{"version":"1.0","provider_name":"digatus","provider_url":"https:\/\/digatus.com\/fr\/","author_name":"Annabell Renner","author_url":"https:\/\/digatus.com\/fr\/author\/annabell\/","title":"Audit de l'infrastructure informatique et des processus","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"0P8R3SYkMX\"><a href=\"https:\/\/digatus.com\/fr\/audit-de-linfrastructure-informatique-et-des-processus\/\">Audit de l&rsquo;infrastructure informatique et des processus<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/digatus.com\/fr\/audit-de-linfrastructure-informatique-et-des-processus\/embed\/#?secret=0P8R3SYkMX\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Audit de l&rsquo;infrastructure informatique et des processus\u00a0\u00bb &#8212; digatus\" data-secret=\"0P8R3SYkMX\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/digatus.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/digatus.com\/wp-content\/uploads\/2021\/11\/DocMorris.jpg","thumbnail_width":1536,"thumbnail_height":1024,"description":"Une forte croissance de la client\u00e8le et des commandes ainsi qu'une augmentation du nombre d'employ\u00e9s, des structures et des processus \u00e9tablis ont conduit \u00e0 une multitude de solutions informatiques. Avec un regard critique \u00ab de l'ext\u00e9rieur \u00bb, nous vous aidons \u00e0 trier les structures, \u00e0 identifier les goulots d'\u00e9tranglement potentiels et \u00e0 fournir des recommandations d'action pragmatiques !"}