{"id":10739,"date":"2020-09-03T18:36:30","date_gmt":"2020-09-03T21:36:30","guid":{"rendered":"http:\/\/gremioseguridad.com\/electronica\/?p=10739"},"modified":"2020-09-03T18:36:31","modified_gmt":"2020-09-03T21:36:31","slug":"desarrollo-low-code","status":"publish","type":"post","link":"https:\/\/infoseguridadit.com\/electronica\/2020\/09\/03\/desarrollo-low-code\/","title":{"rendered":"Desarrollo low-code: se estima que para 2024 m\u00e1s del 65 % de las apps ser\u00e1n de esta tecnolog\u00eda"},"content":{"rendered":"\n<p>Desarrollo\u00a0Low-Code\u00a0se consigue a trav\u00e9s de plataformas como la de Genexus, que \u201cproveen una gran variedad de funcionalidades, componentes y servicios preconfigurados, f\u00e1cilmente adaptables e integrables entre s\u00ed, que garantizan la creaci\u00f3n, el desarrollo y mantenimiento de aplicaciones compatibles con los distintos dispositivos y medios digitales.\u201d comenta C\u00e9sar Pereiro, Director comercial de\u00a0<a href=\"https:\/\/brand-partners.us17.list-manage.com\/track\/click?u=8e2f65093c69bafddac67084e&amp;id=cac3911d26&amp;e=b8751aae8b\" target=\"_blank\" rel=\"noreferrer noopener\">Accion Point<\/a>.<\/p>\n\n\n\n<p>De acuerdo con\u00a0<a href=\"https:\/\/brand-partners.us17.list-manage.com\/track\/click?u=8e2f65093c69bafddac67084e&amp;id=c6a8e43304&amp;e=b8751aae8b\" target=\"_blank\" rel=\"noreferrer noopener\">Gartner<\/a>\u00a0se estima que para 2024, de todas las actividades de desarrollo de aplicaciones, m\u00e1s del 65 % ser\u00e1n aplicaciones\u00a0low-code\u00a0y es que esta tendencia ir\u00e1 en aumento ya que los emprendedores y las empresas necesitan cada vez m\u00e1s herramientas que los acerque a sus clientes y satisfaga necesidades.<\/p>\n\n\n\n<p>Dentro de los m\u00faltiples beneficios de usar plataformas\u00a0Low\u00a0code\u00a0se destaca la reducci\u00f3n de precios y de costos, la mejora de los desarrolladores quienes se pueden centrar en potenciar el Software y la calidad de la experiencia tanto para el cliente como para la empresa ya que estos sistemas ahora incorporan herramientas de inteligencia artificial que garantizan la satisfacci\u00f3n al utilizarse.<\/p>\n\n\n\n<p>Desde Accion Point, han firmado convenios con universidades en Argentina y Colombia para que los estudiantes de distintas carreras puedan certificarse en el uso de herramientas\u00a0low-code\u00a0y de esta forma tengan la oportunidad de crear emprendimientos m\u00e1s competitivos en la realidad actual.<\/p>\n\n\n\n<p>\u201cEst\u00e1 claro que hoy en d\u00eda las aplicaciones dominan nuestra vida, pero este fen\u00f3meno no s\u00f3lo afecta al consumidor final, sino tambi\u00e9n lo hace a las empresas que necesitan producir m\u00e1s y m\u00e1s aplicaciones, por eso desde Accion Point brindamos herramientas\u00a0low-code\u00a0pero tambi\u00e9n capacitamos y acompa\u00f1amos para que el proceso de transformaci\u00f3n sea completo y efectivo, al mismo tiempo que es duradero\u201d. finaliza C\u00e9sar Pereiro, Director Comercial de <a href=\"http:\/\/gremioseguridad.com\/electronica\/?s=accion+point\" target=\"_blank\" aria-label=\"undefined (abre en una nueva pesta\u00f1a)\" rel=\"noreferrer noopener\">Accion Point.<\/a><\/p>\n\n\n\n<p>Para conocer m\u00e1s acerca de la herramienta, te invitamos a participar del webinar: Potencie su negocio en la nueva normalidad con desarrollos\u00a0low-code.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Fecha: 02 de septiembre<br>Hora: 17hs ARG | 15hs COL<br>Inscripci\u00f3n:&nbsp;<a href=\"https:\/\/brand-partners.us17.list-manage.com\/track\/click?u=8e2f65093c69bafddac67084e&amp;id=cb2dd57ca6&amp;e=b8751aae8b\" target=\"_blank\" rel=\"noreferrer noopener\"><u>https:\/\/bit.ly\/2FIbLK7<\/u><\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Desarrollo\u00a0Low-Code\u00a0se consigue a trav\u00e9s de plataformas como la de Genexus, que \u201cproveen una gran variedad de funcionalidades, componentes y servicios preconfigurados, f\u00e1cilmente adaptables e integrables entre s\u00ed, que garantizan la creaci\u00f3n, el desarrollo y mantenimiento de aplicaciones compatibles con los distintos dispositivos y medios digitales.\u201d comenta C\u00e9sar Pereiro, Director comercial de\u00a0Accion Point. De acuerdo con\u00a0Gartner\u00a0se [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":10740,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_joinchat":{"view":"no"},"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[66],"tags":[],"class_list":["post-10739","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualidad"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Desarrollo low-code: para 2024 m\u00e1s del 65 % de las apps lo usar\u00e1n<\/title>\n<meta name=\"description\" content=\"Desarrollo Low-Code se consigue a trav\u00e9s de plataformas como la de Genexus, que \u201cproveen una gran variedad de funcionalidades, componentes y servicios\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/infoseguridadit.com\/electronica\/2020\/09\/03\/desarrollo-low-code\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Desarrollo low-code: para 2024 m\u00e1s del 65 % de las apps lo usar\u00e1n\" \/>\n<meta property=\"og:description\" content=\"Desarrollo Low-Code se consigue a trav\u00e9s de plataformas como la de Genexus, que \u201cproveen una gran variedad de funcionalidades, componentes y servicios\" \/>\n<meta property=\"og:url\" content=\"https:\/\/infoseguridadit.com\/electronica\/2020\/09\/03\/desarrollo-low-code\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSeguridadIT\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Infoseguridadit\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/Infoseguridadit\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-03T21:36:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-03T21:36:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/infoseguridadit.com\/electronica\/wp-content\/uploads\/2020\/09\/desarrollo-low-code.jpg?fit=817%2C446&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"817\" \/>\n\t<meta property=\"og:image:height\" content=\"446\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"InfoSeguridadIT\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@gremioseguridad\" \/>\n<meta name=\"twitter:site\" content=\"@gremioseguridad\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"InfoSeguridadIT\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/infoseguridadit.com\\\/electronica\\\/2020\\\/09\\\/03\\\/desarrollo-low-code\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/infoseguridadit.com\\\/electronica\\\/2020\\\/09\\\/03\\\/desarrollo-low-code\\\/\"},\"author\":{\"name\":\"InfoSeguridadIT\",\"@id\":\"https:\\\/\\\/infoseguridadit.com\\\/electronica\\\/#\\\/schema\\\/person\\\/ebbcebab56199bc170ca93cc17e06b80\"},\"headline\":\"Desarrollo low-code: se estima que para 2024 m\u00e1s del 65 % de las apps ser\u00e1n de esta tecnolog\u00eda\",\"datePublished\":\"2020-09-03T21:36:30+00:00\",\"dateModified\":\"2020-09-03T21:36:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/infoseguridadit.com\\\/electronica\\\/2020\\\/09\\\/03\\\/desarrollo-low-code\\\/\"},\"wordCount\":357,\"publisher\":{\"@id\":\"https:\\\/\\\/infoseguridadit.com\\\/electronica\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/infoseguridadit.com\\\/electronica\\\/2020\\\/09\\\/03\\\/desarrollo-low-code\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/infoseguridadit.com\\\/electronica\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/desarrollo-low-code.jpg\",\"articleSection\":[\"Actualidad\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/infoseguridadit.com\\\/electronica\\\/2020\\\/09\\\/03\\\/desarrollo-low-code\\\/\",\"url\":\"https:\\\/\\\/infoseguridadit.com\\\/electronica\\\/2020\\\/09\\\/03\\\/desarrollo-low-code\\\/\",\"name\":\"Desarrollo low-code: para 2024 m\u00e1s del 65 % de las apps lo usar\u00e1n\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/infoseguridadit.com\\\/electronica\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/infoseguridadit.com\\\/electronica\\\/2020\\\/09\\\/03\\\/desarrollo-low-code\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/infoseguridadit.com\\\/electronica\\\/2020\\\/09\\\/03\\\/desarrollo-low-code\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/infoseguridadit.com\\\/electronica\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/desarrollo-low-code.jpg\",\"datePublished\":\"2020-09-03T21:36:30+00:00\",\"dateModified\":\"2020-09-03T21:36:31+00:00\",\"description\":\"Desarrollo Low-Code se consigue a trav\u00e9s de plataformas como la de Genexus, que \u201cproveen una gran variedad de funcionalidades, componentes y servicios\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/infoseguridadit.com\\\/electronica\\\/2020\\\/09\\\/03\\\/desarrollo-low-code\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/infoseguridadit.com\\\/electronica\\\/2020\\\/09\\\/03\\\/desarrollo-low-code\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/infoseguridadit.com\\\/electronica\\\/2020\\\/09\\\/03\\\/desarrollo-low-code\\\/#primaryimage\",\"url\":\"https:\\\/\\\/infoseguridadit.com\\\/electronica\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/desarrollo-low-code.jpg\",\"contentUrl\":\"https:\\\/\\\/infoseguridadit.com\\\/electronica\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/desarrollo-low-code.jpg\",\"width\":817,\"height\":446,\"caption\":\"desarrollo low-code infogremio\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/infoseguridadit.com\\\/electronica\\\/2020\\\/09\\\/03\\\/desarrollo-low-code\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/infoseguridadit.com\\\/electronica\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Desarrollo low-code: se estima que para 2024 m\u00e1s del 65 % de las apps ser\u00e1n de esta tecnolog\u00eda\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/infoseguridadit.com\\\/electronica\\\/#website\",\"url\":\"https:\\\/\\\/infoseguridadit.com\\\/electronica\\\/\",\"name\":\"InfoSeguridadIT\",\"description\":\"InfoSeguridadIT es un portal de noticias sobre tecnolog\u00eda y seguridad electr\u00f3nica dirigido a Integradores, Distribuidores, Importadores, Fabricantes, etc.\",\"publisher\":{\"@id\":\"https:\\\/\\\/infoseguridadit.com\\\/electronica\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/infoseguridadit.com\\\/electronica\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/infoseguridadit.com\\\/electronica\\\/#organization\",\"name\":\"InfoSeguridadIT\",\"url\":\"https:\\\/\\\/infoseguridadit.com\\\/electronica\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/infoseguridadit.com\\\/electronica\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"http:\\\/\\\/infoseguridadit.com\\\/electronica\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/cropped-logo-isit-latam-low-b.png\",\"contentUrl\":\"http:\\\/\\\/infoseguridadit.com\\\/electronica\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/cropped-logo-isit-latam-low-b.png\",\"width\":400,\"height\":111,\"caption\":\"InfoSeguridadIT\"},\"image\":{\"@id\":\"https:\\\/\\\/infoseguridadit.com\\\/electronica\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Infoseguridadit\",\"https:\\\/\\\/x.com\\\/gremioseguridad\",\"https:\\\/\\\/www.instagram.com\\\/infoseguridadit\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/ramiro-de-rosa--7879a99\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/infoseguridadit.com\\\/electronica\\\/#\\\/schema\\\/person\\\/ebbcebab56199bc170ca93cc17e06b80\",\"name\":\"InfoSeguridadIT\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f65dac9718ad877804b6a3fb5a58ca3238715fb7957e908f214fc5d6161d758f?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f65dac9718ad877804b6a3fb5a58ca3238715fb7957e908f214fc5d6161d758f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f65dac9718ad877804b6a3fb5a58ca3238715fb7957e908f214fc5d6161d758f?s=96&d=mm&r=g\",\"caption\":\"InfoSeguridadIT\"},\"sameAs\":[\"https:\\\/\\\/infoseguridadit.com\\\/electronica\\\/\",\"https:\\\/\\\/www.facebook.com\\\/Infoseguridadit\\\/\",\"https:\\\/\\\/www.instagram.com\\\/infoseguridadit\"],\"url\":\"https:\\\/\\\/infoseguridadit.com\\\/electronica\\\/author\\\/ramiroderosa\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Desarrollo low-code: para 2024 m\u00e1s del 65 % de las apps lo usar\u00e1n","description":"Desarrollo Low-Code se consigue a trav\u00e9s de plataformas como la de Genexus, que \u201cproveen una gran variedad de funcionalidades, componentes y servicios","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/infoseguridadit.com\/electronica\/2020\/09\/03\/desarrollo-low-code\/","og_locale":"es_ES","og_type":"article","og_title":"Desarrollo low-code: para 2024 m\u00e1s del 65 % de las apps lo usar\u00e1n","og_description":"Desarrollo Low-Code se consigue a trav\u00e9s de plataformas como la de Genexus, que \u201cproveen una gran variedad de funcionalidades, componentes y servicios","og_url":"https:\/\/infoseguridadit.com\/electronica\/2020\/09\/03\/desarrollo-low-code\/","og_site_name":"InfoSeguridadIT","article_publisher":"https:\/\/www.facebook.com\/Infoseguridadit","article_author":"https:\/\/www.facebook.com\/Infoseguridadit\/","article_published_time":"2020-09-03T21:36:30+00:00","article_modified_time":"2020-09-03T21:36:31+00:00","og_image":[{"width":817,"height":446,"url":"https:\/\/i0.wp.com\/infoseguridadit.com\/electronica\/wp-content\/uploads\/2020\/09\/desarrollo-low-code.jpg?fit=817%2C446&ssl=1","type":"image\/jpeg"}],"author":"InfoSeguridadIT","twitter_card":"summary_large_image","twitter_creator":"@gremioseguridad","twitter_site":"@gremioseguridad","twitter_misc":{"Escrito por":"InfoSeguridadIT","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/infoseguridadit.com\/electronica\/2020\/09\/03\/desarrollo-low-code\/#article","isPartOf":{"@id":"https:\/\/infoseguridadit.com\/electronica\/2020\/09\/03\/desarrollo-low-code\/"},"author":{"name":"InfoSeguridadIT","@id":"https:\/\/infoseguridadit.com\/electronica\/#\/schema\/person\/ebbcebab56199bc170ca93cc17e06b80"},"headline":"Desarrollo low-code: se estima que para 2024 m\u00e1s del 65 % de las apps ser\u00e1n de esta tecnolog\u00eda","datePublished":"2020-09-03T21:36:30+00:00","dateModified":"2020-09-03T21:36:31+00:00","mainEntityOfPage":{"@id":"https:\/\/infoseguridadit.com\/electronica\/2020\/09\/03\/desarrollo-low-code\/"},"wordCount":357,"publisher":{"@id":"https:\/\/infoseguridadit.com\/electronica\/#organization"},"image":{"@id":"https:\/\/infoseguridadit.com\/electronica\/2020\/09\/03\/desarrollo-low-code\/#primaryimage"},"thumbnailUrl":"https:\/\/infoseguridadit.com\/electronica\/wp-content\/uploads\/2020\/09\/desarrollo-low-code.jpg","articleSection":["Actualidad"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/infoseguridadit.com\/electronica\/2020\/09\/03\/desarrollo-low-code\/","url":"https:\/\/infoseguridadit.com\/electronica\/2020\/09\/03\/desarrollo-low-code\/","name":"Desarrollo low-code: para 2024 m\u00e1s del 65 % de las apps lo usar\u00e1n","isPartOf":{"@id":"https:\/\/infoseguridadit.com\/electronica\/#website"},"primaryImageOfPage":{"@id":"https:\/\/infoseguridadit.com\/electronica\/2020\/09\/03\/desarrollo-low-code\/#primaryimage"},"image":{"@id":"https:\/\/infoseguridadit.com\/electronica\/2020\/09\/03\/desarrollo-low-code\/#primaryimage"},"thumbnailUrl":"https:\/\/infoseguridadit.com\/electronica\/wp-content\/uploads\/2020\/09\/desarrollo-low-code.jpg","datePublished":"2020-09-03T21:36:30+00:00","dateModified":"2020-09-03T21:36:31+00:00","description":"Desarrollo Low-Code se consigue a trav\u00e9s de plataformas como la de Genexus, que \u201cproveen una gran variedad de funcionalidades, componentes y servicios","breadcrumb":{"@id":"https:\/\/infoseguridadit.com\/electronica\/2020\/09\/03\/desarrollo-low-code\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/infoseguridadit.com\/electronica\/2020\/09\/03\/desarrollo-low-code\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/infoseguridadit.com\/electronica\/2020\/09\/03\/desarrollo-low-code\/#primaryimage","url":"https:\/\/infoseguridadit.com\/electronica\/wp-content\/uploads\/2020\/09\/desarrollo-low-code.jpg","contentUrl":"https:\/\/infoseguridadit.com\/electronica\/wp-content\/uploads\/2020\/09\/desarrollo-low-code.jpg","width":817,"height":446,"caption":"desarrollo low-code infogremio"},{"@type":"BreadcrumbList","@id":"https:\/\/infoseguridadit.com\/electronica\/2020\/09\/03\/desarrollo-low-code\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/infoseguridadit.com\/electronica\/"},{"@type":"ListItem","position":2,"name":"Desarrollo low-code: se estima que para 2024 m\u00e1s del 65 % de las apps ser\u00e1n de esta tecnolog\u00eda"}]},{"@type":"WebSite","@id":"https:\/\/infoseguridadit.com\/electronica\/#website","url":"https:\/\/infoseguridadit.com\/electronica\/","name":"InfoSeguridadIT","description":"InfoSeguridadIT es un portal de noticias sobre tecnolog\u00eda y seguridad electr\u00f3nica dirigido a Integradores, Distribuidores, Importadores, Fabricantes, etc.","publisher":{"@id":"https:\/\/infoseguridadit.com\/electronica\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/infoseguridadit.com\/electronica\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/infoseguridadit.com\/electronica\/#organization","name":"InfoSeguridadIT","url":"https:\/\/infoseguridadit.com\/electronica\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/infoseguridadit.com\/electronica\/#\/schema\/logo\/image\/","url":"http:\/\/infoseguridadit.com\/electronica\/wp-content\/uploads\/2023\/10\/cropped-logo-isit-latam-low-b.png","contentUrl":"http:\/\/infoseguridadit.com\/electronica\/wp-content\/uploads\/2023\/10\/cropped-logo-isit-latam-low-b.png","width":400,"height":111,"caption":"InfoSeguridadIT"},"image":{"@id":"https:\/\/infoseguridadit.com\/electronica\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Infoseguridadit","https:\/\/x.com\/gremioseguridad","https:\/\/www.instagram.com\/infoseguridadit\/","https:\/\/www.linkedin.com\/in\/ramiro-de-rosa--7879a99\/"]},{"@type":"Person","@id":"https:\/\/infoseguridadit.com\/electronica\/#\/schema\/person\/ebbcebab56199bc170ca93cc17e06b80","name":"InfoSeguridadIT","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/f65dac9718ad877804b6a3fb5a58ca3238715fb7957e908f214fc5d6161d758f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f65dac9718ad877804b6a3fb5a58ca3238715fb7957e908f214fc5d6161d758f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f65dac9718ad877804b6a3fb5a58ca3238715fb7957e908f214fc5d6161d758f?s=96&d=mm&r=g","caption":"InfoSeguridadIT"},"sameAs":["https:\/\/infoseguridadit.com\/electronica\/","https:\/\/www.facebook.com\/Infoseguridadit\/","https:\/\/www.instagram.com\/infoseguridadit"],"url":"https:\/\/infoseguridadit.com\/electronica\/author\/ramiroderosa\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/infoseguridadit.com\/electronica\/wp-content\/uploads\/2020\/09\/desarrollo-low-code.jpg","jetpack-related-posts":[{"id":11167,"url":"https:\/\/infoseguridadit.com\/electronica\/2020\/11\/11\/low-code\/","url_meta":{"origin":10739,"position":0},"title":"Low-code software preparado para liderar la automatizaci\u00f3n de procesos en la post-pandemia.","author":"InfoSeguridadIT","date":"11 de noviembre de 2020","format":false,"excerpt":"Low-code software jugar\u00e1 un rol fundamental en este 2020 que ser\u00e1 recordado como un a\u00f1o de m\u00faltiples cambios y desaf\u00edos. En este contexto, la tecnolog\u00eda debe adaptarse r\u00e1pidamente\u00a0a un mundo que, producto de la pandemia, aceler\u00f3 su ritmo de evoluci\u00f3n digital. En este marco, GeneXus anunci\u00f3 una nueva versi\u00f3n de\u2026","rel":"","context":"En \u00abActualidad\u00bb","block_context":{"text":"Actualidad","link":"https:\/\/infoseguridadit.com\/electronica\/category\/actualidad\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/infoseguridadit.com\/electronica\/wp-content\/uploads\/2020\/11\/accion-geenxus.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/infoseguridadit.com\/electronica\/wp-content\/uploads\/2020\/11\/accion-geenxus.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/infoseguridadit.com\/electronica\/wp-content\/uploads\/2020\/11\/accion-geenxus.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":10733,"url":"https:\/\/infoseguridadit.com\/electronica\/2020\/09\/02\/dahua-ia-2\/","url_meta":{"origin":10739,"position":1},"title":"Dahua alcanza m\u00e9tricas hist\u00f3ricas con su tecnolog\u00eda de reconocimiento con IA, en la marcha CASIA-B","author":"InfoSeguridadIT","date":"2 de septiembre de 2020","format":false,"excerpt":"Dahua Technology, un proveedor de servicios y soluciones inteligentes de IoT centrado en video l\u00edder en el mundo, realiz\u00f3 recientemente nuevos avances en el campo de la tecnolog\u00eda de inteligencia artificial. Varios indicadores de su tecnolog\u00eda de reconocimiento de la marcha han batido una vez m\u00e1s el r\u00e9cord del conjunto\u2026","rel":"","context":"En \u00abOpini\u00f3n\u00bb","block_context":{"text":"Opini\u00f3n","link":"https:\/\/infoseguridadit.com\/electronica\/category\/opinion\/"},"img":{"alt_text":"dahua-2-infogremio","src":"https:\/\/i0.wp.com\/infoseguridadit.com\/electronica\/wp-content\/uploads\/2020\/09\/dahua-2-infogremio.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/infoseguridadit.com\/electronica\/wp-content\/uploads\/2020\/09\/dahua-2-infogremio.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/infoseguridadit.com\/electronica\/wp-content\/uploads\/2020\/09\/dahua-2-infogremio.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/infoseguridadit.com\/electronica\/wp-content\/uploads\/2020\/09\/dahua-2-infogremio.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":10210,"url":"https:\/\/infoseguridadit.com\/electronica\/2020\/07\/07\/accion-point-renueva-su-presencia-online-con-nuevo-site-corporativo\/","url_meta":{"origin":10739,"position":2},"title":"Accion Point renueva su presencia online con nuevo site corporativo","author":"InfoSeguridadIT","date":"7 de julio de 2020","format":false,"excerpt":"La empresa desarroll\u00f3 el restyling de su site, logrando una mejor experiencia de navegaci\u00f3n, m\u00e1s intuitiva y con informaci\u00f3n e insights valiosos, mejorando su posicionamiento de propuesta hacia la transformaci\u00f3n digital. Accion Point, empresa especializada en el desarrollo, configuraci\u00f3n e implementaci\u00f3n de soluciones de negocios basadas en Tecnolog\u00eda de la\u2026","rel":"","context":"En \u00abActualidad\u00bb","block_context":{"text":"Actualidad","link":"https:\/\/infoseguridadit.com\/electronica\/category\/actualidad\/"},"img":{"alt_text":"accion point infogremio","src":"https:\/\/i0.wp.com\/infoseguridadit.com\/electronica\/wp-content\/uploads\/2020\/07\/NuevoSitioAP1.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/infoseguridadit.com\/electronica\/wp-content\/uploads\/2020\/07\/NuevoSitioAP1.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/infoseguridadit.com\/electronica\/wp-content\/uploads\/2020\/07\/NuevoSitioAP1.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/infoseguridadit.com\/electronica\/wp-content\/uploads\/2020\/07\/NuevoSitioAP1.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/infoseguridadit.com\/electronica\/wp-content\/uploads\/2020\/07\/NuevoSitioAP1.png?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":10541,"url":"https:\/\/infoseguridadit.com\/electronica\/2020\/08\/04\/billetera-digital\/","url_meta":{"origin":10739,"position":3},"title":"Billetera Digital, nueva fase: inteligencia artificial y chatbots","author":"InfoSeguridadIT","date":"4 de agosto de 2020","format":false,"excerpt":"Billetera digital, adem\u00e1s de permitir la inclusi\u00f3n financiera, es la puerta de acceso a innovaciones en el sector de banca y fintech, como automatizaci\u00f3n, inteligencia artificial y chatbots. Las claves de esta tecnolog\u00eda como disparador del comercio electr\u00f3nico y las pasarelas de pago. La situaci\u00f3n actual que vive el mundo\u2026","rel":"","context":"En \u00abActualidad\u00bb","block_context":{"text":"Actualidad","link":"https:\/\/infoseguridadit.com\/electronica\/category\/actualidad\/"},"img":{"alt_text":"Billetera digital infogremio","src":"https:\/\/i0.wp.com\/infoseguridadit.com\/electronica\/wp-content\/uploads\/2020\/08\/Billetera-digital.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/infoseguridadit.com\/electronica\/wp-content\/uploads\/2020\/08\/Billetera-digital.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/infoseguridadit.com\/electronica\/wp-content\/uploads\/2020\/08\/Billetera-digital.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/infoseguridadit.com\/electronica\/wp-content\/uploads\/2020\/08\/Billetera-digital.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":13501,"url":"https:\/\/infoseguridadit.com\/electronica\/2022\/09\/12\/iot-2\/","url_meta":{"origin":10739,"position":4},"title":"IoT, \u00bfest\u00e1n las redes preparadas?","author":"InfoSeguridadIT","date":"12 de septiembre de 2022","format":false,"excerpt":"IoT enfrenta un gran desaf\u00edo: contar con redes que puedan soportar una gran cantidad de dispositivos conectados con alta confiabilidad y bajo consumo de recursos. El incremento de los equipos de Internet de las cosas (IoT) es indudable. y las prestaciones actuales de estos dispositivos promete aumentar exponencialmente en los\u2026","rel":"","context":"En \u00abInformes\u00bb","block_context":{"text":"Informes","link":"https:\/\/infoseguridadit.com\/electronica\/category\/inf\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/infoseguridadit.com\/electronica\/wp-content\/uploads\/2022\/09\/iot-infoseguridadit.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/infoseguridadit.com\/electronica\/wp-content\/uploads\/2022\/09\/iot-infoseguridadit.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/infoseguridadit.com\/electronica\/wp-content\/uploads\/2022\/09\/iot-infoseguridadit.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/infoseguridadit.com\/electronica\/wp-content\/uploads\/2022\/09\/iot-infoseguridadit.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":14766,"url":"https:\/\/infoseguridadit.com\/electronica\/2023\/12\/02\/tecnologia-para-que-la-utilizan-los-argentinos-y-como-impacta-en-sus-vidas\/","url_meta":{"origin":10739,"position":5},"title":"Tecnolog\u00eda: \u00bfpara qu\u00e9 la utilizan los argentinos y c\u00f3mo impacta en sus vidas?","author":"InfoSeguridadIT","date":"2 de diciembre de 2023","format":false,"excerpt":"Decir que la tecnolog\u00eda puede transformar diferentes aspectos de la vida de las personas hoy puede sonar a lugar com\u00fan. Pero cuando se tienen datos concretos sobre el uso y la adopci\u00f3n de las herramientas tecnol\u00f3gicas, esta afirmaci\u00f3n adquiere otra consistencia. En el caso de la Argentina un estudio del\u2026","rel":"","context":"En \u00abArgentina\u00bb","block_context":{"text":"Argentina","link":"https:\/\/infoseguridadit.com\/electronica\/category\/argentina\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/infoseguridadit.com\/electronica\/wp-content\/uploads\/2023\/12\/1_vxjAHkrXbGG6gOiPZgjeZA.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/infoseguridadit.com\/electronica\/wp-content\/uploads\/2023\/12\/1_vxjAHkrXbGG6gOiPZgjeZA.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/infoseguridadit.com\/electronica\/wp-content\/uploads\/2023\/12\/1_vxjAHkrXbGG6gOiPZgjeZA.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/infoseguridadit.com\/electronica\/wp-content\/uploads\/2023\/12\/1_vxjAHkrXbGG6gOiPZgjeZA.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_shortlink":"https:\/\/wp.me\/p6cGtH-2Nd","_links":{"self":[{"href":"https:\/\/infoseguridadit.com\/electronica\/wp-json\/wp\/v2\/posts\/10739","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infoseguridadit.com\/electronica\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infoseguridadit.com\/electronica\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infoseguridadit.com\/electronica\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infoseguridadit.com\/electronica\/wp-json\/wp\/v2\/comments?post=10739"}],"version-history":[{"count":1,"href":"https:\/\/infoseguridadit.com\/electronica\/wp-json\/wp\/v2\/posts\/10739\/revisions"}],"predecessor-version":[{"id":10741,"href":"https:\/\/infoseguridadit.com\/electronica\/wp-json\/wp\/v2\/posts\/10739\/revisions\/10741"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infoseguridadit.com\/electronica\/wp-json\/wp\/v2\/media\/10740"}],"wp:attachment":[{"href":"https:\/\/infoseguridadit.com\/electronica\/wp-json\/wp\/v2\/media?parent=10739"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infoseguridadit.com\/electronica\/wp-json\/wp\/v2\/categories?post=10739"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infoseguridadit.com\/electronica\/wp-json\/wp\/v2\/tags?post=10739"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}