{"version":"1.0","provider_name":"RiskInsight","provider_url":"https:\/\/www.riskinsight-wavestone.com\/en\/","title":"Service desk : les cl\u00e9s de l\u2019optimisation ! - RiskInsight","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"ANN2ntFTL3\"><a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/08\/service-desk-les-cles-de-loptimisation\/\">Service desk : les cl\u00e9s de l\u2019optimisation !<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/08\/service-desk-les-cles-de-loptimisation\/embed\/#?secret=ANN2ntFTL3\" width=\"600\" height=\"338\" title=\"&#8220;Service desk : les cl\u00e9s de l\u2019optimisation !&#8221; &#8212; RiskInsight\" data-secret=\"ANN2ntFTL3\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.riskinsight-wavestone.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite1.jpg","thumbnail_width":573,"thumbnail_height":214,"description":"D\u00e9ploy\u00e9 largement dans les entreprises, le service desk n\u2019est pas une fonction r\u00e9cente au sein de la DSI. Pour autant, dans un contexte de recherche d\u2019\u00e9conomies et d\u2019efficacit\u00e9, bon nombre d\u2019organisations s\u2019interrogent sur les optimisations qui peuvent \u00eatre atteintes tant..."}