<?xml version="1.0" encoding="UTF-8"?>
<!--generator='jetpack-15.9-a.3'-->
<!--Jetpack_Sitemap_Buffer_Image_XMLWriter-->
<?xml-stylesheet type="text/xsl" href="//codigoycontexto.blog/image-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
 <url>
  <loc>https://codigoycontexto.blog/pixel-y-palabra-69c5345b877f7/</loc>
  <lastmod>2026-05-03T02:55:58Z</lastmod>
  <image:image>
   <image:loc>https://codigoycontexto.blog/wp-content/uploads/2026/03/pixel-y-palabra-69c5345b877f7.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://codigoycontexto.blog/logo-para-codigo-y-contexto/</loc>
  <lastmod>2026-05-04T00:07:51Z</lastmod>
  <image:image>
   <image:loc>https://codigoycontexto.blog/wp-content/uploads/2026/05/logo-para-codigo-y-contexto.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://codigoycontexto.blog/home/</loc>
  <lastmod>2026-05-03T23:44:11Z</lastmod>
  <image:image>
   <image:loc>https://codigoycontexto.blog/wp-content/uploads/2026/05/portada-de-codigo-y-contexto.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://codigoycontexto.blog/logo-para-codigo-y-contexto-2/</loc>
  <lastmod>2026-05-03T23:40:29Z</lastmod>
  <image:image>
   <image:loc>https://codigoycontexto.blog/wp-content/uploads/2026/05/Logo-para-Codigo-y-Contexto.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://codigoycontexto.blog/periodismo-critico-sobre-tecnologia-2/</loc>
  <lastmod>2026-05-03T23:30:19Z</lastmod>
  <image:image>
   <image:loc>https://codigoycontexto.blog/wp-content/uploads/2026/05/Periodismo-critico-sobre-tecnologia.jpg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://codigoycontexto.blog/favicon-para-codigo-y-contexto-2/</loc>
  <lastmod>2026-05-03T23:54:43Z</lastmod>
  <image:image>
   <image:loc>https://codigoycontexto.blog/wp-content/uploads/2026/05/Favicon-para-Codigo-y-Contexto.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://codigoycontexto.blog/la-inteligencia-artificial-te-da-superpoderes/</loc>
  <lastmod>2026-05-09T23:13:16Z</lastmod>
  <image:image>
   <image:loc>https://codigoycontexto.blog/wp-content/uploads/2026/05/La-Inteligencia-Artificial-te-da-superpoderes.jpg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://codigoycontexto.blog/apple-cumple-50-anos/</loc>
  <lastmod>2026-05-10T00:02:50Z</lastmod>
  <image:image>
   <image:loc>https://codigoycontexto.blog/wp-content/uploads/2026/05/Apple-cumple-50-anos.jpg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://codigoycontexto.blog/ecosistema-de-la-red-social-x/</loc>
  <lastmod>2026-05-08T01:05:05Z</lastmod>
  <image:image>
   <image:loc>https://codigoycontexto.blog/wp-content/uploads/2026/05/Ecosistema-de-la-red-social-X.jpg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://codigoycontexto.blog/2026/05/13/guia-optimizacion-android-rendimiento-bateria-sin-limpiadores/</loc>
  <lastmod>2026-05-10T23:28:29Z</lastmod>
  <image:image>
   <image:loc>https://codigoycontexto.blog/wp-content/uploads/2026/05/Optimizacion-Android-Maximo-rendimiento-sin-aplicaciones-basura.jpeg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://codigoycontexto.blog/2026/05/13/criptografia-post-cuantica-seguridad-futuro/</loc>
  <lastmod>2026-05-13T01:36:40Z</lastmod>
  <image:image>
   <image:loc>https://codigoycontexto.blog/wp-content/uploads/2026/05/Criptografia-post-cuantica-El-blindaje-contra-el-futuro.jpeg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://codigoycontexto.blog/2026/05/16/google-io-2026-gemini-intelligence-android-17/</loc>
  <lastmod>2026-05-16T16:30:14Z</lastmod>
  <image:image>
   <image:loc>https://codigoycontexto.blog/wp-content/uploads/2026/05/Google-IO-2026-Todo-lo-que-debes-saber.jpeg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://codigoycontexto.blog/2026/05/16/ias-las-6-mejores-plataformas-para-entrenarlas/</loc>
  <lastmod>2026-05-16T20:55:34Z</lastmod>
  <image:image>
   <image:loc>https://codigoycontexto.blog/wp-content/uploads/2026/05/Las-6-mejores-plataformas-para-entrenar-IAs.jpeg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://codigoycontexto.blog/2026/05/17/ia-frontera-palo-alto-networks-alerta-exploits-tiempo-real/</loc>
  <lastmod>2026-05-17T23:52:30Z</lastmod>
  <image:image>
   <image:loc>https://codigoycontexto.blog/wp-content/uploads/2026/05/IA-de-frontera-Palo-Alto-Networks-alerta-creacion-de-exploits-en-tiempo-real.jpeg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://codigoycontexto.blog/ia-agentica-el-salto-del-chat-a-la-ejecucion-autonoma/</loc>
  <lastmod>2026-05-18T00:41:58Z</lastmod>
  <image:image>
   <image:loc>https://codigoycontexto.blog/wp-content/uploads/2026/05/IA-agentica-El-salto-del-chat-a-la-ejecucion-autonoma-1.jpeg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://codigoycontexto.blog/bluesky-la-descentralizacion-del-dominio-como-identidad-2/</loc>
  <lastmod>2026-05-18T01:30:54Z</lastmod>
  <image:image>
   <image:loc>https://codigoycontexto.blog/wp-content/uploads/2026/05/Bluesky-La-descentralizacion-del-dominio-como-identidad-1.jpeg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://codigoycontexto.blog/2026/05/19/gemini-3-5-flash-ia-programacion/</loc>
  <lastmod>2026-05-20T03:48:10Z</lastmod>
  <image:image>
   <image:loc>https://codigoycontexto.blog/wp-content/uploads/2026/05/Sundar-Pichai-en-la-inaguracion-del-Google-IO-2026-presento-Gemini-3.5-Flash-y-Omni.jpeg</image:loc>
  </image:image>
 </url>
</urlset>
