{"id":188,"date":"2021-02-15T11:39:06","date_gmt":"2021-02-15T11:39:06","guid":{"rendered":"https:\/\/directortic.es\/fortinet\/?p=188"},"modified":"2023-01-30T16:43:20","modified_gmt":"2023-01-30T16:43:20","slug":"como-afrontar-la-seguridad-de-la-tecnologia-5g","status":"publish","type":"post","link":"https:\/\/directortic.es\/fortinet\/2021\/02\/15\/como-afrontar-la-seguridad-de-la-tecnologia-5g\/","title":{"rendered":"\u00bfC\u00f3mo afrontar la seguridad de la tecnolog\u00eda 5G?"},"content":{"rendered":"<p>El 5G, una tecnolog\u00eda que supone un cambio de juego para operadores de redes m\u00f3viles y para las empresas, se va desplegando poco a poco por toda la geograf\u00eda espa\u00f1ola. La llegada del 5G trae diversas ventajas en las que ya est\u00e1n trabajando la industria de las telecomunicaciones. Entre los beneficios destaca el aumento de la velocidad de transmisi\u00f3n, la menor latencia, mayor flexibilidad para una mejor gesti\u00f3n de los dispositivos conectados y bajo consumo.<\/p>\n<p>La tecnolog\u00eda 5G se presenta con una firme propuesta. La eficiencia, la automatizaci\u00f3n, la seguridad, la sostenibilidad y la innovaci\u00f3n se incrementar\u00e1n gracias al aprovechamiento de la tecnolog\u00eda y a las capacidades 5G. Pero, en esta ambiciosa promesa, \u00bfqu\u00e9 papel juega la seguridad? \u00bfPuede el 5G garantizar la protecci\u00f3n de los usuarios? \u00bfNecesitan las empresas alguna capa adicional de seguridad?<\/p>\n<p>Desde Fortinet creen que, aunque esta tecnolog\u00eda cuente con capacidades de seguridad inherentes, se requiere incorporar una capa adicional de visibilidad y control de seguridad. Una protecci\u00f3n completa que la compa\u00f1\u00eda puede ofrecer con su arquitectura Security Fabric. Este concepto acu\u00f1ado por Fortinet aglutina un amplio cat\u00e1logo de soluciones de ciberseguridad end-to-end completamente integradas. Gracias a esta interacci\u00f3n entre las soluciones los clientes obtienen una amplia visibilidad de lo que ocurre en toda la superficie de ataque.<\/p>\n<p>FortiGate y FortiWeb son dos de las herramientas de Fortinet Security Fabric. Estas soluciones proporcionan una plataforma de seguridad com\u00fan para los operadores m\u00f3viles y empresas que usan 5G en diferentes industrias. La implementaci\u00f3n de estas soluciones permite a los operadores de redes m\u00f3viles asegurar su infraestructura 5G y garantizar la disponibilidad y continuidad del servicio para sus clientes empresariales. Adem\u00e1s, si los clientes lo requieren pueden implementar o administrar ambas plataformas de manera conjunta.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>El 5G, una tecnolog\u00eda que supone un cambio de juego para operadores de redes m\u00f3viles y para las empresas, se va desplegando poco a poco por toda la geograf\u00eda espa\u00f1ola. La llegada del 5G trae diversas ventajas en las que ya est\u00e1n trabajando la industria de las telecomunicaciones. Entre los beneficios destaca el aumento de [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":189,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jnews-multi-image_gallery":[],"jnews_single_post":{"source_name":"","source_url":"","via_name":"","via_url":"","override_template":"0","override":[{"template":"1","single_blog_custom":"","parallax":"1","fullscreen":"0","layout":"right-sidebar","sidebar":"default-sidebar","second_sidebar":"default-sidebar","sticky_sidebar":"1","share_position":"top","share_float_style":"share-monocrhome","show_share_counter":"1","show_view_counter":"1","show_featured":"1","show_post_meta":"1","show_post_author":"1","show_post_author_image":"1","show_post_date":"1","post_date_format":"default","post_date_format_custom":"Y\/m\/d","show_post_category":"1","show_post_reading_time":"0","post_reading_time_wpm":"300","show_zoom_button":"0","zoom_button_out_step":"2","zoom_button_in_step":"3","show_post_tag":"1","show_prev_next_post":"1","show_popup_post":"1","number_popup_post":"1","show_author_box":"0","show_post_related":"0","show_inline_post_related":"0"}],"override_image_size":"0","image_override":[{"single_post_thumbnail_size":"crop-500","single_post_gallery_size":"crop-500"}],"trending_post":"0","trending_post_position":"meta","trending_post_label":"Trending","sponsored_post":"0","sponsored_post_label":"Sponsored by","sponsored_post_name":"","sponsored_post_url":"","sponsored_post_logo_enable":"0","sponsored_post_logo":"","sponsored_post_desc":""},"jnews_primary_category":{"id":""},"jnews_social_meta":{"fb_title":"","fb_description":"","fb_image":"","twitter_title":"","twitter_description":"","twitter_image":""},"jnews_override_counter":{"override_view_counter":"0","view_counter_number":"0","override_share_counter":"0","share_counter_number":"0","override_like_counter":"0","like_counter_number":"0","override_dislike_counter":"0","dislike_counter_number":"0"},"footnotes":""},"categories":[4],"tags":[],"class_list":["post-188","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articulos"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u00bfC\u00f3mo afrontar la seguridad de la tecnolog\u00eda 5G? - Fortinet<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/directortic.es\/fortinet\/2021\/02\/15\/como-afrontar-la-seguridad-de-la-tecnologia-5g\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00bfC\u00f3mo afrontar la seguridad de la tecnolog\u00eda 5G? - Fortinet\" \/>\n<meta property=\"og:description\" content=\"El 5G, una tecnolog\u00eda que supone un cambio de juego para operadores de redes m\u00f3viles y para las empresas, se va desplegando poco a poco por toda la geograf\u00eda espa\u00f1ola. La llegada del 5G trae diversas ventajas en las que ya est\u00e1n trabajando la industria de las telecomunicaciones. Entre los beneficios destaca el aumento de [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/directortic.es\/fortinet\/2021\/02\/15\/como-afrontar-la-seguridad-de-la-tecnologia-5g\/\" \/>\n<meta property=\"og:site_name\" content=\"Fortinet\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-15T11:39:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-30T16:43:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/02\/Post-seguridad-5G-1024x683.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Manuel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Manuel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/02\\\/15\\\/como-afrontar-la-seguridad-de-la-tecnologia-5g\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/02\\\/15\\\/como-afrontar-la-seguridad-de-la-tecnologia-5g\\\/\"},\"author\":{\"name\":\"Manuel\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#\\\/schema\\\/person\\\/42a132a53dd351df6cf9f23050efafd8\"},\"headline\":\"\u00bfC\u00f3mo afrontar la seguridad de la tecnolog\u00eda 5G?\",\"datePublished\":\"2021-02-15T11:39:06+00:00\",\"dateModified\":\"2023-01-30T16:43:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/02\\\/15\\\/como-afrontar-la-seguridad-de-la-tecnologia-5g\\\/\"},\"wordCount\":321,\"image\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/02\\\/15\\\/como-afrontar-la-seguridad-de-la-tecnologia-5g\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/02\\\/Post-seguridad-5G.jpg\",\"articleSection\":[\"Art\u00edculos\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/02\\\/15\\\/como-afrontar-la-seguridad-de-la-tecnologia-5g\\\/\",\"url\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/02\\\/15\\\/como-afrontar-la-seguridad-de-la-tecnologia-5g\\\/\",\"name\":\"\u00bfC\u00f3mo afrontar la seguridad de la tecnolog\u00eda 5G? - Fortinet\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/02\\\/15\\\/como-afrontar-la-seguridad-de-la-tecnologia-5g\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/02\\\/15\\\/como-afrontar-la-seguridad-de-la-tecnologia-5g\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/02\\\/Post-seguridad-5G.jpg\",\"datePublished\":\"2021-02-15T11:39:06+00:00\",\"dateModified\":\"2023-01-30T16:43:20+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#\\\/schema\\\/person\\\/42a132a53dd351df6cf9f23050efafd8\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/02\\\/15\\\/como-afrontar-la-seguridad-de-la-tecnologia-5g\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/02\\\/15\\\/como-afrontar-la-seguridad-de-la-tecnologia-5g\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/02\\\/15\\\/como-afrontar-la-seguridad-de-la-tecnologia-5g\\\/#primaryimage\",\"url\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/02\\\/Post-seguridad-5G.jpg\",\"contentUrl\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/02\\\/Post-seguridad-5G.jpg\",\"width\":2121,\"height\":1414},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/2021\\\/02\\\/15\\\/como-afrontar-la-seguridad-de-la-tecnologia-5g\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00bfC\u00f3mo afrontar la seguridad de la tecnolog\u00eda 5G?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#website\",\"url\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/\",\"name\":\"Fortinet\",\"description\":\"Dise\u00f1ado para Redes basadas en la Seguridad\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/#\\\/schema\\\/person\\\/42a132a53dd351df6cf9f23050efafd8\",\"name\":\"Manuel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g\",\"caption\":\"Manuel\"},\"url\":\"https:\\\/\\\/directortic.es\\\/fortinet\\\/author\\\/manu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u00bfC\u00f3mo afrontar la seguridad de la tecnolog\u00eda 5G? - Fortinet","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/directortic.es\/fortinet\/2021\/02\/15\/como-afrontar-la-seguridad-de-la-tecnologia-5g\/","og_locale":"es_ES","og_type":"article","og_title":"\u00bfC\u00f3mo afrontar la seguridad de la tecnolog\u00eda 5G? - Fortinet","og_description":"El 5G, una tecnolog\u00eda que supone un cambio de juego para operadores de redes m\u00f3viles y para las empresas, se va desplegando poco a poco por toda la geograf\u00eda espa\u00f1ola. La llegada del 5G trae diversas ventajas en las que ya est\u00e1n trabajando la industria de las telecomunicaciones. Entre los beneficios destaca el aumento de [&hellip;]","og_url":"https:\/\/directortic.es\/fortinet\/2021\/02\/15\/como-afrontar-la-seguridad-de-la-tecnologia-5g\/","og_site_name":"Fortinet","article_published_time":"2021-02-15T11:39:06+00:00","article_modified_time":"2023-01-30T16:43:20+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/02\/Post-seguridad-5G-1024x683.jpg","type":"image\/jpeg"}],"author":"Manuel","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Manuel","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/directortic.es\/fortinet\/2021\/02\/15\/como-afrontar-la-seguridad-de-la-tecnologia-5g\/#article","isPartOf":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/02\/15\/como-afrontar-la-seguridad-de-la-tecnologia-5g\/"},"author":{"name":"Manuel","@id":"https:\/\/directortic.es\/fortinet\/#\/schema\/person\/42a132a53dd351df6cf9f23050efafd8"},"headline":"\u00bfC\u00f3mo afrontar la seguridad de la tecnolog\u00eda 5G?","datePublished":"2021-02-15T11:39:06+00:00","dateModified":"2023-01-30T16:43:20+00:00","mainEntityOfPage":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/02\/15\/como-afrontar-la-seguridad-de-la-tecnologia-5g\/"},"wordCount":321,"image":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/02\/15\/como-afrontar-la-seguridad-de-la-tecnologia-5g\/#primaryimage"},"thumbnailUrl":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/02\/Post-seguridad-5G.jpg","articleSection":["Art\u00edculos"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/directortic.es\/fortinet\/2021\/02\/15\/como-afrontar-la-seguridad-de-la-tecnologia-5g\/","url":"https:\/\/directortic.es\/fortinet\/2021\/02\/15\/como-afrontar-la-seguridad-de-la-tecnologia-5g\/","name":"\u00bfC\u00f3mo afrontar la seguridad de la tecnolog\u00eda 5G? - Fortinet","isPartOf":{"@id":"https:\/\/directortic.es\/fortinet\/#website"},"primaryImageOfPage":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/02\/15\/como-afrontar-la-seguridad-de-la-tecnologia-5g\/#primaryimage"},"image":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/02\/15\/como-afrontar-la-seguridad-de-la-tecnologia-5g\/#primaryimage"},"thumbnailUrl":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/02\/Post-seguridad-5G.jpg","datePublished":"2021-02-15T11:39:06+00:00","dateModified":"2023-01-30T16:43:20+00:00","author":{"@id":"https:\/\/directortic.es\/fortinet\/#\/schema\/person\/42a132a53dd351df6cf9f23050efafd8"},"breadcrumb":{"@id":"https:\/\/directortic.es\/fortinet\/2021\/02\/15\/como-afrontar-la-seguridad-de-la-tecnologia-5g\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/directortic.es\/fortinet\/2021\/02\/15\/como-afrontar-la-seguridad-de-la-tecnologia-5g\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/directortic.es\/fortinet\/2021\/02\/15\/como-afrontar-la-seguridad-de-la-tecnologia-5g\/#primaryimage","url":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/02\/Post-seguridad-5G.jpg","contentUrl":"https:\/\/directortic.es\/fortinet\/wp-content\/uploads\/sites\/2\/2021\/02\/Post-seguridad-5G.jpg","width":2121,"height":1414},{"@type":"BreadcrumbList","@id":"https:\/\/directortic.es\/fortinet\/2021\/02\/15\/como-afrontar-la-seguridad-de-la-tecnologia-5g\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/directortic.es\/fortinet\/"},{"@type":"ListItem","position":2,"name":"\u00bfC\u00f3mo afrontar la seguridad de la tecnolog\u00eda 5G?"}]},{"@type":"WebSite","@id":"https:\/\/directortic.es\/fortinet\/#website","url":"https:\/\/directortic.es\/fortinet\/","name":"Fortinet","description":"Dise\u00f1ado para Redes basadas en la Seguridad","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/directortic.es\/fortinet\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/directortic.es\/fortinet\/#\/schema\/person\/42a132a53dd351df6cf9f23050efafd8","name":"Manuel","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a276c2c7f6758ddc5788f8b090c102edee2c13aa2bf89a1bcd01a2ba5053fe51?s=96&d=mm&r=g","caption":"Manuel"},"url":"https:\/\/directortic.es\/fortinet\/author\/manu\/"}]}},"_links":{"self":[{"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/posts\/188","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/comments?post=188"}],"version-history":[{"count":1,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/posts\/188\/revisions"}],"predecessor-version":[{"id":190,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/posts\/188\/revisions\/190"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/media\/189"}],"wp:attachment":[{"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/media?parent=188"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/categories?post=188"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/directortic.es\/fortinet\/wp-json\/wp\/v2\/tags?post=188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}