{"id":6776,"date":"2015-01-06T14:06:36","date_gmt":"2015-01-06T13:06:36","guid":{"rendered":"http:\/\/www.solucom-insight.fr\/?p=6776"},"modified":"2015-02-05T17:34:09","modified_gmt":"2015-02-05T16:34:09","slug":"vers-le-software-defined-everything","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/01\/vers-le-software-defined-everything\/","title":{"rendered":"Vers le \u00ab Software Defined Everything \u00bb ?"},"content":{"rendered":"<p><em>Depuis le boom de la virtualisation, base du Cloud computing, le mouvement s\u2019acc\u00e9l\u00e8re dans les r\u00e9seaux. Apr\u00e8s le Software Defined Networking arrivent toutes les autres d\u00e9clinaisons : Software Defined Datacenter, Software Defined Servers, Software Defined Storage\u2026 effet de mode ou vraie \u00e9volution\u00a0? Quels sont les moteurs de ce mouvement\u00a0?<\/em><\/p>\n<h2>SDx : tour d\u2019horizon des d\u00e9clinaisons du \u00ab\u00a0Software Defined\u00a0\u00bb<\/h2>\n<p>Le <em><a href=\"http:\/\/www.solucominsight.fr\/2013\/10\/le-sdn-ce-quil-faut-savoir-sur-le-cisco-killer\/\">Software Defined Networking<\/a> <\/em>est le premier acronyme du lot \u00e0 avoir fait parler de lui. Il introduit un pilotage du r\u00e9seau par une intelligence centralis\u00e9e (le contr\u00f4leur), le traitement restant \u00e9tant effectu\u00e9 par les \u00e9quipements r\u00e9seaux (qu\u2019ils soient mat\u00e9riels ou logiciels).<\/p>\n<p>Dans la lign\u00e9e, le<em> <a href=\"http:\/\/snia.org\/sites\/default\/files\/SNIA%20Software%20Defined%20Storage%20White%20Paper-%20v1.0k-DRAFT.pdf\">Software Defined Storage<\/a><\/em>, ajoute une couche de virtualisation au-dessus du stockage. De la virtualisation existe d\u00e9j\u00e0 dans cet univers \u00a0au sein des baies mais le concept est ici \u00e9tendu pour couvrir le stockage dans son ensemble. Les VSA (<em>Virtual Storage Appliances<\/em>) en sont un exemple.<\/p>\n<p>Le terme <em>Software Defined Servers<\/em>, quant \u00e0 lui,\u00a0 fait aujourd\u2019hui l\u2019objet d&#8217;un d\u00e9bat\u2026 On devrait pouvoir ranger dans cette cat\u00e9gorie tous les hyperviseurs du march\u00e9. \u00a0Le concept a cependant \u00e9volu\u00e9 et est sans doute un peu \u00e0 rapprocher du concept de SDN maintenant : l\u2019id\u00e9e est de piloter des ressources mat\u00e9rielles depuis une intelligence centralis\u00e9e pour instancier des serveurs et g\u00e9rer leurs ressources.<\/p>\n<p>Enfin, le <em>Software Defined Datacenter<\/em> agr\u00e8ge les diff\u00e9rentes techniques de virtualisation pour fournir un service complet de type ITaaS<\/p>\n<p><b>Toutes ces d\u00e9clinaisons ont un point commun : retirer de l\u2019intelligence du mat\u00e9riel pour la porter sur du logiciel, support\u00e9 en g\u00e9n\u00e9ral par du mat\u00e9riel courant <\/b>(<em>commodity hardware<\/em>) type serveur x86\u2026 l\u2019\u00e9volution technologique fait surtout (re)surgir des rivalit\u00e9s entre acteurs. La bataille entre les vendeurs de mat\u00e9riel et \u00e9diteurs de logiciels est plus \u00e2pre que jamais, chacun voulant soit prot\u00e9ger ses parts de march\u00e9 actuelles, soit s\u2019imposer sur ce nouveau march\u00e9 qui explose\u2026<\/p>\n<h2>Nouveau d\u00e9bat ou opposition r\u00e9currente\u00a0?<\/h2>\n<p>La rivalit\u00e9 entre les codeurs et les fondeurs de semi-conducteurs ne date pas d\u2019hier, et n\u2019est pas pr\u00e8s de s\u2019\u00e9teindre, et en fait on observe un balancier rythm\u00e9 par les \u00e9volutions technologiques, que ce soit dans les logiciels et les CPU ou bien dans les mat\u00e9riels sp\u00e9cialis\u00e9s, et notamment dans les r\u00e9seaux.<\/p>\n<p>Des affrontements ont donc r\u00e9guli\u00e8rement lieu entre d\u00e9fenseurs du mat\u00e9riel, principalement pour des raisons de performance, et d\u00e9fenseurs du logiciel, pour la souplesse. Ce type de d\u00e9bat a exist\u00e9 \u00e9galement pour les processeurs o\u00f9 s\u2019opposent \u00a0CPU et ASIC (<em><a href=\"http:\/\/fr.wikipedia.org\/wiki\/Application-specific_integrated_circuit\">Application Specific Integrated Circuit<\/a><\/em>), le circuit int\u00e9gr\u00e9 polyvalent mais lent face au circuit int\u00e9gr\u00e9 sp\u00e9cialis\u00e9 et tr\u00e8s rapide car \u00ab\u00a0c\u00e2bl\u00e9\u00a0\u00bb pour faire en une seule op\u00e9ration ce que le CPU fera en de multiples op\u00e9rations.<\/p>\n<p>Dans le domaine des infrastructures r\u00e9seaux et s\u00e9curit\u00e9 on pourrait \u00e9galement faire r\u00e9f\u00e9rence aux affrontements historiques sur les routeurs (Cisco contre Extreme Networks ou Juniper) ou les pare-feu (Checkpoint contre Netscreen, rachet\u00e9 par Juniper depuis).<\/p>\n<h2>Toujours un m\u00eame <em>driver<\/em>\u00a0: vers plus d\u2019intelligence et de souplesse\u2026<\/h2>\n<p>La forte augmentation de la puissance des CPU x86 ces derniers temps les a amen\u00e9s \u00e0 embarquer un certain nombre de produits auparavant uniquement sous la forme de mat\u00e9riels vers une forme logicielle dans des hyperviseurs. Cette abstraction permet non seulement de ne plus \u00eatre retreint par les possibilit\u00e9s du mat\u00e9riel, et donc d\u2019apporter plus d\u2019intelligence ais\u00e9ment, mais aussi un fort gain de souplesse\u00a0: l\u2019ajout de composants virtuels ne requ\u00e9rant aucune installation physique ni c\u00e2blage.<\/p>\n<p>Au-del\u00e0 des serveurs c\u2019est \u00e9galement le cas des pare-feu ou des \u00e9quilibreurs de charge\u00a0: F5, Radware et Citrix par exemple fournissent tous des versions en mode \u00ab virtual appliance\u00a0\u00bb.<\/p>\n<h2>\u2026mais pas au d\u00e9triment des performances\u00a0!<\/h2>\n<p>Ce qui est vrai dans les domaines ayant des traitements complexes ne l\u2019est pas forc\u00e9ment dans des domaines n\u00e9cessitant de tr\u00e8s fortes performances brutes, comme les r\u00e9seaux. M\u00eame les processeurs les plus r\u00e9cents ont du mal \u00e0 suivre les d\u00e9bits du 10Gbs et encore plus du 40Gbps et du 100Gbps<\/p>\n<p>Le logiciel a un gros avantage : la souplesse. Il est en effet bien plus simple de modifier quelques lignes de codes qu\u2019ajouter des connexions cuivre et des transistors dans un ASIC. N\u00e9anmoins ce qu\u2019un CPU fait en 20 ou 50 cycles d\u2019horloge un composant sp\u00e9cialis\u00e9 peut le faire en 1\u00a0! C\u2019est ici qu\u2019interviennent les FPGA (<em><a href=\"http:\/\/fr.wikipedia.org\/wiki\/Circuit_logique_programmable\">Field Programmable Gate Array<\/a><\/em>) : ces ASICs reprogrammables donnent une petite marge de man\u0153uvre pour faire \u00e9voluer les fonctionnalit\u00e9s offertes par le mat\u00e9riel et tous les mat\u00e9riels modernes les int\u00e8grent afin d\u2019arriver \u00e0 r\u00e9concilier performances et souplesse.<\/p>\n<p><b>Au-del\u00e0 du cycle, une tendance se d\u00e9gage donc : la solution doit pouvoir \u00e9voluer avec les besoins, qu\u2019elle soit logicielle ou mat\u00e9rielle, et les \u00e9quipements mat\u00e9riels non reprogrammables seront cantonn\u00e9s \u00e0 des utilisations sp\u00e9cifiques<\/b><\/p>\n<h2>Vers le \u00ab <em>Software Defined Everything<\/em> \u00bb oui, mais ne pas confondre \u00ab <em>Software Defined<\/em> \u00bb et \u00ab <em>Software Only<\/em> \u00bb !<\/h2>\n<p>Les solutions tout logiciel ne tiendront pas les performances n\u00e9cessaires et \u00e0 l\u2019inverse les solutions tout mat\u00e9riel ne tiendront pas les promesses de souplesse demand\u00e9es par les SI de demain.<\/p>\n<p><b>Dans la r\u00e9alit\u00e9 un compromis entre logiciel et mat\u00e9riel est \u00e9videmment obligatoire <\/b>: du logiciel pour la souplesse et du mat\u00e9riel pour les performances\u2026 et c\u2019est typiquement toute la logique derri\u00e8re le <em>Software Defined Networking<\/em>, qui laisse au logiciel le soin de piloter du mat\u00e9riel \u00e0 hautes performances.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Depuis le boom de la virtualisation, base du Cloud computing, le mouvement s\u2019acc\u00e9l\u00e8re dans les r\u00e9seaux. Apr\u00e8s le Software Defined Networking arrivent toutes les autres d\u00e9clinaisons : Software Defined Datacenter, Software Defined Servers, Software Defined Storage\u2026 effet de mode ou&#8230;<\/p>\n","protected":false},"author":128,"featured_media":6778,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[35],"tags":[983,1778,1367,1779,1780],"coauthors":[985],"class_list":["post-6776","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-strategie-projets-it","tag-sdn","tag-software-defined-datacenter","tag-software-defined-networking","tag-software-defined-server","tag-software-defined-storage"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vers le \u00ab Software Defined Everything \u00bb ? - RiskInsight<\/title>\n<meta name=\"description\" content=\"Depuis le boom de la virtualisation, le mouvement s\u2019acc\u00e9l\u00e8re dans les r\u00e9seaux. Apr\u00e8s le Software Defined Networking arrivent toutes les autres d\u00e9clinaisons.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/vers-le-software-defined-everything\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vers le \u00ab Software Defined Everything \u00bb ? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Depuis le boom de la virtualisation, le mouvement s\u2019acc\u00e9l\u00e8re dans les r\u00e9seaux. Apr\u00e8s le Software Defined Networking arrivent toutes les autres d\u00e9clinaisons.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/vers-le-software-defined-everything\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2015-01-06T13:06:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-02-05T16:34:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/01\/Robert-Kotsch-Fotolia.com_.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"843\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pierre-Charles Wagrez\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pierre-Charles Wagrez\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/vers-le-software-defined-everything\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/vers-le-software-defined-everything\/\"},\"author\":{\"name\":\"Pierre-Charles Wagrez\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/cb5cb0a80835ed351f2556a51ca0d4bb\"},\"headline\":\"Vers le \u00ab Software Defined Everything \u00bb ?\",\"datePublished\":\"2015-01-06T13:06:36+00:00\",\"dateModified\":\"2015-02-05T16:34:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/vers-le-software-defined-everything\/\"},\"wordCount\":963,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/vers-le-software-defined-everything\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/01\/Robert-Kotsch-Fotolia.com_.jpg\",\"keywords\":[\"SDN\",\"Software Defined Datacenter\",\"Software Defined Networking\",\"Software Defined Server\",\"Software Defined Storage\"],\"articleSection\":[\"M\u00e9tiers - Strat\u00e9gie &amp; projets IT\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/vers-le-software-defined-everything\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/vers-le-software-defined-everything\/\",\"name\":\"Vers le \u00ab Software Defined Everything \u00bb ? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/vers-le-software-defined-everything\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/vers-le-software-defined-everything\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/01\/Robert-Kotsch-Fotolia.com_.jpg\",\"datePublished\":\"2015-01-06T13:06:36+00:00\",\"dateModified\":\"2015-02-05T16:34:09+00:00\",\"description\":\"Depuis le boom de la virtualisation, le mouvement s\u2019acc\u00e9l\u00e8re dans les r\u00e9seaux. Apr\u00e8s le Software Defined Networking arrivent toutes les autres d\u00e9clinaisons.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/vers-le-software-defined-everything\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/vers-le-software-defined-everything\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/vers-le-software-defined-everything\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/01\/Robert-Kotsch-Fotolia.com_.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/01\/Robert-Kotsch-Fotolia.com_.jpg\",\"width\":1500,\"height\":843},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/vers-le-software-defined-everything\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vers le \u00ab Software Defined Everything \u00bb ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/cb5cb0a80835ed351f2556a51ca0d4bb\",\"name\":\"Pierre-Charles Wagrez\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/pierre-charles-wagrez\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vers le \u00ab Software Defined Everything \u00bb ? - RiskInsight","description":"Depuis le boom de la virtualisation, le mouvement s\u2019acc\u00e9l\u00e8re dans les r\u00e9seaux. Apr\u00e8s le Software Defined Networking arrivent toutes les autres d\u00e9clinaisons.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/vers-le-software-defined-everything\/","og_locale":"en_US","og_type":"article","og_title":"Vers le \u00ab Software Defined Everything \u00bb ? - RiskInsight","og_description":"Depuis le boom de la virtualisation, le mouvement s\u2019acc\u00e9l\u00e8re dans les r\u00e9seaux. Apr\u00e8s le Software Defined Networking arrivent toutes les autres d\u00e9clinaisons.","og_url":"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/vers-le-software-defined-everything\/","og_site_name":"RiskInsight","article_published_time":"2015-01-06T13:06:36+00:00","article_modified_time":"2015-02-05T16:34:09+00:00","og_image":[{"width":1500,"height":843,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/01\/Robert-Kotsch-Fotolia.com_.jpg","type":"image\/jpeg"}],"author":"Pierre-Charles Wagrez","twitter_misc":{"Written by":"Pierre-Charles Wagrez","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/vers-le-software-defined-everything\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/vers-le-software-defined-everything\/"},"author":{"name":"Pierre-Charles Wagrez","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/cb5cb0a80835ed351f2556a51ca0d4bb"},"headline":"Vers le \u00ab Software Defined Everything \u00bb ?","datePublished":"2015-01-06T13:06:36+00:00","dateModified":"2015-02-05T16:34:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/vers-le-software-defined-everything\/"},"wordCount":963,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/vers-le-software-defined-everything\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/01\/Robert-Kotsch-Fotolia.com_.jpg","keywords":["SDN","Software Defined Datacenter","Software Defined Networking","Software Defined Server","Software Defined Storage"],"articleSection":["M\u00e9tiers - Strat\u00e9gie &amp; projets IT"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/vers-le-software-defined-everything\/","url":"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/vers-le-software-defined-everything\/","name":"Vers le \u00ab Software Defined Everything \u00bb ? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/vers-le-software-defined-everything\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/vers-le-software-defined-everything\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/01\/Robert-Kotsch-Fotolia.com_.jpg","datePublished":"2015-01-06T13:06:36+00:00","dateModified":"2015-02-05T16:34:09+00:00","description":"Depuis le boom de la virtualisation, le mouvement s\u2019acc\u00e9l\u00e8re dans les r\u00e9seaux. Apr\u00e8s le Software Defined Networking arrivent toutes les autres d\u00e9clinaisons.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/vers-le-software-defined-everything\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2015\/01\/vers-le-software-defined-everything\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/vers-le-software-defined-everything\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/01\/Robert-Kotsch-Fotolia.com_.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/01\/Robert-Kotsch-Fotolia.com_.jpg","width":1500,"height":843},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/01\/vers-le-software-defined-everything\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Vers le \u00ab Software Defined Everything \u00bb ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/cb5cb0a80835ed351f2556a51ca0d4bb","name":"Pierre-Charles Wagrez","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/pierre-charles-wagrez\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/6776","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/128"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=6776"}],"version-history":[{"count":2,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/6776\/revisions"}],"predecessor-version":[{"id":7127,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/6776\/revisions\/7127"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/6778"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=6776"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=6776"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=6776"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=6776"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}