{"id":4223,"date":"2019-11-16T12:57:28","date_gmt":"2019-11-16T11:57:28","guid":{"rendered":"http:\/\/10.128.3.28\/?p=4223"},"modified":"2025-01-22T12:12:08","modified_gmt":"2025-01-22T11:12:08","slug":"investigadores-de-cenits-publican-un-articulo-de-impacto-donde-describen-una-novedosa-metodologia-para-analizar-trafico-real-de-redes-moviles","status":"publish","type":"post","link":"https:\/\/computaex.es\/en\/presentaciones\/investigadores-de-cenits-publican-un-articulo-de-impacto-donde-describen-una-novedosa-metodologia-para-analizar-trafico-real-de-redes-moviles\/","title":{"rendered":"Investigadores de C\u00e9nitS publican un art\u00edculo de impacto donde describen una novedosa metodolog\u00eda para analizar tr\u00e1fico real de redes m\u00f3viles19"},"content":{"rendered":"<p>Investigadores e ingenieros de\u00a0<a class=\"views-ajax-processed-processed\" href=\"\/en\/cenits\/\">C\u00e9nitS<\/a>\u00a0han publicado el art\u00edculo \u00ab<a class=\"views-ajax-processed-processed\" href=\"https:\/\/\/en\/doi.org\/10.1109\/ACCESS.2019.2949804\/\" target=\"_blank\" rel=\"noopener\"><em>A Novel Methodology Based on Orthogonal Projections for a Mobile Network Data Set Analysis<\/em><\/a>\u00bb en\u00a0<a class=\"views-ajax-processed-processed\" href=\"https:\/\/\/en\/ieeexplore.ieee.org\/xpl\/RecentIssue.jsp\/?punumber=6287639\" target=\"_blank\" rel=\"noopener\">IEEE ACCESS<\/a>, una de las revistas cient\u00edficas m\u00e1s relevantes del \u00e1mbito de las telecomunicaciones.<\/p>\n<p>En la actualidad, las redes est\u00e1n consideradas como uno de los puntos claves en la pr\u00f3xima revoluci\u00f3n industrial. De hecho, en un corto espacio de tiempo, 5G ser\u00e1 la red que conectar\u00e1 a los usuarios, la industria y los dispositivos inteligentes. Por este motivo es importante analizar y comprender c\u00f3mo est\u00e1 siendo usada la red en este nuevo paradigma de 5G.<\/p>\n<p>La anal\u00edtica de datos de red incrementa el conocimiento, tanto de los recursos disponibles, como de los usuarios que hacen uso de ella, llevando a los gestores de la red, como son las grandes operadoras de telecomunicaciones, a tomar decisiones sobre la forma m\u00e1s inteligente de explotar los recursos, basadas en los datos extra\u00eddos de la propia red.<\/p>\n<p>El art\u00edculo presenta una novedosa metodolog\u00eda que analiza datos reales de uso de una red en producci\u00f3n, y gracias a la propuesta se puede realizar una clasificaci\u00f3n del uso de forma sencilla. Los resultados obtenidos en este trabajo demuestran que la metodolog\u00eda permite encontrar patrones de uso, como por ejemplo la detecci\u00f3n de anomal\u00edas, o detectar eventos relevantes en la misma, informaci\u00f3n que puede ser usada para extrapolar futuros acontecimientos en la red.<\/p>\n<p>Este trabajo se enmarca en el an\u00e1lisis inteligente de la red a trav\u00e9s de t\u00e9cnicas de machine learning e inteligencia artificial, para extraer el conocimiento sobre lo que est\u00e1 pasando en la red, de forma que se puedan aprovisionar los recursos de la misma, donde los Centros de Proceso de Datos (CPD) juegan un papel muy relevante ya que sus recursos son esenciales para el despliegue de los servicios en las redes 5G.<\/p>\n<p>M\u00e1s informaci\u00f3n:<\/p>\n<ul>\n<li>D. Cort\u00e9s-Polo, L.I. Jim\u00e9nez Gil, J. Calle-Cancho and J. Gonz\u00e1lez-S\u00e1nchez. A Novel Methodology Based on Orthogonal Projections for a Mobile Network Data Set Analysis.\u00a0<em>IEEE Access<\/em>, vol. 7, pp. 158007-158015, 2019. doi:\u00a0<a class=\"views-ajax-processed-processed\" href=\"https:\/\/\/en\/doi.org\/10.1109\/ACCESS.2019.2949804\/\" target=\"_blank\" rel=\"noopener\">10.1109\/ACCESS.2019.2949804<\/a>.<\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Investigadores e ingenieros de\u00a0C\u00e9nitS\u00a0han publicado el art\u00edculo \u00abA Novel Methodology Based on Orthogonal Projections for a Mobile Network Data Set Analysis\u00bb en\u00a0IEEE ACCESS, una de las revistas cient\u00edficas m\u00e1s relevantes &#8230;<\/p>","protected":false},"author":1,"featured_media":4224,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[89],"tags":[],"class_list":["post-4223","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-presentaciones"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Investigadores de C\u00e9nitS publican un art\u00edculo de impacto donde describen una novedosa metodolog\u00eda para analizar tr\u00e1fico real de redes m\u00f3viles19 - Fundaci\u00f3n COMPUTAEX<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/computaex.es\/en\/presentaciones\/investigadores-de-cenits-publican-un-articulo-de-impacto-donde-describen-una-novedosa-metodologia-para-analizar-trafico-real-de-redes-moviles\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Investigadores de C\u00e9nitS publican un art\u00edculo de impacto donde describen una novedosa metodolog\u00eda para analizar tr\u00e1fico real de redes m\u00f3viles19 - Fundaci\u00f3n COMPUTAEX\" \/>\n<meta property=\"og:description\" content=\"Investigadores e ingenieros de\u00a0C\u00e9nitS\u00a0han publicado el art\u00edculo \u00abA Novel Methodology Based on Orthogonal Projections for a Mobile Network Data Set Analysis\u00bb en\u00a0IEEE ACCESS, una de las revistas cient\u00edficas m\u00e1s relevantes ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/computaex.es\/en\/presentaciones\/investigadores-de-cenits-publican-un-articulo-de-impacto-donde-describen-una-novedosa-metodologia-para-analizar-trafico-real-de-redes-moviles\/\" \/>\n<meta property=\"og:site_name\" content=\"Fundaci\u00f3n COMPUTAEX\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/m.facebook.com\/computaex\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-16T11:57:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-22T11:12:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/computaex.es\/wp-content\/uploads\/2025\/01\/20191119_ieee-access.png\" \/>\n\t<meta property=\"og:image:width\" content=\"185\" \/>\n\t<meta property=\"og:image:height\" content=\"102\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"COMPUTAEX\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@computaex\" \/>\n<meta name=\"twitter:site\" content=\"@computaex\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"COMPUTAEX\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/computaex.es\/presentaciones\/investigadores-de-cenits-publican-un-articulo-de-impacto-donde-describen-una-novedosa-metodologia-para-analizar-trafico-real-de-redes-moviles\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/computaex.es\/presentaciones\/investigadores-de-cenits-publican-un-articulo-de-impacto-donde-describen-una-novedosa-metodologia-para-analizar-trafico-real-de-redes-moviles\/\"},\"author\":{\"name\":\"COMPUTAEX\",\"@id\":\"https:\/\/computaex.es\/#\/schema\/person\/56c40e6e76e66bddcd36a39cb6d96e54\"},\"headline\":\"Investigadores de C\u00e9nitS publican un art\u00edculo de impacto donde describen una novedosa metodolog\u00eda para analizar tr\u00e1fico real de redes m\u00f3viles19\",\"datePublished\":\"2019-11-16T11:57:28+00:00\",\"dateModified\":\"2025-01-22T11:12:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/computaex.es\/presentaciones\/investigadores-de-cenits-publican-un-articulo-de-impacto-donde-describen-una-novedosa-metodologia-para-analizar-trafico-real-de-redes-moviles\/\"},\"wordCount\":390,\"publisher\":{\"@id\":\"https:\/\/computaex.es\/#organization\"},\"image\":{\"@id\":\"https:\/\/computaex.es\/presentaciones\/investigadores-de-cenits-publican-un-articulo-de-impacto-donde-describen-una-novedosa-metodologia-para-analizar-trafico-real-de-redes-moviles\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/computaex.es\/wp-content\/uploads\/2025\/01\/20191119_ieee-access.png\",\"articleSection\":[\"Presentaciones\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/computaex.es\/presentaciones\/investigadores-de-cenits-publican-un-articulo-de-impacto-donde-describen-una-novedosa-metodologia-para-analizar-trafico-real-de-redes-moviles\/\",\"url\":\"https:\/\/computaex.es\/presentaciones\/investigadores-de-cenits-publican-un-articulo-de-impacto-donde-describen-una-novedosa-metodologia-para-analizar-trafico-real-de-redes-moviles\/\",\"name\":\"Investigadores de C\u00e9nitS publican un art\u00edculo de impacto donde describen una novedosa metodolog\u00eda para analizar tr\u00e1fico real de redes m\u00f3viles19 - Fundaci\u00f3n COMPUTAEX\",\"isPartOf\":{\"@id\":\"https:\/\/computaex.es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/computaex.es\/presentaciones\/investigadores-de-cenits-publican-un-articulo-de-impacto-donde-describen-una-novedosa-metodologia-para-analizar-trafico-real-de-redes-moviles\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/computaex.es\/presentaciones\/investigadores-de-cenits-publican-un-articulo-de-impacto-donde-describen-una-novedosa-metodologia-para-analizar-trafico-real-de-redes-moviles\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/computaex.es\/wp-content\/uploads\/2025\/01\/20191119_ieee-access.png\",\"datePublished\":\"2019-11-16T11:57:28+00:00\",\"dateModified\":\"2025-01-22T11:12:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/computaex.es\/presentaciones\/investigadores-de-cenits-publican-un-articulo-de-impacto-donde-describen-una-novedosa-metodologia-para-analizar-trafico-real-de-redes-moviles\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/computaex.es\/presentaciones\/investigadores-de-cenits-publican-un-articulo-de-impacto-donde-describen-una-novedosa-metodologia-para-analizar-trafico-real-de-redes-moviles\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/computaex.es\/presentaciones\/investigadores-de-cenits-publican-un-articulo-de-impacto-donde-describen-una-novedosa-metodologia-para-analizar-trafico-real-de-redes-moviles\/#primaryimage\",\"url\":\"https:\/\/computaex.es\/wp-content\/uploads\/2025\/01\/20191119_ieee-access.png\",\"contentUrl\":\"https:\/\/computaex.es\/wp-content\/uploads\/2025\/01\/20191119_ieee-access.png\",\"width\":185,\"height\":102},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/computaex.es\/presentaciones\/investigadores-de-cenits-publican-un-articulo-de-impacto-donde-describen-una-novedosa-metodologia-para-analizar-trafico-real-de-redes-moviles\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/computaex.es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Investigadores de C\u00e9nitS publican un art\u00edculo de impacto donde describen una novedosa metodolog\u00eda para analizar tr\u00e1fico real de redes m\u00f3viles19\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/computaex.es\/#website\",\"url\":\"https:\/\/computaex.es\/\",\"name\":\"Fundaci\u00f3n COMPUTAEX\",\"description\":\"COMPUTAEX\",\"publisher\":{\"@id\":\"https:\/\/computaex.es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/computaex.es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/computaex.es\/#organization\",\"name\":\"COMPUTAEX\",\"url\":\"https:\/\/computaex.es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/computaex.es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/computaex.es\/wp-content\/uploads\/2025\/05\/cropped-COMPUTAEX_transparente-scaled-1.png\",\"contentUrl\":\"https:\/\/computaex.es\/wp-content\/uploads\/2025\/05\/cropped-COMPUTAEX_transparente-scaled-1.png\",\"width\":2560,\"height\":970,\"caption\":\"COMPUTAEX\"},\"image\":{\"@id\":\"https:\/\/computaex.es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/m.facebook.com\/computaex\/\",\"https:\/\/x.com\/computaex\",\"https:\/\/es.linkedin.com\/company\/cenits\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/computaex.es\/#\/schema\/person\/56c40e6e76e66bddcd36a39cb6d96e54\",\"name\":\"COMPUTAEX\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/computaex.es\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4326f71d26728864745e3897d70bc6d2436e3971500de06e3156d3482a35fc34?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4326f71d26728864745e3897d70bc6d2436e3971500de06e3156d3482a35fc34?s=96&d=mm&r=g\",\"caption\":\"COMPUTAEX\"},\"sameAs\":[\"http:\/\/10.128.3.28\"],\"url\":\"https:\/\/computaex.es\/en\/author\/admincenits\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Investigadores de C\u00e9nitS publican un art\u00edculo de impacto donde describen una novedosa metodolog\u00eda para analizar tr\u00e1fico real de redes m\u00f3viles19 - Fundaci\u00f3n COMPUTAEX","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/computaex.es\/en\/presentaciones\/investigadores-de-cenits-publican-un-articulo-de-impacto-donde-describen-una-novedosa-metodologia-para-analizar-trafico-real-de-redes-moviles\/","og_locale":"en_US","og_type":"article","og_title":"Investigadores de C\u00e9nitS publican un art\u00edculo de impacto donde describen una novedosa metodolog\u00eda para analizar tr\u00e1fico real de redes m\u00f3viles19 - Fundaci\u00f3n COMPUTAEX","og_description":"Investigadores e ingenieros de\u00a0C\u00e9nitS\u00a0han publicado el art\u00edculo \u00abA Novel Methodology Based on Orthogonal Projections for a Mobile Network Data Set Analysis\u00bb en\u00a0IEEE ACCESS, una de las revistas cient\u00edficas m\u00e1s relevantes ...","og_url":"https:\/\/computaex.es\/en\/presentaciones\/investigadores-de-cenits-publican-un-articulo-de-impacto-donde-describen-una-novedosa-metodologia-para-analizar-trafico-real-de-redes-moviles\/","og_site_name":"Fundaci\u00f3n COMPUTAEX","article_publisher":"https:\/\/m.facebook.com\/computaex\/","article_published_time":"2019-11-16T11:57:28+00:00","article_modified_time":"2025-01-22T11:12:08+00:00","og_image":[{"width":185,"height":102,"url":"https:\/\/computaex.es\/wp-content\/uploads\/2025\/01\/20191119_ieee-access.png","type":"image\/png"}],"author":"COMPUTAEX","twitter_card":"summary_large_image","twitter_creator":"@computaex","twitter_site":"@computaex","twitter_misc":{"Written by":"COMPUTAEX","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/computaex.es\/presentaciones\/investigadores-de-cenits-publican-un-articulo-de-impacto-donde-describen-una-novedosa-metodologia-para-analizar-trafico-real-de-redes-moviles\/#article","isPartOf":{"@id":"https:\/\/computaex.es\/presentaciones\/investigadores-de-cenits-publican-un-articulo-de-impacto-donde-describen-una-novedosa-metodologia-para-analizar-trafico-real-de-redes-moviles\/"},"author":{"name":"COMPUTAEX","@id":"https:\/\/computaex.es\/#\/schema\/person\/56c40e6e76e66bddcd36a39cb6d96e54"},"headline":"Investigadores de C\u00e9nitS publican un art\u00edculo de impacto donde describen una novedosa metodolog\u00eda para analizar tr\u00e1fico real de redes m\u00f3viles19","datePublished":"2019-11-16T11:57:28+00:00","dateModified":"2025-01-22T11:12:08+00:00","mainEntityOfPage":{"@id":"https:\/\/computaex.es\/presentaciones\/investigadores-de-cenits-publican-un-articulo-de-impacto-donde-describen-una-novedosa-metodologia-para-analizar-trafico-real-de-redes-moviles\/"},"wordCount":390,"publisher":{"@id":"https:\/\/computaex.es\/#organization"},"image":{"@id":"https:\/\/computaex.es\/presentaciones\/investigadores-de-cenits-publican-un-articulo-de-impacto-donde-describen-una-novedosa-metodologia-para-analizar-trafico-real-de-redes-moviles\/#primaryimage"},"thumbnailUrl":"https:\/\/computaex.es\/wp-content\/uploads\/2025\/01\/20191119_ieee-access.png","articleSection":["Presentaciones"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/computaex.es\/presentaciones\/investigadores-de-cenits-publican-un-articulo-de-impacto-donde-describen-una-novedosa-metodologia-para-analizar-trafico-real-de-redes-moviles\/","url":"https:\/\/computaex.es\/presentaciones\/investigadores-de-cenits-publican-un-articulo-de-impacto-donde-describen-una-novedosa-metodologia-para-analizar-trafico-real-de-redes-moviles\/","name":"Investigadores de C\u00e9nitS publican un art\u00edculo de impacto donde describen una novedosa metodolog\u00eda para analizar tr\u00e1fico real de redes m\u00f3viles19 - Fundaci\u00f3n COMPUTAEX","isPartOf":{"@id":"https:\/\/computaex.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/computaex.es\/presentaciones\/investigadores-de-cenits-publican-un-articulo-de-impacto-donde-describen-una-novedosa-metodologia-para-analizar-trafico-real-de-redes-moviles\/#primaryimage"},"image":{"@id":"https:\/\/computaex.es\/presentaciones\/investigadores-de-cenits-publican-un-articulo-de-impacto-donde-describen-una-novedosa-metodologia-para-analizar-trafico-real-de-redes-moviles\/#primaryimage"},"thumbnailUrl":"https:\/\/computaex.es\/wp-content\/uploads\/2025\/01\/20191119_ieee-access.png","datePublished":"2019-11-16T11:57:28+00:00","dateModified":"2025-01-22T11:12:08+00:00","breadcrumb":{"@id":"https:\/\/computaex.es\/presentaciones\/investigadores-de-cenits-publican-un-articulo-de-impacto-donde-describen-una-novedosa-metodologia-para-analizar-trafico-real-de-redes-moviles\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/computaex.es\/presentaciones\/investigadores-de-cenits-publican-un-articulo-de-impacto-donde-describen-una-novedosa-metodologia-para-analizar-trafico-real-de-redes-moviles\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/computaex.es\/presentaciones\/investigadores-de-cenits-publican-un-articulo-de-impacto-donde-describen-una-novedosa-metodologia-para-analizar-trafico-real-de-redes-moviles\/#primaryimage","url":"https:\/\/computaex.es\/wp-content\/uploads\/2025\/01\/20191119_ieee-access.png","contentUrl":"https:\/\/computaex.es\/wp-content\/uploads\/2025\/01\/20191119_ieee-access.png","width":185,"height":102},{"@type":"BreadcrumbList","@id":"https:\/\/computaex.es\/presentaciones\/investigadores-de-cenits-publican-un-articulo-de-impacto-donde-describen-una-novedosa-metodologia-para-analizar-trafico-real-de-redes-moviles\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/computaex.es\/"},{"@type":"ListItem","position":2,"name":"Investigadores de C\u00e9nitS publican un art\u00edculo de impacto donde describen una novedosa metodolog\u00eda para analizar tr\u00e1fico real de redes m\u00f3viles19"}]},{"@type":"WebSite","@id":"https:\/\/computaex.es\/#website","url":"https:\/\/computaex.es\/","name":"COMPUTAEX Foundation","description":"COMPUTAEX","publisher":{"@id":"https:\/\/computaex.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/computaex.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/computaex.es\/#organization","name":"COMPUTAEX","url":"https:\/\/computaex.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/computaex.es\/#\/schema\/logo\/image\/","url":"https:\/\/computaex.es\/wp-content\/uploads\/2025\/05\/cropped-COMPUTAEX_transparente-scaled-1.png","contentUrl":"https:\/\/computaex.es\/wp-content\/uploads\/2025\/05\/cropped-COMPUTAEX_transparente-scaled-1.png","width":2560,"height":970,"caption":"COMPUTAEX"},"image":{"@id":"https:\/\/computaex.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/m.facebook.com\/computaex\/","https:\/\/x.com\/computaex","https:\/\/es.linkedin.com\/company\/cenits"]},{"@type":"Person","@id":"https:\/\/computaex.es\/#\/schema\/person\/56c40e6e76e66bddcd36a39cb6d96e54","name":"COMPUTAEX","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/computaex.es\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4326f71d26728864745e3897d70bc6d2436e3971500de06e3156d3482a35fc34?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4326f71d26728864745e3897d70bc6d2436e3971500de06e3156d3482a35fc34?s=96&d=mm&r=g","caption":"COMPUTAEX"},"sameAs":["http:\/\/10.128.3.28"],"url":"https:\/\/computaex.es\/en\/author\/admincenits\/"}]}},"_links":{"self":[{"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/posts\/4223","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/comments?post=4223"}],"version-history":[{"count":2,"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/posts\/4223\/revisions"}],"predecessor-version":[{"id":5946,"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/posts\/4223\/revisions\/5946"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/media\/4224"}],"wp:attachment":[{"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/media?parent=4223"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/categories?post=4223"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/computaex.es\/en\/wp-json\/wp\/v2\/tags?post=4223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}