{"id":227068,"date":"2023-10-31T09:36:00","date_gmt":"2023-10-31T09:36:00","guid":{"rendered":"https:\/\/www.internetsociety.org\/?page_id=227068"},"modified":"2025-09-24T10:54:21","modified_gmt":"2025-09-24T10:54:21","slug":"determinar-los-requisitos-tecnologicos","status":"publish","type":"page","link":"https:\/\/www.internetsociety.org\/es\/resources\/community-network-diy-toolkit\/determine-technology-requirements\/","title":{"rendered":"5. Determinar los requisitos tecnol\u00f3gicos"},"content":{"rendered":"\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-image uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-1b60d478 uagb-columns__columns-1 uagb-columns__max_width-theme background-image-fallback-black uag-hide-tab uag-hide-mob\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-6da44868\"><div class=\"uagb-column__overlay\"><\/div>\n<p class=\"has-neutral-white-color has-text-color has-18-font-size\"><a href=\"https:\/\/internetsociety.org\/es\/resources\/community-network-diy-toolkit\/\">Kit de herramientas \u201ch\u00e1galo usted mismo\u201d para redes comunitarias<\/a> &gt; Determinar los requisitos tecnol\u00f3gicos<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading has-neutral-white-color has-text-color\">5. Determinar<br>los requisitos tecnol\u00f3gicos<\/h1>\n<\/div>\n<\/div><\/section>\n\n\n\n<div class=\"wp-block-columns uag-hide-desktop is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column uag-hide-tab uag-hide-mob is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-desktop\"><\/div>\n\n\n\n<p class=\"has-text-align-left has-18-font-size\"><a href=\"https:\/\/internetsociety.org\/es\/resources\/community-network-diy-toolkit\/\">Kit de herramientas \u201ch\u00e1galo usted mismo\u201d para redes comunitarias<\/a> &gt;<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-left\">5. Determinar los requisitos tecnol\u00f3gicos<\/h1>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-desktop\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/20170705_191315_DSCF3774.jpg\" alt=\"a man in a field checking if antenna is aligned\" class=\"wp-image-105907\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column uag-hide-tab uag-hide-mob is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column uag-hide-tab uag-hide-mob is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-tab uag-hide-mob\"><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-desktop\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-accent-purple-color has-text-color has-48-font-size\" id=\"we-will-equip-the-global-encryption-coalition-and-the-internet-society-community-with-the-tools-needed-to-help-increase-awareness-of-the-value-of-encryption\">\u00bfC\u00f3mo conecta su red a Internet? \u00bfC\u00f3mo se conectan los usuarios a su red?<\/h2>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-18-font-size\">Aqu\u00ed es donde se pone interesante: \u00bfqu\u00e9 tecnolog\u00eda debe implementar? Lamentablemente, no existe una soluci\u00f3n tecnol\u00f3gica \u00fanica que sea la mejor para todas las redes. Cada dise\u00f1o de red ser\u00e1 \u00fanico y se ajustar\u00e1 a las limitaciones y necesidades geogr\u00e1ficas, econ\u00f3micas y regulatorias espec\u00edficas de la comunidad. La porci\u00f3n de retorno (backhaul) conecta la red comunitaria a la infraestructura de backbone nacional, mientras que la porci\u00f3n de acceso local conecta a los usuarios individuales. La elecci\u00f3n de la tecnolog\u00eda implica un equilibrio entre factores como el marco regulatorio, los costos, las habilidades requeridas, la disponibilidad local de equipos y las restricciones de licencias, entre otros.<\/p>\n\n\n\n<div class=\"wp-block-columns is-not-stacked-on-mobile has-neutral-white-background-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:2%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:90%\">\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-32-font-size\">Conceptos clave<\/h3>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<ul class=\"wp-block-list has-18-font-size\">\n<li>Deber\u00e1 investigar y elegir la tecnolog\u00eda que utilizar\u00e1 para que los usuarios accedan a su sistema y la que utilizar\u00e1 para conectarse al resto de Internet.<\/li>\n\n\n\n<li>El acceso local suele proporcionarse mediante Wi-Fi o tecnolog\u00edas celulares.<\/li>\n\n\n\n<li>El backhaul a la red p\u00fablica puede adoptar diferentes formas, por ejemplo, cables de fibra \u00f3ptica, antenas inal\u00e1mbricas, conexiones de microondas y sistemas satelitales.<\/li>\n\n\n\n<li>Las opciones disponibles para el suministro de energ\u00eda tambi\u00e9n afectan significativamente la viabilidad de las diferentes opciones tecnol\u00f3gicas.<\/li>\n\n\n\n<li>Debe considerar la resiliencia de su sistema frente a cortes de energ\u00eda o fen\u00f3menos meteorol\u00f3gicos.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:2%\"><\/div>\n<\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-tab uag-hide-mob\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column uag-hide-tab uag-hide-mob is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n<\/div>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-3fc73a6d uagb-columns__columns-1 uagb-columns__max_width-theme\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-cf0d325a\"><div class=\"uagb-column__overlay\"><\/div>\n<h4 class=\"wp-block-heading has-depth-green-color has-text-color\" id=\"how-the-ndss-symposium-helps-to-strengthen-the-internet\">Manos a la obra<\/h4>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-cover alignfull is-light has-custom-content-position is-position-bottom-center\" style=\"margin-top:0;padding-top:48px;padding-right:48px;padding-bottom:48px;padding-left:48px\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"400\" class=\"wp-block-cover__image-background wp-image-201133\" alt=\"A man writes on a large paper on the wall where it\u2019s possible to see drawings of a network structure\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/Network-requirements-scheme.jpg\" data-object-fit=\"cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/Network-requirements-scheme.jpg 600w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/Network-requirements-scheme-450x300.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/Network-requirements-scheme-250x167.jpg 250w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-30 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-cover background-image-fallback-black has-neutral-white-color has-text-color has-18-font-size\" style=\"min-height:100px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-depth-teal-background-color has-background-dim-100 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-constrained wp-block-cover-is-layout-constrained\">\n<p class=\"has-text-align-left has-18-font-size\">Identifique la tecnolog\u00eda (tipo y marcas disponibles) necesaria para ofrecer los servicios deseados.<\/p>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-cover alignfull has-custom-content-position is-position-bottom-center\" style=\"margin-top:0;padding-top:48px;padding-right:48px;padding-bottom:48px;padding-left:48px\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"400\" class=\"wp-block-cover__image-background wp-image-201136\" alt=\"A woman and a man stand by an antenna in Kenya\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/Infrastructure-in-Africa.jpg\" data-object-fit=\"cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/Infrastructure-in-Africa.jpg 600w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/Infrastructure-in-Africa-450x300.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/Infrastructure-in-Africa-250x167.jpg 250w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-30 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-cover has-custom-content-position is-position-bottom-center background-image-fallback-black has-neutral-white-color has-text-color has-18-font-size\" style=\"min-height:100px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-depth-teal-background-color has-background-dim-100 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-constrained wp-block-cover-is-layout-constrained\">\n<p class=\"has-text-align-left has-18-font-size\">Identifique las opciones, fuentes y servicios de backhaul disponibles.<\/p>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-cover alignfull has-custom-content-position is-position-bottom-center\" style=\"margin-top:0;padding-top:48px;padding-right:48px;padding-bottom:48px;padding-left:48px\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"400\" class=\"wp-block-cover__image-background wp-image-201139\" alt=\"A hand holding a phone with CCTV images on the screen\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/CCTV-camera-on-a-phone.jpg\" style=\"object-position:41% 56%\" data-object-fit=\"cover\" data-object-position=\"41% 56%\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/CCTV-camera-on-a-phone.jpg 600w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/CCTV-camera-on-a-phone-450x300.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/CCTV-camera-on-a-phone-250x167.jpg 250w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-30 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-cover background-image-fallback-black has-neutral-white-color has-text-color\" style=\"min-height:100px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-depth-teal-background-color has-background-dim-100 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-constrained wp-block-cover-is-layout-constrained\">\n<p class=\"has-text-align-left has-18-font-size\">Realice un dise\u00f1o inicial de la red (derechos t\u00e9cnicos y de implementaci\u00f3n).<\/p>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<div class=\"wp-block-columns margin-bottom-0 is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-tab uag-hide-mob\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading has-text-align-left\">M\u00e1s informaci\u00f3n<\/h4>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<ul class=\"wp-block-list has-18-font-size\">\n<li><span class=\"tadv-color\" style=\"color:#2b72d6\"><a href=\"https:\/\/www.internetsociety.org\/es\/resources\/doc\/2022\/manual-de-evaluacion-de-la-preparacion-de-las-redes-comunitarias\/\">Manual de evaluaci\u00f3n de la preparaci\u00f3n de las redes comunitarias<\/a><\/span>, secciones sobre \u201cConsideraciones t\u00e9cnicas de la red\u201d<\/li>\n\n\n\n<li><span class=\"tadv-color\" style=\"color:#2b72d6\"><a href=\"https:\/\/oasis.col.org\/items\/c0e7e530-d617-4f9d-a4ec-2842a2a7193c\">Setting Up Wireless Networks: A Course for Barefoot Wireless Engineers<\/a><\/span> (OAsis, Commonwealth of Learning)<\/li>\n\n\n\n<li><span class=\"tadv-color\" style=\"color:#2b72d6\"><a href=\"https:\/\/www.internetsociety.org\/es\/resources\/doc\/2019\/soluciones-para-las-redes-de-retorno-de-trafico-en-redes-comunitarias\/\">Soluciones para las redes de retorno de tr\u00e1fico en redes comunitarias<\/a><\/span><\/li>\n\n\n\n<li>Cursos de capacitaci\u00f3n en l\u00ednea:\n<ul class=\"wp-block-list\">\n<li><span class=\"tadv-color\" style=\"color:#2b72d6\"><a href=\"https:\/\/www.internetsociety.org\/es\/learning\/ddcn\/\">Dise\u00f1o e implementaci\u00f3n de redes inform\u00e1ticas<\/a><\/span><\/li>\n\n\n\n<li><span class=\"tadv-color\" style=\"color:#2b72d6\"><a href=\"https:\/\/www.internetsociety.org\/es\/learning\/network-operations\/\">Introducci\u00f3n a las operaciones de red<\/a><\/span><\/li>\n\n\n\n<li><span class=\"tadv-color\" style=\"color:#2b72d6\"><a href=\"https:\/\/internetsociety.org\/es\/learning\/advanced-network-operations\/\">Operaciones de red avanzadas 2.0<\/a><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p class=\"has-18-font-size\"><a href=\"https:\/\/www.internetsociety.org\/es\/resources\/community-network-diy-toolkit\/research-financial-sustainability\/\">Siguiente -&gt; 6. Investigar la sostenibilidad financiera<\/a><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer uag-hide-tab uag-hide-mob\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:10%\"><\/div>\n<\/div>\n\n\n\n<p class=\"has-text-align-center has-neutral-white-color has-ground-navy-background-color has-text-color has-background has-12-font-size\">Derechos de autor:<br>\u00a9 Atul Loke, \u00a9 Atul Loke, \u00a9 Nyani Quarmyne, \u00a9 Nyani Quarmyne<\/p>\n","protected":false},"excerpt":{"rendered":"<p><b>\u00bfQu\u00e9 tecnolog\u00eda utilizar\u00e1 para conectar a los usuarios y para acceder a Internet?<\/b><br \/>\nLamentablemente, no existe una soluci\u00f3n tecnol\u00f3gica \u00fanica que sea la mejor para todas las redes comunitarias.<\/p>\n","protected":false},"author":11,"featured_media":105909,"parent":226890,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-wide.php","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[67,122],"tags":[],"region_news_regions":[6030],"content_category":[6106],"ppma_author":[6073],"class_list":["post-227068","page","type-page","status-publish","has-post-thumbnail","hentry","category-acceso-es","category-redes-comunitarias","region_news_regions-global","content_category-resources-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/20170705_191315_DSCF3774.jpg",1400,746,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/20170705_191315_DSCF3774-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/20170705_191315_DSCF3774-450x240.jpg",450,240,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/20170705_191315_DSCF3774-768x409.jpg",768,409,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/20170705_191315_DSCF3774-1024x546.jpg",1024,546,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/20170705_191315_DSCF3774.jpg",1400,746,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/20170705_191315_DSCF3774.jpg",1400,746,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/20170705_191315_DSCF3774-250x133.jpg",250,133,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/20170705_191315_DSCF3774-600x600.jpg",600,600,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/20170705_191315_DSCF3774.jpg",300,160,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/20170705_191315_DSCF3774.jpg",400,213,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/10\/20170705_191315_DSCF3774.jpg",600,320,false]},"uagb_author_info":{"display_name":"Internet Society","author_link":"https:\/\/www.internetsociety.org\/es\/author\/isoc\/"},"uagb_comment_info":0,"uagb_excerpt":"\u00bfQu\u00e9 tecnolog\u00eda utilizar\u00e1 para conectar a los usuarios y para acceder a Internet? Lamentablemente, no existe una soluci\u00f3n tecnol\u00f3gica \u00fanica que sea la mejor para todas las redes comunitarias.","_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/227068","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/comments?post=227068"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/227068\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/226890"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media\/105909"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media?parent=227068"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/categories?post=227068"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/tags?post=227068"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/region_news_regions?post=227068"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/content_category?post=227068"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/ppma_author?post=227068"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}