{"id":12,"date":"2016-09-01T12:35:41","date_gmt":"2016-09-01T10:35:41","guid":{"rendered":"https:\/\/www.informaticapremium.com\/blog\/?p=12"},"modified":"2019-02-05T10:16:56","modified_gmt":"2019-02-05T09:16:56","slug":"desarrollo-programacion","status":"publish","type":"post","link":"https:\/\/www.informaticapremium.com\/blog\/desarrollo-programacion\/","title":{"rendered":"Desarrollo-programaci\u00f3n"},"content":{"rendered":"<p>Desarrollo-programaci\u00f3n: Categor\u00eda de Blog|informaticapremium orientada a entradas sobre programaci\u00f3n y desarrollo software \/ web.<\/p>\n<p><span style=\"font-size: 19px; font-weight: 900; color: #1a1a1a;\">Entradas publicadas en blog|informaticapremium Desarrollo-programaci\u00f3n:<\/span><\/p>\n<h5 class=\"entry-title\"><a href=\"https:\/\/www.informaticapremium.com\/blog\/implementar-aviso-cookies\/\">C\u00f3mo implementar aviso de cookies<\/a><\/h5>\n<h5 class=\"entry-title\"><a href=\"https:\/\/www.informaticapremium.com\/blog\/bloqueando-reincidentes-fail2ban\/\">Bloqueando reincidentes de Fail2ban<\/a><\/h5>\n<h5 class=\"entry-title\"><a href=\"https:\/\/www.informaticapremium.com\/blog\/css3-transform-translate-centrar-elemento\/\">CSS3 transform translate \u2013 Centrar elemento<\/a><\/h5>\n<p>Echad un vistazo a otros de nuestros\u00a0art\u00edculos en <strong>informaticapremium<\/strong> sobre lo \u00faltimo en <strong>hardware<\/strong>, <strong>sistemas<\/strong>, <strong>almacenamiento<\/strong>, <strong>redes<\/strong>, <strong>programaci\u00f3n<\/strong>, <strong>dise\u00f1o web<\/strong>, <strong>recuperaci\u00f3n de datos<\/strong> y actualidad del mundo de la <strong>t\u00e9cnica<\/strong> y la <strong>inform\u00e1tica<\/strong>. Nos vemos en breve.<\/p>\n<p>Carlos Yus Valero.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Desarrollo-programaci\u00f3n: Categor\u00eda de Blog|informaticapremium orientada a entradas sobre programaci\u00f3n y desarrollo software \/ web. Entradas publicadas en blog|informaticapremium Desarrollo-programaci\u00f3n: C\u00f3mo implementar aviso de cookies Bloqueando reincidentes de Fail2ban CSS3 transform translate \u2013 Centrar elemento Echad un vistazo a otros de nuestros\u00a0art\u00edculos en informaticapremium sobre lo \u00faltimo en hardware, sistemas, almacenamiento, redes, programaci\u00f3n, dise\u00f1o web, recuperaci\u00f3n &hellip; <a href=\"https:\/\/www.informaticapremium.com\/blog\/desarrollo-programacion\/\" class=\"more-link\">Continuar leyendo<span class=\"screen-reader-text\"> \u00abDesarrollo-programaci\u00f3n\u00bb<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","footnotes":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[5],"tags":[62,63],"jetpack_publicize_connections":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Desarrollo-programaci\u00f3n - Blog | informaticapremium<\/title>\n<meta name=\"description\" content=\"Desarrollo-programaci\u00f3n: Categor\u00eda de Blog|informaticapremium orientada a entradas sobre programaci\u00f3n y desarrollo software \/ web.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.informaticapremium.com\/blog\/desarrollo-programacion\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Desarrollo-programaci\u00f3n - Blog | informaticapremium\" \/>\n<meta property=\"og:description\" content=\"Desarrollo-programaci\u00f3n: Categor\u00eda de Blog|informaticapremium orientada a entradas sobre programaci\u00f3n y desarrollo software \/ web.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.informaticapremium.com\/blog\/desarrollo-programacion\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog | informaticapremium\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/informaticapremiumcom\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-01T10:35:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-02-05T09:16:56+00:00\" \/>\n<meta name=\"author\" content=\"Eduardo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@informatpremium\" \/>\n<meta name=\"twitter:site\" content=\"@informatpremium\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eduardo\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.informaticapremium.com\/blog\/desarrollo-programacion\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.informaticapremium.com\/blog\/desarrollo-programacion\/\"},\"author\":{\"name\":\"Eduardo\",\"@id\":\"https:\/\/www.informaticapremium.com\/blog\/#\/schema\/person\/06e0d0489423f2da4b7f7273bd9a7f65\"},\"headline\":\"Desarrollo-programaci\u00f3n\",\"datePublished\":\"2016-09-01T10:35:41+00:00\",\"dateModified\":\"2019-02-05T09:16:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.informaticapremium.com\/blog\/desarrollo-programacion\/\"},\"wordCount\":89,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.informaticapremium.com\/blog\/#organization\"},\"keywords\":[\"desarrollo\",\"programaci\u00f3n\"],\"articleSection\":[\"Desarrollo\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.informaticapremium.com\/blog\/desarrollo-programacion\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.informaticapremium.com\/blog\/desarrollo-programacion\/\",\"url\":\"https:\/\/www.informaticapremium.com\/blog\/desarrollo-programacion\/\",\"name\":\"Desarrollo-programaci\u00f3n - Blog | informaticapremium\",\"isPartOf\":{\"@id\":\"https:\/\/www.informaticapremium.com\/blog\/#website\"},\"datePublished\":\"2016-09-01T10:35:41+00:00\",\"dateModified\":\"2019-02-05T09:16:56+00:00\",\"description\":\"Desarrollo-programaci\u00f3n: Categor\u00eda de Blog|informaticapremium orientada a entradas sobre programaci\u00f3n y desarrollo software \/ web.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.informaticapremium.com\/blog\/desarrollo-programacion\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.informaticapremium.com\/blog\/desarrollo-programacion\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.informaticapremium.com\/blog\/desarrollo-programacion\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.informaticapremium.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Desarrollo-programaci\u00f3n\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.informaticapremium.com\/blog\/#website\",\"url\":\"https:\/\/www.informaticapremium.com\/blog\/\",\"name\":\"Blog | informaticapremium\",\"description\":\"Inform\u00e1tica, sistemas, hardware, redes, procesadores, optimizaci\u00f3n del rendimiento\",\"publisher\":{\"@id\":\"https:\/\/www.informaticapremium.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.informaticapremium.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.informaticapremium.com\/blog\/#organization\",\"name\":\"informaticapremium\",\"url\":\"https:\/\/www.informaticapremium.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.informaticapremium.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i2.wp.com\/www.informaticapremium.com\/blog\/wp-content\/uploads\/2016\/10\/cropped-informaticapremium-logo.png?fit=240%2C240&ssl=1\",\"contentUrl\":\"https:\/\/i2.wp.com\/www.informaticapremium.com\/blog\/wp-content\/uploads\/2016\/10\/cropped-informaticapremium-logo.png?fit=240%2C240&ssl=1\",\"width\":240,\"height\":240,\"caption\":\"informaticapremium\"},\"image\":{\"@id\":\"https:\/\/www.informaticapremium.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/informaticapremiumcom\/\",\"https:\/\/twitter.com\/informatpremium\",\"https:\/\/www.linkedin.com\/company\/informaticapremium\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.informaticapremium.com\/blog\/#\/schema\/person\/06e0d0489423f2da4b7f7273bd9a7f65\",\"name\":\"Eduardo\",\"url\":\"https:\/\/www.informaticapremium.com\/blog\/author\/edumoreno\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Desarrollo-programaci\u00f3n - Blog | informaticapremium","description":"Desarrollo-programaci\u00f3n: Categor\u00eda de Blog|informaticapremium orientada a entradas sobre programaci\u00f3n y desarrollo software \/ web.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.informaticapremium.com\/blog\/desarrollo-programacion\/","og_locale":"es_ES","og_type":"article","og_title":"Desarrollo-programaci\u00f3n - Blog | informaticapremium","og_description":"Desarrollo-programaci\u00f3n: Categor\u00eda de Blog|informaticapremium orientada a entradas sobre programaci\u00f3n y desarrollo software \/ web.","og_url":"https:\/\/www.informaticapremium.com\/blog\/desarrollo-programacion\/","og_site_name":"Blog | informaticapremium","article_publisher":"https:\/\/www.facebook.com\/informaticapremiumcom\/","article_published_time":"2016-09-01T10:35:41+00:00","article_modified_time":"2019-02-05T09:16:56+00:00","author":"Eduardo","twitter_card":"summary_large_image","twitter_creator":"@informatpremium","twitter_site":"@informatpremium","twitter_misc":{"Escrito por":"Eduardo"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.informaticapremium.com\/blog\/desarrollo-programacion\/#article","isPartOf":{"@id":"https:\/\/www.informaticapremium.com\/blog\/desarrollo-programacion\/"},"author":{"name":"Eduardo","@id":"https:\/\/www.informaticapremium.com\/blog\/#\/schema\/person\/06e0d0489423f2da4b7f7273bd9a7f65"},"headline":"Desarrollo-programaci\u00f3n","datePublished":"2016-09-01T10:35:41+00:00","dateModified":"2019-02-05T09:16:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.informaticapremium.com\/blog\/desarrollo-programacion\/"},"wordCount":89,"commentCount":0,"publisher":{"@id":"https:\/\/www.informaticapremium.com\/blog\/#organization"},"keywords":["desarrollo","programaci\u00f3n"],"articleSection":["Desarrollo"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.informaticapremium.com\/blog\/desarrollo-programacion\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.informaticapremium.com\/blog\/desarrollo-programacion\/","url":"https:\/\/www.informaticapremium.com\/blog\/desarrollo-programacion\/","name":"Desarrollo-programaci\u00f3n - Blog | informaticapremium","isPartOf":{"@id":"https:\/\/www.informaticapremium.com\/blog\/#website"},"datePublished":"2016-09-01T10:35:41+00:00","dateModified":"2019-02-05T09:16:56+00:00","description":"Desarrollo-programaci\u00f3n: Categor\u00eda de Blog|informaticapremium orientada a entradas sobre programaci\u00f3n y desarrollo software \/ web.","breadcrumb":{"@id":"https:\/\/www.informaticapremium.com\/blog\/desarrollo-programacion\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.informaticapremium.com\/blog\/desarrollo-programacion\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.informaticapremium.com\/blog\/desarrollo-programacion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.informaticapremium.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Desarrollo-programaci\u00f3n"}]},{"@type":"WebSite","@id":"https:\/\/www.informaticapremium.com\/blog\/#website","url":"https:\/\/www.informaticapremium.com\/blog\/","name":"Blog | informaticapremium","description":"Inform\u00e1tica, sistemas, hardware, redes, procesadores, optimizaci\u00f3n del rendimiento","publisher":{"@id":"https:\/\/www.informaticapremium.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.informaticapremium.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.informaticapremium.com\/blog\/#organization","name":"informaticapremium","url":"https:\/\/www.informaticapremium.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.informaticapremium.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i2.wp.com\/www.informaticapremium.com\/blog\/wp-content\/uploads\/2016\/10\/cropped-informaticapremium-logo.png?fit=240%2C240&ssl=1","contentUrl":"https:\/\/i2.wp.com\/www.informaticapremium.com\/blog\/wp-content\/uploads\/2016\/10\/cropped-informaticapremium-logo.png?fit=240%2C240&ssl=1","width":240,"height":240,"caption":"informaticapremium"},"image":{"@id":"https:\/\/www.informaticapremium.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/informaticapremiumcom\/","https:\/\/twitter.com\/informatpremium","https:\/\/www.linkedin.com\/company\/informaticapremium\/"]},{"@type":"Person","@id":"https:\/\/www.informaticapremium.com\/blog\/#\/schema\/person\/06e0d0489423f2da4b7f7273bd9a7f65","name":"Eduardo","url":"https:\/\/www.informaticapremium.com\/blog\/author\/edumoreno\/"}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p7V1wU-c","jetpack-related-posts":[{"id":14,"url":"https:\/\/www.informaticapremium.com\/blog\/hardware\/","url_meta":{"origin":12,"position":0},"title":"Hardware","author":"Eduardo","date":"1 septiembre, 2016","format":false,"excerpt":"Hardware: Categor\u00eda orientada a entradas sobre equipos inform\u00e1ticos, dise\u00f1o de sistemas, estaciones de trabajo, instalaci\u00f3n, configuraci\u00f3n y optimizaci\u00f3n de dispositivos. Hardware: Entradas publicadas en blog | informaticapremium: Presentaci\u00f3n blog \u2013 Carlos Yus AMD Zen \/ Ryzen 14 nm \u2013 Historia AMD Zen \/ Ryzen Cache NVMe vs AHCI: Almacenamiento AMD\u2026","rel":"","context":"En \u00abHardware\u00bb","block_context":{"text":"Hardware","link":"https:\/\/www.informaticapremium.com\/blog\/category\/hardware\/"},"img":{"alt_text":"Noctua NH U14S TR4 SP3","src":"https:\/\/i0.wp.com\/www.informaticapremium.com\/blog\/wp-content\/uploads\/2017\/08\/noctua_nh_u14s_tr4_sp3_3_1.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":10,"url":"https:\/\/www.informaticapremium.com\/blog\/sistemas\/","url_meta":{"origin":12,"position":1},"title":"Sistemas","author":"Eduardo","date":"1 septiembre, 2016","format":false,"excerpt":"Sistemas: Categor\u00eda orientada a entradas sobre instalaci\u00f3n, configuraci\u00f3n y optimizaci\u00f3n de sistemas operativos y otro software. Entradas publicadas en Blog|informaticapremium Sistemas: Presentaci\u00f3n blog \u2013 Carlos Yus Bloqueando reincidentes de Fail2ban AMD Zen \/ Ryzen 14 nm \u2013 Historia AMD Zen \/ Ryzen Cache NVMe vs AHCI: Almacenamiento AMD Ryzen, chipsets\u2026","rel":"","context":"En \u00abSistemas\u00bb","block_context":{"text":"Sistemas","link":"https:\/\/www.informaticapremium.com\/blog\/category\/sistemas\/"},"img":{"alt_text":"Los m\u00f3dulos GSkill DDR4 3200.","src":"https:\/\/i0.wp.com\/www.informaticapremium.com\/blog\/wp-content\/uploads\/2017\/08\/GSLILL-DDR4_3200_02.jpg?fit=640%2C427&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.informaticapremium.com\/blog\/wp-content\/uploads\/2017\/08\/GSLILL-DDR4_3200_02.jpg?fit=640%2C427&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.informaticapremium.com\/blog\/wp-content\/uploads\/2017\/08\/GSLILL-DDR4_3200_02.jpg?fit=640%2C427&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":55,"url":"https:\/\/www.informaticapremium.com\/blog\/css3-transform-translate-centrar-elemento\/","url_meta":{"origin":12,"position":2},"title":"CSS3 transform translate &#8211; Centrar elemento","author":"Juan Fran","date":"25 septiembre, 2016","format":false,"excerpt":"CSS3 transform translate, o m\u00e1s correctamente transform:translate,\u00a0nos sirve para centrar un elemento\u00a0en una posici\u00f3n fija, relativa o absoluta. CSS3 transform translate: Por norma general entendemos que para centrar un elemento en una p\u00e1gina web lo podemos hacer con los par\u00e1metros CSS3: top:50% y left:50% Pero \u00bfPorqu\u00e9 no nos queda justamente\u2026","rel":"","context":"En \u00abDesarrollo\u00bb","block_context":{"text":"Desarrollo","link":"https:\/\/www.informaticapremium.com\/blog\/category\/desarrollo\/"},"img":{"alt_text":"CSS3","src":"https:\/\/i0.wp.com\/www.informaticapremium.com\/blog\/wp-content\/uploads\/2016\/09\/css3.jpg?fit=400%2C400&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":23,"url":"https:\/\/www.informaticapremium.com\/blog\/implementar-aviso-cookies\/","url_meta":{"origin":12,"position":3},"title":"C\u00f3mo implementar aviso de cookies","author":"Juan Fran","date":"15 septiembre, 2016","format":false,"excerpt":"La Ley 34\/2002, de 11 de julio, de servicios de la sociedad de la informaci\u00f3n y de comercio electr\u00f3nico (LSSI)\u00a0afecta a todos los\u00a0profesionales o empresas que presten servicios en Espa\u00f1a. Es necesario recalcar que esta normativa es aplicable a los sitios web que utilicen los diferentes tipos de cookies vistas\u2026","rel":"","context":"En \u00abDesarrollo\u00bb","block_context":{"text":"Desarrollo","link":"https:\/\/www.informaticapremium.com\/blog\/category\/desarrollo\/"},"img":{"alt_text":"Cookies","src":"https:\/\/i0.wp.com\/www.informaticapremium.com\/blog\/wp-content\/uploads\/2016\/09\/cookies-1.jpg?fit=564%2C405&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.informaticapremium.com\/blog\/wp-content\/uploads\/2016\/09\/cookies-1.jpg?fit=564%2C405&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.informaticapremium.com\/blog\/wp-content\/uploads\/2016\/09\/cookies-1.jpg?fit=564%2C405&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":44,"url":"https:\/\/www.informaticapremium.com\/blog\/bloqueando-reincidentes-fail2ban\/","url_meta":{"origin":12,"position":4},"title":"Bloqueando reincidentes de Fail2ban","author":"Eduardo","date":"20 septiembre, 2016","format":false,"excerpt":"Fail2ban escanea logs (por ejemplo\u00a0\/var\/log\/auth.log), bloqueando IPs\u00a0que muestran comportamientos maliciosos. Es una gran herramienta en la que se pueden configurar jaulas para los diferentes tipos de servicios que teng\u00e1is en vuestro servidor, protegiendo de esta manera intentos de acceso con contrase\u00f1a err\u00f3nea (fuerza bruta) o incluso bots maliciosos en busca\u2026","rel":"","context":"En \u00abDesarrollo\u00bb","block_context":{"text":"Desarrollo","link":"https:\/\/www.informaticapremium.com\/blog\/category\/desarrollo\/"},"img":{"alt_text":"Faail2Ban.org","src":"https:\/\/i0.wp.com\/www.informaticapremium.com\/blog\/wp-content\/uploads\/2016\/09\/fail2ban-logo.jpg?fit=640%2C454&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.informaticapremium.com\/blog\/wp-content\/uploads\/2016\/09\/fail2ban-logo.jpg?fit=640%2C454&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.informaticapremium.com\/blog\/wp-content\/uploads\/2016\/09\/fail2ban-logo.jpg?fit=640%2C454&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":71,"url":"https:\/\/www.informaticapremium.com\/blog\/hardware-presentacion-blog-carlos-yus\/","url_meta":{"origin":12,"position":5},"title":"Hardware &#8211; Presentaci\u00f3n blog &#8211; Carlos Yus","author":"Carlos Yus Valero","date":"14 octubre, 2016","format":false,"excerpt":"Esta es una presentaci\u00f3n\u00a0y una declaraci\u00f3n de intenciones sobre qu\u00e9 vais a encontrar bajo mi firma, Carlos Yus Valero, en este Blog sobre Hardware. Tratar\u00e9 sobre lo \u00faltimo en hardware, sistemas, almacenamiento, redes, programaci\u00f3n, dise\u00f1o web, recuperaci\u00f3n de datos y actualidad del mundo de la t\u00e9cnica y la inform\u00e1tica. Llevo\u2026","rel":"","context":"En \u00abHardware\u00bb","block_context":{"text":"Hardware","link":"https:\/\/www.informaticapremium.com\/blog\/category\/hardware\/"},"img":{"alt_text":"Amstrad CPC 464","src":"https:\/\/i0.wp.com\/www.informaticapremium.com\/blog\/wp-content\/uploads\/2016\/10\/cpc464a.jpg?fit=600%2C209&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.informaticapremium.com\/blog\/wp-content\/uploads\/2016\/10\/cpc464a.jpg?fit=600%2C209&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.informaticapremium.com\/blog\/wp-content\/uploads\/2016\/10\/cpc464a.jpg?fit=600%2C209&ssl=1&resize=525%2C300 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.informaticapremium.com\/blog\/wp-json\/wp\/v2\/posts\/12"}],"collection":[{"href":"https:\/\/www.informaticapremium.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.informaticapremium.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.informaticapremium.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.informaticapremium.com\/blog\/wp-json\/wp\/v2\/comments?post=12"}],"version-history":[{"count":0,"href":"https:\/\/www.informaticapremium.com\/blog\/wp-json\/wp\/v2\/posts\/12\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.informaticapremium.com\/blog\/wp-json\/wp\/v2\/media?parent=12"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.informaticapremium.com\/blog\/wp-json\/wp\/v2\/categories?post=12"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.informaticapremium.com\/blog\/wp-json\/wp\/v2\/tags?post=12"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}