{"id":17740,"date":"2019-08-15T09:35:08","date_gmt":"2019-08-15T15:35:08","guid":{"rendered":"http:\/\/otech.uaeh.edu.mx\/noti\/?p=17740"},"modified":"2019-08-15T09:35:21","modified_gmt":"2019-08-15T15:35:21","slug":"nuevas-amenazas-de-seguridad-surgiran-con-el-uso-de-inteligencia-artificial","status":"publish","type":"post","link":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/nuevas-amenazas-de-seguridad-surgiran-con-el-uso-de-inteligencia-artificial\/","title":{"rendered":"Nuevas amenazas de seguridad surgir\u00e1n con el uso de Inteligencia Artificial"},"content":{"rendered":"<p>La Inteligencia Artificial (IA) es una tecnolog\u00eda que promete solucionar problemas de la vida diaria al conferirle m\u00e1s inteligencia a m\u00e1quinas y al software, pero tambi\u00e9n enfrentar\u00e1 amenazas de ciberseguridad.<!--more--><\/p>\n<p>\u201cA pesar de que la Inteligencia Artificial tiene muchos beneficios para usuarios y empresas e incluso puede ser utilizada como una herramienta para la prevenci\u00f3n de amenazas, su mayor disponibilidad generar\u00e1 t\u00e9cnicas de ciberataques m\u00e1s avanzadas\u201d, explica \u00c1ngel Salazar, country Manager de Soluciones Seguras Guatemala.<\/p>\n<p>De acuerdo a los expertos de Soluciones Seguras, entre los riesgos que plantea la IA en las manos equivocadas, se encuentran aquellos que ata\u00f1en la seguridad f\u00edsica y digital. En t\u00e9rminos de seguridad digital permitir\u00e1 aumentar la escala de los amenazas, por ejemplo, se podr\u00edan realizar ciberataques intensivos de phishing o utilizar t\u00e9cnicas como s\u00edntesis del habla para hacerse pasar por las v\u00edctimas y realizar fraudes electr\u00f3nicos.<\/p>\n<p>En lo que respecta a la seguridad f\u00edsica, la IA podr\u00eda generar vulnerabilidades a medida que los sistemas automatizados permiten hogares y empresas conectados y aut\u00f3nomos. \u201cLos criminales cibern\u00e9ticos pueden infiltrar estos sistemas y causar da\u00f1os significativos\u201d, explica Salazar.<\/p>\n<p>Esto, sin contar lo que se conoce como \u201camenazas de inteligencia artificial hechas a prop\u00f3sito\u201d que var\u00edan desde la manipulaci\u00f3n de videos hasta la creaci\u00f3n de armas aut\u00f3nomas. En el primer caso, se conoce como deepfakes, un m\u00e9todo de machine learning que intercambia rostros de personas, desde celebridades hasta l\u00edderes mundiales.<\/p>\n<p>Recientemente circul\u00f3 un v\u00eddeo de Nancy Pelosi, presidenta de la C\u00e1mara de Representantes de EE.UU., en el que \u00e9sta parec\u00eda mostrar evidencias de intoxicaci\u00f3n alcoh\u00f3lica, por su dificultad en la dicci\u00f3n. El video es un ejemplo de deepfake y de lo que se puede lograr con la manipulaci\u00f3n de este tipo de formatos.<\/p>\n<p>Ante este panorama, el experto de Soluciones Seguras aboga por la creaci\u00f3n de nuevas pol\u00edticas para controlar las amenazas de esta nueva tecnolog\u00eda. \u201cLo primero que debemos preguntarnos es qui\u00e9n tiene acceso a IA, deben existir modelos de licencia de acceso y regulaci\u00f3n de estas herramientas para evitar que su enorme potencial sea utilizado para generar ataques m\u00e1s eficientes\u201d, finaliza el vocero.<\/p>\n<p><strong>Fuente:\u00a0<\/strong><\/p>\n<p><em>R.L, R. L. (2019b, 15 agosto). Nuevas amenazas de seguridad surgir\u00e1n con el uso de Inteligencia Artificial. Recuperado 15 agosto, 2019, de https:\/\/newsinamerica.com\/pdcc\/nuevas-amenazas-de-seguridad-surgiran-con-el-uso-de-inteligencia-artificial\/<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>La Inteligencia Artificial (IA) es una tecnolog\u00eda que promete solucionar problemas de la vida diaria al conferirle m\u00e1s inteligencia a m\u00e1quinas y al software, pero tambi\u00e9n enfrentar\u00e1 amenazas de ciberseguridad.<\/p>\n","protected":false},"author":1,"featured_media":17741,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[361],"tags":[],"class_list":["post-17740","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ia"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Nuevas amenazas de seguridad surgir\u00e1n con el uso de Inteligencia Artificial - Observatorio Tecnol\u00f3gico de Hidalgo<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/nuevas-amenazas-de-seguridad-surgiran-con-el-uso-de-inteligencia-artificial\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Nuevas amenazas de seguridad surgir\u00e1n con el uso de Inteligencia Artificial - Observatorio Tecnol\u00f3gico de Hidalgo\" \/>\n<meta property=\"og:description\" content=\"La Inteligencia Artificial (IA) es una tecnolog\u00eda que promete solucionar problemas de la vida diaria al conferirle m\u00e1s inteligencia a m\u00e1quinas y al software, pero tambi\u00e9n enfrentar\u00e1 amenazas de ciberseguridad.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/nuevas-amenazas-de-seguridad-surgiran-con-el-uso-de-inteligencia-artificial\/\" \/>\n<meta property=\"og:site_name\" content=\"Observatorio Tecnol\u00f3gico de Hidalgo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/observatoriouaeh\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-15T15:35:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-08-15T15:35:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/08\/Notic.2-7.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@OBSERVATORIOEH\" \/>\n<meta name=\"twitter:site\" content=\"@OBSERVATORIOEH\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/nuevas-amenazas-de-seguridad-surgiran-con-el-uso-de-inteligencia-artificial\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/nuevas-amenazas-de-seguridad-surgiran-con-el-uso-de-inteligencia-artificial\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c\"},\"headline\":\"Nuevas amenazas de seguridad surgir\u00e1n con el uso de Inteligencia Artificial\",\"datePublished\":\"2019-08-15T15:35:08+00:00\",\"dateModified\":\"2019-08-15T15:35:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/nuevas-amenazas-de-seguridad-surgiran-con-el-uso-de-inteligencia-artificial\/\"},\"wordCount\":427,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/nuevas-amenazas-de-seguridad-surgiran-con-el-uso-de-inteligencia-artificial\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/08\/Notic.2-7.jpg\",\"articleSection\":[\"Inteligencia Artificial\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/nuevas-amenazas-de-seguridad-surgiran-con-el-uso-de-inteligencia-artificial\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/nuevas-amenazas-de-seguridad-surgiran-con-el-uso-de-inteligencia-artificial\/\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/nuevas-amenazas-de-seguridad-surgiran-con-el-uso-de-inteligencia-artificial\/\",\"name\":\"Nuevas amenazas de seguridad surgir\u00e1n con el uso de Inteligencia Artificial - Observatorio Tecnol\u00f3gico de Hidalgo\",\"isPartOf\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/nuevas-amenazas-de-seguridad-surgiran-con-el-uso-de-inteligencia-artificial\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/nuevas-amenazas-de-seguridad-surgiran-con-el-uso-de-inteligencia-artificial\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/08\/Notic.2-7.jpg\",\"datePublished\":\"2019-08-15T15:35:08+00:00\",\"dateModified\":\"2019-08-15T15:35:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/nuevas-amenazas-de-seguridad-surgiran-con-el-uso-de-inteligencia-artificial\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/nuevas-amenazas-de-seguridad-surgiran-con-el-uso-de-inteligencia-artificial\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/nuevas-amenazas-de-seguridad-surgiran-con-el-uso-de-inteligencia-artificial\/#primaryimage\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/08\/Notic.2-7.jpg\",\"contentUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/08\/Notic.2-7.jpg\",\"width\":600,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/nuevas-amenazas-de-seguridad-surgiran-con-el-uso-de-inteligencia-artificial\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Nuevas amenazas de seguridad surgir\u00e1n con el uso de Inteligencia Artificial\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#website\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\",\"name\":\"Observatorio Tecnol\u00f3gico de Hidalgo\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/otech.uaeh.edu.mx\/noti\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\",\"name\":\"Observatorio Tecnol\u00f3gico de Hidalgo\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png\",\"contentUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png\",\"width\":250,\"height\":250,\"caption\":\"Observatorio Tecnol\u00f3gico de Hidalgo\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/observatoriouaeh\",\"https:\/\/x.com\/OBSERVATORIOEH\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Nuevas amenazas de seguridad surgir\u00e1n con el uso de Inteligencia Artificial - Observatorio Tecnol\u00f3gico de Hidalgo","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/nuevas-amenazas-de-seguridad-surgiran-con-el-uso-de-inteligencia-artificial\/","og_locale":"en_US","og_type":"article","og_title":"Nuevas amenazas de seguridad surgir\u00e1n con el uso de Inteligencia Artificial - Observatorio Tecnol\u00f3gico de Hidalgo","og_description":"La Inteligencia Artificial (IA) es una tecnolog\u00eda que promete solucionar problemas de la vida diaria al conferirle m\u00e1s inteligencia a m\u00e1quinas y al software, pero tambi\u00e9n enfrentar\u00e1 amenazas de ciberseguridad.","og_url":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/nuevas-amenazas-de-seguridad-surgiran-con-el-uso-de-inteligencia-artificial\/","og_site_name":"Observatorio Tecnol\u00f3gico de Hidalgo","article_publisher":"https:\/\/www.facebook.com\/observatoriouaeh","article_published_time":"2019-08-15T15:35:08+00:00","article_modified_time":"2019-08-15T15:35:21+00:00","og_image":[{"width":600,"height":350,"url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/08\/Notic.2-7.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@OBSERVATORIOEH","twitter_site":"@OBSERVATORIOEH","twitter_misc":{"Written by":"admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/nuevas-amenazas-de-seguridad-surgiran-con-el-uso-de-inteligencia-artificial\/#article","isPartOf":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/nuevas-amenazas-de-seguridad-surgiran-con-el-uso-de-inteligencia-artificial\/"},"author":{"name":"admin","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c"},"headline":"Nuevas amenazas de seguridad surgir\u00e1n con el uso de Inteligencia Artificial","datePublished":"2019-08-15T15:35:08+00:00","dateModified":"2019-08-15T15:35:21+00:00","mainEntityOfPage":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/nuevas-amenazas-de-seguridad-surgiran-con-el-uso-de-inteligencia-artificial\/"},"wordCount":427,"commentCount":0,"publisher":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/nuevas-amenazas-de-seguridad-surgiran-con-el-uso-de-inteligencia-artificial\/#primaryimage"},"thumbnailUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/08\/Notic.2-7.jpg","articleSection":["Inteligencia Artificial"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/otech.uaeh.edu.mx\/noti\/ia\/nuevas-amenazas-de-seguridad-surgiran-con-el-uso-de-inteligencia-artificial\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/nuevas-amenazas-de-seguridad-surgiran-con-el-uso-de-inteligencia-artificial\/","url":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/nuevas-amenazas-de-seguridad-surgiran-con-el-uso-de-inteligencia-artificial\/","name":"Nuevas amenazas de seguridad surgir\u00e1n con el uso de Inteligencia Artificial - Observatorio Tecnol\u00f3gico de Hidalgo","isPartOf":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#website"},"primaryImageOfPage":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/nuevas-amenazas-de-seguridad-surgiran-con-el-uso-de-inteligencia-artificial\/#primaryimage"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/nuevas-amenazas-de-seguridad-surgiran-con-el-uso-de-inteligencia-artificial\/#primaryimage"},"thumbnailUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/08\/Notic.2-7.jpg","datePublished":"2019-08-15T15:35:08+00:00","dateModified":"2019-08-15T15:35:21+00:00","breadcrumb":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/nuevas-amenazas-de-seguridad-surgiran-con-el-uso-de-inteligencia-artificial\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/otech.uaeh.edu.mx\/noti\/ia\/nuevas-amenazas-de-seguridad-surgiran-con-el-uso-de-inteligencia-artificial\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/nuevas-amenazas-de-seguridad-surgiran-con-el-uso-de-inteligencia-artificial\/#primaryimage","url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/08\/Notic.2-7.jpg","contentUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/08\/Notic.2-7.jpg","width":600,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/nuevas-amenazas-de-seguridad-surgiran-con-el-uso-de-inteligencia-artificial\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/otech.uaeh.edu.mx\/noti\/"},{"@type":"ListItem","position":2,"name":"Nuevas amenazas de seguridad surgir\u00e1n con el uso de Inteligencia Artificial"}]},{"@type":"WebSite","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#website","url":"https:\/\/otech.uaeh.edu.mx\/noti\/","name":"Observatorio Tecnol\u00f3gico de Hidalgo","description":"","publisher":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/otech.uaeh.edu.mx\/noti\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization","name":"Observatorio Tecnol\u00f3gico de Hidalgo","url":"https:\/\/otech.uaeh.edu.mx\/noti\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/","url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png","contentUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png","width":250,"height":250,"caption":"Observatorio Tecnol\u00f3gico de Hidalgo"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/observatoriouaeh","https:\/\/x.com\/OBSERVATORIOEH"]},{"@type":"Person","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/otech.uaeh.edu.mx\/noti\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/17740","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/comments?post=17740"}],"version-history":[{"count":1,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/17740\/revisions"}],"predecessor-version":[{"id":17742,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/17740\/revisions\/17742"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/media\/17741"}],"wp:attachment":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/media?parent=17740"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/categories?post=17740"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/tags?post=17740"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}