{"id":4442,"date":"2013-10-28T13:55:58","date_gmt":"2013-10-28T12:55:58","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=4442"},"modified":"2015-08-17T09:38:34","modified_gmt":"2015-08-17T08:38:34","slug":"application-management-quels-fondamentaux","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/10\/application-management-quels-fondamentaux\/","title":{"rendered":"Application management : quels fondamentaux ?"},"content":{"rendered":"<p><em>Dans les d\u00e9marches d\u2019optimisation des directions informatiques, la conduite applicative (ou application management) fait souvent d\u00e9bat. Soucieuses de rationaliser les activit\u00e9s c\u0153ur de leur SI, les DSI pistent en effet les redondances, industrialisent les activit\u00e9s voire les externalisent\u2026 Et si la conduite applicative doit \u00eatre optimis\u00e9e, il est en revanche n\u00e9cessaire d\u2019analyser avec finesse ses activit\u00e9s pour le faire intelligemment. Comment r\u00e9partir les responsabilit\u00e9s sur ces activit\u00e9s\u00a0? Y-a-t-il des crit\u00e8res \u00e0 respecter\u00a0? Ou encore un type d\u2019organisation particulier\u00a0\u00e0 adopter?<\/em><\/p>\n<h2>\u00a0Des activit\u00e9s au contour bien d\u00e9fini\u2026<\/h2>\n<p>La conduite applicative garantit le bon fonctionnement au quotidien des applications de l\u2019entreprise. Ses activit\u00e9s font appel \u00e0 un panel de comp\u00e9tences large, du savoir-faire technique \u00e0 la connaissance du m\u00e9tier. Elles se scindent en deux cat\u00e9gories\u00a0: <strong>l\u2019exploitation technique<\/strong> et la <strong>conduite fonctionnelle<\/strong>, sp\u00e9cifique \u00e0 chaque application m\u00e9tier.<\/p>\n<p>Les activit\u00e9s d\u2019exploitation sont port\u00e9es par les \u00e9quipes de Production,\u00a0responsables notamment de l\u2019atterrissage des applications dans l\u2019exploitation, l\u2019installation et l\u2019exploitation des composants <em>middleware, <\/em>la mise en place et le maintien en conditions op\u00e9rationnelles du plan de continuit\u00e9 des activit\u00e9s d\u2019exploitation applicative et technique, la supervision de l\u2019ensemble\u2026<\/p>\n<p>Les activit\u00e9s de conduite fonctionnelle sont quant \u00e0 elles assur\u00e9es par les \u00c9tudes et portent sur le c\u0153ur de l\u2019application\u00a0: administration des donn\u00e9es et mise \u00e0 jour du param\u00e9trage applicatif, r\u00e9alisation des \u00e9volutions et corrections demand\u00e9es par le m\u00e9tier, r\u00e9solution d\u2019incidents, etc.<\/p>\n<h2>\u00a0\u2026 mais aux r\u00f4les parfois disput\u00e9s<\/h2>\n<p>C\u2019est autour du plan de production, c\u2019est-\u00e0-dire les traitements p\u00e9riodiques d\u2019une application et ses interactions avec le reste du SI,\u00a0qu\u2019apparaissent les discussions. Il est parfois envisag\u00e9 de confier sa surveillance \u00e0 la Production pour tirer profit de la plage de service souvent \u00e9tendue des \u00e9quipes en charge de la supervision technique du SI.<\/p>\n<p>Mais c\u2019est sans tenir compte de l\u2019incompatibilit\u00e9 entre la surveillance cadenc\u00e9e d\u2019un plan de production et la r\u00e9activit\u00e9 attendue d\u2019un superviseur en cas d\u2019\u00e9v\u00e9nement sur le SI d\u2019une part, et des comp\u00e9tences fonctionnelles requises pour la reprise des flux d\u2019autre part.<\/p>\n<p>Le plus pertinent est sans doute de ne positionner dans les \u00e9quipes de production mutualis\u00e9es que les activit\u00e9s document\u00e9es (proc\u00e9dures) et de confier l\u2019analyse pouss\u00e9e des dysfonctionnements et la reprise des donn\u00e9es et flux\u00a0aux \u00e9quipes en charge de la conduite fonctionnelle.<\/p>\n<h2>\u00a0Qui fait quoi\u00a0: un d\u00e9broussaillage n\u00e9cessaire\u00a0!<\/h2>\n<p>La clarification du positionnement de la conduite applicative peut constituer un v\u00e9ritable levier d\u2019optimisation. Il n\u2019existe pas de mod\u00e8le \u00ab\u00a0unique\u00a0\u00bb pour positionner cette activit\u00e9 qui, au sein d\u2019une entreprise, peut reposer sur divers mod\u00e8les organisationnels en fonction du domaine m\u00e9tier, d\u2019une application ou encore d\u2019une organisation d\u2019un fournisseur.<\/p>\n<p>Une fois ce d\u00e9frichage r\u00e9alis\u00e9, il est important de supprimer les redondances, pour clarifier les p\u00e9rim\u00e8tres de responsabilit\u00e9 entre les \u00c9tudes et la Production et ainsi d\u2019identifier les pistes d\u2019externalisation des activit\u00e9s standard.<\/p>\n<h2><strong>\u00a0<\/strong>Vers quel mod\u00e8le d\u2019organisation \u00e9voluer\u00a0?<\/h2>\n<p>La meilleure formule consiste finalement \u00e0\u00a0 confier plut\u00f4t aux \u00c9tudes la conduite fonctionnelle car ces derniers disposent des comp\u00e9tences fonctionnelles et de la connaissance du m\u00e9tier requise pour ce type d\u2019activit\u00e9s.<\/p>\n<p>L\u2019exploitation technique des applications, c\u00f4t\u00e9 Production, peut de son c\u00f4t\u00e9 reposer sur deux mod\u00e8les diff\u00e9rents. Le premier consiste en une \u00e9quipe unique conservant les comp\u00e9tences d\u2019exploitation des serveurs et <em>middleware.\u00a0<\/em>Le second repose de son c\u00f4t\u00e9 sur deux \u00e9quipes d\u2019exploitation, l\u2019une centr\u00e9e sur les<em> middleware<\/em> et l\u2019autre sur la couche technique (OS et mat\u00e9riel).<\/p>\n<p>Attention cependant\u00a0: quel qu\u2019il soit, le d\u00e9coupage organisationnel doit se retrouver dans le catalogue de services de la DSI : une offre orient\u00e9e &#8220;exploitation technique des applications&#8221; et l\u2019autre &#8220;maintien en conditions op\u00e9rationnelle des applications&#8221;. De ces offres de services d\u00e9coulent naturellement les p\u00e9rim\u00e8tres de responsabilit\u00e9.\u00a0Ces fondamentaux \u00e9tant pos\u00e9s, \u00e0 vous de jouer\u00a0!<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dans les d\u00e9marches d\u2019optimisation des directions informatiques, la conduite applicative (ou application management) fait souvent d\u00e9bat. Soucieuses de rationaliser les activit\u00e9s c\u0153ur de leur SI, les DSI pistent en effet les redondances, industrialisent les activit\u00e9s voire les externalisent\u2026 Et si&#8230;<\/p>\n","protected":false},"author":211,"featured_media":4446,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[35],"tags":[1384,1383,919],"coauthors":[1382,1385],"class_list":["post-4442","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-strategie-projets-it","tag-application-management","tag-conduite-applicative","tag-organisation-de-la-dsi"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Application management : quels fondamentaux ?<\/title>\n<meta name=\"description\" content=\"Dans les d\u00e9marches d\u2019optimisation des directions informatiques, la conduite applicative (ou application management) fait souvent d\u00e9bat. Soucieuses de rationaliser les activit\u00e9s c\u0153ur de leur SI, les DSI pistent en effet les redondances, industrialisent les activit\u00e9s voire les externalisent\u2026 Et si la conduite applicative doit \u00eatre optimis\u00e9e, il est en revanche n\u00e9cessaire d\u2019analyser avec finesse ses activit\u00e9s pour le faire intelligemment. Comment r\u00e9partir les responsabilit\u00e9s sur ces activit\u00e9s ? Y-a-t-il des crit\u00e8res \u00e0 respecter ? Ou encore un type d\u2019organisation particulier \u00e0 adopter?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/application-management-quels-fondamentaux\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Application management : quels fondamentaux ?\" \/>\n<meta property=\"og:description\" content=\"Dans les d\u00e9marches d\u2019optimisation des directions informatiques, la conduite applicative (ou application management) fait souvent d\u00e9bat. Soucieuses de rationaliser les activit\u00e9s c\u0153ur de leur SI, les DSI pistent en effet les redondances, industrialisent les activit\u00e9s voire les externalisent\u2026 Et si la conduite applicative doit \u00eatre optimis\u00e9e, il est en revanche n\u00e9cessaire d\u2019analyser avec finesse ses activit\u00e9s pour le faire intelligemment. Comment r\u00e9partir les responsabilit\u00e9s sur ces activit\u00e9s ? Y-a-t-il des crit\u00e8res \u00e0 respecter ? Ou encore un type d\u2019organisation particulier \u00e0 adopter?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/application-management-quels-fondamentaux\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2013-10-28T12:55:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-08-17T08:38:34+00:00\" \/>\n<meta name=\"author\" content=\"Delphine Cossin, Sarah Maltcheff\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Delphine Cossin, Sarah Maltcheff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/application-management-quels-fondamentaux\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/application-management-quels-fondamentaux\/\"},\"author\":{\"name\":\"Delphine Cossin\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/046b3866ced3905a7a66155b58b6ace6\"},\"headline\":\"Application management : quels fondamentaux ?\",\"datePublished\":\"2013-10-28T12:55:58+00:00\",\"dateModified\":\"2015-08-17T08:38:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/application-management-quels-fondamentaux\/\"},\"wordCount\":714,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/application-management-quels-fondamentaux\/#primaryimage\"},\"thumbnailUrl\":\"\",\"keywords\":[\"application management\",\"conduite applicative\",\"organisation de la DSI\"],\"articleSection\":[\"M\u00e9tiers - Strat\u00e9gie &amp; projets IT\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/application-management-quels-fondamentaux\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/application-management-quels-fondamentaux\/\",\"name\":\"Application management : quels fondamentaux ?\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/application-management-quels-fondamentaux\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/application-management-quels-fondamentaux\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2013-10-28T12:55:58+00:00\",\"dateModified\":\"2015-08-17T08:38:34+00:00\",\"description\":\"Dans les d\u00e9marches d\u2019optimisation des directions informatiques, la conduite applicative (ou application management) fait souvent d\u00e9bat. Soucieuses de rationaliser les activit\u00e9s c\u0153ur de leur SI, les DSI pistent en effet les redondances, industrialisent les activit\u00e9s voire les externalisent\u2026 Et si la conduite applicative doit \u00eatre optimis\u00e9e, il est en revanche n\u00e9cessaire d\u2019analyser avec finesse ses activit\u00e9s pour le faire intelligemment. Comment r\u00e9partir les responsabilit\u00e9s sur ces activit\u00e9s ? Y-a-t-il des crit\u00e8res \u00e0 respecter ? Ou encore un type d\u2019organisation particulier \u00e0 adopter?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/application-management-quels-fondamentaux\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/application-management-quels-fondamentaux\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/application-management-quels-fondamentaux\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/application-management-quels-fondamentaux\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Application management : quels fondamentaux ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/046b3866ced3905a7a66155b58b6ace6\",\"name\":\"Delphine Cossin\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/delphine-cossin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Application management : quels fondamentaux ?","description":"Dans les d\u00e9marches d\u2019optimisation des directions informatiques, la conduite applicative (ou application management) fait souvent d\u00e9bat. Soucieuses de rationaliser les activit\u00e9s c\u0153ur de leur SI, les DSI pistent en effet les redondances, industrialisent les activit\u00e9s voire les externalisent\u2026 Et si la conduite applicative doit \u00eatre optimis\u00e9e, il est en revanche n\u00e9cessaire d\u2019analyser avec finesse ses activit\u00e9s pour le faire intelligemment. Comment r\u00e9partir les responsabilit\u00e9s sur ces activit\u00e9s ? Y-a-t-il des crit\u00e8res \u00e0 respecter ? Ou encore un type d\u2019organisation particulier \u00e0 adopter?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/application-management-quels-fondamentaux\/","og_locale":"en_US","og_type":"article","og_title":"Application management : quels fondamentaux ?","og_description":"Dans les d\u00e9marches d\u2019optimisation des directions informatiques, la conduite applicative (ou application management) fait souvent d\u00e9bat. Soucieuses de rationaliser les activit\u00e9s c\u0153ur de leur SI, les DSI pistent en effet les redondances, industrialisent les activit\u00e9s voire les externalisent\u2026 Et si la conduite applicative doit \u00eatre optimis\u00e9e, il est en revanche n\u00e9cessaire d\u2019analyser avec finesse ses activit\u00e9s pour le faire intelligemment. Comment r\u00e9partir les responsabilit\u00e9s sur ces activit\u00e9s ? Y-a-t-il des crit\u00e8res \u00e0 respecter ? Ou encore un type d\u2019organisation particulier \u00e0 adopter?","og_url":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/application-management-quels-fondamentaux\/","og_site_name":"RiskInsight","article_published_time":"2013-10-28T12:55:58+00:00","article_modified_time":"2015-08-17T08:38:34+00:00","author":"Delphine Cossin, Sarah Maltcheff","twitter_misc":{"Written by":"Delphine Cossin, Sarah Maltcheff","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/application-management-quels-fondamentaux\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/application-management-quels-fondamentaux\/"},"author":{"name":"Delphine Cossin","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/046b3866ced3905a7a66155b58b6ace6"},"headline":"Application management : quels fondamentaux ?","datePublished":"2013-10-28T12:55:58+00:00","dateModified":"2015-08-17T08:38:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/application-management-quels-fondamentaux\/"},"wordCount":714,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/application-management-quels-fondamentaux\/#primaryimage"},"thumbnailUrl":"","keywords":["application management","conduite applicative","organisation de la DSI"],"articleSection":["M\u00e9tiers - Strat\u00e9gie &amp; projets IT"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/application-management-quels-fondamentaux\/","url":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/application-management-quels-fondamentaux\/","name":"Application management : quels fondamentaux ?","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/application-management-quels-fondamentaux\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/application-management-quels-fondamentaux\/#primaryimage"},"thumbnailUrl":"","datePublished":"2013-10-28T12:55:58+00:00","dateModified":"2015-08-17T08:38:34+00:00","description":"Dans les d\u00e9marches d\u2019optimisation des directions informatiques, la conduite applicative (ou application management) fait souvent d\u00e9bat. Soucieuses de rationaliser les activit\u00e9s c\u0153ur de leur SI, les DSI pistent en effet les redondances, industrialisent les activit\u00e9s voire les externalisent\u2026 Et si la conduite applicative doit \u00eatre optimis\u00e9e, il est en revanche n\u00e9cessaire d\u2019analyser avec finesse ses activit\u00e9s pour le faire intelligemment. Comment r\u00e9partir les responsabilit\u00e9s sur ces activit\u00e9s ? Y-a-t-il des crit\u00e8res \u00e0 respecter ? Ou encore un type d\u2019organisation particulier \u00e0 adopter?","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/application-management-quels-fondamentaux\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2013\/10\/application-management-quels-fondamentaux\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/application-management-quels-fondamentaux\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/10\/application-management-quels-fondamentaux\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Application management : quels fondamentaux ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/046b3866ced3905a7a66155b58b6ace6","name":"Delphine Cossin","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/delphine-cossin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/4442","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/211"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=4442"}],"version-history":[{"count":7,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/4442\/revisions"}],"predecessor-version":[{"id":4461,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/4442\/revisions\/4461"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=4442"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=4442"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=4442"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=4442"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}