{"id":224,"date":"2011-03-21T14:40:53","date_gmt":"2011-03-21T13:40:53","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=224"},"modified":"2015-01-21T09:59:05","modified_gmt":"2015-01-21T08:59:05","slug":"2010-ou-laffirmation-du-cloud-computing","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/03\/2010-ou-laffirmation-du-cloud-computing\/","title":{"rendered":"L\u2019affirmation du Cloud computing : un changement de dimension pour l&#8217;architecture en 2011"},"content":{"rendered":"<p>L\u2019ann\u00e9e 2010 aura \u00e9t\u00e9 marqu\u00e9e par l\u2019essor et la diversification des offres \u00ab\u00a0Cloud\u00a0\u00bb. Mise \u00e0 disposition d\u2019infrastructures, de plates-formes, de bases de donn\u00e9es ou encore d\u2019applications, l\u2019offre englob\u00e9e dans le nuage est vaste. Et cette tendance n\u2019est pas pr\u00eate de s\u2019arr\u00eater \u00e0 en voir la vitesse avec laquelle les acteurs majeurs du march\u00e9 se positionnent (Microsoft, Amazon, Google, etc.).<\/p>\n<p><!--more-->Il faut dire que le <em>Cloud<\/em> pourrait bien r\u00e9soudre certains des casse-t\u00eates r\u00e9currents des directions m\u00e9tiers et des DSI\u00a0: r\u00e9duction drastique des d\u00e9lais de mise en \u0153uvre (la mise en ligne d\u2019un serveur chez certains offreurs prend moins de dix minutes\u00a0!), meilleure ma\u00eetrise des co\u00fbts du fait d\u2019une facturation \u00e0 la consommation, rationalisation du SI et renforcement des engagements entre les diff\u00e9rentes fonctions du SI.<\/p>\n<p>Au-del\u00e0 des slogans, 2010 aura donc vu Le <em>Cloud<\/em> s\u2019affirmer comme une tendance de fond qui risque de modifier profond\u00e9ment le paysage des SI dans les ann\u00e9es \u00e0 venir\u2026. et l\u2019architecture d\u2019entreprise.<\/p>\n<h2>Une nouvelle dimension pour l\u2019architecture<\/h2>\n<p>Aujourd\u2019hui en charge d\u2019op\u00e9rer les diff\u00e9rentes strates du SI, la DSI sera demain un agr\u00e9gateur de services fournis par des tiers, lui permettant par ailleurs de se concentrer sur les applications c\u0153ur de m\u00e9tier demeur\u00e9s hors du <em>Cloud<\/em> &#8211; pour des raisons de ma\u00eetrise du risque op\u00e9rationnel.<\/p>\n<p>Les architectes auront pour nouvelle mission de ma\u00eetriser tant sur le plan fonctionnel que technique l\u2019\u00e9clatement et le morcellement du SI, tout en essayant de tirer le maximum de b\u00e9n\u00e9fices du <em>Cloud.<\/em><\/p>\n<h2>Nouveau mod\u00e8le, nouvelles r\u00e8gles du jeu<\/h2>\n<p>Ce mouvement d\u00e9clench\u00e9 par le <em>Cloud<\/em> commence d\u00e9j\u00e0 \u00e0 bousculer les rapports de force entre m\u00e9tiers et la DSI &#8211; mais \u00e9galement au sein de la DSI m\u00eame. Ainsi, l\u2019architecte aura \u2013t-il demain pour mission de rendre les offres de services plus comp\u00e9titives tout en garantissant la coh\u00e9rence du SI quelles que soient les orientations retenues. Les architectes interviendront beaucoup plus en amont sur des phases cl\u00e9s, notamment lors de l\u2019arbitrage entre internalisation et externalisation ou encore lors de la contractualisation avec des tiers pour imposer les contraintes d\u2019int\u00e9gration au SI.<\/p>\n<p>La fonction Architecture va de fait progressivement passer d\u2019une dimension projet \u00e0 une dimension Entreprise renfor\u00e7ant ainsi sa contribution \u00e0 la strat\u00e9gie SI.<\/p>\n<h2>Un changement de r\u00f4le<\/h2>\n<p>Au-del\u00e0 des aspects organisationnels, les architectes vont avoir la responsabilit\u00e9 de piloter l\u2019\u00e9volution des services d\u2019infrastructure existants pour pr\u00e9parer l\u2019arriv\u00e9e du <em>Cloud<\/em>.<\/p>\n<p>En priorit\u00e9, il s\u2019agit d\u2019ouvrir le SI pour faciliter l\u2019int\u00e9gration des offres <em>Cloud<\/em> sans compromettre pour autant la s\u00e9curit\u00e9 de l\u2019entreprise et la performance du SI. Ensuite, ce sont les services d\u2019infrastructure existants impliqu\u00e9s dans la cha\u00eene de liaison avec le <em>Cloud<\/em> qui doivent \u00eatre repens\u00e9s et optimis\u00e9s (plates-formes d\u2019\u00e9change internes, briques de s\u00e9curit\u00e9, etc.). Enfin, pour perdurer, les offres historiques de la DSI (comme la mise \u00e0 disposition de serveurs) doivent \u00e9voluer pour offrir une r\u00e9ponse diff\u00e9renci\u00e9e aux offres <em>Cloud<\/em>.<\/p>\n<p>A la diff\u00e9rence de pr\u00e9c\u00e9dentes \u00e9volutions du monde IT (la SOA par exemple), le tournant vers le <em>Cloud<\/em> peut r\u00e9ellement \u00eatre amorc\u00e9 sur des projets de petite taille et sans risque, le co\u00fbt d\u2019entr\u00e9e \u00e9tant relativement faible. N\u00e9anmoins, pour installer plus durablement le <em>Cloud<\/em> dans le paysage de l\u2019Entreprise, il faudra viser des projets plus structurants de transformation du SI.<\/p>\n<h2>Une n\u00e9cessit\u00e9\u00a0: adopter une vision transverse, de l\u2019architecture fonctionnelle jusqu\u2019\u00e0 l\u2019infrastructure technique<\/h2>\n<p>Au-del\u00e0 du positionnement de la fonction architecture au c\u0153ur du triptyque M\u00e9tier\/\u00c9tudes\/Production, l\u2019architecte devra veiller \u00e0 b\u00e2tir et promouvoir un socle IT sous forme d\u2019offre de services qui r\u00e9pond aux exigences de performance et de s\u00e9curit\u00e9 demand\u00e9es par le m\u00e9tier. Pour r\u00e9ussir dans cette mission, les architectes sont amen\u00e9s \u00e0 couvrir, de mani\u00e8re coh\u00e9rente, un spectre allant des services fonctionnels jusqu\u2019aux services d\u2019infrastructure.<\/p>\n<p>Avec le <em>Cloud<\/em>, cette mission sera demain \u00e0 la fois plus complexe \u00e0 r\u00e9aliser mais \u00e9galement plus cruciale pour l\u2019entreprise.<\/p>\n<p>Pour en savoir plus sur le Cloud Computing, lire le dernier <a title=\"Lire le Focus Solucom\" href=\"http:\/\/www.solucom.fr\/file\/download\/2767\" target=\"_blank\">Focus Solucom : &#8221; Cloud computing, comment en tirer parti&#8221; ?<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>L\u2019ann\u00e9e 2010 aura \u00e9t\u00e9 marqu\u00e9e par l\u2019essor et la diversification des offres \u00ab\u00a0Cloud\u00a0\u00bb. Mise \u00e0 disposition d\u2019infrastructures, de plates-formes, de bases de donn\u00e9es ou encore d\u2019applications, l\u2019offre englob\u00e9e dans le nuage est vaste. Et cette tendance n\u2019est pas pr\u00eate de&#8230;<\/p>\n","protected":false},"author":28,"featured_media":6343,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[35],"tags":[120,44,121],"coauthors":[797],"class_list":["post-224","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-strategie-projets-it","tag-architecture-si-2","tag-cloud-computing","tag-infrastructure-technique"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>L\u2019affirmation du Cloud computing : un changement de dimension pour l&#039;architecture en 2011 - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/03\/2010-ou-laffirmation-du-cloud-computing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"L\u2019affirmation du Cloud computing : un changement de dimension pour l&#039;architecture en 2011 - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"L\u2019ann\u00e9e 2010 aura \u00e9t\u00e9 marqu\u00e9e par l\u2019essor et la diversification des offres \u00ab\u00a0Cloud\u00a0\u00bb. Mise \u00e0 disposition d\u2019infrastructures, de plates-formes, de bases de donn\u00e9es ou encore d\u2019applications, l\u2019offre englob\u00e9e dans le nuage est vaste. Et cette tendance n\u2019est pas pr\u00eate de...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/03\/2010-ou-laffirmation-du-cloud-computing\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2011-03-21T13:40:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-01-21T08:59:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"573\" \/>\n\t<meta property=\"og:image:height\" content=\"214\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Emmanuel Arnaudin\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Emmanuel Arnaudin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/03\/2010-ou-laffirmation-du-cloud-computing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/03\/2010-ou-laffirmation-du-cloud-computing\/\"},\"author\":{\"name\":\"Emmanuel Arnaudin\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/cef9650be7f779508e65ef18170890cd\"},\"headline\":\"L\u2019affirmation du Cloud computing : un changement de dimension pour l&#8217;architecture en 2011\",\"datePublished\":\"2011-03-21T13:40:53+00:00\",\"dateModified\":\"2015-01-21T08:59:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/03\/2010-ou-laffirmation-du-cloud-computing\/\"},\"wordCount\":753,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/03\/2010-ou-laffirmation-du-cloud-computing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"keywords\":[\"architecture Si\",\"Cloud computing\",\"infrastructure technique\"],\"articleSection\":[\"M\u00e9tiers - Strat\u00e9gie &amp; projets IT\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/03\/2010-ou-laffirmation-du-cloud-computing\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/03\/2010-ou-laffirmation-du-cloud-computing\/\",\"name\":\"L\u2019affirmation du Cloud computing : un changement de dimension pour l'architecture en 2011 - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/03\/2010-ou-laffirmation-du-cloud-computing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/03\/2010-ou-laffirmation-du-cloud-computing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"datePublished\":\"2011-03-21T13:40:53+00:00\",\"dateModified\":\"2015-01-21T08:59:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/03\/2010-ou-laffirmation-du-cloud-computing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/03\/2010-ou-laffirmation-du-cloud-computing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/03\/2010-ou-laffirmation-du-cloud-computing\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"width\":573,\"height\":214},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/03\/2010-ou-laffirmation-du-cloud-computing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"L\u2019affirmation du Cloud computing : un changement de dimension pour l&#8217;architecture en 2011\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/cef9650be7f779508e65ef18170890cd\",\"name\":\"Emmanuel Arnaudin\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/emmanuel-arnaudin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"L\u2019affirmation du Cloud computing : un changement de dimension pour l'architecture en 2011 - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/03\/2010-ou-laffirmation-du-cloud-computing\/","og_locale":"en_US","og_type":"article","og_title":"L\u2019affirmation du Cloud computing : un changement de dimension pour l'architecture en 2011 - RiskInsight","og_description":"L\u2019ann\u00e9e 2010 aura \u00e9t\u00e9 marqu\u00e9e par l\u2019essor et la diversification des offres \u00ab\u00a0Cloud\u00a0\u00bb. Mise \u00e0 disposition d\u2019infrastructures, de plates-formes, de bases de donn\u00e9es ou encore d\u2019applications, l\u2019offre englob\u00e9e dans le nuage est vaste. Et cette tendance n\u2019est pas pr\u00eate de...","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/03\/2010-ou-laffirmation-du-cloud-computing\/","og_site_name":"RiskInsight","article_published_time":"2011-03-21T13:40:53+00:00","article_modified_time":"2015-01-21T08:59:05+00:00","og_image":[{"width":573,"height":214,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","type":"image\/jpeg"}],"author":"Emmanuel Arnaudin","twitter_misc":{"Written by":"Emmanuel Arnaudin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/03\/2010-ou-laffirmation-du-cloud-computing\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/03\/2010-ou-laffirmation-du-cloud-computing\/"},"author":{"name":"Emmanuel Arnaudin","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/cef9650be7f779508e65ef18170890cd"},"headline":"L\u2019affirmation du Cloud computing : un changement de dimension pour l&#8217;architecture en 2011","datePublished":"2011-03-21T13:40:53+00:00","dateModified":"2015-01-21T08:59:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/03\/2010-ou-laffirmation-du-cloud-computing\/"},"wordCount":753,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/03\/2010-ou-laffirmation-du-cloud-computing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","keywords":["architecture Si","Cloud computing","infrastructure technique"],"articleSection":["M\u00e9tiers - Strat\u00e9gie &amp; projets IT"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/03\/2010-ou-laffirmation-du-cloud-computing\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/03\/2010-ou-laffirmation-du-cloud-computing\/","name":"L\u2019affirmation du Cloud computing : un changement de dimension pour l'architecture en 2011 - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/03\/2010-ou-laffirmation-du-cloud-computing\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/03\/2010-ou-laffirmation-du-cloud-computing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","datePublished":"2011-03-21T13:40:53+00:00","dateModified":"2015-01-21T08:59:05+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/03\/2010-ou-laffirmation-du-cloud-computing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2011\/03\/2010-ou-laffirmation-du-cloud-computing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/03\/2010-ou-laffirmation-du-cloud-computing\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","width":573,"height":214},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/03\/2010-ou-laffirmation-du-cloud-computing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"L\u2019affirmation du Cloud computing : un changement de dimension pour l&#8217;architecture en 2011"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/cef9650be7f779508e65ef18170890cd","name":"Emmanuel Arnaudin","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/emmanuel-arnaudin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/224","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=224"}],"version-history":[{"count":16,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/224\/revisions"}],"predecessor-version":[{"id":6550,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/224\/revisions\/6550"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/6343"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=224"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=224"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=224"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=224"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}