San Pedro de Quemes

San Pedro de Quemes is a village in Potosí Department, Bolivia .

Understand

San Pedro de Quemes is one of the points of refuelling & resupply around Salar de Uyuni.

You can get Internet access in the municipal centre that is on the east side of the main square. You can find limited groceries - no fresh fruit or vegetables to speak of, but plenty of cookies, pasta, tuna, sauces, long life juices and eggs.

There is a bakery that prepares bread every day but you need to order your bread in advance. This lies close to the southern edge of town, ask around or check out OpenStreetMap for its exact location.

Get in

The roads that lead to/from San Pedro de Quemes are mapped in OpenStreetMap. They include an approach from the south that links to the "International Road", a road leading to San Juan and a smaller road leading to Salar de Uyuni.

Get around

San Pedro de Quemes is small enough to walk around on foot.

See

  • Pueblo Quemado, the ruined village on the top of the hill.
  • The local museum

Do

Buy

Eat

Meals can be prepared for you if you ask in advance. Do not expect a turn-up-and-eat restaurant, because you will find none.

Drink

Sleep

There are at least two hotels.

  • The expensive one (100 USD per night) on the top of the hill.
  • The inexpensive one (50 BOB per night) lies on the southern edge of the town, right next to the football field.

Connect

Go next

You will probably need to arrange your own transportation. Guided tours with 4x4 vehicles use San Pedro de Quemes as an overnight stop, so ask them if they have room for you.

gollark: If living programmers remain, they will be neurally scanned and their memories used to reassemble site code. Alternatively, the contents of their neural scan can be backfilled from public (or nonpublic) data.
gollark: In this case it may become necessary to simulate the universe backward such that you attain a time when the site existed.
gollark: Now, of course, the servers it finds may not or no longer contain the site code, in which case it can try data recovery operations or piece it together from logs.
gollark: In parallel, it can attempt to access governmental IP traffic logs and find historical copies of the site to use.
gollark: If no exploitable vulnerabilities are found the next step is to launch a physical layer assault to access the servers in question.
This article is issued from Wikivoyage. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.