
{"id":344,"date":"2008-05-11T13:19:53","date_gmt":"2008-05-11T16:19:53","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=344"},"modified":"2008-05-11T13:21:17","modified_gmt":"2008-05-11T16:21:17","slug":"catedra-y-universidad-libre","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/catedra-y-universidad-libre\/","title":{"rendered":"C\u00c3\u00a1tedra y Universidad Libre"},"content":{"rendered":"<p>Para empezar sabr\u00c3\u00a1n que soy parte de la C\u00c3\u00a1tedra de Seguridad Inform\u00c3\u00a1tica de la Universidad FASTA, en la sede de Mar Del Plata, Buenos Aires, Argentina.<br \/>\nTengo el agrado de presentar un proyecto que emprendimos con la C\u00c3\u00a1tedra sobre la educaci\u00c3\u00b3n libre, o mejor dicho sobre Universidad Libre, en la cu\u00c3\u00a1l permite compartir conocimientos entre la c\u00c3\u00a1tedra y los alumnos  como as\u00c3\u00ad tambien inculcar en los alumnos la iniciativa de aportar sus conocimientos en los temarios, etc. y romper con el viejo m\u00c3\u00a9todo de &#8220;La C\u00c3\u00a1tedra&#8221; y del otro lado los alumnos, solo fiel oyentes y aceptando solo lo  que el Profesor dicta.<\/p>\n<p>Ademas no solo educar en libertad sino tambien acompa\u00c3\u00b1ado de Software Libre, permitiendo una contrucci\u00c3\u00b3n cooperativa de conocimientos, entre los objetivos principales de las Universidades Libres se encuentran:<br \/>\n    *  El software que se utiliza en las universidades debe poseer una licencia libre.<br \/>\n    * Los apuntes de la materia deben estar disponibles en formato digital bajo est\u00c3\u00a1ndares abiertos<br \/>\n    * Liberar a las universidades de los acuerdos con empresas que limiten su libertad.<br \/>\n    * Lograr que las tesis o trabajos finales de carrera se licencien de forma libre.<br \/>\n    * Dar la posibilidad a los estudiantes universitarios de utilizar herramientas que no restrinjan su libertad.<br \/>\n    * Construcci\u00c3\u00b3n cooperativa del conocimiento.<br \/>\n    * La universidad debe ser un espacio de intercambio y creaci\u00c3\u00b3n de conocimientos y no un mero repositorio de verdades acabadas. <\/p>\n<p>Universidad Libre: <a href=\"http:\/\/wiki.universidadlibre.org.ar\/index.php?title=Objetivos\">Objetivos<\/a><\/p>\n<p>Nuestra c\u00c3\u00a1tedra esta integrada por:<br \/>\n          o Sebasti\u00c3\u00a1n Garc\u00c3\u00ada<br \/>\n          o Horacio Luz Clara<br \/>\n          o Leandro G. Ferrari<br \/>\n          o Erika Givaudant <\/p>\n<p>Para mas informaci\u00c3\u00b3n de la C\u00c3\u00a1tedra y aportes:<\/p>\n<p>Wiki de la C\u00c3\u00a1tedra Seguridad Inform\u00c3\u00a1tica en FASTA: <a href=\"http:\/\/wiki.universidadlibre.org.ar\/index.php?title=Ufasta_Mar_del_Plata_Seguridad_Inform%C3%A1tica\">Aqu\u00c3\u00ad<\/a><\/p>\n<p>Saludos,<br \/>\nLeandro Ferrari<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Para empezar sabr\u00c3\u00a1n que soy parte de la C\u00c3\u00a1tedra de Seguridad Inform\u00c3\u00a1tica de la Universidad FASTA, en la sede de Mar Del Plata, Buenos Aires, Argentina. Tengo el agrado de presentar un proyecto que emprendimos con la C\u00c3\u00a1tedra sobre la educaci\u00c3\u00b3n libre, o mejor dicho sobre Universidad Libre, en la cu\u00c3\u00a1l permite compartir conocimientos entre [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-344","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - C\u00c3\u00a1tedra y Universidad Libre<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/catedra-y-universidad-libre\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/catedra-y-universidad-libre\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/catedra-y-universidad-libre\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"C\u00c3\u00a1tedra y Universidad Libre\",\"datePublished\":\"2008-05-11T16:19:53+00:00\",\"dateModified\":\"2008-05-11T16:21:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/catedra-y-universidad-libre\/\"},\"wordCount\":292,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/catedra-y-universidad-libre\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/catedra-y-universidad-libre\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - C\u00c3\u00a1tedra y Universidad Libre\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2008-05-11T16:19:53+00:00\",\"dateModified\":\"2008-05-11T16:21:17+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/catedra-y-universidad-libre\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - C\u00c3\u00a1tedra y Universidad Libre","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/catedra-y-universidad-libre\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/catedra-y-universidad-libre\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/catedra-y-universidad-libre\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"C\u00c3\u00a1tedra y Universidad Libre","datePublished":"2008-05-11T16:19:53+00:00","dateModified":"2008-05-11T16:21:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/catedra-y-universidad-libre\/"},"wordCount":292,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/catedra-y-universidad-libre\/","url":"https:\/\/www.talsoft-security.com\/site\/catedra-y-universidad-libre\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - C\u00c3\u00a1tedra y Universidad Libre","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2008-05-11T16:19:53+00:00","dateModified":"2008-05-11T16:21:17+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/catedra-y-universidad-libre\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/344","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=344"}],"version-history":[{"count":0,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/344\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=344"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=344"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}