/20210607_jnic.png\",\"articleSection\":[\"Colaboraci\u00f3n\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/computaex.es\/colaboracion\/cenits-colabora-en-las-jornadas-nacionales-de-investigacion-en-ciberseguridad-jnic\/\",\"url\":\"https:\/\/computaex.es\/colaboracion\/cenits-colabora-en-las-jornadas-nacionales-de-investigacion-en-ciberseguridad-jnic\/\",\"name\":\"C\u00e9nitS colabora en las Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad (JNIC) - Fundaci\u00f3n COMPUTAEX\",\"isPartOf\":{\"@id\":\"https:\/\/computaex.es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/computaex.es\/colaboracion\/cenits-colabora-en-las-jornadas-nacionales-de-investigacion-en-ciberseguridad-jnic\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/computaex.es\/colaboracion\/cenits-colabora-en-las-jornadas-nacionales-de-investigacion-en-ciberseguridad-jnic\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/computaex.es\/wp-content\/uploads\/2025\/01\/20210607_jnic.png\",\"datePublished\":\"2021-06-07T10:01:57+00:00\",\"dateModified\":\"2025-01-23T07:47:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/computaex.es\/colaboracion\/cenits-colabora-en-las-jornadas-nacionales-de-investigacion-en-ciberseguridad-jnic\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/computaex.es\/colaboracion\/cenits-colabora-en-las-jornadas-nacionales-de-investigacion-en-ciberseguridad-jnic\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/computaex.es\/colaboracion\/cenits-colabora-en-las-jornadas-nacionales-de-investigacion-en-ciberseguridad-jnic\/#primaryimage\",\"url\":\"https:\/\/computaex.es\/wp-content\/uploads\/2025\/01\/20210607_jnic.png\",\"contentUrl\":\"https:\/\/computaex.es\/wp-content\/uploads\/2025\/01\/20210607_jnic.png\",\"width\":185,\"height\":69},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/computaex.es\/colaboracion\/cenits-colabora-en-las-jornadas-nacionales-de-investigacion-en-ciberseguridad-jnic\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/computaex.es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"C\u00e9nitS colabora en las Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad (JNIC)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/computaex.es\/#website\",\"url\":\"https:\/\/computaex.es\/\",\"name\":\"Fundaci\u00f3n COMPUTAEX\",\"description\":\"COMPUTAEX\",\"publisher\":{\"@id\":\"https:\/\/computaex.es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/computaex.es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/computaex.es\/#organization\",\"name\":\"COMPUTAEX\",\"url\":\"https:\/\/computaex.es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/computaex.es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/computaex.es\/wp-content\/uploads\/2025\/05\/cropped-COMPUTAEX_transparente-scaled-1.png\",\"contentUrl\":\"https:\/\/computaex.es\/wp-content\/uploads\/2025\/05\/cropped-COMPUTAEX_transparente-scaled-1.png\",\"width\":2560,\"height\":970,\"caption\":\"COMPUTAEX\"},\"image\":{\"@id\":\"https:\/\/computaex.es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/m.facebook.com\/computaex\/\",\"https:\/\/x.com\/computaex\",\"https:\/\/es.linkedin.com\/company\/cenits\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/computaex.es\/#\/schema\/person\/56c40e6e76e66bddcd36a39cb6d96e54\",\"name\":\"COMPUTAEX\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/computaex.es\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4326f71d26728864745e3897d70bc6d2436e3971500de06e3156d3482a35fc34?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4326f71d26728864745e3897d70bc6d2436e3971500de06e3156d3482a35fc34?s=96&d=mm&r=g\",\"caption\":\"COMPUTAEX\"},\"sameAs\":[\"http:\/\/10.128.3.28\"],\"url\":\"https:\/\/computaex.es\/en\/author\/admincenits\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"C\u00e9nitS colabora en las Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad (JNIC) - Fundaci\u00f3n COMPUTAEX","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/computaex.es\/en\/colaboracion\/cenits-colabora-en-las-jornadas-nacionales-de-investigacion-en-ciberseguridad-jnic\/","og_locale":"en_US","og_type":"article","og_title":"C\u00e9nitS colabora en las Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad (JNIC) - Fundaci\u00f3n COMPUTAEX","og_description":"El mi\u00e9rcoles 9 y el jueves 10 de junio van a celebrarse de forma virtual las VI Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad (JNIC), cuyo objetivo es promover el contacto, ...","og_url":"https:\/\/computaex.es\/en\/colaboracion\/cenits-colabora-en-las-jornadas-nacionales-de-investigacion-en-ciberseguridad-jnic\/","og_site_name":"Fundaci\u00f3n COMPUTAEX","article_publisher":"https:\/\/m.facebook.com\/computaex\/","article_published_time":"2021-06-07T10:01:57+00:00","article_modified_time":"2025-01-23T07:47:27+00:00","og_image":[{"width":185,"height":69,"url":"https:\/\/computaex.es\/wp-content\/uploads\/2025\/01\/20210607_jnic.png","type":"image\/png"}],"author":"COMPUTAEX","twitter_card":"summary_large_image","twitter_creator":"@computaex","twitter_site":"@computaex","twitter_misc":{"Written by":"COMPUTAEX","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/computaex.es\/colaboracion\/cenits-colabora-en-las-jornadas-nacionales-de-investigacion-en-ciberseguridad-jnic\/#article","isPartOf":{"@id":"https:\/\/computaex.es\/colaboracion\/cenits-colabora-en-las-jornadas-nacionales-de-investigacion-en-ciberseguridad-jnic\/"},"author":{"name":"COMPUTAEX","@id":"https:\/\/computaex.es\/#\/schema\/person\/56c40e6e76e66bddcd36a39cb6d96e54"},"headline":"C\u00e9nitS colabora en las Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad (JNIC)","datePublished":"2021-06-07T10:01:57+00:00","dateModified":"2025-01-23T07:47:27+00:00","mainEntityOfPage":{"@id":"https:\/\/computaex.es\/colaboracion\/cenits-colabora-en-las-jornadas-nacionales-de-investigacion-en-ciberseguridad-jnic\/"},"wordCount":462,"publisher":{"@id":"https:\/\/computaex.es\/#organization"},"image":{"@id":"https:\/\/computaex.es\/colaboracion\/cenits-colabora-en-las-jornadas-nacionales-de-investigacion-en-ciberseguridad-jnic\/#primaryimage"},"thumbnailUrl":"https:\/\/computaex.es\/wp-content\/uploads\/2025\/01\/20210607_jnic.png","articleSection":["Colaboraci\u00f3n"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/computaex.es\/colaboracion\/cenits-colabora-en-las-jornadas-nacionales-de-investigacion-en-ciberseguridad-jnic\/","url":"https:\/\/computaex.es\/colaboracion\/cenits-colabora-en-las-jornadas-nacionales-de-investigacion-en-ciberseguridad-jnic\/","name":"C\u00e9nitS colabora en las Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad (JNIC) - Fundaci\u00f3n COMPUTAEX","isPartOf":{"@id":"https:\/\/computaex.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/computaex.es\/colaboracion\/cenits-colabora-en-las-jornadas-nacionales-de-investigacion-en-ciberseguridad-jnic\/#primaryimage"},"image":{"@id":"https:\/\/computaex.es\/colaboracion\/cenits-colabora-en-las-jornadas-nacionales-de-investigacion-en-ciberseguridad-jnic\/#primaryimage"},"thumbnailUrl":"https:\/\/computaex.es\/wp-content\/uploads\/2025\/01\/20210607_jnic.png","datePublished":"2021-06-07T10:01:57+00:00","dateModified":"2025-01-23T07:47:27+00:00","breadcrumb":{"@id":"https:\/\/computaex.es\/colaboracion\/cenits-colabora-en-las-jornadas-nacionales-de-investigacion-en-ciberseguridad-jnic\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/computaex.es\/colaboracion\/cenits-colabora-en-las-jornadas-nacionales-de-investigacion-en-ciberseguridad-jnic\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/computaex.es\/colaboracion\/cenits-colabora-en-las-jornadas-nacionales-de-investigacion-en-ciberseguridad-jnic\/#primaryimage","url":"https:\/\/computaex.es\/wp-content\/uploads\/2025\/01\/20210607_jnic.png","contentUrl":"https:\/\/computaex.es\/wp-content\/uploads\/2025\/01\/20210607_jnic.png","width":185,"height":69},{"@type":"BreadcrumbList","@id":"https:\/\/computaex.es\/colaboracion\/cenits-colabora-en-las-jornadas-nacionales-de-investigacion-en-ciberseguridad-jnic\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/computaex.es\/"},{"@type":"ListItem","position":2,"name":"C\u00e9nitS colabora en las Jornadas Nacionales de Investigaci\u00f3n en Ciberseguridad (JNIC)"}]},{"@type":"WebSite","@id":"https:\/\/computaex.es\/#website","url":"https:\/\/computaex.es\/","name":"COMPUTAEX Foundation","description":"COMPUTAEX","publisher":{"@id":"https:\/\/computaex.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/computaex.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/computaex.es\/#organization","name":"COMPUTAEX","url":"https:\/\/computaex.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/computaex.es\/#\/schema\/logo\/image\/","url":"https:\/\/computaex.es\/wp-content\/uploads\/2025\/05\/cropped-COMPUTAEX_transparente-scaled-1.png","contentUrl":"https:\/\/computaex.es\/wp-content\/uploads\/2025\/05\/cropped-COMPUTAEX_transparente-scaled-1.png","width":2560,"height":970,"caption":"COMPUTAEX"},"image":{"@id":"https:\/\/computaex.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/m.facebook.com\/computaex\/","https:\/\/x.com\/computaex","https:\/\/es.linkedin.com\/company\/cenits"]},{"@type":"Person","@id":"https:\/\/computaex.es\/#\/schema\/person\/56c40e6e76e66bddcd36a39cb6d96e54","name":"COMPUTAEX","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/computaex.es\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4326f71d26728864745e3897d70bc6d2436e3971500de06e3156d3482a35fc34?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4326f71d26728864745e3897d70bc6d2436e3971500de06e3156d3482a35fc34?s=96&d=mm&r=g","caption":"COMPUTAEX"},"sameAs":["http:\/\/10.128.3.28"],"url":"https:\/\/computaex.es\/en\/author\/admincenits\/"}]}},"_links":{"self":[{"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/posts\/4026","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/comments?post=4026"}],"version-history":[{"count":1,"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/posts\/4026\/revisions"}],"predecessor-version":[{"id":4028,"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/posts\/4026\/revisions\/4028"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/media\/4027"}],"wp:attachment":[{"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/media?parent=4026"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/categories?post=4026"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/tags?post=4026"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}