{"id":8873,"date":"2016-04-06T08:00:35","date_gmt":"2016-04-06T07:00:35","guid":{"rendered":"https:\/\/www.solucominsight.fr\/2016\/04\/la-data-est-elle-vraiment-exploitee-grace-a-nos-objets-connectes-dans-le-secteur-de-lenergie\/"},"modified":"2016-04-06T08:00:35","modified_gmt":"2016-04-06T07:00:35","slug":"la-data-est-elle-vraiment-exploitee-grace-a-nos-objets-connectes-dans-le-secteur-de-lenergie","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2016\/04\/la-data-est-elle-vraiment-exploitee-grace-a-nos-objets-connectes-dans-le-secteur-de-lenergie\/","title":{"rendered":"La data est-elle vraiment exploit\u00e9e gr\u00e2ce \u00e0 nos objets connect\u00e9s dans le secteur de l\u2019\u00e9nergie ?"},"content":{"rendered":"<p>La collecte de donn\u00e9es n\u2019a jamais \u00e9t\u00e9 aussi facile\u00a0! Les objets connect\u00e9s permettent de les r\u00e9colter en pagaille tandis que les logiciels d\u2019analyse sont de plus en plus performants. Cependant, les donn\u00e9es sont-elles r\u00e9ellement exploit\u00e9es au maximum par nos fournisseurs d\u2019\u00e9nergie\u00a0? Comment sont-elles valoris\u00e9es\u00a0? Quels sont les r\u00e9els b\u00e9n\u00e9fices li\u00e9s \u00e0 cette activit\u00e9 dans le [&#8230;]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La collecte de donn\u00e9es n\u2019a jamais \u00e9t\u00e9 aussi facile\u00a0! Les objets connect\u00e9s permettent de les r\u00e9colter en pagaille tandis que les logiciels d\u2019analyse sont de plus en plus performants. Cependant, les donn\u00e9es sont-elles r\u00e9ellement exploit\u00e9es au maximum par nos fournisseurs&#8230;<\/p>\n","protected":false},"author":1269,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1734],"tags":[],"coauthors":[],"class_list":["post-8873","post","type-post","status-publish","format-standard","hentry","category-energystream"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>La data est-elle vraiment exploit\u00e9e gr\u00e2ce \u00e0 nos objets connect\u00e9s dans le secteur de l\u2019\u00e9nergie ? - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/la-data-est-elle-vraiment-exploitee-grace-a-nos-objets-connectes-dans-le-secteur-de-lenergie\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La data est-elle vraiment exploit\u00e9e gr\u00e2ce \u00e0 nos objets connect\u00e9s dans le secteur de l\u2019\u00e9nergie ? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"La collecte de donn\u00e9es n\u2019a jamais \u00e9t\u00e9 aussi facile\u00a0! Les objets connect\u00e9s permettent de les r\u00e9colter en pagaille tandis que les logiciels d\u2019analyse sont de plus en plus performants. Cependant, les donn\u00e9es sont-elles r\u00e9ellement exploit\u00e9es au maximum par nos fournisseurs...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/la-data-est-elle-vraiment-exploitee-grace-a-nos-objets-connectes-dans-le-secteur-de-lenergie\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-06T07:00:35+00:00\" \/>\n<meta name=\"author\" content=\"zephSolucomBO\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"zephSolucomBO\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/la-data-est-elle-vraiment-exploitee-grace-a-nos-objets-connectes-dans-le-secteur-de-lenergie\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/la-data-est-elle-vraiment-exploitee-grace-a-nos-objets-connectes-dans-le-secteur-de-lenergie\/\"},\"author\":{\"name\":\"zephSolucomBO\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/61c2fe74fad6b31442e1706ccacf3421\"},\"headline\":\"La data est-elle vraiment exploit\u00e9e gr\u00e2ce \u00e0 nos objets connect\u00e9s dans le secteur de l\u2019\u00e9nergie ?\",\"datePublished\":\"2016-04-06T07:00:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/la-data-est-elle-vraiment-exploitee-grace-a-nos-objets-connectes-dans-le-secteur-de-lenergie\/\"},\"wordCount\":86,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"articleSection\":[\"energystream\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/la-data-est-elle-vraiment-exploitee-grace-a-nos-objets-connectes-dans-le-secteur-de-lenergie\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/la-data-est-elle-vraiment-exploitee-grace-a-nos-objets-connectes-dans-le-secteur-de-lenergie\/\",\"name\":\"La data est-elle vraiment exploit\u00e9e gr\u00e2ce \u00e0 nos objets connect\u00e9s dans le secteur de l\u2019\u00e9nergie ? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"datePublished\":\"2016-04-06T07:00:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/la-data-est-elle-vraiment-exploitee-grace-a-nos-objets-connectes-dans-le-secteur-de-lenergie\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/la-data-est-elle-vraiment-exploitee-grace-a-nos-objets-connectes-dans-le-secteur-de-lenergie\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/la-data-est-elle-vraiment-exploitee-grace-a-nos-objets-connectes-dans-le-secteur-de-lenergie\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"La data est-elle vraiment exploit\u00e9e gr\u00e2ce \u00e0 nos objets connect\u00e9s dans le secteur de l\u2019\u00e9nergie ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/61c2fe74fad6b31442e1706ccacf3421\",\"name\":\"zephSolucomBO\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/zephsolucombo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"La data est-elle vraiment exploit\u00e9e gr\u00e2ce \u00e0 nos objets connect\u00e9s dans le secteur de l\u2019\u00e9nergie ? - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/la-data-est-elle-vraiment-exploitee-grace-a-nos-objets-connectes-dans-le-secteur-de-lenergie\/","og_locale":"en_US","og_type":"article","og_title":"La data est-elle vraiment exploit\u00e9e gr\u00e2ce \u00e0 nos objets connect\u00e9s dans le secteur de l\u2019\u00e9nergie ? - RiskInsight","og_description":"La collecte de donn\u00e9es n\u2019a jamais \u00e9t\u00e9 aussi facile\u00a0! Les objets connect\u00e9s permettent de les r\u00e9colter en pagaille tandis que les logiciels d\u2019analyse sont de plus en plus performants. Cependant, les donn\u00e9es sont-elles r\u00e9ellement exploit\u00e9es au maximum par nos fournisseurs...","og_url":"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/la-data-est-elle-vraiment-exploitee-grace-a-nos-objets-connectes-dans-le-secteur-de-lenergie\/","og_site_name":"RiskInsight","article_published_time":"2016-04-06T07:00:35+00:00","author":"zephSolucomBO","twitter_misc":{"Written by":"zephSolucomBO"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/la-data-est-elle-vraiment-exploitee-grace-a-nos-objets-connectes-dans-le-secteur-de-lenergie\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/la-data-est-elle-vraiment-exploitee-grace-a-nos-objets-connectes-dans-le-secteur-de-lenergie\/"},"author":{"name":"zephSolucomBO","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/61c2fe74fad6b31442e1706ccacf3421"},"headline":"La data est-elle vraiment exploit\u00e9e gr\u00e2ce \u00e0 nos objets connect\u00e9s dans le secteur de l\u2019\u00e9nergie ?","datePublished":"2016-04-06T07:00:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/la-data-est-elle-vraiment-exploitee-grace-a-nos-objets-connectes-dans-le-secteur-de-lenergie\/"},"wordCount":86,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"articleSection":["energystream"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/la-data-est-elle-vraiment-exploitee-grace-a-nos-objets-connectes-dans-le-secteur-de-lenergie\/","url":"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/la-data-est-elle-vraiment-exploitee-grace-a-nos-objets-connectes-dans-le-secteur-de-lenergie\/","name":"La data est-elle vraiment exploit\u00e9e gr\u00e2ce \u00e0 nos objets connect\u00e9s dans le secteur de l\u2019\u00e9nergie ? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"datePublished":"2016-04-06T07:00:35+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/la-data-est-elle-vraiment-exploitee-grace-a-nos-objets-connectes-dans-le-secteur-de-lenergie\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2016\/04\/la-data-est-elle-vraiment-exploitee-grace-a-nos-objets-connectes-dans-le-secteur-de-lenergie\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/la-data-est-elle-vraiment-exploitee-grace-a-nos-objets-connectes-dans-le-secteur-de-lenergie\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"La data est-elle vraiment exploit\u00e9e gr\u00e2ce \u00e0 nos objets connect\u00e9s dans le secteur de l\u2019\u00e9nergie ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/61c2fe74fad6b31442e1706ccacf3421","name":"zephSolucomBO","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/zephsolucombo\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/8873","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1269"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=8873"}],"version-history":[{"count":0,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/8873\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=8873"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=8873"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=8873"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=8873"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}