{"id":31835,"date":"2021-04-27T15:07:00","date_gmt":"2021-04-27T15:07:00","guid":{"rendered":"https:\/\/www.capgemini.com\/ar-es\/?p=31835"},"modified":"2025-03-28T08:52:59","modified_gmt":"2025-03-28T08:52:59","slug":"devsecops","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/ar-es\/insights\/expert-perspectives\/devsecops\/","title":{"rendered":"DevSecOps"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1>DevSecOps<\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/ar-es\/wp-content\/uploads\/sites\/9\/2021\/08\/cg-logo-3.png?w=330?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">Capgemini<\/h5><h5 class=\"blog-date\">2021-04-27<\/h5><\/div><\/div><div class=\"brand-image\"> <\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/ar-es\/?p=31835\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"abrir en una nueva ventana\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-tw\"><a href=\"https:\/\/twitter.com\/intent\/tweet?url=https:\/\/www.capgemini.com\/ar-es\/?p=31835&amp;text=\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"abrir en una nueva ventana\"><i aria-hidden=\"true\" class=\"icon-tw\"><\/i><span class=\"sr-only\">Twitter<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/ar-es\/?p=31835&amp;text=\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"abrir en una nueva ventana\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><div class=\"article-text article-quote-text\">\n<h3 class=\"wp-block-heading\">Aspectos clave para una implementaci\u00f3n exitosa<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\">La transformaci\u00f3n digital contin\u00faa cobrando fuerza, por lo que las empresas deben acelerar el desarrollo para ofrecer innovaci\u00f3n a gran velocidad.<\/h4>\n\n\n\n<p>Las expectativas de desarrollo han cambiado fundamentalmente y los equipos de TI deben permitir un tiempo de lanzamiento significativamente m\u00e1s r\u00e1pido, alinearse m\u00e1s estrechamente con los equipos de productos y negocios, mejorar la seguridad y permitir el cambio a nuevas formas de trabajo.<\/p>\n\n\n\n<p>Sin embargo, existen muchas barreras para lograr la agilidad que enfrentan las organizaciones. En nuestro trabajo con los clientes, hemos descubierto una serie de ineficiencias que son t\u00edpicas de las organizaciones que no cuentan con una estrategia s\u00f3lida de DevSecOps, desde el tiempo innecesario dedicado a tareas manuales hasta las vulnerabilidades del software. De hecho, hemos descubierto que el 40 por ciento del tiempo se dedica a completar tareas que se pueden automatizar, el 85 por ciento de las pruebas se realiza manualmente y el 35 por ciento del tiempo se dedica a reprocesar<\/p>\n\n\n\n<p>DevSecOps, cuando se hace bien, puede ayudar a las organizaciones a superar estos obst\u00e1culos al ritmo y con el nivel de seguridad deseado. Puede reducir el esfuerzo, acelerar la velocidad de publicaci\u00f3n, reducir los costos y mejorar la seguridad y el cumplimiento. De hecho, algunos de nuestros clientes se han dado cuenta de un aumento del 80 por ciento en eficiencia, tiempos de liberaci\u00f3n un 30 por ciento m\u00e1s r\u00e1pidos y un 100 por ciento de cumplimiento del proceso.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-aspectos-clave-para-una-implementacion-exitosa\">Aspectos clave para una implementaci\u00f3n exitosa<\/h2>\n\n\n\n<p>Una estrategia DevSecOps eficaz incluye los siguientes componentes.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Transformaci\u00f3n de personas:<\/strong> aunque a menudo se piensa en DevSecOps principalmente como una tecnolog\u00eda o un cambio de proceso, las personas est\u00e1n en el centro de su \u00e9xito. Pasar de la forma tradicional de trabajar a la mentalidad de DevSecOps requiere un cambio cultural. De hecho, estas iniciativas fracasan con mayor frecuencia debido a problemas relacionados con las personas. Para superar esto, los l\u00edderes deben definir claramente los nuevos roles y responsabilidades de DevSecOps, reestructurar los equipos en consecuencia y elegir a los miembros del equipo que tengan lo necesario para poner en marcha la nueva forma de trabajar para motivar e inspirar a otros.<\/li>\n\n\n\n<li><strong>Automatizaci\u00f3n \u201cTodo como c\u00f3digo\u201d:<\/strong> las tareas manuales deber\u00edan eliminarse por completo y la automatizaci\u00f3n deber\u00eda ser el nombre del juego. \u201cCanalizaci\u00f3n como c\u00f3digo\u201d garantiza la integraci\u00f3n continua, \u201cinfraestructura como c\u00f3digo\u201d permite la implementaci\u00f3n continua y \u201ccontenerizaci\u00f3n como c\u00f3digo\u201d permite la dockerizaci\u00f3n. En resumen, cuando todo se entrega como c\u00f3digo, puede comenzar a trabajar de una manera verdaderamente \u00e1gil.<\/li>\n\n\n\n<li><strong>Procesos de \u201ctodo continuo\u201d<\/strong>: en DevSecOps, cada paso debe automatizarse, incluidas las pruebas unitarias, las pruebas de integraci\u00f3n, la implementaci\u00f3n y las pruebas de rendimiento y seguridad, y la reproducci\u00f3n debe ser continua.<\/li>\n\n\n\n<li><strong>\u201cCambio a la izquierda\u201d y enfoque r\u00e1pido:<\/strong> para garantizar la calidad y reducir los costos con DevSecOps, los equipos deben ser proactivos en lugar de reactivos cuando se trata de la calidad del c\u00f3digo. Esto significa que el cumplimiento de la calidad deber\u00eda \u201cdesplazarse a la izquierda\u201d u ocurrir mucho antes en el ciclo de vida del desarrollo. Al realizar pruebas lo antes posible y habilitar el desarrollo basado en pruebas, puede detectar problemas r\u00e1pidamente para evitar problemas de calidad costosos m\u00e1s adelante.<\/li>\n\n\n\n<li><strong>Herramientas adecuadas:<\/strong> existen muchas herramientas de DevSecOps, y todos los d\u00edas se lanzan nuevas. Es importante elegir las herramientas adecuadas.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-empezando\">Empezando<\/h2>\n\n\n\n<p>La implementaci\u00f3n exitosa de una estrategia de DevSecOps con los componentes establecidos anteriormente requiere una planificaci\u00f3n y consideraci\u00f3n cuidadosas, por lo que recomendamos una fase de evaluaci\u00f3n y hoja de ruta de tres partes para garantizar un viaje exitoso de transformaci\u00f3n de DevSecOps:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Comience por <strong>definir su madurez actual,<\/strong> ya sea que se encuentre al comienzo de su viaje de DevSecOps o sea m\u00e1s avanzado.<\/li>\n\n\n\n<li>Luego, <strong>cree una hoja de ruta<\/strong> con un enfoque de diagn\u00f3stico<\/li>\n\n\n\n<li>Finalmente, <strong>categorice y secuencia las aplicaciones<\/strong> para implementaciones basadas en la complejidad.<\/li>\n<\/ol>\n\n\n\n<p>La plataforma de aceleraci\u00f3n DevSecOps de Capgemini ayuda a las organizaciones a lograr el \u00e9xito y la maduraci\u00f3n de DevSecOps. Combinar y optimizar todas las tareas de DevSecOps en una interfaz de usuario simple e intuitiva con un flujo de trabajo de implementaci\u00f3n altamente configurable y recomendaciones automatizadas para realizar mejoras en las aplicaciones en cada etapa del ciclo de vida acelera significativamente el tiempo de comercializaci\u00f3n. Para obtener m\u00e1s informaci\u00f3n sobre c\u00f3mo impulsar su viaje DevSecOps, comun\u00edquese con nosotros o visite nuestra p\u00e1gina web.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":336,"featured_media":31836,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"8349b550-c1bd-43f9-a54d-df47f75e7e51\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":false,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":false,"_yoast_wpseo_primary_brand":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","featured_focal_points":""},"categories":[1],"tags":[],"brand":[],"service":[189],"industry":[],"partners":[],"blog-topic":[323],"content-group":[],"class_list":["post-31835","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","service-application-development-management","blog-topic-digital-core"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>DevSecOps - Capgemini Argentina<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/ar-es\/insights\/expert-perspectives\/devsecops\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DevSecOps\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/ar-es\/insights\/expert-perspectives\/devsecops\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini Argentina\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-27T15:07:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-28T08:52:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/ar-es\/wp-content\/uploads\/sites\/9\/2023\/01\/devops-3.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1560\" \/>\n\t<meta property=\"og:image:height\" content=\"760\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Capgemini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"krishnasingh\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/ar-es\/insights\/expert-perspectives\/devsecops\/\",\"url\":\"https:\/\/www.capgemini.com\/ar-es\/insights\/expert-perspectives\/devsecops\/\",\"name\":\"DevSecOps - Capgemini Argentina\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/ar-es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/ar-es\/insights\/expert-perspectives\/devsecops\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/ar-es\/insights\/expert-perspectives\/devsecops\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/ar-es\/wp-content\/uploads\/sites\/9\/2023\/01\/devops-3.png\",\"datePublished\":\"2021-04-27T15:07:00+00:00\",\"dateModified\":\"2025-03-28T08:52:59+00:00\",\"author\":{\"@id\":\"https:\/\/www.capgemini.com\/ar-es\/#\/schema\/person\/c282b28dcf9c10f58a683ad349573e95\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.capgemini.com\/ar-es\/insights\/expert-perspectives\/devsecops\/#breadcrumb\"},\"inLanguage\":\"es-MX\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/ar-es\/insights\/expert-perspectives\/devsecops\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-MX\",\"@id\":\"https:\/\/www.capgemini.com\/ar-es\/insights\/expert-perspectives\/devsecops\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/ar-es\/wp-content\/uploads\/sites\/9\/2023\/01\/devops-3.png\",\"contentUrl\":\"https:\/\/www.capgemini.com\/ar-es\/wp-content\/uploads\/sites\/9\/2023\/01\/devops-3.png\",\"width\":1560,\"height\":760},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.capgemini.com\/ar-es\/insights\/expert-perspectives\/devsecops\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.capgemini.com\/ar-es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DevSecOps\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/ar-es\/#website\",\"url\":\"https:\/\/www.capgemini.com\/ar-es\/\",\"name\":\"Capgemini Argentina\",\"description\":\"Capgemini\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/ar-es\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es-MX\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.capgemini.com\/ar-es\/#\/schema\/person\/c282b28dcf9c10f58a683ad349573e95\",\"name\":\"krishnasingh\",\"url\":\"https:\/\/www.capgemini.com\/ar-es\/author\/krishnasingh\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DevSecOps - Capgemini Argentina","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/ar-es\/insights\/expert-perspectives\/devsecops\/","og_locale":"es_MX","og_type":"article","og_title":"DevSecOps","og_url":"https:\/\/www.capgemini.com\/ar-es\/insights\/expert-perspectives\/devsecops\/","og_site_name":"Capgemini Argentina","article_published_time":"2021-04-27T15:07:00+00:00","article_modified_time":"2025-03-28T08:52:59+00:00","og_image":[{"width":1560,"height":760,"url":"https:\/\/www.capgemini.com\/ar-es\/wp-content\/uploads\/sites\/9\/2023\/01\/devops-3.png","type":"image\/png"}],"author":"Capgemini","twitter_card":"summary_large_image","twitter_misc":{"Written by":"krishnasingh","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/ar-es\/insights\/expert-perspectives\/devsecops\/","url":"https:\/\/www.capgemini.com\/ar-es\/insights\/expert-perspectives\/devsecops\/","name":"DevSecOps - Capgemini Argentina","isPartOf":{"@id":"https:\/\/www.capgemini.com\/ar-es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/ar-es\/insights\/expert-perspectives\/devsecops\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/ar-es\/insights\/expert-perspectives\/devsecops\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/ar-es\/wp-content\/uploads\/sites\/9\/2023\/01\/devops-3.png","datePublished":"2021-04-27T15:07:00+00:00","dateModified":"2025-03-28T08:52:59+00:00","author":{"@id":"https:\/\/www.capgemini.com\/ar-es\/#\/schema\/person\/c282b28dcf9c10f58a683ad349573e95"},"breadcrumb":{"@id":"https:\/\/www.capgemini.com\/ar-es\/insights\/expert-perspectives\/devsecops\/#breadcrumb"},"inLanguage":"es-MX","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/ar-es\/insights\/expert-perspectives\/devsecops\/"]}]},{"@type":"ImageObject","inLanguage":"es-MX","@id":"https:\/\/www.capgemini.com\/ar-es\/insights\/expert-perspectives\/devsecops\/#primaryimage","url":"https:\/\/www.capgemini.com\/ar-es\/wp-content\/uploads\/sites\/9\/2023\/01\/devops-3.png","contentUrl":"https:\/\/www.capgemini.com\/ar-es\/wp-content\/uploads\/sites\/9\/2023\/01\/devops-3.png","width":1560,"height":760},{"@type":"BreadcrumbList","@id":"https:\/\/www.capgemini.com\/ar-es\/insights\/expert-perspectives\/devsecops\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.capgemini.com\/ar-es\/"},{"@type":"ListItem","position":2,"name":"DevSecOps"}]},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/ar-es\/#website","url":"https:\/\/www.capgemini.com\/ar-es\/","name":"Capgemini Argentina","description":"Capgemini","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/ar-es\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es-MX"},{"@type":"Person","@id":"https:\/\/www.capgemini.com\/ar-es\/#\/schema\/person\/c282b28dcf9c10f58a683ad349573e95","name":"krishnasingh","url":"https:\/\/www.capgemini.com\/ar-es\/author\/krishnasingh\/"}]}},"blog_topic_info":[{"id":323,"name":"Digital core"}],"taxonomy_info":{"category":[{"id":1,"name":"Uncategorized","slug":"uncategorized"}],"service":[{"id":189,"name":"Application development &amp; management","slug":"application-development-management"}],"blog-topic":[{"id":323,"name":"Digital core","slug":"digital-core"}],"following_users":[{"id":141,"name":"automator","slug":"automator"},{"id":378,"name":"krishnasingh","slug":"krishnasingh"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/ar-es\/insights\/expert-perspectives\/devsecops\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"DevSecOps","url":"https:\/\/www.capgemini.com\/ar-es\/insights\/expert-perspectives\/devsecops\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/ar-es\/insights\/expert-perspectives\/devsecops\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/ar-es\/wp-content\/uploads\/sites\/9\/2023\/01\/devops-3.png?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/ar-es\/wp-content\/uploads\/sites\/9\/2023\/01\/devops-3.png"},"articleSection":"Uncategorized","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini Argentina","logo":""},"keywords":[],"dateCreated":"2021-04-27T15:07:00Z","datePublished":"2021-04-27T15:07:00Z","dateModified":"2025-03-28T08:52:59Z"},"rendered":"<meta name=\"parsely-title\" content=\"DevSecOps\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/ar-es\/insights\/expert-perspectives\/devsecops\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/ar-es\/wp-content\/uploads\/sites\/9\/2023\/01\/devops-3.png?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2021-04-27T15:07:00Z\" \/>\n<meta name=\"parsely-section\" content=\"Uncategorized\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/ar-es\/wp-content\/uploads\/sites\/9\/2023\/01\/devops-3.png","archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/ar-es\/wp-content\/uploads\/sites\/9\/2023\/01\/devops-3.png","featured_image_alt":"","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini Argentina","distributor_original_site_url":"https:\/\/www.capgemini.com\/ar-es","push-errors":false,"featured_image_url":"https:\/\/www.capgemini.com\/ar-es\/wp-content\/uploads\/sites\/9\/2023\/01\/devops-3.png","author_title":"Capgemini","author_thumbnail_url":"https:\/\/www.capgemini.com\/ar-es\/wp-content\/uploads\/sites\/9\/2021\/08\/cg-logo-3.png?w=330","author_thumbnail_alt":"","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/ar-es\/wp-json\/wp\/v2\/posts\/31835","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/ar-es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/ar-es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/ar-es\/wp-json\/wp\/v2\/users\/336"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/ar-es\/wp-json\/wp\/v2\/comments?post=31835"}],"version-history":[{"count":5,"href":"https:\/\/www.capgemini.com\/ar-es\/wp-json\/wp\/v2\/posts\/31835\/revisions"}],"predecessor-version":[{"id":516248,"href":"https:\/\/www.capgemini.com\/ar-es\/wp-json\/wp\/v2\/posts\/31835\/revisions\/516248"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/ar-es\/wp-json\/wp\/v2\/media\/31836"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/ar-es\/wp-json\/wp\/v2\/media?parent=31835"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/ar-es\/wp-json\/wp\/v2\/categories?post=31835"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/ar-es\/wp-json\/wp\/v2\/tags?post=31835"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/ar-es\/wp-json\/wp\/v2\/brand?post=31835"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/ar-es\/wp-json\/wp\/v2\/service?post=31835"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/ar-es\/wp-json\/wp\/v2\/industry?post=31835"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/ar-es\/wp-json\/wp\/v2\/partners?post=31835"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/ar-es\/wp-json\/wp\/v2\/blog-topic?post=31835"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/ar-es\/wp-json\/wp\/v2\/content-group?post=31835"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}