{"id":4019,"date":"2023-10-02T14:43:09","date_gmt":"2023-10-02T20:43:09","guid":{"rendered":"https:\/\/redporlaciberseguridad.org\/?p=4019"},"modified":"2023-10-10T13:03:41","modified_gmt":"2023-10-10T19:03:41","slug":"que-es-la-realidad-virtual","status":"publish","type":"post","link":"https:\/\/redporlaciberseguridad.org\/en\/que-es-la-realidad-virtual\/","title":{"rendered":"What is Virtual Reality?"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"4019\" class=\"elementor elementor-4019\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1bdc83b elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"1bdc83b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3302f89\" data-id=\"3302f89\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9dc496e elementor-widget elementor-widget-heading\" data-id=\"9dc496e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is Virtual Reality?\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd8a0c4 elementor-widget elementor-widget-text-editor\" data-id=\"bd8a0c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h6><span style=\"color: #3366ff;\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">By<\/span><strong><span class=\"OYPEnA text-decoration-none text-strikethrough-none\"> Isabely Mendo Hern\u00e1ndez<\/span><\/strong><\/span><\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cc6a5a2 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"cc6a5a2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e5dbdb7\" data-id=\"e5dbdb7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-40d5738 elementor-widget elementor-widget-image\" data-id=\"40d5738\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"577\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/VR-post-1024x577.png\" class=\"attachment-large size-large wp-image-4027\" alt=\"\" srcset=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/VR-post-1024x577.png 1024w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/VR-post-600x338.png 600w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/VR-post-300x169.png 300w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/VR-post-768x433.png 768w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/VR-post-1536x865.png 1536w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/VR-post.png 1640w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0c408df elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"0c408df\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a26d7d0\" data-id=\"a26d7d0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bc79e85 elementor-widget elementor-widget-text-editor\" data-id=\"bc79e85\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Do you remember when we were younger and watched those science fiction movies, where they showed us high technology where one could pretend to be in a completely different world than the one we are in now and all according to our imagination and perspective?\n\nWell, although it may have gone unnoticed by many at the beginning, it became a reality in the blink of an eye.<\/span><\/p><p>\u00a0<\/p><p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Well, although it may have gone unnoticed by many at the beginning, it became a reality in the blink of an eye.<\/span><\/p><p>\u00a0<\/p><p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Creating great opportunities for all users, since their uses are constantly innovating and changing in all possible areas and if you still do not know these areas or simply do not know what we are talking about, below, we will provide you with a little information about.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2514ebd elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"2514ebd\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f6ebae1\" data-id=\"f6ebae1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-27cae4c elementor-widget elementor-widget-heading\" data-id=\"27cae4c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Virtual Reality<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8f46e4c elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"8f46e4c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-80ce42e\" data-id=\"80ce42e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7b2d7d3 elementor-widget elementor-widget-heading\" data-id=\"7b2d7d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">What is?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cb06053 elementor-widget elementor-widget-heading\" data-id=\"cb06053\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Definition<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ab3653 elementor-widget elementor-widget-text-editor\" data-id=\"3ab3653\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">In more scientific terms, according to the RAE definition it is understood as:<\/span><\/p><p class=\"cvGsUA direction-ltr align-justify para-style-body\"><strong><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">\u201cRepresentation of scenes or images of objects produced by a computer system, which gives the sensation of their real existence.\u201d<\/span><\/strong><\/p><p>\u00a0<\/p><p><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Although in more colloquial terms it is about immersion in a new environment where one can be part or the protagonist of a trip or situation without the need to leave the house, this is based on real-looking scenes generated thanks to technology, even allowing the creation of sensations thanks to the glasses, helmets, gloves and special suits that allow these interactions.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83eb447 elementor-widget elementor-widget-image\" data-id=\"83eb447\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"251\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-VR-300x251.png\" class=\"attachment-medium size-medium wp-image-4026\" alt=\"\" srcset=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-VR-300x251.png 300w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-VR-600x503.png 600w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-VR-768x644.png 768w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-VR.png 940w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0f3931f elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"0f3931f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c97ac22\" data-id=\"c97ac22\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-467e8b0 elementor-widget elementor-widget-heading\" data-id=\"467e8b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">What is it for?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c9f4be elementor-widget elementor-widget-heading\" data-id=\"7c9f4be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Videogames <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-199d884 elementor-widget elementor-widget-text-editor\" data-id=\"199d884\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">This is the main use in VR technology since it seeks for players to obtain a realistic experience, allowing the launch of an endless number of video games, which are usually those that require greater management of situations or circumstances such as races, fights, shooting, etc<\/span><\/p><p>\u00a0<\/p><p><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">These video games are available for computers and consoles, although their price is high.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e03d990 elementor-widget elementor-widget-image\" data-id=\"e03d990\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"251\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-VR-1-300x251.png\" class=\"attachment-medium size-medium wp-image-4025\" alt=\"\" srcset=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-VR-1-300x251.png 300w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-VR-1-600x503.png 600w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-VR-1-768x644.png 768w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-VR-1.png 940w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8fabc89 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"8fabc89\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-719796b\" data-id=\"719796b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-30901f8 elementor-widget elementor-widget-heading\" data-id=\"30901f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Education<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d4dedd elementor-widget elementor-widget-text-editor\" data-id=\"5d4dedd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Although some may not believe it, this technology reached school classrooms, providing great advantages, allowing teachers to share knowledge in a dynamic way and with a different perspective, making it easier for students to retain knowledge, since They are accompanied by experiences and sensations.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-06a24ad elementor-widget elementor-widget-image\" data-id=\"06a24ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"251\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-VR-2-300x251.png\" class=\"attachment-medium size-medium wp-image-4024\" alt=\"\" srcset=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-VR-2-300x251.png 300w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-VR-2-600x503.png 600w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-VR-2-768x644.png 768w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-VR-2.png 940w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4543610 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"4543610\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-dda6f48\" data-id=\"dda6f48\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f8ffb0c elementor-widget elementor-widget-heading\" data-id=\"f8ffb0c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Entertainment<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da1cadf elementor-widget elementor-widget-text-editor\" data-id=\"da1cadf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Of course, not all entertainment has to do with the world of video games, since there are other ways to pass the time using virtual reality and best of all, without the need to control something, simply with a mobile device.<\/span><\/p><p>\u00a0<\/p><p><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">All this thanks to the 360\u00b0 technology which is based on the creation of videos on different streaming platforms, which just by looking at the device allows you to fully enter the experience.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e154d58 elementor-widget elementor-widget-image\" data-id=\"e154d58\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"251\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-VR-3-300x251.png\" class=\"attachment-medium size-medium wp-image-4023\" alt=\"\" srcset=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-VR-3-300x251.png 300w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-VR-3-600x503.png 600w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-VR-3-768x644.png 768w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-VR-3.png 940w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-86b13a7 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"86b13a7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e03fe13\" data-id=\"e03fe13\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a8e4779 elementor-widget elementor-widget-heading\" data-id=\"a8e4779\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Medicine<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7bfdb26 elementor-widget elementor-widget-text-editor\" data-id=\"7bfdb26\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Likewise, in medicine its implementation is increasingly frequent, since varied practices and technical interventions are required and thanks to the use of virtual reality, it has been possible to create realistic and detailed practice scenarios, in order to perform surgical procedures, without the need to call upon ancient practices with the use of corpses or living cells<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-458d1f2 elementor-widget elementor-widget-image\" data-id=\"458d1f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"251\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-VR-4-300x251.png\" class=\"attachment-medium size-medium wp-image-4022\" alt=\"\" srcset=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-VR-4-300x251.png 300w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-VR-4-600x503.png 600w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-VR-4-768x644.png 768w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-VR-4.png 940w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-716e5d6 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"716e5d6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b30beb\" data-id=\"1b30beb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e0b7771 elementor-widget elementor-widget-heading\" data-id=\"e0b7771\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">In the industry <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4748717 elementor-widget elementor-widget-text-editor\" data-id=\"4748717\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Although this technology is not currently used or recognized in the industrial world, this is a new technique that is beginning to be implemented, especially in the development of future professionals.<\/span><\/p><p>\u00a0<\/p><p><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">It is based on training in high-risk areas in order to perform them in real life. Achieving with this practice to reduce work risks.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-53905fe elementor-widget elementor-widget-image\" data-id=\"53905fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"251\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-VR-5-300x251.png\" class=\"attachment-medium size-medium wp-image-4021\" alt=\"\" srcset=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-VR-5-300x251.png 300w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-VR-5-600x503.png 600w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-VR-5-768x644.png 768w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/10\/post-VR-5.png 940w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-634aa1a elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"634aa1a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-86f707b\" data-id=\"86f707b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1710e7e elementor-widget elementor-widget-heading\" data-id=\"1710e7e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Tourism <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8af0e03 elementor-widget elementor-widget-text-editor\" data-id=\"8af0e03\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Just as we witnessed the creation and use of what is now Google Maps or Google Street, which got us out of many troubles whether we were on vacation or in our own country, state or city, this usually represented a considerable expenditure of both time like money<\/span><\/p><p>\u00a0<\/p><p><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">That is why, thanks to virtual reality, this could remain in the past, since this technology also reached tourism, thus forming companies dedicated to virtually showing monuments, museums and even entire cities. This allowed tourists to enjoy the wonders that each center has without the need to worry if there is any climatic or social situation that prevents them from living the experience.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5eab04b elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"5eab04b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8507ec6\" data-id=\"8507ec6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5699edf elementor-widget elementor-widget-heading\" data-id=\"5699edf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><b>bibliographic references<\/b><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-645eb12 elementor-widget elementor-widget-text-editor\" data-id=\"645eb12\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">RAE. (s. f.-b). Realidad. Real Academia Espa\u00f1ola. Recuperado 12 de octubre de 2022, de <span style=\"color: #333333;\"><a style=\"color: #333333;\" href=\"https:\/\/dle.rae.es\/realidad\">https:\/\/dle.rae.es\/realidad<\/a><\/span><\/span><\/li><li><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Gr, R. (2022, 18 mayo). Realidad virtual, la tecnolog\u00eda que ya est\u00e1 cambiando nuestras vidas. ADSLZone. Recuperado 12 de octubre de 2022, de <span style=\"color: #333333;\"><a style=\"color: #333333;\" href=\"https:\/\/www.adslzone.net\/reportajes\/tecnologia\/realidad-virtual-rv\/\">https:\/\/www.adslzone.net\/reportajes\/tecnologia\/realidad-virtual-rv\/<\/a><\/span><\/span><\/li><li><span class=\"OYPEnA text-decoration-none text-strikethrough-none\">Innovae. (s. f.). Realidad Virtual. Recuperado 12 de octubre de 2022, de <span style=\"color: #333333;\"><a style=\"color: #333333;\" href=\"https:\/\/www.innovae.eu\/la-tecnologia-de-realidad-virtual\/\">https:\/\/www.innovae.eu\/la-tecnologia-de-realidad-virtual\/<\/a><\/span><\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d5cfb78 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"d5cfb78\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-374443f\" data-id=\"374443f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-27ab2a3 elementor-widget elementor-widget-image\" data-id=\"27ab2a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/09\/BANNER-WEBINAR-2-1024x576.png\" class=\"attachment-large size-large wp-image-3605\" alt=\"\" srcset=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/09\/BANNER-WEBINAR-2-1024x576.png 1024w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/09\/BANNER-WEBINAR-2-600x338.png 600w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/09\/BANNER-WEBINAR-2-300x169.png 300w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/09\/BANNER-WEBINAR-2-768x432.png 768w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/09\/BANNER-WEBINAR-2-1536x864.png 1536w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/09\/BANNER-WEBINAR-2.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-312df40 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"312df40\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b03bc27\" data-id=\"b03bc27\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5d4acee elementor-shape-circle elementor-grid-0 e-grid-align-center elementor-widget elementor-widget-social-icons\" data-id=\"5d4acee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"social-icons.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-social-icons-wrapper elementor-grid\" role=\"list\">\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-facebook elementor-repeater-item-7974e07\" href=\"https:\/\/www.facebook.com\/redporlaciberseguridad\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Facebook<\/span>\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fab fa-facebook\"><\/i>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-linkedin elementor-repeater-item-3faa0ff\" href=\"https:\/\/www.linkedin.com\/company\/red-por-la-ciberseguridad\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Linkedin<\/span>\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fab fa-linkedin\"><\/i>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-youtube elementor-repeater-item-f3c2677\" href=\"https:\/\/www.youtube.com\/@redporlaciberseguridad\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Youtube<\/span>\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fab fa-youtube\"><\/i>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-twitch elementor-repeater-item-5ad851c\" href=\"https:\/\/www.twitch.tv\/redporlaciberseguridad\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Twitch<\/span>\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fab fa-twitch\"><\/i>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>\u00bfQu\u00e9 es la Realidad Virtual? por: Isabely Mendo Hern\u00e1ndez \u00bfRecuerdan cuando \u00e9ramos m\u00e1s j\u00f3venes y ve\u00edamos esas pel\u00edculas de ciencia ficci\u00f3n, donde nos mostraban alta tecnolog\u00eda donde uno pod\u00eda simular estar en un mundo completamente distinto al que estamos ahora y todo seg\u00fan nuestra imaginaci\u00f3n y perspectiva? \u00a0 Pues, aunque pueda que en su comienzo<\/p>","protected":false},"author":8,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[22],"tags":[],"class_list":["post-4019","post","type-post","status-publish","format-standard","hentry","category-noticias"],"_links":{"self":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/posts\/4019","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/comments?post=4019"}],"version-history":[{"count":0,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/posts\/4019\/revisions"}],"wp:attachment":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/media?parent=4019"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/categories?post=4019"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/tags?post=4019"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}