{"id":16879,"date":"2023-01-20T12:10:20","date_gmt":"2023-01-20T11:10:20","guid":{"rendered":"https:\/\/www.alinto.com\/?p=16879"},"modified":"2024-06-10T09:25:20","modified_gmt":"2024-06-10T07:25:20","slug":"infographie-open-source-un-modele-cle-pour-votre-cybersecurite","status":"publish","type":"post","link":"https:\/\/www.alinto.com\/fr\/infographie-open-source-un-modele-cle-pour-votre-cybersecurite\/","title":{"rendered":"[Infographie] Open source : un mod\u00e8le cl\u00e9 pour votre cybers\u00e9curit\u00e9 ?"},"content":{"rendered":"<p>Dans cette infographie, nous faisons le point sur la croissance des technologies open source, et leur r\u00f4le dans la cybers\u00e9curit\u00e9.<\/p>\n<p>L&rsquo;open source s&rsquo;impose et devient incontournable dans le paysage num\u00e9rique. Son utilisation s\u2019est acc\u00e9l\u00e9r\u00e9e avec le d\u00e9veloppement d&rsquo;internet, du cloud et l\u2019essor des communaut\u00e9s de d\u00e9veloppeurs qui contribuent et partagent leurs connaissances. Gouvernance, communaut\u00e9 et ouverture du code sont les principaux leviers d\u2019adoption de l\u2019open source, pouss\u00e9e \u00e9galement par les probl\u00e9matiques de souverainet\u00e9 num\u00e9rique et de cybers\u00e9curit\u00e9. Avec un avantage non n\u00e9gligeable : la rapidit\u00e9 de d\u00e9tection des failles et de production de correctifs gr\u00e2ce \u00e0 l\u2019engagement des communaut\u00e9s.<\/p>\n<h2>L&rsquo;Open Source, un mod\u00e8le en plein essor<\/h2>\n<p>Les chiffres cl\u00e9s :<\/p>\n<ul>\n<li>La croissance annuelle du march\u00e9 du logiciel libre est de <strong>5,9 Mds\u20ac\u00a0<\/strong><\/li>\n<li>La croissance annuelle de l&rsquo;open source en France serait de 8 % entre 2022 et 2027<\/li>\n<li>Les technologies open source repr\u00e9sentent <strong>11 %<\/strong> des logiciels et services en France<\/li>\n<li><strong>80 % <\/strong>des entreprises utilisent des logiciels Open Source<\/li>\n<li>En 2022 en France, les logiciels et services cybers\u00e9curit\u00e9 bas\u00e9s sur l&rsquo;open source repr\u00e9sentaient<strong> 560 M\u20ac<\/strong><\/li>\n<li>La fili\u00e8re du logiciel libre en France compte recruter <strong>26 000 salari\u00e9s<\/strong> entre 2022 et 2027<\/li>\n<\/ul>\n<h2>Un r\u00f4le majeur pour\u00a0la cybers\u00e9curit\u00e9<\/h2>\n<p><span style=\"font-weight: 400;\">Depuis plusieurs ann\u00e9es, l\u2019open source\u00a0\u00a0<\/span><span style=\"font-weight: 400;\">est une alternative pl\u00e9biscit\u00e9e pour les\u00a0\u00a0<\/span><span style=\"font-weight: 400;\">solutions de cybers\u00e9curit\u00e9 : gestion\u00a0\u00a0<\/span><span style=\"font-weight: 400;\">des identit\u00e9s, des acc\u00e8s, pare-feu,\u00a0\u00a0<\/span><span style=\"font-weight: 400;\">supervision des infrastructures,\u00a0\u00a0<\/span><span style=\"font-weight: 400;\">orchestration des infrastructures&#8230;<\/span><\/p>\n<ul>\n<li>Les logiciels et services de cybers\u00e9curit\u00e9 bas\u00e9s sur l&rsquo;Open Source repr\u00e9sentent <strong>560 M\u20ac<\/strong> en France 2022<\/li>\n<li>En 2027, selon les pr\u00e9visions, ils repr\u00e9senteront <strong>1,1 Mds\u20ac<br \/>\n<\/strong><\/li>\n<\/ul>\n<h2>Alinto et les technologies open source de protection des messageries<\/h2>\n<p>La s\u00e9curisation des messageries est la premi\u00e8re \u00e9tape pour renforcer la protection contre les cyberattaques. Et l\u2019open source est un mod\u00e8le efficace et souverain pour la s\u00e9curit\u00e9. Face \u00e0 ce constat, et afin de renforcer son positionnement d\u2019expert de la s\u00e9curit\u00e9 de l\u2019email, Alinto s&rsquo;investit dans l\u2019open source \u00e0 travers deux solutions : messagerie et antispam.<\/p>\n<h3>SOGo en chiffres :<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.alinto.com\/fr\/sogo-opensource\/\">Webmail Open Source<\/a> cr\u00e9\u00e9 en <strong>2004<\/strong><\/li>\n<li>Communaut\u00e9 de <strong>3 000<\/strong> membres<\/li>\n<li><strong>21 000<\/strong> t\u00e9l\u00e9chargements<\/li>\n<\/ul>\n<h3>MailCleaner en chiffres :<\/h3>\n<ul>\n<li>Cr\u00e9ation de <a href=\"https:\/\/www.alinto.com\/fr\/mailcleaner-antispam-serveur-virtuel-dedie\/\">MailCleaner<\/a> en <strong>2003<\/strong><\/li>\n<li>Communaut\u00e9 de <strong>4 500<\/strong> membres<\/li>\n<li><strong>12 000<\/strong> t\u00e9l\u00e9chargements<\/li>\n<\/ul>\n<img loading=\"lazy\" decoding=\"async\" class=\"wp-image-16880 aligncenter\" src=\"https:\/\/www.alinto.com\/wp-content\/uploads\/2023\/01\/Infographie-Alinto-Open-source-Janv23.jpg\" alt=\"infographie open source\" width=\"614\" height=\"4803\" \/>\n<p>D\u00e9couvrez \u00e9galement notre article sur l&rsquo;<a href=\"https:\/\/www.alinto.com\/fr\/open-source-souverainete-numerique\/\">Open Source et la Souverainet\u00e9<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dans cette infographie, nous faisons le point sur la croissance des technologies open source, et leur (&#8230;)<\/p>\n","protected":false},"author":9,"featured_media":16897,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[183],"tags":[],"class_list":["post-16879","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-open-source"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Infographie : Open source, mod\u00e8le cl\u00e9 pour la cybers\u00e9curit\u00e9<\/title>\n<meta name=\"description\" content=\"Dans cette infographie, nous faisons le point sur le poids de l&#039;open source dans le paysage num\u00e9rique et la cybers\u00e9curit\u00e9.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.alinto.com\/fr\/infographie-open-source-un-modele-cle-pour-votre-cybersecurite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Infographie : Open source, mod\u00e8le cl\u00e9 pour la cybers\u00e9curit\u00e9\" \/>\n<meta property=\"og:description\" content=\"Dans cette infographie, nous faisons le point sur le poids de l&#039;open source dans le paysage num\u00e9rique et la cybers\u00e9curit\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.alinto.com\/fr\/infographie-open-source-un-modele-cle-pour-votre-cybersecurite\/\" \/>\n<meta property=\"og:site_name\" content=\"Alinto\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-20T11:10:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-10T07:25:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.alinto.com\/wp-content\/uploads\/2023\/01\/Capture-decran-2023-01-20-121240.png\" \/>\n\t<meta property=\"og:image:width\" content=\"625\" \/>\n\t<meta property=\"og:image:height\" content=\"332\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Rodolphe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@rfrering@alinto.net\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rodolphe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/infographie-open-source-un-modele-cle-pour-votre-cybersecurite\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/infographie-open-source-un-modele-cle-pour-votre-cybersecurite\\\/\"},\"author\":{\"name\":\"Rodolphe\",\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/#\\\/schema\\\/person\\\/4b8003811ac2b1c38db595ffb531b297\"},\"headline\":\"[Infographie] Open source : un mod\u00e8le cl\u00e9 pour votre cybers\u00e9curit\u00e9 ?\",\"datePublished\":\"2023-01-20T11:10:20+00:00\",\"dateModified\":\"2024-06-10T07:25:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/infographie-open-source-un-modele-cle-pour-votre-cybersecurite\\\/\"},\"wordCount\":402,\"publisher\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/infographie-open-source-un-modele-cle-pour-votre-cybersecurite\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.alinto.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Capture-decran-2023-01-20-121240.png\",\"articleSection\":[\"Open source\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/infographie-open-source-un-modele-cle-pour-votre-cybersecurite\\\/\",\"url\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/infographie-open-source-un-modele-cle-pour-votre-cybersecurite\\\/\",\"name\":\"Infographie : Open source, mod\u00e8le cl\u00e9 pour la cybers\u00e9curit\u00e9\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/infographie-open-source-un-modele-cle-pour-votre-cybersecurite\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/infographie-open-source-un-modele-cle-pour-votre-cybersecurite\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.alinto.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Capture-decran-2023-01-20-121240.png\",\"datePublished\":\"2023-01-20T11:10:20+00:00\",\"dateModified\":\"2024-06-10T07:25:20+00:00\",\"description\":\"Dans cette infographie, nous faisons le point sur le poids de l'open source dans le paysage num\u00e9rique et la cybers\u00e9curit\u00e9.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/infographie-open-source-un-modele-cle-pour-votre-cybersecurite\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.alinto.com\\\/fr\\\/infographie-open-source-un-modele-cle-pour-votre-cybersecurite\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/infographie-open-source-un-modele-cle-pour-votre-cybersecurite\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.alinto.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Capture-decran-2023-01-20-121240.png\",\"contentUrl\":\"https:\\\/\\\/www.alinto.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Capture-decran-2023-01-20-121240.png\",\"width\":625,\"height\":332},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/infographie-open-source-un-modele-cle-pour-votre-cybersecurite\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"[Infographie] Open source : un mod\u00e8le cl\u00e9 pour votre cybers\u00e9curit\u00e9 ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/\",\"name\":\"Alinto\",\"description\":\"Solutions email &amp; securit\u00e9 email\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/#organization\",\"name\":\"Alinto\",\"url\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.alinto.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/logo-alinto-1-1.svg\",\"contentUrl\":\"https:\\\/\\\/www.alinto.com\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/logo-alinto-1-1.svg\",\"caption\":\"Alinto\"},\"image\":{\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.alinto.com\\\/fr\\\/#\\\/schema\\\/person\\\/4b8003811ac2b1c38db595ffb531b297\",\"name\":\"Rodolphe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/76b25f131e5166b4b5a6f3bf46d5f761868d10852374c4b64c26defa0f63e537?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/76b25f131e5166b4b5a6f3bf46d5f761868d10852374c4b64c26defa0f63e537?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/76b25f131e5166b4b5a6f3bf46d5f761868d10852374c4b64c26defa0f63e537?s=96&d=mm&r=g\",\"caption\":\"Rodolphe\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/rfrering@alinto.net\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Infographie : Open source, mod\u00e8le cl\u00e9 pour la cybers\u00e9curit\u00e9","description":"Dans cette infographie, nous faisons le point sur le poids de l'open source dans le paysage num\u00e9rique et la cybers\u00e9curit\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.alinto.com\/fr\/infographie-open-source-un-modele-cle-pour-votre-cybersecurite\/","og_locale":"fr_FR","og_type":"article","og_title":"Infographie : Open source, mod\u00e8le cl\u00e9 pour la cybers\u00e9curit\u00e9","og_description":"Dans cette infographie, nous faisons le point sur le poids de l'open source dans le paysage num\u00e9rique et la cybers\u00e9curit\u00e9.","og_url":"https:\/\/www.alinto.com\/fr\/infographie-open-source-un-modele-cle-pour-votre-cybersecurite\/","og_site_name":"Alinto","article_published_time":"2023-01-20T11:10:20+00:00","article_modified_time":"2024-06-10T07:25:20+00:00","og_image":[{"width":625,"height":332,"url":"https:\/\/www.alinto.com\/wp-content\/uploads\/2023\/01\/Capture-decran-2023-01-20-121240.png","type":"image\/png"}],"author":"Rodolphe","twitter_card":"summary_large_image","twitter_creator":"@rfrering@alinto.net","twitter_misc":{"\u00c9crit par":"Rodolphe","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.alinto.com\/fr\/infographie-open-source-un-modele-cle-pour-votre-cybersecurite\/#article","isPartOf":{"@id":"https:\/\/www.alinto.com\/fr\/infographie-open-source-un-modele-cle-pour-votre-cybersecurite\/"},"author":{"name":"Rodolphe","@id":"https:\/\/www.alinto.com\/fr\/#\/schema\/person\/4b8003811ac2b1c38db595ffb531b297"},"headline":"[Infographie] Open source : un mod\u00e8le cl\u00e9 pour votre cybers\u00e9curit\u00e9 ?","datePublished":"2023-01-20T11:10:20+00:00","dateModified":"2024-06-10T07:25:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.alinto.com\/fr\/infographie-open-source-un-modele-cle-pour-votre-cybersecurite\/"},"wordCount":402,"publisher":{"@id":"https:\/\/www.alinto.com\/fr\/#organization"},"image":{"@id":"https:\/\/www.alinto.com\/fr\/infographie-open-source-un-modele-cle-pour-votre-cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.alinto.com\/wp-content\/uploads\/2023\/01\/Capture-decran-2023-01-20-121240.png","articleSection":["Open source"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.alinto.com\/fr\/infographie-open-source-un-modele-cle-pour-votre-cybersecurite\/","url":"https:\/\/www.alinto.com\/fr\/infographie-open-source-un-modele-cle-pour-votre-cybersecurite\/","name":"Infographie : Open source, mod\u00e8le cl\u00e9 pour la cybers\u00e9curit\u00e9","isPartOf":{"@id":"https:\/\/www.alinto.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.alinto.com\/fr\/infographie-open-source-un-modele-cle-pour-votre-cybersecurite\/#primaryimage"},"image":{"@id":"https:\/\/www.alinto.com\/fr\/infographie-open-source-un-modele-cle-pour-votre-cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/www.alinto.com\/wp-content\/uploads\/2023\/01\/Capture-decran-2023-01-20-121240.png","datePublished":"2023-01-20T11:10:20+00:00","dateModified":"2024-06-10T07:25:20+00:00","description":"Dans cette infographie, nous faisons le point sur le poids de l'open source dans le paysage num\u00e9rique et la cybers\u00e9curit\u00e9.","breadcrumb":{"@id":"https:\/\/www.alinto.com\/fr\/infographie-open-source-un-modele-cle-pour-votre-cybersecurite\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.alinto.com\/fr\/infographie-open-source-un-modele-cle-pour-votre-cybersecurite\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.alinto.com\/fr\/infographie-open-source-un-modele-cle-pour-votre-cybersecurite\/#primaryimage","url":"https:\/\/www.alinto.com\/wp-content\/uploads\/2023\/01\/Capture-decran-2023-01-20-121240.png","contentUrl":"https:\/\/www.alinto.com\/wp-content\/uploads\/2023\/01\/Capture-decran-2023-01-20-121240.png","width":625,"height":332},{"@type":"BreadcrumbList","@id":"https:\/\/www.alinto.com\/fr\/infographie-open-source-un-modele-cle-pour-votre-cybersecurite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.alinto.com\/fr\/"},{"@type":"ListItem","position":2,"name":"[Infographie] Open source : un mod\u00e8le cl\u00e9 pour votre cybers\u00e9curit\u00e9 ?"}]},{"@type":"WebSite","@id":"https:\/\/www.alinto.com\/fr\/#website","url":"https:\/\/www.alinto.com\/fr\/","name":"Alinto","description":"Solutions email &amp; securit\u00e9 email","publisher":{"@id":"https:\/\/www.alinto.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.alinto.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.alinto.com\/fr\/#organization","name":"Alinto","url":"https:\/\/www.alinto.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.alinto.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.alinto.com\/wp-content\/uploads\/2022\/04\/logo-alinto-1-1.svg","contentUrl":"https:\/\/www.alinto.com\/wp-content\/uploads\/2022\/04\/logo-alinto-1-1.svg","caption":"Alinto"},"image":{"@id":"https:\/\/www.alinto.com\/fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.alinto.com\/fr\/#\/schema\/person\/4b8003811ac2b1c38db595ffb531b297","name":"Rodolphe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/76b25f131e5166b4b5a6f3bf46d5f761868d10852374c4b64c26defa0f63e537?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/76b25f131e5166b4b5a6f3bf46d5f761868d10852374c4b64c26defa0f63e537?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/76b25f131e5166b4b5a6f3bf46d5f761868d10852374c4b64c26defa0f63e537?s=96&d=mm&r=g","caption":"Rodolphe"},"sameAs":["https:\/\/x.com\/rfrering@alinto.net"]}]}},"_links":{"self":[{"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/posts\/16879","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/comments?post=16879"}],"version-history":[{"count":0,"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/posts\/16879\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/media\/16897"}],"wp:attachment":[{"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/media?parent=16879"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/categories?post=16879"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.alinto.com\/fr\/wp-json\/wp\/v2\/tags?post=16879"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}