{"version":"1.0","provider_name":"RiskInsight","provider_url":"https:\/\/www.riskinsight-wavestone.com\/en\/","title":"Application management : quels fondamentaux ?","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"HVm8pjCWjp\"><a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/10\/application-management-quels-fondamentaux\/\">Application management : quels fondamentaux ?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/10\/application-management-quels-fondamentaux\/embed\/#?secret=HVm8pjCWjp\" width=\"600\" height=\"338\" title=\"&#8220;Application management : quels fondamentaux ?&#8221; &#8212; RiskInsight\" data-secret=\"HVm8pjCWjp\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.riskinsight-wavestone.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":null,"thumbnail_width":null,"thumbnail_height":null,"description":"Dans les d\u00e9marches d\u2019optimisation des directions informatiques, la conduite applicative (ou application management) fait souvent d\u00e9bat. Soucieuses de rationaliser les activit\u00e9s c\u0153ur de leur SI, les DSI pistent en effet les redondances, industrialisent les activit\u00e9s voire les externalisent\u2026 Et si la conduite applicative doit \u00eatre optimis\u00e9e, il est en revanche n\u00e9cessaire d\u2019analyser avec finesse ses activit\u00e9s pour le faire intelligemment. Comment r\u00e9partir les responsabilit\u00e9s sur ces activit\u00e9s ? Y-a-t-il des crit\u00e8res \u00e0 respecter ? Ou encore un type d\u2019organisation particulier \u00e0 adopter?"}