{"id":4501,"date":"2024-09-10T14:03:02","date_gmt":"2024-09-10T14:03:02","guid":{"rendered":"https:\/\/techhub.saworks.io\/?page_id=4501"},"modified":"2025-07-10T09:48:42","modified_gmt":"2025-07-10T09:48:42","slug":"architecture-cloud","status":"publish","type":"page","link":"https:\/\/techhub.saworks.io\/fr\/architecture-cloud\/","title":{"rendered":"Architecture Cloud"},"content":{"rendered":"\n<p class=\"has-medium-font-size\">L&rsquo;architecture cloud dans le secteur financier am\u00e9liore l&rsquo;efficacit\u00e9, la s\u00e9curit\u00e9 et la scalabilit\u00e9 en exploitant des solutions\u00a0public cloud,\u00a0hybride\u00a0et\u00a0multi-cloud. Cette approche r\u00e9duit les co\u00fbts, int\u00e8gre des technologies innovantes comme l&rsquo;IA pour des services personnalis\u00e9s, et garantit une protection robuste des donn\u00e9es.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-light-gray-color has-alpha-channel-opacity has-light-gray-background-color has-background is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-group is-layout-flow wp-container-core-group-is-layout-6 wp-block-group-is-layout-flow\">\n<h2 class=\"wp-block-heading is-style-sidebar-title has-white-color has-primary-background-color has-text-color has-background has-small-font-size\" style=\"margin-top:2vw;margin-bottom:1.5vw;font-style:normal;font-weight:400\">Derniers articles sur l&rsquo;architecture<\/h2>\n\n\n\n<div class=\"wp-block-query is-layout-flow wp-block-query-is-layout-flow\"><ul class=\"wp-block-post-template is-layout-flow wp-block-post-template-is-layout-flow\"><li class=\"wp-block-post post-11723 post type-post status-publish format-standard has-post-thumbnail hentry category-architecture-cloud tag-architecture-cloud tag-securite-fr\">\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><figure style=\"margin-top:0rem;margin-bottom:0rem;\" class=\"is-style-full-height wp-block-post-featured-image\"><a href=\"https:\/\/techhub.saworks.io\/fr\/5-types-darchitecture-cloud-populaires-actuellement\/\" target=\"_self\"  ><img decoding=\"async\" width=\"1656\" height=\"756\" data-src=\"https:\/\/techhub.saworks.io\/wp-content\/uploads\/2026\/01\/Capture-decran-2026-01-05-160516.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image lazyload\" alt=\"5 types d&rsquo;architecture cloud populaires actuellement\" style=\"--smush-placeholder-width: 1656px; --smush-placeholder-aspect-ratio: 1656\/756;object-fit:cover;\" data-srcset=\"https:\/\/techhub.saworks.io\/wp-content\/uploads\/2026\/01\/Capture-decran-2026-01-05-160516.png 1656w, https:\/\/techhub.saworks.io\/wp-content\/uploads\/2026\/01\/Capture-decran-2026-01-05-160516-300x137.png 300w, https:\/\/techhub.saworks.io\/wp-content\/uploads\/2026\/01\/Capture-decran-2026-01-05-160516-1024x467.png 1024w, https:\/\/techhub.saworks.io\/wp-content\/uploads\/2026\/01\/Capture-decran-2026-01-05-160516-768x351.png 768w, https:\/\/techhub.saworks.io\/wp-content\/uploads\/2026\/01\/Capture-decran-2026-01-05-160516-1536x701.png 1536w\" data-sizes=\"(max-width: 1656px) 100vw, 1656px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" \/><\/a><\/figure><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/techhub.saworks.io\/fr\/5-types-darchitecture-cloud-populaires-actuellement\/\" target=\"_self\" >5 types d&rsquo;architecture cloud populaires actuellement<\/a><\/h2>\n\n\n<div class=\"wp-block-group has-gray-color has-text-color is-layout-flex wp-container-core-group-is-layout-1 wp-block-group-is-layout-flex\" style=\"margin-top:0.75rem\"><div class=\"has-link-color wp-elements-9bd9074ee846ec112305f0fe352da13e wp-block-post-date\"><time datetime=\"2026-01-05T16:06:22+00:00\"><a href=\"https:\/\/techhub.saworks.io\/fr\/5-types-darchitecture-cloud-populaires-actuellement\/\">5 janvier 2026<\/a><\/time><\/div>\n\n\n<p>\u2013<\/p>\n\n\n<div class=\"wp-block-post-author\"><div class=\"wp-block-post-author__content\"><p class=\"wp-block-post-author__name\">Annick N&rsquo;dri<\/p><\/div><\/div><\/div>\n\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Publi\u00e9 : 10\/04\/2024 | Mis \u00e0 jour : 30\/04\/2025 par ESLSCA La fa\u00e7on dont les entreprises g\u00e8rent leurs ressources informatiques peut avoir une [&hellip;] <a class=\"wp-block-post-excerpt__more-link\" href=\"https:\/\/techhub.saworks.io\/fr\/5-types-darchitecture-cloud-populaires-actuellement\/\">Read more<\/a><\/p><\/div><\/div>\n<\/div>\n\n<\/li><\/ul><\/div>\n\n\n\n<div class=\"wp-block-query is-layout-flow wp-block-query-is-layout-flow\"><ul class=\"columns-3 wp-block-post-template is-layout-grid wp-container-core-post-template-is-layout-2 wp-block-post-template-is-layout-grid\"><li class=\"wp-block-post post-3700 post type-post status-publish format-standard has-post-thumbnail hentry category-architecture-cloud tag-architecture-cloud tag-securite-fr\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\"><figure style=\"height:20vh;\" class=\"wp-block-post-featured-image\"><a href=\"https:\/\/techhub.saworks.io\/fr\/architecture-de-confiance-zero\/\" target=\"_self\"  style=\"height:20vh\"><img decoding=\"async\" width=\"1200\" height=\"675\" data-src=\"https:\/\/techhub.saworks.io\/wp-content\/uploads\/2024\/10\/what-is-zero-trust-16548477525131364113877.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image lazyload\" alt=\"Architecture de confiance z\u00e9ro\" style=\"--smush-placeholder-width: 1200px; --smush-placeholder-aspect-ratio: 1200\/675;height:20vh;object-fit:cover;\" data-srcset=\"https:\/\/techhub.saworks.io\/wp-content\/uploads\/2024\/10\/what-is-zero-trust-16548477525131364113877.jpg 1200w, https:\/\/techhub.saworks.io\/wp-content\/uploads\/2024\/10\/what-is-zero-trust-16548477525131364113877-300x169.jpg 300w, https:\/\/techhub.saworks.io\/wp-content\/uploads\/2024\/10\/what-is-zero-trust-16548477525131364113877-1024x576.jpg 1024w, https:\/\/techhub.saworks.io\/wp-content\/uploads\/2024\/10\/what-is-zero-trust-16548477525131364113877-768x432.jpg 768w\" data-sizes=\"(max-width: 1200px) 100vw, 1200px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" \/><\/a><\/figure>\n\n<h2 class=\"wp-block-post-title has-medium-font-size\"><a href=\"https:\/\/techhub.saworks.io\/fr\/architecture-de-confiance-zero\/\" target=\"_self\" >Architecture de confiance z\u00e9ro<\/a><\/h2>\n\n\n<div class=\"wp-block-group has-gray-color has-text-color has-small-font-size is-layout-flex wp-container-core-group-is-layout-2 wp-block-group-is-layout-flex\" style=\"margin-top:0.5rem\"><div class=\"has-link-color wp-elements-9bd9074ee846ec112305f0fe352da13e wp-block-post-date\"><time datetime=\"2024-10-16T15:41:26+00:00\"><a href=\"https:\/\/techhub.saworks.io\/fr\/architecture-de-confiance-zero\/\">16 octobre 2024<\/a><\/time><\/div><\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-3714 post type-post status-publish format-standard has-post-thumbnail hentry category-architecture-cloud tag-architecture-cloud\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\"><figure style=\"height:20vh;\" class=\"wp-block-post-featured-image\"><a href=\"https:\/\/techhub.saworks.io\/fr\/gestion-des-donnees-dans-le-cloud-stockage-et-bases-de-donnees\/\" target=\"_self\"  style=\"height:20vh\"><img decoding=\"async\" width=\"1000\" height=\"700\" data-src=\"https:\/\/techhub.saworks.io\/wp-content\/uploads\/2024\/10\/Qualifiersabasededonnees_data-1-1000x700-1.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image lazyload\" alt=\"Gestion des donn\u00e9es dans le cloud : stockage et bases de donn\u00e9es\" style=\"--smush-placeholder-width: 1000px; --smush-placeholder-aspect-ratio: 1000\/700;height:20vh;object-fit:cover;\" data-srcset=\"https:\/\/techhub.saworks.io\/wp-content\/uploads\/2024\/10\/Qualifiersabasededonnees_data-1-1000x700-1.jpg 1000w, https:\/\/techhub.saworks.io\/wp-content\/uploads\/2024\/10\/Qualifiersabasededonnees_data-1-1000x700-1-300x210.jpg 300w, https:\/\/techhub.saworks.io\/wp-content\/uploads\/2024\/10\/Qualifiersabasededonnees_data-1-1000x700-1-768x538.jpg 768w\" data-sizes=\"(max-width: 1000px) 100vw, 1000px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" \/><\/a><\/figure>\n\n<h2 class=\"wp-block-post-title has-medium-font-size\"><a href=\"https:\/\/techhub.saworks.io\/fr\/gestion-des-donnees-dans-le-cloud-stockage-et-bases-de-donnees\/\" target=\"_self\" >Gestion des donn\u00e9es dans le cloud : stockage et bases de donn\u00e9es<\/a><\/h2>\n\n\n<div class=\"wp-block-group has-gray-color has-text-color has-small-font-size is-layout-flex wp-container-core-group-is-layout-4 wp-block-group-is-layout-flex\" style=\"margin-top:0.5rem\"><div class=\"has-link-color wp-elements-9bd9074ee846ec112305f0fe352da13e wp-block-post-date\"><time datetime=\"2024-10-16T11:19:08+00:00\"><a href=\"https:\/\/techhub.saworks.io\/fr\/gestion-des-donnees-dans-le-cloud-stockage-et-bases-de-donnees\/\">16 octobre 2024<\/a><\/time><\/div><\/div>\n<\/div>\n\n<\/li><\/ul><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-flow wp-container-core-group-is-layout-19 wp-block-group-is-layout-flow\">\n<h2 class=\"wp-block-heading is-style-sidebar-title has-white-color has-primary-background-color has-text-color has-background has-small-font-size\" style=\"margin-top:2vw;margin-bottom:1.5vw;font-style:normal;font-weight:400\">Ces sujets pourraient vous int\u00e9resser\u2026<\/h2>\n\n\n\n<div class=\"wp-block-query is-layout-flow wp-block-query-is-layout-flow\"><ul class=\"columns-3 wp-block-post-template is-layout-grid wp-container-core-post-template-is-layout-3 wp-block-post-template-is-layout-grid\"><li class=\"wp-block-post post-11762 post type-post status-publish format-standard has-post-thumbnail hentry category-securite tag-securite-fr\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\"><figure style=\"height:20vh;\" class=\"wp-block-post-featured-image\"><a href=\"https:\/\/techhub.saworks.io\/fr\/limportance-de-la-securite-informatique-proteger-vos-informations\/\" target=\"_self\"  style=\"height:20vh\"><img decoding=\"async\" width=\"1087\" height=\"789\" data-src=\"https:\/\/techhub.saworks.io\/wp-content\/uploads\/2026\/01\/Capture-decran-2026-01-06-154157.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image lazyload\" alt=\"L&rsquo;importance de la s\u00e9curit\u00e9 informatique : prot\u00e9ger vos informations\" style=\"--smush-placeholder-width: 1087px; --smush-placeholder-aspect-ratio: 1087\/789;height:20vh;object-fit:cover;\" data-srcset=\"https:\/\/techhub.saworks.io\/wp-content\/uploads\/2026\/01\/Capture-decran-2026-01-06-154157.png 1087w, https:\/\/techhub.saworks.io\/wp-content\/uploads\/2026\/01\/Capture-decran-2026-01-06-154157-300x218.png 300w, https:\/\/techhub.saworks.io\/wp-content\/uploads\/2026\/01\/Capture-decran-2026-01-06-154157-1024x743.png 1024w, https:\/\/techhub.saworks.io\/wp-content\/uploads\/2026\/01\/Capture-decran-2026-01-06-154157-768x557.png 768w\" data-sizes=\"(max-width: 1087px) 100vw, 1087px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" \/><\/a><\/figure>\n\n<h2 class=\"wp-block-post-title has-regular-font-size\"><a href=\"https:\/\/techhub.saworks.io\/fr\/limportance-de-la-securite-informatique-proteger-vos-informations\/\" target=\"_self\" >L&rsquo;importance de la s\u00e9curit\u00e9 informatique : prot\u00e9ger vos informations<\/a><\/h2>\n\n\n<div class=\"wp-block-group has-gray-color has-text-color has-x-small-font-size is-layout-flex wp-container-core-group-is-layout-7 wp-block-group-is-layout-flex\" style=\"margin-top:0.25rem\"><div class=\"has-link-color wp-elements-9bd9074ee846ec112305f0fe352da13e wp-block-post-date\"><time datetime=\"2026-01-06T15:46:29+00:00\"><a href=\"https:\/\/techhub.saworks.io\/fr\/limportance-de-la-securite-informatique-proteger-vos-informations\/\">6 janvier 2026<\/a><\/time><\/div><\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-11714 post type-post status-publish format-standard has-post-thumbnail hentry category-ia-aa\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\"><figure style=\"height:20vh;\" class=\"wp-block-post-featured-image\"><a href=\"https:\/\/techhub.saworks.io\/fr\/comment-le-seo-evolue-t-il-face-a-lessor-de-lintelligence-artificielle\/\" target=\"_self\"  style=\"height:20vh\"><img decoding=\"async\" width=\"1384\" height=\"698\" data-src=\"https:\/\/techhub.saworks.io\/wp-content\/uploads\/2026\/01\/Capture-decran-2026-01-05-144719.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image lazyload\" alt=\"Comment le SEO \u00e9volue-t-il face \u00e0 l\u2019essor de l\u2019intelligence artificielle ?\" style=\"--smush-placeholder-width: 1384px; --smush-placeholder-aspect-ratio: 1384\/698;height:20vh;object-fit:cover;\" data-srcset=\"https:\/\/techhub.saworks.io\/wp-content\/uploads\/2026\/01\/Capture-decran-2026-01-05-144719.png 1384w, https:\/\/techhub.saworks.io\/wp-content\/uploads\/2026\/01\/Capture-decran-2026-01-05-144719-300x151.png 300w, https:\/\/techhub.saworks.io\/wp-content\/uploads\/2026\/01\/Capture-decran-2026-01-05-144719-1024x516.png 1024w, https:\/\/techhub.saworks.io\/wp-content\/uploads\/2026\/01\/Capture-decran-2026-01-05-144719-768x387.png 768w\" data-sizes=\"(max-width: 1384px) 100vw, 1384px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" \/><\/a><\/figure>\n\n<h2 class=\"wp-block-post-title has-regular-font-size\"><a href=\"https:\/\/techhub.saworks.io\/fr\/comment-le-seo-evolue-t-il-face-a-lessor-de-lintelligence-artificielle\/\" target=\"_self\" >Comment le SEO \u00e9volue-t-il face \u00e0 l\u2019essor de l\u2019intelligence artificielle ?<\/a><\/h2>\n\n\n<div class=\"wp-block-group has-gray-color has-text-color has-x-small-font-size is-layout-flex wp-container-core-group-is-layout-9 wp-block-group-is-layout-flex\" style=\"margin-top:0.25rem\"><div class=\"has-link-color wp-elements-9bd9074ee846ec112305f0fe352da13e wp-block-post-date\"><time datetime=\"2026-01-05T15:03:32+00:00\"><a href=\"https:\/\/techhub.saworks.io\/fr\/comment-le-seo-evolue-t-il-face-a-lessor-de-lintelligence-artificielle\/\">5 janvier 2026<\/a><\/time><\/div><\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-4205 post type-post status-publish format-standard has-post-thumbnail hentry category-ia-aa tag-ia\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\"><figure style=\"height:20vh;\" class=\"wp-block-post-featured-image\"><a href=\"https:\/\/techhub.saworks.io\/fr\/les-assistants-de-codage-ia-doutil-experimental-a-incontournable-comment-les-equipes-en-tirent-parti-et-les-risques-a-maitriser\/\" target=\"_self\"  style=\"height:20vh\"><img decoding=\"async\" width=\"1000\" height=\"1000\" data-src=\"https:\/\/techhub.saworks.io\/wp-content\/uploads\/2025\/07\/image-1000x1000.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image lazyload\" alt=\"Les assistants de codage avec l\u2019IA : utiles, mais \u00e0 utiliser avec prudence\" style=\"--smush-placeholder-width: 1000px; --smush-placeholder-aspect-ratio: 1000\/1000;height:20vh;object-fit:cover;\" data-srcset=\"https:\/\/techhub.saworks.io\/wp-content\/uploads\/2025\/07\/image-1000x1000.png 1000w, https:\/\/techhub.saworks.io\/wp-content\/uploads\/2025\/07\/image-300x300.png 300w, https:\/\/techhub.saworks.io\/wp-content\/uploads\/2025\/07\/image-150x150.png 150w, https:\/\/techhub.saworks.io\/wp-content\/uploads\/2025\/07\/image-768x768.png 768w, https:\/\/techhub.saworks.io\/wp-content\/uploads\/2025\/07\/image-100x100.png 100w, https:\/\/techhub.saworks.io\/wp-content\/uploads\/2025\/07\/image-16x16.png 16w, https:\/\/techhub.saworks.io\/wp-content\/uploads\/2025\/07\/image-50x50.png 50w, https:\/\/techhub.saworks.io\/wp-content\/uploads\/2025\/07\/image-e1751973092563.png 500w\" data-sizes=\"(max-width: 1000px) 100vw, 1000px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" \/><\/a><\/figure>\n\n<h2 class=\"wp-block-post-title has-regular-font-size\"><a href=\"https:\/\/techhub.saworks.io\/fr\/les-assistants-de-codage-ia-doutil-experimental-a-incontournable-comment-les-equipes-en-tirent-parti-et-les-risques-a-maitriser\/\" target=\"_self\" >Les assistants de codage avec l\u2019IA : utiles, mais \u00e0 utiliser avec prudence<\/a><\/h2>\n\n\n<div class=\"wp-block-group has-gray-color has-text-color has-x-small-font-size is-layout-flex wp-container-core-group-is-layout-11 wp-block-group-is-layout-flex\" style=\"margin-top:0.25rem\"><div class=\"has-link-color wp-elements-9bd9074ee846ec112305f0fe352da13e wp-block-post-date\"><time datetime=\"2025-07-02T09:51:43+00:00\"><a href=\"https:\/\/techhub.saworks.io\/fr\/les-assistants-de-codage-ia-doutil-experimental-a-incontournable-comment-les-equipes-en-tirent-parti-et-les-risques-a-maitriser\/\">2 juillet 2025<\/a><\/time><\/div><\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-3703 post type-post status-publish format-standard has-post-thumbnail hentry category-ia-aa tag-ia\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\"><figure style=\"height:20vh;\" class=\"wp-block-post-featured-image\"><a href=\"https:\/\/techhub.saworks.io\/fr\/apprentissage-automatique-et-reconnaissance-de-formes\/\" target=\"_self\"  style=\"height:20vh\"><img decoding=\"async\" width=\"1200\" height=\"600\" data-src=\"https:\/\/techhub.saworks.io\/wp-content\/uploads\/2024\/10\/reconnaissance-faciale.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image lazyload\" alt=\"Apprentissage automatique et reconnaissance de formes\" style=\"--smush-placeholder-width: 1200px; --smush-placeholder-aspect-ratio: 1200\/600;height:20vh;object-fit:cover;\" data-srcset=\"https:\/\/techhub.saworks.io\/wp-content\/uploads\/2024\/10\/reconnaissance-faciale.jpg 1200w, https:\/\/techhub.saworks.io\/wp-content\/uploads\/2024\/10\/reconnaissance-faciale-300x150.jpg 300w, https:\/\/techhub.saworks.io\/wp-content\/uploads\/2024\/10\/reconnaissance-faciale-1024x512.jpg 1024w, https:\/\/techhub.saworks.io\/wp-content\/uploads\/2024\/10\/reconnaissance-faciale-768x384.jpg 768w\" data-sizes=\"(max-width: 1200px) 100vw, 1200px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" \/><\/a><\/figure>\n\n<h2 class=\"wp-block-post-title has-regular-font-size\"><a href=\"https:\/\/techhub.saworks.io\/fr\/apprentissage-automatique-et-reconnaissance-de-formes\/\" target=\"_self\" >Apprentissage automatique et reconnaissance de formes<\/a><\/h2>\n\n\n<div class=\"wp-block-group has-gray-color has-text-color has-x-small-font-size is-layout-flex wp-container-core-group-is-layout-13 wp-block-group-is-layout-flex\" style=\"margin-top:0.25rem\"><div class=\"has-link-color wp-elements-9bd9074ee846ec112305f0fe352da13e wp-block-post-date\"><time datetime=\"2024-10-16T14:34:04+00:00\"><a href=\"https:\/\/techhub.saworks.io\/fr\/apprentissage-automatique-et-reconnaissance-de-formes\/\">16 octobre 2024<\/a><\/time><\/div><\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-3707 post type-post status-publish format-standard has-post-thumbnail hentry category-ia-aa tag-ia tag-securite-fr\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\"><figure style=\"height:20vh;\" class=\"wp-block-post-featured-image\"><a href=\"https:\/\/techhub.saworks.io\/fr\/lia-dans-la-cybersecurite\/\" target=\"_self\"  style=\"height:20vh\"><img decoding=\"async\" width=\"512\" height=\"275\" data-src=\"https:\/\/techhub.saworks.io\/wp-content\/uploads\/2024\/10\/unnamed-1.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image lazyload\" alt=\"L&rsquo;IA dans la cybers\u00e9curit\u00e9\" style=\"--smush-placeholder-width: 512px; --smush-placeholder-aspect-ratio: 512\/275;height:20vh;object-fit:cover;\" data-srcset=\"https:\/\/techhub.saworks.io\/wp-content\/uploads\/2024\/10\/unnamed-1.png 512w, https:\/\/techhub.saworks.io\/wp-content\/uploads\/2024\/10\/unnamed-1-300x161.png 300w\" data-sizes=\"(max-width: 512px) 100vw, 512px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" \/><\/a><\/figure>\n\n<h2 class=\"wp-block-post-title has-regular-font-size\"><a href=\"https:\/\/techhub.saworks.io\/fr\/lia-dans-la-cybersecurite\/\" target=\"_self\" >L&rsquo;IA dans la cybers\u00e9curit\u00e9<\/a><\/h2>\n\n\n<div class=\"wp-block-group has-gray-color has-text-color has-x-small-font-size is-layout-flex wp-container-core-group-is-layout-15 wp-block-group-is-layout-flex\" style=\"margin-top:0.25rem\"><div class=\"has-link-color wp-elements-9bd9074ee846ec112305f0fe352da13e wp-block-post-date\"><time datetime=\"2024-10-16T13:45:05+00:00\"><a href=\"https:\/\/techhub.saworks.io\/fr\/lia-dans-la-cybersecurite\/\">16 octobre 2024<\/a><\/time><\/div><\/div>\n<\/div>\n\n<\/li><li class=\"wp-block-post post-3711 post type-post status-publish format-standard has-post-thumbnail hentry category-securite tag-securite-fr\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\"><figure style=\"height:20vh;\" class=\"wp-block-post-featured-image\"><a href=\"https:\/\/techhub.saworks.io\/fr\/securisation-des-infrastructures-critiques\/\" target=\"_self\"  style=\"height:20vh\"><img decoding=\"async\" width=\"1579\" height=\"1000\" data-src=\"https:\/\/techhub.saworks.io\/wp-content\/uploads\/2024\/10\/gunnebo-sector-critical-1579x1000.webp\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image lazyload\" alt=\"S\u00e9curisation des infrastructures critiques\" style=\"--smush-placeholder-width: 1579px; --smush-placeholder-aspect-ratio: 1579\/1000;height:20vh;object-fit:cover;\" data-srcset=\"https:\/\/techhub.saworks.io\/wp-content\/uploads\/2024\/10\/gunnebo-sector-critical-1579x1000.webp 1579w, https:\/\/techhub.saworks.io\/wp-content\/uploads\/2024\/10\/gunnebo-sector-critical-300x190.webp 300w, https:\/\/techhub.saworks.io\/wp-content\/uploads\/2024\/10\/gunnebo-sector-critical-1024x648.webp 1024w, https:\/\/techhub.saworks.io\/wp-content\/uploads\/2024\/10\/gunnebo-sector-critical-768x486.webp 768w, https:\/\/techhub.saworks.io\/wp-content\/uploads\/2024\/10\/gunnebo-sector-critical-1536x973.webp 1536w, https:\/\/techhub.saworks.io\/wp-content\/uploads\/2024\/10\/gunnebo-sector-critical-2048x1297.webp 2048w\" data-sizes=\"(max-width: 1579px) 100vw, 1579px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" \/><\/a><\/figure>\n\n<h2 class=\"wp-block-post-title has-regular-font-size\"><a href=\"https:\/\/techhub.saworks.io\/fr\/securisation-des-infrastructures-critiques\/\" target=\"_self\" >S\u00e9curisation des infrastructures critiques<\/a><\/h2>\n\n\n<div class=\"wp-block-group has-gray-color has-text-color has-x-small-font-size is-layout-flex wp-container-core-group-is-layout-17 wp-block-group-is-layout-flex\" style=\"margin-top:0.25rem\"><div class=\"has-link-color wp-elements-9bd9074ee846ec112305f0fe352da13e wp-block-post-date\"><time datetime=\"2024-10-16T13:16:03+00:00\"><a href=\"https:\/\/techhub.saworks.io\/fr\/securisation-des-infrastructures-critiques\/\">16 octobre 2024<\/a><\/time><\/div><\/div>\n<\/div>\n\n<\/li><\/ul><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\">\n<h2 class=\"wp-block-heading is-style-sidebar-title has-white-color has-primary-background-color has-text-color has-background has-small-font-size\" style=\"margin-top:2vw;margin-bottom:1.5vw;font-style:normal;font-weight:400\">\n\t\tJoin now\t<\/h2>\n\n\n\n<div class=\"wp-block-group has-light-gray-background-color has-background is-layout-flow wp-block-group-is-layout-flow\">\n<h2 class=\"wp-block-heading\">Call to Action<\/h2>\n\n\n\n<p>Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean commodo ligula eget dolor. Aenean massa. Cum sociis natoque penatibus et magnis diss parturient.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\">Learn more<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>L&rsquo;architecture cloud dans le secteur financier am\u00e9liore l&rsquo;efficacit\u00e9, la s\u00e9curit\u00e9 et la scalabilit\u00e9 en exploitant des solutions\u00a0public cloud,\u00a0hybride\u00a0et\u00a0multi-cloud. Cette approche r\u00e9duit les co\u00fbts, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-4501","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/techhub.saworks.io\/fr\/wp-json\/wp\/v2\/pages\/4501"}],"collection":[{"href":"https:\/\/techhub.saworks.io\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/techhub.saworks.io\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/techhub.saworks.io\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techhub.saworks.io\/fr\/wp-json\/wp\/v2\/comments?post=4501"}],"version-history":[{"count":0,"href":"https:\/\/techhub.saworks.io\/fr\/wp-json\/wp\/v2\/pages\/4501\/revisions"}],"wp:attachment":[{"href":"https:\/\/techhub.saworks.io\/fr\/wp-json\/wp\/v2\/media?parent=4501"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}