{"id":7804,"date":"2015-06-24T11:30:34","date_gmt":"2015-06-24T10:30:34","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=7804"},"modified":"2015-06-25T10:41:28","modified_gmt":"2015-06-25T09:41:28","slug":"cloud-computing-les-cas-dusage-de-demain","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/06\/cloud-computing-les-cas-dusage-de-demain\/","title":{"rendered":"Cloud computing : les cas d\u2019usage de demain"},"content":{"rendered":"<p><em>De nombreux grands comptes se sont d\u00e9sormais lanc\u00e9s dans le Cloud public : les outils de gestion de la relation client (CRM), les solutions de collaboration et de communication sont des illustrations flagrantes de la d\u00e9mocratisation du SaaS. L\u2019utilisation de VM ponctuelles et rapidement provisionn\u00e9es, avec ou sans couche logicielle, pour des besoins de d\u00e9veloppement ou de R&amp;D est aujourd\u2019hui largement r\u00e9pandue.<\/em><\/p>\n<p><em>Jusqu\u2019\u00e0 pr\u00e9sent, les principales motivations d\u2019adoption du Cloud computing sont les co\u00fbts (\u00e9conomie et mod\u00e8le) et la flexibilit\u00e9 apport\u00e9e (rapidit\u00e9 de <\/em>provisioning<em>, \u00e9lasticit\u00e9 \u00e0 la demande). L\u2019\u00e9tape suivante pour ces entreprises consistera sans aucun doute \u00e0 se recentrer davantage sur leur c\u0153ur d\u2019activit\u00e9 et \u00e0 apporter plus d\u2019innovation. Voici quelques exemples de cas d\u2019usage de demain.<\/em><\/p>\n<h2>Le <em>Cloud<\/em>\u00a0computing comme incubateur<\/h2>\n<p><a href=\"http:\/\/www.solucominsight.fr\/2014\/01\/les-cles-dune-bonne-strategie-cloud-combiner-approche-tactique-et-vision-strategique\/\">L\u2019un des usages \u00e9mergents est l\u2019utilisation du Cloud public en tant qu\u2019incubateur.<\/a> Prenons le Big data par exemple\u00a0: <a href=\"http:\/\/www.solucominsight.fr\/2014\/03\/au-menu-du-big-data-3-formules-integrer-package-nuage\/\">le Cloud est une excellente opportunit\u00e9 pour les entreprises qui souhaitent \u00e9prouver et\u00a0 exp\u00e9rimenter ces nouvelles technologies pendant un Proof-Of-Concept (POC)<\/a>, quitte \u00e0 rebasculer ensuite sur un h\u00e9bergement <em>on-premise<\/em> pour la phase de mise en production.<\/p>\n<p>Auparavant, r\u00e9aliser un POC n\u00e9cessitait d\u2019investir sur des infrastructures, de contractualiser pour disposer de licences de test, de prendre en compte les d\u00e9lais de mise en \u0153uvre. D\u00e9sormais, les fournisseurs <em>Cloud<\/em> proposent des offres pr\u00eates \u00e0 l\u2019utilisation imm\u00e9diatement et factur\u00e9es selon l\u2019usage qui en est fait.<\/p>\n<p>Le mod\u00e8le \u00e9conomique <em>Cloud<\/em> se pr\u00eate parfaitement \u00e0 ce cas d\u2019usage et favorisera demain l\u2019innovation technologique.<\/p>\n<h2>Le Cloud comme promesse d&#8217;une meilleure qualit\u00e9 de service<\/h2>\n<p>La disponibilit\u00e9 des applications critiques reste un enjeu majeur des DSI aujourd\u2019hui. Les infrastructures utilis\u00e9es doivent pouvoir r\u00e9pondre aux al\u00e9as qui surviennent, tels que les incidents ou les pics de charge. C\u2019est l\u2019une des promesses du <em>Cloud<\/em>, qui se concr\u00e9tisera demain gr\u00e2ce \u00e0 plusieurs leviers.<\/p>\n<p>Prenons l\u2019exemple du Plan de Reprise d\u2019Activit\u00e9s (PRA) permanent. Il s\u2019agit de r\u00e9pliquer l\u2019application plusieurs fois et de simuler en continu, via un loadbalancer, la perte de l\u2019une d\u2019elles. Ce m\u00e9canisme permet de garantir une meilleure disponibilit\u00e9 du service.<\/p>\n<p>Autre exemple, pour les sites web worldwide, il sera possible de r\u00e9pliquer les infrastructures sous-jacentes dans les diff\u00e9rents datacenters du fournisseur et de diriger les utilisateurs qui s\u2019y connectent en fonction de leur localisation g\u00e9ographique. Cette fois-ci, c\u2019est le temps de r\u00e9ponse qui sera optimis\u00e9.<\/p>\n<p>Dernier exemple, les entreprises commencent \u00e0 impl\u00e9menter des applications pour lesquelles l\u2019infrastructure qui l\u2019h\u00e9berge pourra d\u2019elle-m\u00eame s\u2019\u00e9tendre ou se r\u00e9duire en fonction des connexions r\u00e9elles, voire s\u2019\u00e9teindre en p\u00e9riode d\u2019inactivit\u00e9. Ce m\u00e9canisme de \u00ab\u00a0<em>scale up<\/em> \/ <em>scale down<\/em>\u00a0\u00bb permet \u00e0 la fois de r\u00e9duire les co\u00fbts (dans un mod\u00e8le de facturation \u00e0 l\u2019usage), mais \u00e9galement de garantir une disponibilit\u00e9 optimale en cas de forte activit\u00e9. Cela se traduit techniquement par l\u2019\u00e9volution des ressources m\u00eame des serveurs ou de leur nombre, en fonction des socles install\u00e9s dessus, mais n\u00e9cessite surtout des applications dont le design est sp\u00e9cialement \u00e9tudi\u00e9 pour.<\/p>\n<h2>Une acc\u00e9l\u00e9ration du cycle de vie des applications<\/h2>\n<p>C\u00f4t\u00e9 PaaS, de nombreuses \u00e9volutions sont encore \u00e0 venir, visant principalement \u00e0 r\u00e9duire le <em>time-to-market<\/em> des applications, via une simplification de leur d\u00e9ploiement.<\/p>\n<p>L\u2019approche par <em>containers<\/em> est un premier levier visant \u00e0 r\u00e9pondre \u00e0 cet objectif. Le march\u00e9 s\u2019oriente vers des plates-formes capables d\u2019ex\u00e9cuter du code quel que soit le serveur d\u2019application sous-jacent. Cela est rendu possible par l\u2019utilisation de <em>containers<\/em>, qui embarquent le code, l\u2019application et les binaires du serveur d\u2019application, et sont ex\u00e9cutables sur tout environnement d\u2019ex\u00e9cution. Des solutions se d\u00e9veloppent pour faciliter la cr\u00e9ation et la gestion de ces <em>containers<\/em>, Docker par exemple.<\/p>\n<p>Ainsi les entreprises n\u2019auront plus \u00e0 choisir entre des offres PaaS proposant \u00a0un serveur d\u2019application ou un autre, l\u2019utilisation de containers permettra d\u2019ex\u00e9cuter le code quel que soit l\u2019environnement utilis\u00e9. L\u2019approche par <em>containers<\/em> est un premier levier visant \u00e0 faciliter le d\u00e9ploiement d\u2019applications sur les offres PaaS.<\/p>\n<p>Le second moyen qui se d\u00e9mocratise est l\u2019utilisation d\u2019un gestionnaire de configuration qui permet d\u2019automatiser le d\u00e9ploiement de composants logiciels. <a href=\"http:\/\/www.solucominsight.fr\/2012\/09\/le-deploiement-automatise-optez-pour-des-mises-en-production-sereines\/\">Cette industrialisation peut se faire \u00e0 l\u2019aide d\u2019outils comme Chef, Puppet, CFEngine\u2026 et apporte de nombreux b\u00e9n\u00e9fices<\/a>. Ces outils en pleine expansion permettront ainsi d\u2019acc\u00e9l\u00e9rer le cycle de mise en production des applications pour suivre plus facilement les \u00e9volutions applicatives demand\u00e9es plus fr\u00e9quemment par les M\u00e9tiers.<\/p>\n<p>Cela ne pourra toutefois pas se faire sans une adaptation du cycle de vie des applications, pour adosser les usines logicielles aux offres PaaS qui les h\u00e9bergent, et une adaptation de l\u2019organisation et des processus existants. <a href=\"http:\/\/www.solucominsight.fr\/2014\/08\/processus-generateurs-souplesse-dagilite-chaine-valeur-lit\/\">C\u2019est justement l\u2019objectif de l\u2019approche appel\u00e9e\u00a0 \u00ab\u00a0<em>DevOps<\/em>\u00a0\u00bb, qui se caract\u00e9rise par une coop\u00e9ration \u00e9troite entre la ma\u00eetrise d\u2019\u0153uvre, les \u00e9quipes charg\u00e9es des d\u00e9veloppements, et celles de l\u2019exploitation.<\/a> Il n\u2019y a par exemple pas d\u2019int\u00e9r\u00eat \u00e0 ce qu\u2019une nouvelle fonctionnalit\u00e9 soit demand\u00e9e chaque semaine et effectivement d\u00e9velopp\u00e9e, si les mises en production de l\u2019application ne sont pr\u00e9vues que tous les 6 mois. L\u2019objectif de cette m\u00e9thode est donc de prendre en compte d\u00e8s le lancement d\u2019un projet applicatif les besoins fonctionnels en amont, afin d\u2019aligner ensuite les fr\u00e9quences de mise \u00e0 disposition de nouvelles fonctionnalit\u00e9s et celles de mise en production.<\/p>\n<p><em>De nombreux cas d\u2019usage seront rencontr\u00e9s demain et les exemples pr\u00e9sent\u00e9s ici n\u2019ont pas tous le m\u00eame degr\u00e9 de maturit\u00e9\u00a0: il existe d\u00e9j\u00e0 quelques POC r\u00e9alis\u00e9s sur des plateformes Cloud, alors que la mise en \u0153uvre du m\u00e9canisme de \u00ab\u00a0scale up \/ scale down\u00a0\u00bb reste aujourd\u2019hui une promesse difficilement r\u00e9alisable. Quant \u00e0 l\u2019\u00e9volution du cycle de vie des applications, et \u00e0 l\u2019industrialisation de leur d\u00e9ploiement, on voit que cela se fera une p\u00e9riode plus longue, car une transformation des processus, des comp\u00e9tences et des \u00e9quipes au sein de la DSI seront \u00e9galement n\u00e9cessaires.<\/em><\/p>\n<p>&nbsp;<\/p>\n<figure id=\"post-7819 media-7819\" class=\"align-none\"><img decoding=\"async\" src=\"http:\/\/www.solucominsight.fr\/wp-content\/uploads\/2015\/06\/schema-article-cloud.png\" alt=\"\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>De nombreux grands comptes se sont d\u00e9sormais lanc\u00e9s dans le Cloud public : les outils de gestion de la relation client (CRM), les solutions de collaboration et de communication sont des illustrations flagrantes de la d\u00e9mocratisation du SaaS. L\u2019utilisation de&#8230;<\/p>\n","protected":false},"author":173,"featured_media":7805,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[35],"tags":[672,95],"coauthors":[1138,2362],"class_list":["post-7804","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-strategie-projets-it","tag-deploiement-automatise","tag-innovation"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cloud computing : les cas d\u2019usage de demain - RiskInsight<\/title>\n<meta name=\"description\" content=\"Les motivations d\u2019adoption du Cloud computing sont les co\u00fbts et la flexibilit\u00e9. La prochaine \u00e9tape : servir le c\u0153ur de m\u00e9tier, apporter plus d\u2019innovation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2015\/06\/cloud-computing-les-cas-dusage-de-demain\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud computing : les cas d\u2019usage de demain - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Les motivations d\u2019adoption du Cloud computing sont les co\u00fbts et la flexibilit\u00e9. La prochaine \u00e9tape : servir le c\u0153ur de m\u00e9tier, apporter plus d\u2019innovation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2015\/06\/cloud-computing-les-cas-dusage-de-demain\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2015-06-24T10:30:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-06-25T09:41:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/06\/Fotolia_74377415_Subscription_Monthly_XXL.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"4625\" \/>\n\t<meta property=\"og:image:height\" content=\"3243\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Am\u00e9lie Torrents, Franck Lenormand\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Am\u00e9lie Torrents, Franck Lenormand\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/06\/cloud-computing-les-cas-dusage-de-demain\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/06\/cloud-computing-les-cas-dusage-de-demain\/\"},\"author\":{\"name\":\"Am\u00e9lie Torrents\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/16f5e19a12c0e56175383c43d033605c\"},\"headline\":\"Cloud computing : les cas d\u2019usage de demain\",\"datePublished\":\"2015-06-24T10:30:34+00:00\",\"dateModified\":\"2015-06-25T09:41:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/06\/cloud-computing-les-cas-dusage-de-demain\/\"},\"wordCount\":1081,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/06\/cloud-computing-les-cas-dusage-de-demain\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/06\/Fotolia_74377415_Subscription_Monthly_XXL.jpg\",\"keywords\":[\"d\u00e9ploiement automatis\u00e9\",\"Innovation\"],\"articleSection\":[\"M\u00e9tiers - Strat\u00e9gie &amp; projets IT\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/06\/cloud-computing-les-cas-dusage-de-demain\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/06\/cloud-computing-les-cas-dusage-de-demain\/\",\"name\":\"Cloud computing : les cas d\u2019usage de demain - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/06\/cloud-computing-les-cas-dusage-de-demain\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/06\/cloud-computing-les-cas-dusage-de-demain\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/06\/Fotolia_74377415_Subscription_Monthly_XXL.jpg\",\"datePublished\":\"2015-06-24T10:30:34+00:00\",\"dateModified\":\"2015-06-25T09:41:28+00:00\",\"description\":\"Les motivations d\u2019adoption du Cloud computing sont les co\u00fbts et la flexibilit\u00e9. La prochaine \u00e9tape : servir le c\u0153ur de m\u00e9tier, apporter plus d\u2019innovation.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/06\/cloud-computing-les-cas-dusage-de-demain\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2015\/06\/cloud-computing-les-cas-dusage-de-demain\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/06\/cloud-computing-les-cas-dusage-de-demain\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/06\/Fotolia_74377415_Subscription_Monthly_XXL.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/06\/Fotolia_74377415_Subscription_Monthly_XXL.jpg\",\"width\":4625,\"height\":3243,\"caption\":\"Web cloud technology\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2015\/06\/cloud-computing-les-cas-dusage-de-demain\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud computing : les cas d\u2019usage de demain\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/16f5e19a12c0e56175383c43d033605c\",\"name\":\"Am\u00e9lie Torrents\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/amelie-torrents\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloud computing : les cas d\u2019usage de demain - RiskInsight","description":"Les motivations d\u2019adoption du Cloud computing sont les co\u00fbts et la flexibilit\u00e9. La prochaine \u00e9tape : servir le c\u0153ur de m\u00e9tier, apporter plus d\u2019innovation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2015\/06\/cloud-computing-les-cas-dusage-de-demain\/","og_locale":"en_US","og_type":"article","og_title":"Cloud computing : les cas d\u2019usage de demain - RiskInsight","og_description":"Les motivations d\u2019adoption du Cloud computing sont les co\u00fbts et la flexibilit\u00e9. La prochaine \u00e9tape : servir le c\u0153ur de m\u00e9tier, apporter plus d\u2019innovation.","og_url":"https:\/\/www.riskinsight-wavestone.com\/2015\/06\/cloud-computing-les-cas-dusage-de-demain\/","og_site_name":"RiskInsight","article_published_time":"2015-06-24T10:30:34+00:00","article_modified_time":"2015-06-25T09:41:28+00:00","og_image":[{"width":4625,"height":3243,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/06\/Fotolia_74377415_Subscription_Monthly_XXL.jpg","type":"image\/jpeg"}],"author":"Am\u00e9lie Torrents, Franck Lenormand","twitter_misc":{"Written by":"Am\u00e9lie Torrents, Franck Lenormand","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/06\/cloud-computing-les-cas-dusage-de-demain\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/06\/cloud-computing-les-cas-dusage-de-demain\/"},"author":{"name":"Am\u00e9lie Torrents","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/16f5e19a12c0e56175383c43d033605c"},"headline":"Cloud computing : les cas d\u2019usage de demain","datePublished":"2015-06-24T10:30:34+00:00","dateModified":"2015-06-25T09:41:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/06\/cloud-computing-les-cas-dusage-de-demain\/"},"wordCount":1081,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/06\/cloud-computing-les-cas-dusage-de-demain\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/06\/Fotolia_74377415_Subscription_Monthly_XXL.jpg","keywords":["d\u00e9ploiement automatis\u00e9","Innovation"],"articleSection":["M\u00e9tiers - Strat\u00e9gie &amp; projets IT"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/06\/cloud-computing-les-cas-dusage-de-demain\/","url":"https:\/\/www.riskinsight-wavestone.com\/2015\/06\/cloud-computing-les-cas-dusage-de-demain\/","name":"Cloud computing : les cas d\u2019usage de demain - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/06\/cloud-computing-les-cas-dusage-de-demain\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/06\/cloud-computing-les-cas-dusage-de-demain\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/06\/Fotolia_74377415_Subscription_Monthly_XXL.jpg","datePublished":"2015-06-24T10:30:34+00:00","dateModified":"2015-06-25T09:41:28+00:00","description":"Les motivations d\u2019adoption du Cloud computing sont les co\u00fbts et la flexibilit\u00e9. La prochaine \u00e9tape : servir le c\u0153ur de m\u00e9tier, apporter plus d\u2019innovation.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/06\/cloud-computing-les-cas-dusage-de-demain\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2015\/06\/cloud-computing-les-cas-dusage-de-demain\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/06\/cloud-computing-les-cas-dusage-de-demain\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/06\/Fotolia_74377415_Subscription_Monthly_XXL.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/06\/Fotolia_74377415_Subscription_Monthly_XXL.jpg","width":4625,"height":3243,"caption":"Web cloud technology"},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2015\/06\/cloud-computing-les-cas-dusage-de-demain\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cloud computing : les cas d\u2019usage de demain"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/16f5e19a12c0e56175383c43d033605c","name":"Am\u00e9lie Torrents","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/amelie-torrents\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/7804","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/173"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=7804"}],"version-history":[{"count":6,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/7804\/revisions"}],"predecessor-version":[{"id":7821,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/7804\/revisions\/7821"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/7805"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=7804"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=7804"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=7804"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=7804"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}