{"id":31,"date":"2022-04-16T13:54:56","date_gmt":"2022-04-16T13:54:56","guid":{"rendered":"https:\/\/fouleye-camara.com\/?page_id=31"},"modified":"2024-05-05T09:20:52","modified_gmt":"2024-05-05T09:20:52","slug":"veille","status":"publish","type":"page","link":"https:\/\/fouleye-camara.com\/index.php\/veille\/","title":{"rendered":"veille"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"31\" class=\"elementor elementor-31\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dcb8bfc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dcb8bfc\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1833249\" data-id=\"1833249\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6b309e9 elementor-widget elementor-widget-image\" data-id=\"6b309e9\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.6.4 - 13-04-2022 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"372\" src=\"https:\/\/fouleye-camara.com\/wp-content\/uploads\/2022\/04\/big-data.png\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/fouleye-camara.com\/wp-content\/uploads\/2022\/04\/big-data.png 700w, https:\/\/fouleye-camara.com\/wp-content\/uploads\/2022\/04\/big-data-300x159.png 300w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-47baeea elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"47baeea\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ec55bc8\" data-id=\"ec55bc8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8301771 elementor-widget elementor-widget-heading\" data-id=\"8301771\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.6.4 - 13-04-2022 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\"><font color=\"#000000\"><span style=\"font-size: 40px;\">Introduction<\/span><\/font><\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-542a895 elementor-widget elementor-widget-text-editor\" data-id=\"542a895\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.6.4 - 13-04-2022 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#818a91;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#818a91;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p data-adtags-visited=\"true\">Il nous a \u00e9t\u00e9 demand\u00e9 de choisir un sujet de veille technologique. J\u2019ai choisi de faire des recherches sur le Big Data car, outre la traduction litt\u00e9rale, qui peut sembler \u00e9vidente et dont tout le monde parle, je n\u2019avais aucune id\u00e9e des notions que ce terme pouvait englober.\u00a0<\/p><p data-adtags-visited=\"true\"><b>Qu&rsquo;est ce qu&rsquo;une veille technologique ?<\/b><\/p><p data-adtags-visited=\"true\">La\u00a0<b>veille technologique<\/b> \u00a0consiste \u00e0 s&rsquo;informer de fa\u00e7on syst\u00e9matique sur les techniques les plus r\u00e9centes et surtout sur leur mise \u00e0 disposition commerciale et \u00a0ainsi rester informer sur les nouveaut\u00e9s.<\/p><p>\u00a0<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-387a793 elementor-widget elementor-widget-heading\" data-id=\"387a793\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Big data dans la d\u00e9tection des fraudes de moyens de paiement<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-262e150 elementor-widget elementor-widget-text-editor\" data-id=\"262e150\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p dir=\"ltr\" style=\"line-height: 1.38; background-color: #ffffff; margin-top: 5pt; margin-bottom: 0pt; padding: 0pt 0pt 5pt 0pt;\"><span style=\"font-size: 12.499999999999998pt; font-family: Arial; color: #202122; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Le <\/span><span style=\"font-size: 12.499999999999998pt; font-family: Arial; color: #202122; background-color: transparent; font-weight: bold; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">big data <\/span><span style=\"font-size: 12.499999999999998pt; font-family: Arial; color: #202122; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"> (\u00ab grosses donn\u00e9es \u00bb en anglais), les <\/span><span style=\"font-size: 12.499999999999998pt; font-family: Arial; color: #202122; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">m\u00e9gadonn\u00e9es<\/span><span style=\"font-size: 12.499999999999998pt; font-family: Arial; color: #202122; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"> ou les <\/span><span style=\"font-size: 12.499999999999998pt; font-family: Arial; color: #202122; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">donn\u00e9es massives<\/span><span style=\"font-size: 12.499999999999998pt; font-family: Arial; color: #202122; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">, d\u00e9signe les ressources d\u2019informations dont les caract\u00e9ristiques en termes de volume, de v\u00e9locit\u00e9 et de vari\u00e9t\u00e9<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.38; background-color: #ffffff; margin-top: 0pt; margin-bottom: 0pt; padding: 2pt 0pt 7pt 0pt;\"><span style=\"font-size: 12.499999999999998pt; font-family: Arial; color: #202122; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Volume<\/span><span style=\"font-size: 12.499999999999998pt; font-family: Arial; color: #202122; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"> : les entreprises sont submerg\u00e9es de volumes de donn\u00e9es croissants de tous types. Les donn\u00e9es num\u00e9riques cr\u00e9\u00e9es dans le monde seraient pass\u00e9es de 1,2 zettaoctets (valant 1021 octets) par an en 2010 \u00e0 1,8 zettaoctets en 2011, puis 2,8 zettaoctets en 2012 et s\u2019\u00e9l\u00e8veront \u00e0 40 zettaoctets en 2020.<\/span><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.38; background-color: #ffffff; margin-top: 0pt; margin-bottom: 0pt; padding: 0pt 0pt 7pt 0pt;\"><span style=\"font-size: 12.499999999999998pt; font-family: Arial; color: #202122; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">V\u00e9locit\u00e9<\/span><span style=\"font-size: 12.499999999999998pt; font-family: Arial; color: #202122; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"> : elle repr\u00e9sente la fr\u00e9quence \u00e0 laquelle les donn\u00e9es sont \u00e0 la fois g\u00e9n\u00e9r\u00e9es, captur\u00e9es et partag\u00e9es. Pour r\u00e9pondre aux besoins des processus chrono sensibles, tels que la d\u00e9tection de fraudes, le Big Data doit \u00eatre utilis\u00e9 \u00e0 mesure que les donn\u00e9es sont collect\u00e9es par l\u2019entreprise, c\u2019est \u00e0 dire que les flux croissants de donn\u00e9es doivent \u00eatre analys\u00e9s en temps r\u00e9el afin d\u2019en tirer le meilleur r\u00e9sultat.<\/span><\/p>\n<p><span style=\"font-size: 12.5pt; font-family: Arial; color: #202122; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\">Vari\u00e9t\u00e9<\/span><span style=\"font-size: 12.5pt; font-family: Arial; color: #202122; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; vertical-align: baseline; white-space: pre-wrap;\"> : le Big Data se pr\u00e9sente sous la forme de donn\u00e9es brute s, complexes et parfois non-structur\u00e9es. Quelques exemples de sources : les messages sur les sites de m\u00e9dias sociaux, les images et vid\u00e9os publi\u00e9es en ligne, les signaux GPS de t\u00e9l\u00e9phones mobiles. Les analyses sont d\u2019autant plus complexes qu\u2019elles portent sur des liens entre des donn\u00e9es de natures diff\u00e9rentes.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a758a20 elementor-widget elementor-widget-text-editor\" data-id=\"a758a20\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"color: rgba(var(--kubio-color-6-variant-4),1);\">Le Big Data fait r\u00e9f\u00e9rence \u00e0 des ensembles de donn\u00e9es extr\u00eamement volumineux qui sont analys\u00e9s par des technologies avanc\u00e9es pour r\u00e9v\u00e9ler des tendances, des mod\u00e8les et des associations, surtout en relation avec le comportement et les interactions humaines.<\/span><br><\/p>\n<p><i style=\"color: rgba(var(--kubio-color-6-variant-4),1);\">Le <\/i><span style=\"color: rgba(var(--kubio-color-6-variant-4),1);\">Big Data dans le paiement<\/span><br><\/p>\n<p>Dans le secteur bancaire, le Big Data s&rsquo;est r\u00e9v\u00e9l\u00e9 \u00eatre un outil pr\u00e9cieux pour combattre la fraude. Les banques d\u00e9veloppent des mod\u00e8les de machine learning qui utilisent l&rsquo;historique des transactions pour d\u00e9tecter et pr\u00e9dire les cas de fraude. Par exemple, ces mod\u00e8les peuvent d\u00e9terminer si un virement est effectu\u00e9 par le titulaire du compte ou s&rsquo;il s&rsquo;agit d&rsquo;une activit\u00e9 suspecte.<\/p>\n<p><span style=\"color: rgba(var(--kubio-color-6-variant-4),1);\">Cas pratique : Soci\u00e9t\u00e9 G\u00e9n\u00e9rale et MOSAIC<\/span><br><\/p>\n<p>Un exemple notable est celui de la Soci\u00e9t\u00e9 G\u00e9n\u00e9rale qui a d\u00e9velopp\u00e9 MOSAIC, un outil de d\u00e9tection de fraude qui utilise l&rsquo;intelligence artificielle pour renforcer la s\u00e9curit\u00e9 des transactions. Cet outil s&rsquo;appuie sur le Big Data pour analyser les comportements de transaction et identifier les anomalies qui pourraient indiquer une fraude.<\/p>\n<p><br><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae7f7a7 elementor-aspect-ratio-169 elementor-widget elementor-widget-video\" data-id=\"ae7f7a7\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=KxqqQoyRvVE&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;,&quot;aspect_ratio&quot;:&quot;169&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.6.4 - 13-04-2022 *\/\n.elementor-widget-video .elementor-widget-container{overflow:hidden;-webkit-transform:translateZ(0);transform:translateZ(0)}.elementor-widget-video .elementor-open-inline .elementor-custom-embed-image-overlay{position:absolute;top:0;left:0;width:100%;height:100%;background-size:cover;background-position:50%}.elementor-widget-video .elementor-custom-embed-image-overlay{cursor:pointer;text-align:center}.elementor-widget-video .elementor-custom-embed-image-overlay:hover .elementor-custom-embed-play i{opacity:1}.elementor-widget-video .elementor-custom-embed-image-overlay img{display:block;width:100%}.elementor-widget-video .e-hosted-video .elementor-video{-o-object-fit:cover;object-fit:cover}<\/style>\t\t<div class=\"elementor-wrapper elementor-fit-aspect-ratio elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-44b1748 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"44b1748\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2150b88\" data-id=\"2150b88\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-62dc106 elementor-widget elementor-widget-heading\" data-id=\"62dc106\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Avantages, opportunit\u00e9s  et inconv\u00e9nients de l'utilisation du Big Data<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b3d8b30 elementor-widget elementor-widget-text-editor\" data-id=\"b3d8b30\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 700;\">Am\u00e9lioration de la pr\u00e9cision des d\u00e9tections<\/span>&nbsp;:&nbsp;<br>Le Big Data permet d&rsquo;analyser de vastes volumes de donn\u00e9es transactionnelles en temps r\u00e9el. Cela aide \u00e0 identifier des mod\u00e8les et des anomalies qui pourraient indiquer une activit\u00e9 frauduleuse&nbsp;<span style=\"color: rgba(var(--kubio-color-6-variant-4),1);\">avec une pr\u00e9cision accrue.<\/span><\/p><p><o:p><\/o:p><\/p><p style=\"--tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-pan-x: ; --tw-pan-y: ; --tw-pinch-zoom: ; --tw-scroll-snap-strictness: proximity; --tw-gradient-from-position: ; --tw-gradient-via-position: ; --tw-gradient-to-position: ; --tw-ordinal: ; --tw-slashed-zero: ; --tw-numeric-figure: ; --tw-numeric-spacing: ; --tw-numeric-fraction: ; --tw-ring-inset: ; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(69,89,164,.5); --tw-ring-offset-shadow: 0 0 transparent; --tw-ring-shadow: 0 0 transparent; --tw-shadow: 0 0 transparent; --tw-shadow-colored: 0 0 transparent; --tw-blur: ; --tw-brightness: ; --tw-contrast: ; --tw-grayscale: ; --tw-hue-rotate: ; --tw-invert: ; --tw-saturate: ; --tw-sepia: ; --tw-drop-shadow: ; --tw-backdrop-blur: ; --tw-backdrop-brightness: ; --tw-backdrop-contrast: ; --tw-backdrop-grayscale: ; --tw-backdrop-hue-rotate: ; --tw-backdrop-invert: ; --tw-backdrop-opacity: ; --tw-backdrop-saturate: ; --tw-backdrop-sepia: ; --tw-contain-size: ; --tw-contain-layout: ; --tw-contain-paint: ; --tw-contain-style: ;\"><span style=\"font-weight: 700;\">Adaptation aux nouvelles m\u00e9thodes de fraude<\/span>&nbsp;: Les fraudeurs \u00e9voluent constamment dans leurs m\u00e9thodes pour \u00e9chapper aux syst\u00e8mes de d\u00e9tection traditionnels. Une veille technologique continue permet de rester \u00e0 jour avec les derni\u00e8res techniques et technologies de fraude, et d&rsquo;adapter les syst\u00e8mes de d\u00e9tection en cons\u00e9quence.<o:p><\/o:p><\/p><p style=\"--tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-pan-x: ; --tw-pan-y: ; --tw-pinch-zoom: ; --tw-scroll-snap-strictness: proximity; --tw-gradient-from-position: ; --tw-gradient-via-position: ; --tw-gradient-to-position: ; --tw-ordinal: ; --tw-slashed-zero: ; --tw-numeric-figure: ; --tw-numeric-spacing: ; --tw-numeric-fraction: ; --tw-ring-inset: ; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(69,89,164,.5); --tw-ring-offset-shadow: 0 0 transparent; --tw-ring-shadow: 0 0 transparent; --tw-shadow: 0 0 transparent; --tw-shadow-colored: 0 0 transparent; --tw-blur: ; --tw-brightness: ; --tw-contrast: ; --tw-grayscale: ; --tw-hue-rotate: ; --tw-invert: ; --tw-saturate: ; --tw-sepia: ; --tw-drop-shadow: ; --tw-backdrop-blur: ; --tw-backdrop-brightness: ; --tw-backdrop-contrast: ; --tw-backdrop-grayscale: ; --tw-backdrop-hue-rotate: ; --tw-backdrop-invert: ; --tw-backdrop-opacity: ; --tw-backdrop-saturate: ; --tw-backdrop-sepia: ; --tw-contain-size: ; --tw-contain-layout: ; --tw-contain-paint: ; --tw-contain-style: ;\"><span style=\"font-weight: 700;\">R\u00e9duction des pertes financi\u00e8res<\/span><\/p><p style=\"--tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-pan-x: ; --tw-pan-y: ; --tw-pinch-zoom: ; --tw-scroll-snap-strictness: proximity; --tw-gradient-from-position: ; --tw-gradient-via-position: ; --tw-gradient-to-position: ; --tw-ordinal: ; --tw-slashed-zero: ; --tw-numeric-figure: ; --tw-numeric-spacing: ; --tw-numeric-fraction: ; --tw-ring-inset: ; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(69,89,164,.5); --tw-ring-offset-shadow: 0 0 transparent; --tw-ring-shadow: 0 0 transparent; --tw-shadow: 0 0 transparent; --tw-shadow-colored: 0 0 transparent; --tw-blur: ; --tw-brightness: ; --tw-contrast: ; --tw-grayscale: ; --tw-hue-rotate: ; --tw-invert: ; --tw-saturate: ; --tw-sepia: ; --tw-drop-shadow: ; --tw-backdrop-blur: ; --tw-backdrop-brightness: ; --tw-backdrop-contrast: ; --tw-backdrop-grayscale: ; --tw-backdrop-hue-rotate: ; --tw-backdrop-invert: ; --tw-backdrop-opacity: ; --tw-backdrop-saturate: ; --tw-backdrop-sepia: ; --tw-contain-size: ; --tw-contain-layout: ; --tw-contain-paint: ; --tw-contain-style: ;\">En d\u00e9tectant efficacement les fraudes \u00e0 un stade pr\u00e9coce, les entreprises peuvent significativement r\u00e9duire les pertes financi\u00e8res dues \u00e0 des activit\u00e9s frauduleuses. Cela peut aussi diminuer les co\u00fbts associ\u00e9s aux enqu\u00eates de fraude et aux recouvrements.<o:p><\/o:p><\/p><p style=\"--tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-pan-x: ; --tw-pan-y: ; --tw-pinch-zoom: ; --tw-scroll-snap-strictness: proximity; --tw-gradient-from-position: ; --tw-gradient-via-position: ; --tw-gradient-to-position: ; --tw-ordinal: ; --tw-slashed-zero: ; --tw-numeric-figure: ; --tw-numeric-spacing: ; --tw-numeric-fraction: ; --tw-ring-inset: ; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(69,89,164,.5); --tw-ring-offset-shadow: 0 0 transparent; --tw-ring-shadow: 0 0 transparent; --tw-shadow: 0 0 transparent; --tw-shadow-colored: 0 0 transparent; --tw-blur: ; --tw-brightness: ; --tw-contrast: ; --tw-grayscale: ; --tw-hue-rotate: ; --tw-invert: ; --tw-saturate: ; --tw-sepia: ; --tw-drop-shadow: ; --tw-backdrop-blur: ; --tw-backdrop-brightness: ; --tw-backdrop-contrast: ; --tw-backdrop-grayscale: ; --tw-backdrop-hue-rotate: ; --tw-backdrop-invert: ; --tw-backdrop-opacity: ; --tw-backdrop-saturate: ; --tw-backdrop-sepia: ; --tw-contain-size: ; --tw-contain-layout: ; --tw-contain-paint: ; --tw-contain-style: ;\"><span style=\"font-weight: 700;\">Conformit\u00e9 r\u00e9glementaire<\/span>&nbsp;:&nbsp;<br>De nombreux secteurs, notamment la finance et la sant\u00e9, sont r\u00e9glement\u00e9s en termes de gestion des donn\u00e9es et de lutte contre la fraude. La veille technologique aide les organisations \u00e0 rester conformes aux lois en vigueur, \u00e9vitant ainsi des p\u00e9nalit\u00e9s potentielles.<o:p><\/o:p><\/p><p style=\"--tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-pan-x: ; --tw-pan-y: ; --tw-pinch-zoom: ; --tw-scroll-snap-strictness: proximity; --tw-gradient-from-position: ; --tw-gradient-via-position: ; --tw-gradient-to-position: ; --tw-ordinal: ; --tw-slashed-zero: ; --tw-numeric-figure: ; --tw-numeric-spacing: ; --tw-numeric-fraction: ; --tw-ring-inset: ; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(69,89,164,.5); --tw-ring-offset-shadow: 0 0 transparent; --tw-ring-shadow: 0 0 transparent; --tw-shadow: 0 0 transparent; --tw-shadow-colored: 0 0 transparent; --tw-blur: ; --tw-brightness: ; --tw-contrast: ; --tw-grayscale: ; --tw-hue-rotate: ; --tw-invert: ; --tw-saturate: ; --tw-sepia: ; --tw-drop-shadow: ; --tw-backdrop-blur: ; --tw-backdrop-brightness: ; --tw-backdrop-contrast: ; --tw-backdrop-grayscale: ; --tw-backdrop-hue-rotate: ; --tw-backdrop-invert: ; --tw-backdrop-opacity: ; --tw-backdrop-saturate: ; --tw-backdrop-sepia: ; --tw-contain-size: ; --tw-contain-layout: ; --tw-contain-paint: ; --tw-contain-style: ;\"><span style=\"font-weight: 700;\">Optimisation des ressources<\/span>&nbsp;:<br>L&rsquo;utilisation de technologies avanc\u00e9es de Big Data pour la d\u00e9tection de fraude permet aux entreprises de d\u00e9ployer plus efficacement leurs ressources humaines et mat\u00e9rielles. Les syst\u00e8mes automatis\u00e9s peuvent g\u00e9rer les analyses de routine, permettant aux \u00e9quipes de se concentrer sur des cas plus complexes et strat\u00e9giques.<o:p><\/o:p><\/p><p style=\"--tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-pan-x: ; --tw-pan-y: ; --tw-pinch-zoom: ; --tw-scroll-snap-strictness: proximity; --tw-gradient-from-position: ; --tw-gradient-via-position: ; --tw-gradient-to-position: ; --tw-ordinal: ; --tw-slashed-zero: ; --tw-numeric-figure: ; --tw-numeric-spacing: ; --tw-numeric-fraction: ; --tw-ring-inset: ; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(69,89,164,.5); --tw-ring-offset-shadow: 0 0 transparent; --tw-ring-shadow: 0 0 transparent; --tw-shadow: 0 0 transparent; --tw-shadow-colored: 0 0 transparent; --tw-blur: ; --tw-brightness: ; --tw-contrast: ; --tw-grayscale: ; --tw-hue-rotate: ; --tw-invert: ; --tw-saturate: ; --tw-sepia: ; --tw-drop-shadow: ; --tw-backdrop-blur: ; --tw-backdrop-brightness: ; --tw-backdrop-contrast: ; --tw-backdrop-grayscale: ; --tw-backdrop-hue-rotate: ; --tw-backdrop-invert: ; --tw-backdrop-opacity: ; --tw-backdrop-saturate: ; --tw-backdrop-sepia: ; --tw-contain-size: ; --tw-contain-layout: ; --tw-contain-paint: ; --tw-contain-style: ;\"><span style=\"font-weight: 700;\">Confiance et r\u00e9putation de&nbsp;<\/span><span style=\"font-weight: 700;\">l&rsquo;entreprise<\/span>&nbsp;:<span style=\"font-weight: 700;\"><br><\/span>&nbsp;Une d\u00e9tection efficace et rapide de la fraude renforce la confiance des clients et des partenaires commerciaux. Cela contribue positivement \u00e0 la r\u00e9putation de l&rsquo;entreprise et peut fournir un avantage comp\u00e9titif sur le march\u00e9.<o:p><\/o:p><\/p><p><\/p><p style=\"--tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-pan-x: ; --tw-pan-y: ; --tw-pinch-zoom: ; --tw-scroll-snap-strictness: proximity; --tw-gradient-from-position: ; --tw-gradient-via-position: ; --tw-gradient-to-position: ; --tw-ordinal: ; --tw-slashed-zero: ; --tw-numeric-figure: ; --tw-numeric-spacing: ; --tw-numeric-fraction: ; --tw-ring-inset: ; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(69,89,164,.5); --tw-ring-offset-shadow: 0 0 transparent; --tw-ring-shadow: 0 0 transparent; --tw-shadow: 0 0 transparent; --tw-shadow-colored: 0 0 transparent; --tw-blur: ; --tw-brightness: ; --tw-contrast: ; --tw-grayscale: ; --tw-hue-rotate: ; --tw-invert: ; --tw-saturate: ; --tw-sepia: ; --tw-drop-shadow: ; --tw-backdrop-blur: ; --tw-backdrop-brightness: ; --tw-backdrop-contrast: ; --tw-backdrop-grayscale: ; --tw-backdrop-hue-rotate: ; --tw-backdrop-invert: ; --tw-backdrop-opacity: ; --tw-backdrop-saturate: ; --tw-backdrop-sepia: ; --tw-contain-size: ; --tw-contain-layout: ; --tw-contain-paint: ; --tw-contain-style: ;\"><span style=\"font-weight: 700;\">Innovation et comp\u00e9titivit\u00e9<\/span>&nbsp;:<br>Les entreprises qui investissent dans la veille technologique pour la d\u00e9tection de fraude montrent souvent une capacit\u00e9 \u00e0 innover et \u00e0 s&rsquo;adapter rapidement aux changements du march\u00e9, ce qui peut les rendre plus comp\u00e9titives.&nbsp;<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29ce987 elementor-widget elementor-widget-text-editor\" data-id=\"29ce987\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>L&rsquo;utilisation du Big Data pr\u00e9sente des avantages suivants:<\/strong><\/p><p><span style=\"font-weight: 400;\">Comme disent certaine le big data est le nouveau \u00e9lectricit\u00e9 du 21iem si\u00e8cle.<\/span><\/p><p><span style=\"font-weight: 400;\">Ceci dit on peut en tir\u00e9 \u00e9norm\u00e9ment des profil gr\u00e2ce \u00e0 l\u2019analyse des donn\u00e9e.<\/span><\/p><p><span style=\"font-weight: 400;\">On peut citer les exemples suivants:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">En France les banque utilise l\u2019analyse des donn\u00e9es pour faire de la d\u00e9tection de fraude dans les moyens de paiement.\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Les e-commer\u00e7ant qui font de la recommandation \u00e0 leurs utilisateurs gr\u00e2ce \u00e0 l\u2019analyse des donn\u00e9es<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Faire de la d\u00e9tection anomalie\u00a0<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/li><li style=\"margin: 0px; padding: 0px 0px 10px 10px; border: 0px; font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: inherit; line-height: 22px; font-family: inherit; vertical-align: baseline; list-style-type: square;\">Am\u00e9liorer son exp\u00e9rience clients ;<\/li><li style=\"margin: 0px; padding: 0px 0px 10px 10px; border: 0px; font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: inherit; line-height: 22px; font-family: inherit; vertical-align: baseline; list-style-type: square;\">Comprendre les attentes et comportements de ses clients et prospects ;<\/li><li style=\"margin: 0px; padding: 0px 0px 10px 10px; border: 0px; font-style: inherit; font-variant: inherit; font-weight: inherit; font-stretch: inherit; font-size: inherit; line-height: 22px; font-family: inherit; vertical-align: baseline; list-style-type: square;\">Optimiser sa strat\u00e9gie marketing digital<\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">\u00a0Google Analytics\u00a0permet par exemple d\u2019optimiser son site web de par une analyse en temps r\u00e9el des donn\u00e9es li\u00e9es: nombre de visites, comportement de navigation, taux de rebond, nombre de pages lues, taux de clics\u2026<br \/><\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Target, aux Etats-Unis,\u00a0<span style=\"margin: 0px; padding: 0px; border: 0px; font-variant-numeric: inherit; font-variant-east-asian: inherit; font-weight: bold; font-stretch: inherit; line-height: inherit; font-family: Roboto; vertical-align: baseline; color: #323232;\">parvient avec le Big Data \u00e0 pr\u00e9dire l\u2019accouchement prochain de femmes enceintes.<\/span><span style=\"color: #242d3c; font-family: Roboto;\">\u00a0Comment\u00a0? En analysant leur comportement d\u2019achat. Les femmes enceintes ach\u00e8tent des cr\u00e8mes sans parfum aux alentours de 3 mois de grossesse et des compl\u00e9ments alimentaires ensuite. C\u2019est aussi \u00e7a le Big Data.<\/span><br \/><\/span><\/li><\/ul><p>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 <strong>Inconv\u00e9nients<\/strong>\u00a0<\/p><ul><li style=\"list-style-type: none;\"><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Utilisation des donn\u00e9es \u00e0 des fins n\u00e9faste pour la soci\u00e9t\u00e9: exemple le scandale Cambridge analytica dans les \u00e9lection l\u00e9gislative aux USA<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">D\u00e9veloppement des robots tueur\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Surveillance de masse : exemple les cameras intelligent en chine<\/span><\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ec7c45 elementor-widget elementor-widget-heading\" data-id=\"6ec7c45\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Technologies utilis\u00e9es pour d\u00e9tecter une fraude bancaire<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47f921e elementor-widget elementor-widget-image\" data-id=\"47f921e\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"773\" height=\"212\" src=\"https:\/\/fouleye-camara.com\/wp-content\/uploads\/2024\/05\/Capture-decran-2024-05-05-111345.png\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/fouleye-camara.com\/wp-content\/uploads\/2024\/05\/Capture-decran-2024-05-05-111345.png 773w, https:\/\/fouleye-camara.com\/wp-content\/uploads\/2024\/05\/Capture-decran-2024-05-05-111345-300x82.png 300w, https:\/\/fouleye-camara.com\/wp-content\/uploads\/2024\/05\/Capture-decran-2024-05-05-111345-768x211.png 768w\" sizes=\"(max-width: 773px) 100vw, 773px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-13464ac elementor-widget elementor-widget-text-editor\" data-id=\"13464ac\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p class=\"MsoNormal\" style=\"mso-margin-top-alt:auto;mso-margin-bottom-alt:auto; line-height:normal\"><span style=\"font-size:10.5pt;font-family:&quot;Segoe UI&quot;,sans-serif; mso-fareast-font-family:&quot;Times New Roman&quot;;mso-font-kerning:0pt;mso-ligatures: none\">&nbsp;<\/span><\/p>\n<p class=\"MsoNormal\">Dans le secteur bancaire, la d\u00e9tection de fraude est particuli\u00e8rement critique en raison de la nature sensible des transactions financi\u00e8res et des cons\u00e9quences potentiellement graves des activit\u00e9s frauduleuses. Les banques utilisent une combinaison de technologies avanc\u00e9es, de r\u00e8gles r\u00e9glementaires, et de pratiques de surveillance pour identifier et pr\u00e9venir la fraude. Voici quelques-unes des technologies et m\u00e9thodes les plus utilis\u00e9es :<o:p><\/o:p><\/p>\n<p class=\"MsoNormal\"><b>Syst\u00e8mes de surveillance des transactions <\/b>: Ces syst\u00e8mes analysent les transactions en temps r\u00e9el pour d\u00e9tecter des comportements inhabituels qui pourraient indiquer une fraude. Ils utilisent souvent des techniques<br>d&rsquo;apprentissage automatique pour apprendre des mod\u00e8les de transactions normales et flaguer celles qui sortent de l&rsquo;ordinaire.<o:p><\/o:p><\/p>\n<p class=\"MsoNormal\"><b>Analyse comportementale et profilage :<\/b> En suivant les habitudes de transaction des clients, les banques peuvent d\u00e9tecter des \u00e9carts significatifs qui sugg\u00e8rent des activit\u00e9s potentiellement frauduleuses. Cela inclut des changements dans les lieux des transactions, les montants d\u00e9pens\u00e9s, ou les types de transactions.<o:p><\/o:p><\/p>\n<p class=\"MsoNormal\"><b>Technologies de l&rsquo;intelligence artificielle (IA)<\/b><b> :<o:p><\/o:p><\/b><\/p>\n<p class=\"MsoNormal\"><b>R\u00e9seaux de neurones et mod\u00e8les pr\u00e9dictifs<\/b><b> :<\/b><\/p><p class=\"MsoNormal\"> Utilis\u00e9s pour identifier les sch\u00e9mas complexes de donn\u00e9es qui pr\u00e9c\u00e8dent souvent les incidents de fraude.<o:p><\/o:p><\/p>\n<p class=\"MsoNormal\"><b>Apprentissage profond (Deep Learning)<\/b> : Pour analyser les donn\u00e9es de transaction \u00e0 un niveau plus profond, d\u00e9tectant ainsi des fraudes plus sophistiqu\u00e9es.<o:p><\/o:p><\/p>\n<p class=\"MsoNormal\"><b>Authentification multifactorielle (MFA)<\/b> : Pour s\u00e9curiser l&rsquo;acc\u00e8s aux comptes en ligne, les banques utilisent plusieurs m\u00e9thodes d&rsquo;authentification, combinant souvent quelque chose que l&rsquo;utilisateur sait (un mot de passe),<br>quelque chose qu&rsquo;il poss\u00e8de (un t\u00e9l\u00e9phone portable pour recevoir un code de v\u00e9rification), et quelque chose qu&rsquo;il est (biom\u00e9trie).<o:p><\/o:p><\/p>\n<p class=\"MsoNormal\"><b>Blockchain<\/b><br>&nbsp;Certaines banques explorent l&rsquo;utilisation de la technologie blockchain pour s\u00e9curiser les transactions et am\u00e9liorer la transparence, rendant ainsi les activit\u00e9s frauduleuses plus difficiles \u00e0 r\u00e9aliser.<o:p><\/o:p><\/p>\n<p class=\"MsoNormal\"><b>Solutions anti-phishing<\/b> : Les banques emploient des technologies pour d\u00e9tecter et<br>bloquer les tentatives de phishing, prot\u00e9geant ainsi les informations personnelles et financi\u00e8res de leurs clients.<o:p><\/o:p><\/p>\n<p class=\"MsoNormal\"><b>Outils de conformit\u00e9 r\u00e9glementaire<\/b> : Les banques utilisent des syst\u00e8mes automatis\u00e9s pour s&rsquo;assurer que toutes les transactions sont conformes aux r\u00e9glementations locales et internationales, ce qui aide \u00e0 pr\u00e9venir la<br>fraude r\u00e9glementaire et le blanchiment d&rsquo;argent.<o:p><\/o:p><\/p>\n<p class=\"MsoNormal\"><b>Collaboration et partage d&rsquo;informations<\/b> : Les banques collaborent souvent avec d&rsquo;autres institutions financi\u00e8res et organismes gouvernementaux pour partager des informations sur les menaces et les tactiques de fraude,<br>am\u00e9liorant ainsi leur capacit\u00e9 \u00e0 d\u00e9tecter et \u00e0 pr\u00e9venir la fraude.&nbsp;<span style=\"color: rgba(var(--kubio-color-6-variant-4),1);\">Ces&nbsp;<\/span><span style=\"color: rgba(var(--kubio-color-6-variant-4),1);\">technologies sont int\u00e9gr\u00e9es dans des cadres de s\u00e9curit\u00e9 strat\u00e9giques qui visent&nbsp;<\/span><span style=\"color: rgba(var(--kubio-color-6-variant-4),1);\">\u00e0 prot\u00e9ger \u00e0 la fois les clients et les actifs institutionnels tout en&nbsp;<\/span><span style=\"color: rgba(var(--kubio-color-6-variant-4),1);\">garantissant la conformit\u00e9 avec les r\u00e9glementations financi\u00e8res strictes.<\/span><\/p><p class=\"MsoNormal\"><o:p><\/o:p><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d46996c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d46996c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-63b14c5\" data-id=\"63b14c5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-36508a3 elementor-widget elementor-widget-text-editor\" data-id=\"36508a3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h1>Veille juridique<\/h1>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1371bfd elementor-widget elementor-widget-image\" data-id=\"1371bfd\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"328\" height=\"153\" src=\"https:\/\/fouleye-camara.com\/wp-content\/uploads\/2022\/04\/telechargement.jpg\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/fouleye-camara.com\/wp-content\/uploads\/2022\/04\/telechargement.jpg 328w, https:\/\/fouleye-camara.com\/wp-content\/uploads\/2022\/04\/telechargement-300x140.jpg 300w\" sizes=\"(max-width: 328px) 100vw, 328px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ef30d6 elementor-widget elementor-widget-text-editor\" data-id=\"1ef30d6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Une\u00a0<b>veille juridique<\/b>\u00a0est un ensemble d&rsquo;actions permettant de se tenir au fait des informations pertinentes dans les domaines l\u00e9gislatif, r\u00e9glementaire, jurisprudentiel, voire doctrinal. Il s&rsquo;agit d&rsquo;une activit\u00e9 continue, et non ponctuelle, comme peut l&rsquo;\u00eatre une simple recherche d&rsquo;informations.<\/p><p>\u00a0<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4af6877 elementor-widget elementor-widget-text-editor\" data-id=\"4af6877\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Comment nos donn\u00e9es sont ils s\u00e9curiser ?<\/p><p><span style=\"color: rgb(39, 40, 41); font-family: &quot;Open Sans&quot;, sans-serif; font-size: 16px;\">Afin de r\u00e9pondre a cette th\u00e9matique ma veille se repose sur diff\u00e9rents articles :<\/span><br><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-31d6e4f elementor-widget elementor-widget-text-editor\" data-id=\"31d6e4f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul><li><a href=\"https:\/\/www.village-justice.com\/articles\/cnil-covid-rappel-des-regles-collecte-des-donnees-personnelles-des-salaries,36732.html\">https:\/\/www.village-justice.com\/articles\/cnil-covid-rappel-des-regles-collecte-des-donnees-personnelles-des-salaries,36732.html<\/a><\/li><li><a href=\"https:\/\/lincnil.github.io\/Guide-RGPD-du-developpeur\/\">https:\/\/lincnil.github.io\/Guide-RGPD-du-developpeur\/<\/a><\/li><li><a href=\"https:\/\/www.lemonde.fr\/pixels\/article\/2019\/01\/16\/rgpd-plus-de-1-200-violations-de-donnees-personnelles-signalees-a-la-cnil-depuis-mai_5410170_4408996.html\">https:\/\/www.lemonde.fr\/pixels\/article\/2019\/01\/16\/rgpd-plus-de-1-200-violations-de-donnees-personnelles-signalees-a-la-cnil-depuis-mai_5410170_4408996.html<\/a><\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e6d5b50 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e6d5b50\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0c5aa7f\" data-id=\"0c5aa7f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-594b2a5 elementor-widget elementor-widget-text-editor\" data-id=\"594b2a5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h2>Mon outils de veille technologique et juridique :<\/h2>\n<ul>\n<li>Feedly<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.pearltrees.com\/fouleyecamara\">https:\/\/www.pearltrees.com\/fouleyecamara<\/a><\/p>\n<div><strong>Source<\/strong><\/div>\n<div><strong>Google alerte<\/strong><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2b5981d elementor-widget elementor-widget-text-editor\" data-id=\"2b5981d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><a href=\"https:\/\/www.google.fr\/alerts#2:0\">https:\/\/www.google.fr\/alerts#2:0<\/a><\/p>\n<p><br><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa70c6d elementor-widget elementor-widget-shortcode\" data-id=\"fa70c6d\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-shortcode\"><div class=\"wp-rss-template-container\" data-wpra-template=\"default\" data-template-ctx=\"eyJzb3VyY2VzIjoiNTczIn0=\">\n    <div class=\"wp-rss-aggregator wpra-list-template  \" data-page=\"1\">\n    \n    \n<ul class=\"wpra-item-list rss-aggregator wpra-item-list--bullets wpra-item-list--default\"\n    start=\"1\">\n                        <li class=\"wpra-item feed-item \">\n            \n            \n\n    <a  href=\"https:\/\/www.lebigdata.fr\/regarder-jo-2024-gratuitement\" target=\"_blank\" rel=\"nofollow\" class=\"\">JO 2024 : Comment regarder la comp\u00e9tition en direct gratuitement ?<\/a>\n\n\n\n\n\n\n<div class=\"wprss-feed-meta\">\n            <span class=\"feed-source\">\n            Source:\n\n                            big data\n                    <\/span>\n    \n            <span class=\"feed-date\">\n            Published on 2024-07-25\n        <\/span>\n    \n    <\/div>\n\n\n\n\n\n            \n        <\/li>\n                    <li class=\"wpra-item feed-item \">\n            \n            \n\n    <a  href=\"https:\/\/www.lebigdata.fr\/soldes-de-printemps-nordvpn-2\" target=\"_blank\" rel=\"nofollow\" class=\"\">Soldes de Printemps NordVPN : \u2013 72% sur le VPN \u00e9lu produit de l\u2019ann\u00e9e 2024 !<\/a>\n\n\n\n\n\n\n<div class=\"wprss-feed-meta\">\n            <span class=\"feed-source\">\n            Source:\n\n                            big data\n                    <\/span>\n    \n            <span class=\"feed-date\">\n            Published on 2024-07-25\n        <\/span>\n    \n    <\/div>\n\n\n\n\n\n            \n        <\/li>\n                    <li class=\"wpra-item feed-item \">\n            \n            \n\n    <a  href=\"https:\/\/www.lebigdata.fr\/protection-assistants-virtuels-cyberattaques\" target=\"_blank\" rel=\"nofollow\" class=\"\">Urgence ! Prot\u00e9gez votre assistant virtuel avant qu\u2019il ne soit trop tard<\/a>\n\n\n\n\n\n\n<div class=\"wprss-feed-meta\">\n            <span class=\"feed-source\">\n            Source:\n\n                            big data\n                    <\/span>\n    \n            <span class=\"feed-date\">\n            Published on 2024-07-25\n        <\/span>\n    \n    <\/div>\n\n\n\n\n\n            \n        <\/li>\n                    <li class=\"wpra-item feed-item \">\n            \n            \n\n    <a  href=\"https:\/\/www.lebigdata.fr\/windows-11-sur-iphone-15\" target=\"_blank\" rel=\"nofollow\" class=\"\">Ce d\u00e9veloppeur a install\u00e9 Windows 11 sur iPhone 15 : d\u00e9couvrez le r\u00e9sultat<\/a>\n\n\n\n\n\n\n<div class=\"wprss-feed-meta\">\n            <span class=\"feed-source\">\n            Source:\n\n                            big data\n                    <\/span>\n    \n            <span class=\"feed-date\">\n            Published on 2024-07-25\n        <\/span>\n    \n    <\/div>\n\n\n\n\n\n            \n        <\/li>\n                    <li class=\"wpra-item feed-item \">\n            \n            \n\n    <a  href=\"https:\/\/www.lebigdata.fr\/en-irlande-la-consommation-denergie-des-data-centers-depasse-celle-des-maisons\" target=\"_blank\" rel=\"nofollow\" class=\"\">En Irlande, les Data Centers consomment plus d\u2019\u00e9lectricit\u00e9 que les maisons : et en France ?<\/a>\n\n\n\n\n\n\n<div class=\"wprss-feed-meta\">\n            <span class=\"feed-source\">\n            Source:\n\n                            big data\n                    <\/span>\n    \n            <span class=\"feed-date\">\n            Published on 2024-07-24\n        <\/span>\n    \n    <\/div>\n\n\n\n\n\n            \n        <\/li>\n                    <li class=\"wpra-item feed-item \">\n            \n            \n\n    <a  href=\"https:\/\/www.lebigdata.fr\/data-insights-laurent-bouteiller-responsable-commercial-grands-comptes-de-commercetools\" target=\"_blank\" rel=\"nofollow\" class=\"\">Data Insights | Laurent Bouteiller (responsable commercial grands comptes de commercetools)<\/a>\n\n\n\n\n\n\n<div class=\"wprss-feed-meta\">\n            <span class=\"feed-source\">\n            Source:\n\n                            big data\n                    <\/span>\n    \n            <span class=\"feed-date\">\n            Published on 2024-07-24\n        <\/span>\n    \n    <\/div>\n\n\n\n\n\n            \n        <\/li>\n                    <li class=\"wpra-item feed-item \">\n            \n            \n\n    <a  href=\"https:\/\/www.lebigdata.fr\/france-ferme-40-sites-de-telechargement\" target=\"_blank\" rel=\"nofollow\" class=\"\">YggTorrent, Torrent\u2026 la France ferme 40 sites de t\u00e9l\u00e9chargement, voici la liste<\/a>\n\n\n\n\n\n\n<div class=\"wprss-feed-meta\">\n            <span class=\"feed-source\">\n            Source:\n\n                            big data\n                    <\/span>\n    \n            <span class=\"feed-date\">\n            Published on 2024-07-24\n        <\/span>\n    \n    <\/div>\n\n\n\n\n\n            \n        <\/li>\n                    <li class=\"wpra-item feed-item \">\n            \n            \n\n    <a  href=\"https:\/\/www.lebigdata.fr\/la-ps5-pro-confirme-sa-puissance-massive-et-sa-date-de-sortie\" target=\"_blank\" rel=\"nofollow\" class=\"\">La PS5 Pro confirme sa puissance massive\u2026 et sa date de sortie\u2009!<\/a>\n\n\n\n\n\n\n<div class=\"wprss-feed-meta\">\n            <span class=\"feed-source\">\n            Source:\n\n                            big data\n                    <\/span>\n    \n            <span class=\"feed-date\">\n            Published on 2024-07-24\n        <\/span>\n    \n    <\/div>\n\n\n\n\n\n            \n        <\/li>\n                    <li class=\"wpra-item feed-item \">\n            \n            \n\n    <a  href=\"https:\/\/www.lebigdata.fr\/meta-lance-llama-3-1-un-llm-open-source-colossal-qui-surpasse-meme-gpt-4\" target=\"_blank\" rel=\"nofollow\" class=\"\">Meta lance Llama 3.1 : un LLM open source colossal, qui surpasse m\u00eame GPT-4<\/a>\n\n\n\n\n\n\n<div class=\"wprss-feed-meta\">\n            <span class=\"feed-source\">\n            Source:\n\n                            big data\n                    <\/span>\n    \n            <span class=\"feed-date\">\n            Published on 2024-07-24\n        <\/span>\n    \n    <\/div>\n\n\n\n\n\n            \n        <\/li>\n                    <li class=\"wpra-item feed-item \">\n            \n            \n\n    <a  href=\"https:\/\/www.lebigdata.fr\/lia-devait-leur-faciliter-la-vie-elle-leur-rajoute-du-travail-une-tech-surcotee\" target=\"_blank\" rel=\"nofollow\" class=\"\">L\u2019IA devait leur faciliter la vie, elle leur rajoute du travail : une tech surc\u00f4t\u00e9e ?<\/a>\n\n\n\n\n\n\n<div class=\"wprss-feed-meta\">\n            <span class=\"feed-source\">\n            Source:\n\n                            big data\n                    <\/span>\n    \n            <span class=\"feed-date\">\n            Published on 2024-07-24\n        <\/span>\n    \n    <\/div>\n\n\n\n\n\n            \n        <\/li>\n                    <li class=\"wpra-item feed-item \">\n            \n            \n\n    <a  href=\"https:\/\/www.lebigdata.fr\/oxygene-sombre-decouvert-au-fond-de-locean-lorigine-de-la-vie-enfin-revelee\" target=\"_blank\" rel=\"nofollow\" class=\"\">Oxyg\u00e8ne sombre d\u00e9couvert au fond de l\u2019oc\u00e9an : l\u2019origine de la vie enfin r\u00e9v\u00e9l\u00e9e ?<\/a>\n\n\n\n\n\n\n<div class=\"wprss-feed-meta\">\n            <span class=\"feed-source\">\n            Source:\n\n                            big data\n                    <\/span>\n    \n            <span class=\"feed-date\">\n            Published on 2024-07-24\n        <\/span>\n    \n    <\/div>\n\n\n\n\n\n            \n        <\/li>\n                    <li class=\"wpra-item feed-item \">\n            \n            \n\n    <a  href=\"https:\/\/www.lebigdata.fr\/microrobots-meduses-traitements-cibles\" target=\"_blank\" rel=\"nofollow\" class=\"\">Ces m\u00e9duses robotiques ciblent vos organes pour des traitements pr\u00e9cis<\/a>\n\n\n\n\n\n\n<div class=\"wprss-feed-meta\">\n            <span class=\"feed-source\">\n            Source:\n\n                            big data\n                    <\/span>\n    \n            <span class=\"feed-date\">\n            Published on 2024-07-24\n        <\/span>\n    \n    <\/div>\n\n\n\n\n\n            \n        <\/li>\n                    <li class=\"wpra-item feed-item \">\n            \n            \n\n    <a  href=\"https:\/\/www.lebigdata.fr\/victoire-pour-la-cybersecurite-le-plus-grand-hub-de-ddos-neutralise\" target=\"_blank\" rel=\"nofollow\" class=\"\">Victoire pour la cybers\u00e9curit\u00e9 ! Le plus grand hub de DDoS neutralis\u00e9<\/a>\n\n\n\n\n\n\n<div class=\"wprss-feed-meta\">\n            <span class=\"feed-source\">\n            Source:\n\n                            big data\n                    <\/span>\n    \n            <span class=\"feed-date\">\n            Published on 2024-07-24\n        <\/span>\n    \n    <\/div>\n\n\n\n\n\n            \n        <\/li>\n                    <li class=\"wpra-item feed-item \">\n            \n            \n\n    <a  href=\"https:\/\/www.lebigdata.fr\/veepee-lentreprise-de-vente-privee-qui-revolutionne-votre-quotidien\" target=\"_blank\" rel=\"nofollow\" class=\"\">Veepee : l\u2019entreprise de vente priv\u00e9e qui r\u00e9volutionne votre quotidien<\/a>\n\n\n\n\n\n\n<div class=\"wprss-feed-meta\">\n            <span class=\"feed-source\">\n            Source:\n\n                            big data\n                    <\/span>\n    \n            <span class=\"feed-date\">\n            Published on 2024-07-24\n        <\/span>\n    \n    <\/div>\n\n\n\n\n\n            \n        <\/li>\n                    <li class=\"wpra-item feed-item \">\n            \n            \n\n    <a  href=\"https:\/\/www.lebigdata.fr\/chatgpt-un-lyceen-en-bac-l-lia-ecrit-des-poemes-mais-est-nulle-en-maths\" target=\"_blank\" rel=\"nofollow\" class=\"\">ChatGPT, un lyc\u00e9en en Bac L ? L\u2019IA \u00e9crit des po\u00eames, mais est nulle en maths<\/a>\n\n\n\n\n\n\n<div class=\"wprss-feed-meta\">\n            <span class=\"feed-source\">\n            Source:\n\n                            big data\n                    <\/span>\n    \n            <span class=\"feed-date\">\n            Published on 2024-07-24\n        <\/span>\n    \n    <\/div>\n\n\n\n\n\n            \n        <\/li>\n        <\/ul>\n\n        \n<\/div>\n\n<\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c6b2878 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c6b2878\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0bc0678\" data-id=\"0bc0678\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4d51371 elementor-widget elementor-widget-shortcode\" data-id=\"4d51371\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-shortcode\"><div class=\"wp-rss-template-container\" data-wpra-template=\"default\" data-template-ctx=\"eyJmZWVkcyI6ImpkbiJ9\">\n    <div class=\"wp-rss-aggregator wpra-list-template  \" data-page=\"1\">\n    \n    \n<ul class=\"wpra-item-list rss-aggregator wpra-item-list--bullets wpra-item-list--default\"\n    start=\"1\">\n                        <li class=\"wpra-item feed-item \">\n            \n            \n\n    <a  href=\"https:\/\/www.journaldunet.com\/adtech\/1550019-publicite-dans-chatgpt-aux-usa-quelles-strategies-gagnantes-se-demarquent\/\" target=\"_blank\" rel=\"nofollow\" class=\"\">Publicit\u00e9 dans ChatGPT aux USA\u00a0: quelles strat\u00e9gies gagnantes se d\u00e9marquent\u00a0?<\/a>\n\n\n\n\n\n\n<div class=\"wprss-feed-meta\">\n            <span class=\"feed-source\">\n            Source:\n\n                            JDN\n                    <\/span>\n    \n            <span class=\"feed-date\">\n            Published on 2026-05-06\n        <\/span>\n    \n    <\/div>\n\n\n\n\n\n            \n        <\/li>\n                    <li class=\"wpra-item feed-item \">\n            \n            \n\n    <a  href=\"https:\/\/www.journaldunet.com\/intelligence-artificielle\/1550121-ce-qui-rend-un-humanoide-fiable-ce-n-est-ni-le-hardware-ni-son-apparence\/\" target=\"_blank\" rel=\"nofollow\" class=\"\">\"Ce qui rend un humano\u00efde fiable, ce n&#039;est ni le hardware ni son apparence\"<\/a>\n\n\n\n\n\n\n<div class=\"wprss-feed-meta\">\n            <span class=\"feed-source\">\n            Source:\n\n                            JDN\n                    <\/span>\n    \n            <span class=\"feed-date\">\n            Published on 2026-05-06\n        <\/span>\n    \n    <\/div>\n\n\n\n\n\n            \n        <\/li>\n                    <li class=\"wpra-item feed-item \">\n            \n            \n\n    <a  href=\"https:\/\/www.journaldunet.com\/intelligence-artificielle\/1550113-de-la-conversation-a-l-action-l-ia-agentique-et-l-avenement-de-l-interface-invisible\/\" target=\"_blank\" rel=\"nofollow\" class=\"\">De la conversation \u00e0 l&#039;action\u00a0: l&#039;IA agentique et l&#039;av\u00e8nement de l&#039;interface invisible<\/a>\n\n\n\n\n\n\n<div class=\"wprss-feed-meta\">\n            <span class=\"feed-source\">\n            Source:\n\n                            JDN\n                    <\/span>\n    \n            <span class=\"feed-date\">\n            Published on 2026-05-06\n        <\/span>\n    \n    <\/div>\n\n\n\n\n\n            \n        <\/li>\n                    <li class=\"wpra-item feed-item \">\n            \n            \n\n    <a  href=\"https:\/\/www.journaldunet.com\/intelligence-artificielle\/1550115-robotique-et-ia-pourquoi-l-avenir-des-machines-autonomes-sera-celui-des-petits-modeles\/\" target=\"_blank\" rel=\"nofollow\" class=\"\">Robotique et IA\u00a0: pourquoi l&#039;avenir des machines autonomes sera celui des petits mod\u00e8les<\/a>\n\n\n\n\n\n\n<div class=\"wprss-feed-meta\">\n            <span class=\"feed-source\">\n            Source:\n\n                            JDN\n                    <\/span>\n    \n            <span class=\"feed-date\">\n            Published on 2026-05-06\n        <\/span>\n    \n    <\/div>\n\n\n\n\n\n            \n        <\/li>\n                    <li class=\"wpra-item feed-item \">\n            \n            \n\n    <a  href=\"https:\/\/www.journaldunet.com\/intelligence-artificielle\/1550103-dora-vs-space-mesurer-la-performance-logicielle-a-l-ere-de-l-ia\/\" target=\"_blank\" rel=\"nofollow\" class=\"\">DORA vs SPACE\u00a0: mesurer la performance logicielle \u00e0 l&#039;\u00e8re de l&#039;IA<\/a>\n\n\n\n\n\n\n<div class=\"wprss-feed-meta\">\n            <span class=\"feed-source\">\n            Source:\n\n                            JDN\n                    <\/span>\n    \n            <span class=\"feed-date\">\n            Published on 2026-05-06\n        <\/span>\n    \n    <\/div>\n\n\n\n\n\n            \n        <\/li>\n                    <li class=\"wpra-item feed-item \">\n            \n            \n\n    <a  href=\"https:\/\/www.journaldunet.com\/intelligence-artificielle\/guide-de-l-intelligence-artificielle\/1550129-le-prompt-pour-generer-un-audit-financier-de-votre-compte-avec-claude\/\" target=\"_blank\" rel=\"nofollow\" class=\"\">Le prompt pour g\u00e9n\u00e9rer un audit financier de votre compte avec Claude<\/a>\n\n\n\n\n\n\n<div class=\"wprss-feed-meta\">\n            <span class=\"feed-source\">\n            Source:\n\n                            JDN\n                    <\/span>\n    \n            <span class=\"feed-date\">\n            Published on 2026-05-06\n        <\/span>\n    \n    <\/div>\n\n\n\n\n\n            \n        <\/li>\n                    <li class=\"wpra-item feed-item \">\n            \n            \n\n    <a  href=\"https:\/\/www.journaldunet.com\/intelligence-artificielle\/1550111-stitch-de-google-creer-une-interface-ux-ui-en-quelques-minutes-tutoriel\/\" target=\"_blank\" rel=\"nofollow\" class=\"\">Tutoriel\u00a0: comment cr\u00e9er une interface UX\/UI avec Google Stitch en quelques minutes<\/a>\n\n\n\n\n\n\n<div class=\"wprss-feed-meta\">\n            <span class=\"feed-source\">\n            Source:\n\n                            JDN\n                    <\/span>\n    \n            <span class=\"feed-date\">\n            Published on 2026-05-06\n        <\/span>\n    \n    <\/div>\n\n\n\n\n\n            \n        <\/li>\n                    <li class=\"wpra-item feed-item \">\n            \n            \n\n    <a  href=\"https:\/\/www.journaldunet.com\/patrimoine\/finances-personnelles\/1550065-hf1-redressement-banque-impots\/\" target=\"_blank\" rel=\"nofollow\" class=\"\">Les imp\u00f4ts leur r\u00e9clament 700\u00a0000\u00a0\u20ac\u00a0: le couple de contribuables oblige la banque \u00e0 rembourser<\/a>\n\n\n\n\n\n\n<div class=\"wprss-feed-meta\">\n            <span class=\"feed-source\">\n            Source:\n\n                            JDN\n                    <\/span>\n    \n            <span class=\"feed-date\">\n            Published on 2026-05-06\n        <\/span>\n    \n    <\/div>\n\n\n\n\n\n            \n        <\/li>\n                    <li class=\"wpra-item feed-item \">\n            \n            \n\n    <a  href=\"https:\/\/www.journaldunet.com\/intelligence-artificielle\/1550097-l-ia-est-un-miroir-parfois-sans-pitie\/\" target=\"_blank\" rel=\"nofollow\" class=\"\">L&#039;IA est un miroir, parfois sans piti\u00e9<\/a>\n\n\n\n\n\n\n<div class=\"wprss-feed-meta\">\n            <span class=\"feed-source\">\n            Source:\n\n                            JDN\n                    <\/span>\n    \n            <span class=\"feed-date\">\n            Published on 2026-05-05\n        <\/span>\n    \n    <\/div>\n\n\n\n\n\n            \n        <\/li>\n                    <li class=\"wpra-item feed-item \">\n            \n            \n\n    <a  href=\"https:\/\/www.journaldunet.com\/retail\/1550077-le-magasin-nouveau-centre-de-decision-du-retail\/\" target=\"_blank\" rel=\"nofollow\" class=\"\">Le magasin\u00a0: nouveau centre de d\u00e9cision du retail<\/a>\n\n\n\n\n\n\n<div class=\"wprss-feed-meta\">\n            <span class=\"feed-source\">\n            Source:\n\n                            JDN\n                    <\/span>\n    \n            <span class=\"feed-date\">\n            Published on 2026-05-05\n        <\/span>\n    \n    <\/div>\n\n\n\n\n\n            \n        <\/li>\n                    <li class=\"wpra-item feed-item \">\n            \n            \n\n    <a  href=\"https:\/\/www.journaldunet.com\/retail\/1550007-le-retail-entre-dans-une-nouvelle-ere-du-tout-numerique-au-clicks-to-bricks\/\" target=\"_blank\" rel=\"nofollow\" class=\"\">Le retail entre dans une nouvelle \u00e8re\u00a0: du tout num\u00e9rique au \"clicks to bricks\"<\/a>\n\n\n\n\n\n\n<div class=\"wprss-feed-meta\">\n            <span class=\"feed-source\">\n            Source:\n\n                            JDN\n                    <\/span>\n    \n            <span class=\"feed-date\">\n            Published on 2026-05-05\n        <\/span>\n    \n    <\/div>\n\n\n\n\n\n            \n        <\/li>\n                    <li class=\"wpra-item feed-item \">\n            \n            \n\n    <a  href=\"https:\/\/www.journaldunet.com\/retail\/1549913-vendeur-le-plus-beau-metier-du-monde\/\" target=\"_blank\" rel=\"nofollow\" class=\"\">Vendeur\u00a0: le plus beau m\u00e9tier du monde<\/a>\n\n\n\n\n\n\n<div class=\"wprss-feed-meta\">\n            <span class=\"feed-source\">\n            Source:\n\n                            JDN\n                    <\/span>\n    \n            <span class=\"feed-date\">\n            Published on 2026-05-05\n        <\/span>\n    \n    <\/div>\n\n\n\n\n\n            \n        <\/li>\n                    <li class=\"wpra-item feed-item \">\n            \n            \n\n    <a  href=\"https:\/\/www.journaldunet.com\/retail\/1549869-previsions-mix-match-une-approche-strategique-pour-fiabiliser-la-supply-chain\/\" target=\"_blank\" rel=\"nofollow\" class=\"\">Pr\u00e9visions \"mix-and-match\": une approche strat\u00e9gique pour fiabiliser la supply chain<\/a>\n\n\n\n\n\n\n<div class=\"wprss-feed-meta\">\n            <span class=\"feed-source\">\n            Source:\n\n                            JDN\n                    <\/span>\n    \n            <span class=\"feed-date\">\n            Published on 2026-05-05\n        <\/span>\n    \n    <\/div>\n\n\n\n\n\n            \n        <\/li>\n                    <li class=\"wpra-item feed-item \">\n            \n            \n\n    <a  href=\"https:\/\/www.journaldunet.com\/retail\/1549751-e-commerce-comment-rester-visible-quand-l-ia-gere-l-entree-du-parcours-d-achat\/\" target=\"_blank\" rel=\"nofollow\" class=\"\">E\u2011commerce\u00a0: comment rester visible quand l&#039;IA g\u00e8re l&#039;entr\u00e9e du parcours d&#039;achat<\/a>\n\n\n\n\n\n\n<div class=\"wprss-feed-meta\">\n            <span class=\"feed-source\">\n            Source:\n\n                            JDN\n                    <\/span>\n    \n            <span class=\"feed-date\">\n            Published on 2026-05-05\n        <\/span>\n    \n    <\/div>\n\n\n\n\n\n            \n        <\/li>\n                    <li class=\"wpra-item feed-item \">\n            \n            \n\n    <a  href=\"https:\/\/www.journaldunet.com\/retail\/1549663-la-realite-augmentee-en-e-commerce-pourquoi-elle-n-est-plus-reservee-aux-grands-groupes\/\" target=\"_blank\" rel=\"nofollow\" class=\"\">La r\u00e9alit\u00e9 augment\u00e9e en e-commerce\u00a0: pourquoi elle n&#039;est plus r\u00e9serv\u00e9e aux grands groupes<\/a>\n\n\n\n\n\n\n<div class=\"wprss-feed-meta\">\n            <span class=\"feed-source\">\n            Source:\n\n                            JDN\n                    <\/span>\n    \n            <span class=\"feed-date\">\n            Published on 2026-05-05\n        <\/span>\n    \n    <\/div>\n\n\n\n\n\n            \n        <\/li>\n        <\/ul>\n\n        \n<\/div>\n\n<\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Introduction Il nous a \u00e9t\u00e9 demand\u00e9 de choisir un sujet de veille technologique. J\u2019ai choisi de faire des recherches sur le Big Data car, outre la traduction litt\u00e9rale, qui peut sembler \u00e9vidente et dont tout le monde parle, je n\u2019avais aucune id\u00e9e des notions que ce terme pouvait englober.\u00a0 Qu&rsquo;est ce qu&rsquo;une veille technologique ? [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"saved_in_kubio":false,"footnotes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v18.5.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>veille - Portfolio<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fouleye-camara.com\/index.php\/veille\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"veille - Portfolio\" \/>\n<meta property=\"og:description\" content=\"Introduction Il nous a \u00e9t\u00e9 demand\u00e9 de choisir un sujet de veille technologique. J\u2019ai choisi de faire des recherches sur le Big Data car, outre la traduction litt\u00e9rale, qui peut sembler \u00e9vidente et dont tout le monde parle, je n\u2019avais aucune id\u00e9e des notions que ce terme pouvait englober.\u00a0 Qu&rsquo;est ce qu&rsquo;une veille technologique ? [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fouleye-camara.com\/index.php\/veille\/\" \/>\n<meta property=\"og:site_name\" content=\"Portfolio\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-05T09:20:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/fouleye-camara.com\/wp-content\/uploads\/2022\/04\/big-data.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/fouleye-camara.com\/#website\",\"url\":\"https:\/\/fouleye-camara.com\/\",\"name\":\"Portfolio\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/fouleye-camara.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/fouleye-camara.com\/index.php\/veille\/#primaryimage\",\"inLanguage\":\"fr-FR\",\"url\":\"https:\/\/fouleye-camara.com\/wp-content\/uploads\/2022\/04\/big-data.png\",\"contentUrl\":\"https:\/\/fouleye-camara.com\/wp-content\/uploads\/2022\/04\/big-data.png\",\"width\":700,\"height\":372},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/fouleye-camara.com\/index.php\/veille\/#webpage\",\"url\":\"https:\/\/fouleye-camara.com\/index.php\/veille\/\",\"name\":\"veille - Portfolio\",\"isPartOf\":{\"@id\":\"https:\/\/fouleye-camara.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/fouleye-camara.com\/index.php\/veille\/#primaryimage\"},\"datePublished\":\"2022-04-16T13:54:56+00:00\",\"dateModified\":\"2024-05-05T09:20:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/fouleye-camara.com\/index.php\/veille\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/fouleye-camara.com\/index.php\/veille\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/fouleye-camara.com\/index.php\/veille\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/fouleye-camara.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"veille\"}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"veille - Portfolio","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fouleye-camara.com\/index.php\/veille\/","og_locale":"fr_FR","og_type":"article","og_title":"veille - Portfolio","og_description":"Introduction Il nous a \u00e9t\u00e9 demand\u00e9 de choisir un sujet de veille technologique. J\u2019ai choisi de faire des recherches sur le Big Data car, outre la traduction litt\u00e9rale, qui peut sembler \u00e9vidente et dont tout le monde parle, je n\u2019avais aucune id\u00e9e des notions que ce terme pouvait englober.\u00a0 Qu&rsquo;est ce qu&rsquo;une veille technologique ? [&hellip;]","og_url":"https:\/\/fouleye-camara.com\/index.php\/veille\/","og_site_name":"Portfolio","article_modified_time":"2024-05-05T09:20:52+00:00","og_image":[{"url":"https:\/\/fouleye-camara.com\/wp-content\/uploads\/2022\/04\/big-data.png"}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/fouleye-camara.com\/#website","url":"https:\/\/fouleye-camara.com\/","name":"Portfolio","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fouleye-camara.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"ImageObject","@id":"https:\/\/fouleye-camara.com\/index.php\/veille\/#primaryimage","inLanguage":"fr-FR","url":"https:\/\/fouleye-camara.com\/wp-content\/uploads\/2022\/04\/big-data.png","contentUrl":"https:\/\/fouleye-camara.com\/wp-content\/uploads\/2022\/04\/big-data.png","width":700,"height":372},{"@type":"WebPage","@id":"https:\/\/fouleye-camara.com\/index.php\/veille\/#webpage","url":"https:\/\/fouleye-camara.com\/index.php\/veille\/","name":"veille - Portfolio","isPartOf":{"@id":"https:\/\/fouleye-camara.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fouleye-camara.com\/index.php\/veille\/#primaryimage"},"datePublished":"2022-04-16T13:54:56+00:00","dateModified":"2024-05-05T09:20:52+00:00","breadcrumb":{"@id":"https:\/\/fouleye-camara.com\/index.php\/veille\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fouleye-camara.com\/index.php\/veille\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/fouleye-camara.com\/index.php\/veille\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/fouleye-camara.com\/"},{"@type":"ListItem","position":2,"name":"veille"}]}]}},"kubio_ai_page_context":{"short_desc":"","purpose":"general"},"_links":{"self":[{"href":"https:\/\/fouleye-camara.com\/index.php\/wp-json\/wp\/v2\/pages\/31"}],"collection":[{"href":"https:\/\/fouleye-camara.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/fouleye-camara.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/fouleye-camara.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fouleye-camara.com\/index.php\/wp-json\/wp\/v2\/comments?post=31"}],"version-history":[{"count":80,"href":"https:\/\/fouleye-camara.com\/index.php\/wp-json\/wp\/v2\/pages\/31\/revisions"}],"predecessor-version":[{"id":2009,"href":"https:\/\/fouleye-camara.com\/index.php\/wp-json\/wp\/v2\/pages\/31\/revisions\/2009"}],"wp:attachment":[{"href":"https:\/\/fouleye-camara.com\/index.php\/wp-json\/wp\/v2\/media?parent=31"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}