{"id":15349,"date":"2018-05-25T15:00:45","date_gmt":"2018-05-25T14:00:45","guid":{"rendered":"https:\/\/sensorpoint.pt\/controlo-de-acessos\/"},"modified":"2020-09-16T16:17:55","modified_gmt":"2020-09-16T15:17:55","slug":"control-de-accesos","status":"publish","type":"page","link":"https:\/\/sp.inovamatic.com\/es\/control-de-accesos\/","title":{"rendered":"Control de Accesos"},"content":{"rendered":"<p>[vc_row parallax=&#8221;content-moving-fade&#8221; parallax_image=&#8221;3416&#8243; css=&#8221;.vc_custom_1527256828994{padding-top: 160px !important;padding-bottom: 220px !important;background-image: url(https:\/\/www.sensorpoint.pt\/wp-content\/uploads\/2018\/05\/acessos-2.jpg?id=3883) !important;}&#8221;][vc_column][vc_custom_heading text=&#8221;Control de Accesos&#8221; font_container=&#8221;tag:h1|font_size:44px|text_align:center|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;section-heading&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1475934235598{padding-top: 80px !important;padding-bottom: 100px !important;background-color: #ffffff !important;}&#8221;][vc_column][vc_row_inner el_class=&#8221;container&#8221; css=&#8221;.vc_custom_1475933788716{margin-bottom: 60px !important;}&#8221;][vc_column_inner][vc_custom_heading text=&#8221;Hoy en d\u00eda, los sistemas de control de acceso electr\u00f3nico deben ir mucho m\u00e1s all\u00e1 de la simple funci\u00f3n de bloquear o desbloquear puertas. Su empresa necesita una soluci\u00f3n de seguridad que le ofrezca todo el control y la informaci\u00f3n para que pueda administrarla de manera m\u00e1s eficiente.<\/p>\n<p>Nuestros sistemas de control de acceso pueden ayudarlo a garantizar que solo las personas autorizadas tengan acceso a las \u00e1reas reservadas de su empresa, haciendo de la administraci\u00f3n de acceso una herramienta no solo para la seguridad, sino tambi\u00e9n para la administraci\u00f3n.<\/p>\n<p>Las caracter\u00edsticas de los sistemas de control de acceso tienen numerosos beneficios para cualquier sector de actividad, desde los m\u00e1s simples sistemas &#8220;aut\u00f3nomos&#8220; por teclado, hasta los m\u00e1s complejos en redes y con control biom\u00e9trico.&#8221; font_container=&#8221;tag:h4|text_align:justify|color:%23999999|line_height:28px&#8221; use_theme_fonts=&#8221;yes&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; gap=&#8221;35&#8243; el_class=&#8221;container&#8221; css=&#8221;.vc_custom_1533212107588{margin-bottom: 60px !important;}&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;5289&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_custom_heading text=&#8221;Tyco&#8221; font_container=&#8221;tag:h2|font_size:45px|text_align:left|color:%234367a1|line_height:45px&#8221; google_fonts=&#8221;font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:300%20light%20regular%3A300%3Anormal&#8221; css=&#8221;.vc_custom_1533212241840{margin-bottom: 0px !important;}&#8221;][vc_custom_heading text=&#8221;Kantech&#8221; font_container=&#8221;tag:h2|font_size:45px|text_align:left|color:%234367a1|line_height:45px&#8221; google_fonts=&#8221;font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css=&#8221;.vc_custom_1534165896235{margin-top: 0px !important;}&#8221;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJsaW5lLTMtMTAwLWF6dWwlMjIlM0UlM0MlMkZkaXYlM0U=[\/vc_raw_html][vc_column_text]<\/p>\n<div align=\"justify\">\n<p>Fundada en 1986, la empresa Kantech del grupo Tyco Security Products dise\u00f1a y desarrolla tecnolog\u00edas de control de acceso.<\/p>\n<p>Las soluciones de Kantech proporcionan una soluci\u00f3n compacta y b\u00e1sica para peque\u00f1as empresas, y soluciones con software EntraPass y potentes controladores de puertas para proporcionar los recursos adecuados para aplicaciones a escala empresarial.<\/p>\n<p>Las soluciones de Kantech se pueden vincular f\u00e1cilmente a los sistemas de video anal\u00edticos de American Dynamics para proporcionar una soluci\u00f3n integrada de control de acceso y video.<\/p>\n<p>Kantech tambi\u00e9n ofrece integraci\u00f3n inmediata con sistemas de detecci\u00f3n de intrusos. Todo interconectado desde un paquete de software unificado.<\/p>\n<p><a href=\"http:\/\/www.kantech.com\/Default.aspx\">P\u00e1gina del fabricante<\/a><\/p>\n<\/div>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; gap=&#8221;35&#8243; el_class=&#8221;container&#8221; css=&#8221;.vc_custom_1533212107588{margin-bottom: 60px !important;}&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;5290&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_custom_heading text=&#8221;Tyco&#8221; font_container=&#8221;tag:h2|font_size:45px|text_align:left|color:%234367a1|line_height:45px&#8221; google_fonts=&#8221;font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:300%20light%20regular%3A300%3Anormal&#8221; css=&#8221;.vc_custom_1533212241840{margin-bottom: 0px !important;}&#8221;][vc_custom_heading text=&#8221;Software House&#8221; font_container=&#8221;tag:h2|font_size:45px|text_align:left|color:%234367a1|line_height:45px&#8221; google_fonts=&#8221;font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css=&#8221;.vc_custom_1534165963976{margin-top: 0px !important;}&#8221;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJsaW5lLTMtMTAwLWF6dWwlMjIlM0UlM0MlMkZkaXYlM0U=[\/vc_raw_html][vc_column_text]<\/p>\n<div align=\"justify\">\n<p>Cuando las empresas m\u00e1s grandes de Fortune 500, los gobiernos o cualquier otra gran empresa se preocupan por problemas cr\u00edticos de seguridad y necesitan una soluci\u00f3n confiable en sus operaciones diarias, a menudo recurren a Software House.<\/p>\n<p>Software House es una empresa del grupo Tyco y sus tecnolog\u00edas de control de acceso est\u00e1n instaladas en los principales eventos mundiales.<\/p>\n<p><a href=\"http:\/\/www.swhouse.com\/Default.aspx\">P\u00e1gina del fabricante<\/a><\/p>\n<\/div>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; gap=&#8221;35&#8243; el_class=&#8221;container&#8221; css=&#8221;.vc_custom_1533212107588{margin-bottom: 60px !important;}&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;5285&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_custom_heading text=&#8221;Tyco&#8221; font_container=&#8221;tag:h2|font_size:45px|text_align:left|color:%234367a1|line_height:45px&#8221; google_fonts=&#8221;font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:300%20light%20regular%3A300%3Anormal&#8221; css=&#8221;.vc_custom_1533212241840{margin-bottom: 0px !important;}&#8221;][vc_custom_heading text=&#8221;CEM Systems&#8221; font_container=&#8221;tag:h2|font_size:45px|text_align:left|color:%234367a1|line_height:45px&#8221; google_fonts=&#8221;font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css=&#8221;.vc_custom_1534165710893{margin-top: 0px !important;}&#8221;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJsaW5lLTMtMTAwLWF6dWwlMjIlM0UlM0MlMkZkaXYlM0U=[\/vc_raw_html][vc_column_text]<\/p>\n<div align=\"justify\">\n<p>CEM Systems es una empresa del grupo Tyco que fabrica sistemas de gesti\u00f3n de seguridad y control de acceso.<\/p>\n<p>Con m\u00e1s de 25 a\u00f1os de experiencia en la industria de la seguridad y las tecnolog\u00edas de la informaci\u00f3n, CEM fabrica el hardware y el software para el sistema de control de acceso. Esto ofrece niveles incomparables de flexibilidad para seleccionar una soluci\u00f3n de control de acceso completa para satisfacer sus necesidades de seguridad.<\/p>\n<p>Los sistemas de CEM Systems protegen a la mayor\u00eda de los principales aeropuertos del mundo.<\/p>\n<p><a href=\"https:\/\/www.cemsys.com\/\">P\u00e1gina del fabricante<\/a><\/p>\n<\/div>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; gap=&#8221;35&#8243; el_class=&#8221;container&#8221; css=&#8221;.vc_custom_1533212107588{margin-bottom: 60px !important;}&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;5287&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_custom_heading text=&#8221;&#8221; font_container=&#8221;tag:h2|font_size:45px|text_align:left|color:%234367a1|line_height:45px&#8221; google_fonts=&#8221;font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:300%20light%20regular%3A300%3Anormal&#8221; css=&#8221;.vc_custom_1533212241840{margin-bottom: 0px !important;}&#8221;][vc_custom_heading text=&#8221;HID Global&#8221; font_container=&#8221;tag:h2|font_size:45px|text_align:left|color:%234367a1|line_height:45px&#8221; google_fonts=&#8221;font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css=&#8221;.vc_custom_1534165778238{margin-top: 0px !important;}&#8221;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJsaW5lLTMtMTAwLWF6dWwlMjIlM0UlM0MlMkZkaXYlM0U=[\/vc_raw_html][vc_column_text]<\/p>\n<div align=\"justify\">\n<p>Todos los d\u00edas, millones de personas en m\u00e1s de 100 pa\u00edses utilizan productos y servicios para acceder de forma segura al lugar de trabajo.<\/p>\n<p>M\u00e1s de 2 mil millones de elementos que necesitan ser identificados, verificados y rastreados est\u00e1n conectados usando tecnolog\u00eda HID.<\/p>\n<p><a href=\"https:\/\/www.hidglobal.com\/\">P\u00e1gina del fabricante<\/a><\/p>\n<\/div>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; gap=&#8221;35&#8243; el_class=&#8221;container&#8221; css=&#8221;.vc_custom_1533212107588{margin-bottom: 60px !important;}&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;5288&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_custom_heading text=&#8221;&#8221; font_container=&#8221;tag:h2|font_size:45px|text_align:left|color:%234367a1|line_height:45px&#8221; google_fonts=&#8221;font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:300%20light%20regular%3A300%3Anormal&#8221; css=&#8221;.vc_custom_1533212241840{margin-bottom: 0px !important;}&#8221;][vc_custom_heading text=&#8221;Honeywell&#8221; font_container=&#8221;tag:h2|font_size:45px|text_align:left|color:%234367a1|line_height:45px&#8221; google_fonts=&#8221;font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css=&#8221;.vc_custom_1534165840909{margin-top: 0px !important;}&#8221;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJsaW5lLTMtMTAwLWF6dWwlMjIlM0UlM0MlMkZkaXYlM0U=[\/vc_raw_html][vc_column_text]<\/p>\n<div align=\"justify\">\n<p>Una de las soluciones m\u00e1s utilizadas cuando queremos un panel de control de intrusi\u00f3n con control de acceso profesional.<\/p>\n<p><a href=\"https:\/\/www.security.honeywell.com\/uk\/products\/intruder\/control-panels\/accessories\/galaxydimension\/\">P\u00e1gina del fabricante<\/a><\/p>\n<\/div>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; gap=&#8221;35&#8243; el_class=&#8221;container&#8221; css=&#8221;.vc_custom_1533212107588{margin-bottom: 60px !important;}&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;5291&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_custom_heading text=&#8221;&#8221; font_container=&#8221;tag:h2|font_size:45px|text_align:left|color:%234367a1|line_height:45px&#8221; google_fonts=&#8221;font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:300%20light%20regular%3A300%3Anormal&#8221; css=&#8221;.vc_custom_1533212241840{margin-bottom: 0px !important;}&#8221;][vc_custom_heading text=&#8221;UTC&#8221; font_container=&#8221;tag:h2|font_size:45px|text_align:left|color:%234367a1|line_height:45px&#8221; google_fonts=&#8221;font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css=&#8221;.vc_custom_1534166008594{margin-top: 0px !important;}&#8221;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJsaW5lLTMtMTAwLWF6dWwlMjIlM0UlM0MlMkZkaXYlM0U=[\/vc_raw_html][vc_column_text]<\/p>\n<div align=\"justify\">\n<p>Una de las marcas de control de acceso m\u00e1s populares de Portugal. Soluciones probadas y profesionales.<\/p>\n<p><a href=\"https:\/\/www.utcfssecurityproductspages.eu\/PT\/products.php?cd=2\">P\u00e1gina del fabricante<\/a><\/p>\n<\/div>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; gap=&#8221;35&#8243; el_class=&#8221;container&#8221; css=&#8221;.vc_custom_1533212107588{margin-bottom: 60px !important;}&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;5292&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_custom_heading text=&#8221;&#8221; font_container=&#8221;tag:h2|font_size:45px|text_align:left|color:%234367a1|line_height:45px&#8221; google_fonts=&#8221;font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:300%20light%20regular%3A300%3Anormal&#8221; css=&#8221;.vc_custom_1533212241840{margin-bottom: 0px !important;}&#8221;][vc_custom_heading text=&#8221;Vanderbilt&#8221; font_container=&#8221;tag:h2|font_size:45px|text_align:left|color:%234367a1|line_height:45px&#8221; google_fonts=&#8221;font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css=&#8221;.vc_custom_1534166071664{margin-top: 0px !important;}&#8221;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJsaW5lLTMtMTAwLWF6dWwlMjIlM0UlM0MlMkZkaXYlM0U=[\/vc_raw_html][vc_column_text]<\/p>\n<div align=\"justify\">\n<p>Vanderbilt, al comprar Siemens Security, ten\u00eda una excelente soluci\u00f3n de control de acceso.<\/p>\n<p><a href=\"https:\/\/vanderbiltindustries.com\/products\/access-control\">P\u00e1gina del fabricante<\/a><\/p>\n<\/div>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; gap=&#8221;35&#8243; el_class=&#8221;container&#8221; css=&#8221;.vc_custom_1533212107588{margin-bottom: 60px !important;}&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;15879&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_custom_heading text=&#8221;&#8221; font_container=&#8221;tag:h2|font_size:45px|text_align:left|color:%234367a1|line_height:45px&#8221; google_fonts=&#8221;font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:300%20light%20regular%3A300%3Anormal&#8221; css=&#8221;.vc_custom_1533212241840{margin-bottom: 0px !important;}&#8221;][vc_custom_heading text=&#8221;Honeywell&#8221; font_container=&#8221;tag:h2|font_size:45px|text_align:left|color:%234367a1|line_height:45px&#8221; google_fonts=&#8221;font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css=&#8221;.vc_custom_1600269429986{margin-top: 0px !important;}&#8221;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJsaW5lLTMtMTAwLWF6dWwlMjIlM0UlM0MlMkZkaXYlM0U=[\/vc_raw_html][vc_column_text]<\/p>\n<div align=\"justify\">\n<p>Como l\u00edder en el desarrollo de soluciones de control de acceso, su l\u00ednea de productos abarca desde controles simples de puertas hasta sistemas integrados capaces de administrar miles de puertas y puntos de monitoreo en m\u00faltiples ubicaciones y \/ o pa\u00edses.<\/p>\n<p><a href=\"https:\/\/www.security.honeywell.com\/All-Categories\/access-control-systems\">P\u00e1gina del fabricante<\/a><\/p>\n<\/div>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row parallax=&#8221;content-moving-fade&#8221; parallax_image=&#8221;3416&#8243; css=&#8221;.vc_custom_1527256828994{padding-top: 160px !important;padding-bottom: 220px !important;background-image: url(https:\/\/www.sensorpoint.pt\/wp-content\/uploads\/2018\/05\/acessos-2.jpg?id=3883) !important;}&#8221;][vc_column][vc_custom_heading text=&#8221;Control de Accesos&#8221; font_container=&#8221;tag:h1|font_size:44px|text_align:center|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221; el_class=&#8221;section-heading&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1475934235598{padding-top: 80px !important;padding-bottom: 100px !important;background-color: #ffffff !important;}&#8221;][vc_column][vc_row_inner [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","footnotes":""},"class_list":["post-15349","page","type-page","status-publish","hentry"],"coauthors":[],"author_meta":{"author_link":"https:\/\/sp.inovamatic.com\/es\/author\/miguelmailribeiro_h017r696\/","display_name":"admin"},"relative_dates":{"created":"Publicado 8 a\u00f1os hace","modified":"Actualizado 6 a\u00f1os hace"},"absolute_dates":{"created":"Publicado el mayo 25, 2018","modified":"Actualizado el septiembre 16, 2020"},"absolute_dates_time":{"created":"Publicado el mayo 25, 2018 3:00 pm","modified":"Actualizado el septiembre 16, 2020 4:17 pm"},"featured_img_caption":"","featured_img":false,"series_order":"","_links":{"self":[{"href":"https:\/\/sp.inovamatic.com\/es\/wp-json\/wp\/v2\/pages\/15349","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sp.inovamatic.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sp.inovamatic.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sp.inovamatic.com\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sp.inovamatic.com\/es\/wp-json\/wp\/v2\/comments?post=15349"}],"version-history":[{"count":3,"href":"https:\/\/sp.inovamatic.com\/es\/wp-json\/wp\/v2\/pages\/15349\/revisions"}],"predecessor-version":[{"id":15919,"href":"https:\/\/sp.inovamatic.com\/es\/wp-json\/wp\/v2\/pages\/15349\/revisions\/15919"}],"wp:attachment":[{"href":"https:\/\/sp.inovamatic.com\/es\/wp-json\/wp\/v2\/media?parent=15349"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}