<?xml version="1.0" encoding="UTF-8" ?>
<!-- This is a WordPress eXtended RSS file generated by WordPress as an export of your site. -->
<!-- It contains information about your site's posts, pages, comments, categories, and other content. -->
<!-- You may use this file to transfer that content from one site to another. -->
<!-- This file is not intended to serve as a complete backup of your site. -->

<!-- To import this information into a WordPress site follow these steps: -->
<!-- 1. Log in to that site as an administrator. -->
<!-- 2. Go to Tools: Import in the WordPress admin panel. -->
<!-- 3. Install the "WordPress" importer from the list. -->
<!-- 4. Activate & Run Importer. -->
<!-- 5. Upload this file using the form provided on that page. -->
<!-- 6. You will first be asked to map the authors in this export file to users -->
<!--    on the site. For each author, you may choose to map to an -->
<!--    existing user on the site or to create a new user. -->
<!-- 7. WordPress will then import each of the posts, pages, comments, categories, etc. -->
<!--    contained in this file into your site. -->

<!-- generator="WordPress/4.1.1" created="2015-03-05 09:26" -->
<rss version="2.0"
	xmlns:excerpt="http://wordpress.org/export/1.2/excerpt/"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:wp="http://wordpress.org/export/1.2/"
>

<channel>
	<title>L&#039;actualité pour décideurs informatiques</title>
	<link>http://www.it-news.fr</link>
	<description></description>
	<pubDate>Thu, 05 Mar 2015 09:26:10 +0000</pubDate>
	<language>fr-FR</language>
	<wp:wxr_version>1.2</wp:wxr_version>
	<wp:base_site_url>http://www.it-news.fr</wp:base_site_url>
	<wp:base_blog_url>http://www.it-news.fr</wp:base_blog_url>

	<wp:author><wp:author_id>37</wp:author_id><wp:author_login>aquastar</wp:author_login><wp:author_email>saljundi@aquastar-consulting.com</wp:author_email><wp:author_display_name><![CDATA[L'équipe IT News]]></wp:author_display_name><wp:author_first_name><![CDATA[L'équipe IT News]]></wp:author_first_name><wp:author_last_name><![CDATA[L'équipe IT News]]></wp:author_last_name></wp:author>

	<wp:category><wp:term_id>44</wp:term_id><wp:category_nicename>comptabilite-finances</wp:category_nicename><wp:category_parent></wp:category_parent><wp:cat_name><![CDATA[Comptabilité - Finances]]></wp:cat_name></wp:category>
	<wp:category><wp:term_id>33</wp:term_id><wp:category_nicename>crm</wp:category_nicename><wp:category_parent></wp:category_parent><wp:cat_name><![CDATA[CRM]]></wp:cat_name></wp:category>
	<wp:category><wp:term_id>68</wp:term_id><wp:category_nicename>decisionnel</wp:category_nicename><wp:category_parent></wp:category_parent><wp:cat_name><![CDATA[Décisionnel]]></wp:cat_name></wp:category>
	<wp:category><wp:term_id>75</wp:term_id><wp:category_nicename>developpement-specifique</wp:category_nicename><wp:category_parent></wp:category_parent><wp:cat_name><![CDATA[Développement spécifique]]></wp:cat_name></wp:category>
	<wp:category><wp:term_id>60</wp:term_id><wp:category_nicename>edi-ged</wp:category_nicename><wp:category_parent></wp:category_parent><wp:cat_name><![CDATA[EDI - GED]]></wp:cat_name></wp:category>
	<wp:category><wp:term_id>174</wp:term_id><wp:category_nicename>erp</wp:category_nicename><wp:category_parent></wp:category_parent><wp:cat_name><![CDATA[ERP]]></wp:cat_name></wp:category>
	<wp:category><wp:term_id>3</wp:term_id><wp:category_nicename>evenements</wp:category_nicename><wp:category_parent></wp:category_parent><wp:cat_name><![CDATA[Evénements]]></wp:cat_name></wp:category>
	<wp:category><wp:term_id>18</wp:term_id><wp:category_nicename>gestion-commerciale</wp:category_nicename><wp:category_parent></wp:category_parent><wp:cat_name><![CDATA[Gestion commerciale]]></wp:cat_name></wp:category>
	<wp:category><wp:term_id>63</wp:term_id><wp:category_nicename>gestion-de-production</wp:category_nicename><wp:category_parent></wp:category_parent><wp:cat_name><![CDATA[Gestion de production]]></wp:cat_name></wp:category>
	<wp:category><wp:term_id>10</wp:term_id><wp:category_nicename>infrastructures</wp:category_nicename><wp:category_parent></wp:category_parent><wp:cat_name><![CDATA[Infrastructures]]></wp:cat_name></wp:category>
	<wp:category><wp:term_id>342</wp:term_id><wp:category_nicename>livres-blanc</wp:category_nicename><wp:category_parent></wp:category_parent><wp:cat_name><![CDATA[Livres Blanc]]></wp:cat_name></wp:category>
	<wp:category><wp:term_id>73</wp:term_id><wp:category_nicename>mobilite</wp:category_nicename><wp:category_parent></wp:category_parent><wp:cat_name><![CDATA[Mobilité]]></wp:cat_name></wp:category>
	<wp:category><wp:term_id>1</wp:term_id><wp:category_nicename>non-classe</wp:category_nicename><wp:category_parent></wp:category_parent><wp:cat_name><![CDATA[Non classé]]></wp:cat_name></wp:category>
	<wp:category><wp:term_id>79</wp:term_id><wp:category_nicename>paie-rh</wp:category_nicename><wp:category_parent></wp:category_parent><wp:cat_name><![CDATA[Paie - RH]]></wp:cat_name></wp:category>
	<wp:category><wp:term_id>29</wp:term_id><wp:category_nicename>reseaux-et-mobilite</wp:category_nicename><wp:category_parent></wp:category_parent><wp:cat_name><![CDATA[Réseaux et mobilité]]></wp:cat_name></wp:category>
	<wp:category><wp:term_id>12</wp:term_id><wp:category_nicename>securite</wp:category_nicename><wp:category_parent></wp:category_parent><wp:cat_name><![CDATA[Sécurité]]></wp:cat_name></wp:category>
	<wp:category><wp:term_id>21</wp:term_id><wp:category_nicename>solutions-de-gestion</wp:category_nicename><wp:category_parent></wp:category_parent><wp:cat_name><![CDATA[Solutions de gestion]]></wp:cat_name></wp:category>
	<wp:category><wp:term_id>45</wp:term_id><wp:category_nicename>systemes</wp:category_nicename><wp:category_parent></wp:category_parent><wp:cat_name><![CDATA[Systèmes]]></wp:cat_name></wp:category>
	<wp:category><wp:term_id>283</wp:term_id><wp:category_nicename>videos</wp:category_nicename><wp:category_parent></wp:category_parent><wp:cat_name><![CDATA[Vidéos]]></wp:cat_name></wp:category>
	<wp:tag><wp:term_id>266</wp:term_id><wp:tag_slug>1er-janvier-2014</wp:tag_slug><wp:tag_name><![CDATA[1er janvier 2014]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>2</wp:term_id><wp:tag_slug>2013</wp:tag_slug><wp:tag_name><![CDATA[2013]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>224</wp:term_id><wp:tag_slug>2014</wp:tag_slug><wp:tag_name><![CDATA[2014]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>306</wp:term_id><wp:tag_slug>2015</wp:tag_slug><wp:tag_name><![CDATA[2015]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>324</wp:term_id><wp:tag_slug>3d</wp:tag_slug><wp:tag_name><![CDATA[3D]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>106</wp:term_id><wp:tag_slug>802-11ac</wp:tag_slug><wp:tag_name><![CDATA[802.11ac]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>53</wp:term_id><wp:tag_slug>achat</wp:tag_slug><wp:tag_name><![CDATA[achat]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>312</wp:term_id><wp:tag_slug>acquisition</wp:tag_slug><wp:tag_name><![CDATA[acquisition]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>318</wp:term_id><wp:tag_slug>administrations-fiscales</wp:tag_slug><wp:tag_name><![CDATA[administrations fiscales]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>186</wp:term_id><wp:tag_slug>adobe</wp:tag_slug><wp:tag_name><![CDATA[Adobe]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>66</wp:term_id><wp:tag_slug>aide-a-la-decision</wp:tag_slug><wp:tag_name><![CDATA[aide à la décision]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>236</wp:term_id><wp:tag_slug>alimentation</wp:tag_slug><wp:tag_name><![CDATA[alimentation]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>207</wp:term_id><wp:tag_slug>anonymous</wp:tag_slug><wp:tag_name><![CDATA[Anonymous]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>276</wp:term_id><wp:tag_slug>anssi</wp:tag_slug><wp:tag_name><![CDATA[anssi]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>373</wp:term_id><wp:tag_slug>appareil-mobile</wp:tag_slug><wp:tag_name><![CDATA[appareil mobile]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>188</wp:term_id><wp:tag_slug>applcations</wp:tag_slug><wp:tag_name><![CDATA[Applcations]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>97</wp:term_id><wp:tag_slug>apple</wp:tag_slug><wp:tag_name><![CDATA[Apple]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>109</wp:term_id><wp:tag_slug>applications</wp:tag_slug><wp:tag_name><![CDATA[applications]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>84</wp:term_id><wp:tag_slug>aquastar-consulting</wp:tag_slug><wp:tag_name><![CDATA[Aquastar Consulting]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>376</wp:term_id><wp:tag_slug>arkoon</wp:tag_slug><wp:tag_name><![CDATA[arkoon]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>254</wp:term_id><wp:tag_slug>article-13</wp:tag_slug><wp:tag_name><![CDATA[article 13]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>22</wp:term_id><wp:tag_slug>aruba-networks</wp:tag_slug><wp:tag_name><![CDATA[Aruba networks]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>340</wp:term_id><wp:tag_slug>attaque-informatique</wp:tag_slug><wp:tag_name><![CDATA[attaque informatique]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>265</wp:term_id><wp:tag_slug>augmentation-du-smic</wp:tag_slug><wp:tag_name><![CDATA[augmentation du smic]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>98</wp:term_id><wp:tag_slug>authentification</wp:tag_slug><wp:tag_name><![CDATA[authentification]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>57</wp:term_id><wp:tag_slug>automatiser</wp:tag_slug><wp:tag_name><![CDATA[automatiser]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>157</wp:term_id><wp:tag_slug>banque-de-france</wp:tag_slug><wp:tag_name><![CDATA[banque de France]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>204</wp:term_id><wp:tag_slug>big-data</wp:tag_slug><wp:tag_name><![CDATA[big data]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>180</wp:term_id><wp:tag_slug>bill-gates</wp:tag_slug><wp:tag_name><![CDATA[Bill Gates]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>339</wp:term_id><wp:tag_slug>bofip</wp:tag_slug><wp:tag_name><![CDATA[BOFiP]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>264</wp:term_id><wp:tag_slug>bonnes-pratiques</wp:tag_slug><wp:tag_name><![CDATA[bonnes pratiques]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>304</wp:term_id><wp:tag_slug>botnet</wp:tag_slug><wp:tag_name><![CDATA[botnet]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>113</wp:term_id><wp:tag_slug>boyd</wp:tag_slug><wp:tag_name><![CDATA[BOYD]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>240</wp:term_id><wp:tag_slug>bring-your-own-device</wp:tag_slug><wp:tag_name><![CDATA[bring your own device]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>259</wp:term_id><wp:tag_slug>budget-informatique</wp:tag_slug><wp:tag_name><![CDATA[budget informatique]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>279</wp:term_id><wp:tag_slug>budget-it</wp:tag_slug><wp:tag_name><![CDATA[budget IT]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>358</wp:term_id><wp:tag_slug>bug</wp:tag_slug><wp:tag_name><![CDATA[bug]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>72</wp:term_id><wp:tag_slug>business-mobile</wp:tag_slug><wp:tag_name><![CDATA[business mobile]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>349</wp:term_id><wp:tag_slug>byoa</wp:tag_slug><wp:tag_name><![CDATA[BYOA]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>36</wp:term_id><wp:tag_slug>byod</wp:tag_slug><wp:tag_name><![CDATA[BYOD]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>150</wp:term_id><wp:tag_slug>c-i-c-e</wp:tag_slug><wp:tag_name><![CDATA[C.I.C.E.]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>8</wp:term_id><wp:tag_slug>camera</wp:tag_slug><wp:tag_name><![CDATA[caméra]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>169</wp:term_id><wp:tag_slug>capture-decran</wp:tag_slug><wp:tag_name><![CDATA[capture d'écran]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>153</wp:term_id><wp:tag_slug>chef-dentreprise</wp:tag_slug><wp:tag_name><![CDATA[chef d'entreprise]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>243</wp:term_id><wp:tag_slug>chiffrement</wp:tag_slug><wp:tag_name><![CDATA[chiffrement]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>81</wp:term_id><wp:tag_slug>cice</wp:tag_slug><wp:tag_name><![CDATA[CICE]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>361</wp:term_id><wp:tag_slug>clandestine-fox</wp:tag_slug><wp:tag_name><![CDATA[Clandestine Fox]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>336</wp:term_id><wp:tag_slug>clearpass</wp:tag_slug><wp:tag_name><![CDATA[ClearPass]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>119</wp:term_id><wp:tag_slug>cloud</wp:tag_slug><wp:tag_name><![CDATA[cloud]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>205</wp:term_id><wp:tag_slug>cloud-computing</wp:tag_slug><wp:tag_name><![CDATA[Cloud computing]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>198</wp:term_id><wp:tag_slug>cloud-souverain</wp:tag_slug><wp:tag_name><![CDATA[Cloud Souverain]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>183</wp:term_id><wp:tag_slug>cnil</wp:tag_slug><wp:tag_name><![CDATA[CNIL]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>208</wp:term_id><wp:tag_slug>commission-europeenne</wp:tag_slug><wp:tag_name><![CDATA[Commission européenne]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>31</wp:term_id><wp:tag_slug>communication</wp:tag_slug><wp:tag_name><![CDATA[communication]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>177</wp:term_id><wp:tag_slug>commutateur</wp:tag_slug><wp:tag_name><![CDATA[commutateur]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>50</wp:term_id><wp:tag_slug>competitivite</wp:tag_slug><wp:tag_name><![CDATA[compétitivité]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>155</wp:term_id><wp:tag_slug>competitivite-emplois</wp:tag_slug><wp:tag_name><![CDATA[compétitivité emplois]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>82</wp:term_id><wp:tag_slug>competitivite-entreprise</wp:tag_slug><wp:tag_name><![CDATA[compétitivité entreprise]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>32</wp:term_id><wp:tag_slug>comportemental</wp:tag_slug><wp:tag_name><![CDATA[comportemental]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>67</wp:term_id><wp:tag_slug>comptabilite</wp:tag_slug><wp:tag_name><![CDATA[comptabilité]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>23</wp:term_id><wp:tag_slug>connexion</wp:tag_slug><wp:tag_name><![CDATA[connexion]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>92</wp:term_id><wp:tag_slug>connexion-perso</wp:tag_slug><wp:tag_name><![CDATA[connexion perso]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>171</wp:term_id><wp:tag_slug>connexions</wp:tag_slug><wp:tag_name><![CDATA[connexions]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>263</wp:term_id><wp:tag_slug>conseil</wp:tag_slug><wp:tag_name><![CDATA[conseil]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>181</wp:term_id><wp:tag_slug>conservation-de-donnees</wp:tag_slug><wp:tag_name><![CDATA[Conservation de données]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>238</wp:term_id><wp:tag_slug>consommation</wp:tag_slug><wp:tag_name><![CDATA[consommation]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>209</wp:term_id><wp:tag_slug>consommation-energetique-dun-data-center</wp:tag_slug><wp:tag_name><![CDATA[Consommation énergétique d'un data Center]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>24</wp:term_id><wp:tag_slug>controleurs-wifi</wp:tag_slug><wp:tag_name><![CDATA[contrôleurs wifi]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>268</wp:term_id><wp:tag_slug>coordonnees-bancaires</wp:tag_slug><wp:tag_name><![CDATA[coordonnées bancaires]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>328</wp:term_id><wp:tag_slug>courtier</wp:tag_slug><wp:tag_name><![CDATA[courtier]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>49</wp:term_id><wp:tag_slug>cout</wp:tag_slug><wp:tag_name><![CDATA[coût]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>136</wp:term_id><wp:tag_slug>couts-it</wp:tag_slug><wp:tag_name><![CDATA[coûts IT]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>154</wp:term_id><wp:tag_slug>credit-dimpot</wp:tag_slug><wp:tag_name><![CDATA[crédit d'impôt]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>146</wp:term_id><wp:tag_slug>crise</wp:tag_slug><wp:tag_name><![CDATA[crise]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>33</wp:term_id><wp:tag_slug>crm</wp:tag_slug><wp:tag_name><![CDATA[CRM]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>159</wp:term_id><wp:tag_slug>crm-classique</wp:tag_slug><wp:tag_name><![CDATA[CRM classique]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>160</wp:term_id><wp:tag_slug>crm-dusage</wp:tag_slug><wp:tag_name><![CDATA[CRM d'usage]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>244</wp:term_id><wp:tag_slug>cryptage</wp:tag_slug><wp:tag_name><![CDATA[cryptage]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>299</wp:term_id><wp:tag_slug>cyber-attaque</wp:tag_slug><wp:tag_name><![CDATA[cyber-attaque]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>187</wp:term_id><wp:tag_slug>cyberattaque</wp:tag_slug><wp:tag_name><![CDATA[Cyberattaque]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>346</wp:term_id><wp:tag_slug>cyberattaques</wp:tag_slug><wp:tag_name><![CDATA[cyberattaques]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>305</wp:term_id><wp:tag_slug>cybermenaces</wp:tag_slug><wp:tag_name><![CDATA[cybermenaces]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>302</wp:term_id><wp:tag_slug>cybersecurite</wp:tag_slug><wp:tag_name><![CDATA[cybersécurité]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>239</wp:term_id><wp:tag_slug>cyod</wp:tag_slug><wp:tag_name><![CDATA[cyod]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>280</wp:term_id><wp:tag_slug>data</wp:tag_slug><wp:tag_name><![CDATA[data]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>25</wp:term_id><wp:tag_slug>data-communications</wp:tag_slug><wp:tag_name><![CDATA[Data Communications]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>235</wp:term_id><wp:tag_slug>datacenter</wp:tag_slug><wp:tag_name><![CDATA[datacenter]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>26</wp:term_id><wp:tag_slug>debit</wp:tag_slug><wp:tag_name><![CDATA[débit]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>226</wp:term_id><wp:tag_slug>deepweb</wp:tag_slug><wp:tag_name><![CDATA[deepweb]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>246</wp:term_id><wp:tag_slug>deloitte</wp:tag_slug><wp:tag_name><![CDATA[deloitte]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>15</wp:term_id><wp:tag_slug>dematerialisation</wp:tag_slug><wp:tag_name><![CDATA[dématérialisation]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>365</wp:term_id><wp:tag_slug>dematerialisation-de-documents</wp:tag_slug><wp:tag_name><![CDATA[Dématérialisation de documents]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>75</wp:term_id><wp:tag_slug>developpement-specifique</wp:tag_slug><wp:tag_name><![CDATA[Développement spécifique]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>131</wp:term_id><wp:tag_slug>donnees</wp:tag_slug><wp:tag_name><![CDATA[données]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>37</wp:term_id><wp:tag_slug>donnees-personnelles</wp:tag_slug><wp:tag_name><![CDATA[données personnelles]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>258</wp:term_id><wp:tag_slug>douglas-engelbart</wp:tag_slug><wp:tag_name><![CDATA[Douglas Engelbart]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>138</wp:term_id><wp:tag_slug>dsi</wp:tag_slug><wp:tag_name><![CDATA[DSI]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>327</wp:term_id><wp:tag_slug>e-citoyen</wp:tag_slug><wp:tag_name><![CDATA[e-citoyen]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>326</wp:term_id><wp:tag_slug>e-learning</wp:tag_slug><wp:tag_name><![CDATA[e-learning]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>58</wp:term_id><wp:tag_slug>economie</wp:tag_slug><wp:tag_name><![CDATA[économie]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>256</wp:term_id><wp:tag_slug>ecoute-telephonique</wp:tag_slug><wp:tag_name><![CDATA[écoute téléphonique]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>227</wp:term_id><wp:tag_slug>ecritures-comptables</wp:tag_slug><wp:tag_name><![CDATA[écritures comptables]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>59</wp:term_id><wp:tag_slug>edi</wp:tag_slug><wp:tag_name><![CDATA[edi]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>69</wp:term_id><wp:tag_slug>edition-pilotee</wp:tag_slug><wp:tag_name><![CDATA[edition pilotée]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>16</wp:term_id><wp:tag_slug>efacture</wp:tag_slug><wp:tag_name><![CDATA[efacture]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>210</wp:term_id><wp:tag_slug>electrique</wp:tag_slug><wp:tag_name><![CDATA[électrique]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>237</wp:term_id><wp:tag_slug>eleectrique</wp:tag_slug><wp:tag_name><![CDATA[éléectrique]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>337</wp:term_id><wp:tag_slug>employes</wp:tag_slug><wp:tag_name><![CDATA[employés]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>78</wp:term_id><wp:tag_slug>empoyabilite</wp:tag_slug><wp:tag_name><![CDATA[empoyabilité]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>289</wp:term_id><wp:tag_slug>entreprise</wp:tag_slug><wp:tag_name><![CDATA[entreprise]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>123</wp:term_id><wp:tag_slug>entreprises</wp:tag_slug><wp:tag_name><![CDATA[entreprises]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>212</wp:term_id><wp:tag_slug>entreprises-francaises</wp:tag_slug><wp:tag_name><![CDATA[entreprises françaises]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>366</wp:term_id><wp:tag_slug>erp-3-0</wp:tag_slug><wp:tag_name><![CDATA[ERP 3.0]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>369</wp:term_id><wp:tag_slug>erp-hybride</wp:tag_slug><wp:tag_name><![CDATA[erp hybride]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>170</wp:term_id><wp:tag_slug>espionnage</wp:tag_slug><wp:tag_name><![CDATA[espionnage]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>343</wp:term_id><wp:tag_slug>europe</wp:tag_slug><wp:tag_name><![CDATA[Europe]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>85</wp:term_id><wp:tag_slug>evenement</wp:tag_slug><wp:tag_name><![CDATA[événement]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>372</wp:term_id><wp:tag_slug>excel</wp:tag_slug><wp:tag_name><![CDATA[Excel]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>282</wp:term_id><wp:tag_slug>exploitation</wp:tag_slug><wp:tag_name><![CDATA[exploitation]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>296</wp:term_id><wp:tag_slug>externalisation</wp:tag_slug><wp:tag_name><![CDATA[externalisation]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>61</wp:term_id><wp:tag_slug>fabrication</wp:tag_slug><wp:tag_name><![CDATA[fabrication]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>168</wp:term_id><wp:tag_slug>facebook</wp:tag_slug><wp:tag_name><![CDATA[facebook]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>17</wp:term_id><wp:tag_slug>facture</wp:tag_slug><wp:tag_name><![CDATA[Facture]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>232</wp:term_id><wp:tag_slug>facture-electronique</wp:tag_slug><wp:tag_name><![CDATA[facture electronique]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>221</wp:term_id><wp:tag_slug>facture-numerique</wp:tag_slug><wp:tag_name><![CDATA[facture numérique]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>338</wp:term_id><wp:tag_slug>factures-edi</wp:tag_slug><wp:tag_name><![CDATA[factures EDI]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>199</wp:term_id><wp:tag_slug>faille</wp:tag_slug><wp:tag_name><![CDATA[faille]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>362</wp:term_id><wp:tag_slug>faille-de-securite</wp:tag_slug><wp:tag_name><![CDATA[Faille de sécurité]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>206</wp:term_id><wp:tag_slug>fbi</wp:tag_slug><wp:tag_name><![CDATA[FBI]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>334</wp:term_id><wp:tag_slug>fec</wp:tag_slug><wp:tag_name><![CDATA[FEC]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>335</wp:term_id><wp:tag_slug>fichier-des-ecritures-comptables</wp:tag_slug><wp:tag_name><![CDATA[Fichier des écritures comptables]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>332</wp:term_id><wp:tag_slug>finance</wp:tag_slug><wp:tag_name><![CDATA[finance]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>377</wp:term_id><wp:tag_slug>firewall</wp:tag_slug><wp:tag_name><![CDATA[firewall]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>99</wp:term_id><wp:tag_slug>firewalls</wp:tag_slug><wp:tag_name><![CDATA[firewalls]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>152</wp:term_id><wp:tag_slug>fond-de-roulement</wp:tag_slug><wp:tag_name><![CDATA[fond de roulement]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>151</wp:term_id><wp:tag_slug>fonds-de-roulement</wp:tag_slug><wp:tag_name><![CDATA[fonds de roulement]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>4</wp:term_id><wp:tag_slug>forum</wp:tag_slug><wp:tag_name><![CDATA[Forum]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>189</wp:term_id><wp:tag_slug>fournisseur-de-services-cloud</wp:tag_slug><wp:tag_name><![CDATA[fournisseur de services Cloud]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>353</wp:term_id><wp:tag_slug>fournisseur-de-solution-de-gestion</wp:tag_slug><wp:tag_name><![CDATA[fournisseur de solution de gestion]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>190</wp:term_id><wp:tag_slug>fournisseurs</wp:tag_slug><wp:tag_name><![CDATA[Fournisseurs]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>192</wp:term_id><wp:tag_slug>fournisseurs-de-services-cloud</wp:tag_slug><wp:tag_name><![CDATA[fournisseurs de services Cloud]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>142</wp:term_id><wp:tag_slug>france</wp:tag_slug><wp:tag_name><![CDATA[france]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>156</wp:term_id><wp:tag_slug>g4</wp:tag_slug><wp:tag_name><![CDATA[G4+]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>27</wp:term_id><wp:tag_slug>gamme-7200</wp:tag_slug><wp:tag_name><![CDATA[gamme 7200]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>277</wp:term_id><wp:tag_slug>gartner</wp:tag_slug><wp:tag_name><![CDATA[Gartner]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>363</wp:term_id><wp:tag_slug>ged</wp:tag_slug><wp:tag_name><![CDATA[GED]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>194</wp:term_id><wp:tag_slug>generation-y</wp:tag_slug><wp:tag_name><![CDATA[Génération Y]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>62</wp:term_id><wp:tag_slug>gestion</wp:tag_slug><wp:tag_name><![CDATA[gestion]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>320</wp:term_id><wp:tag_slug>gestion-client</wp:tag_slug><wp:tag_name><![CDATA[gestion client]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>54</wp:term_id><wp:tag_slug>gestion-commerciale-2</wp:tag_slug><wp:tag_name><![CDATA[gestion commerciale]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>63</wp:term_id><wp:tag_slug>gestion-de-production</wp:tag_slug><wp:tag_name><![CDATA[Gestion de production]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>122</wp:term_id><wp:tag_slug>gouvernement</wp:tag_slug><wp:tag_name><![CDATA[Gouvernement]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>86</wp:term_id><wp:tag_slug>gpao</wp:tag_slug><wp:tag_name><![CDATA[GPAO]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>248</wp:term_id><wp:tag_slug>hacker</wp:tag_slug><wp:tag_name><![CDATA[hacker]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>100</wp:term_id><wp:tag_slug>hackers</wp:tag_slug><wp:tag_name><![CDATA[hackers]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>9</wp:term_id><wp:tag_slug>haute-resolution</wp:tag_slug><wp:tag_name><![CDATA[haute résolution]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>261</wp:term_id><wp:tag_slug>hopital</wp:tag_slug><wp:tag_name><![CDATA[hopital]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>285</wp:term_id><wp:tag_slug>hotspot</wp:tag_slug><wp:tag_name><![CDATA[hotspot]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>316</wp:term_id><wp:tag_slug>idc</wp:tag_slug><wp:tag_name><![CDATA[IDC]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>252</wp:term_id><wp:tag_slug>ietf</wp:tag_slug><wp:tag_name><![CDATA[IETF]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>333</wp:term_id><wp:tag_slug>impot</wp:tag_slug><wp:tag_name><![CDATA[impôt]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>101</wp:term_id><wp:tag_slug>imprivata</wp:tag_slug><wp:tag_name><![CDATA[Imprivata]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>64</wp:term_id><wp:tag_slug>industrie</wp:tag_slug><wp:tag_name><![CDATA[industrie]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>76</wp:term_id><wp:tag_slug>informatique</wp:tag_slug><wp:tag_name><![CDATA[informatique]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>140</wp:term_id><wp:tag_slug>infrastructure</wp:tag_slug><wp:tag_name><![CDATA[infrastructure]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>287</wp:term_id><wp:tag_slug>innovation</wp:tag_slug><wp:tag_name><![CDATA[innovation]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>93</wp:term_id><wp:tag_slug>internet</wp:tag_slug><wp:tag_name><![CDATA[internet]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>132</wp:term_id><wp:tag_slug>intrusion</wp:tag_slug><wp:tag_name><![CDATA[intrusion]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>88</wp:term_id><wp:tag_slug>investissement</wp:tag_slug><wp:tag_name><![CDATA[investissement]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>137</wp:term_id><wp:tag_slug>it</wp:tag_slug><wp:tag_name><![CDATA[IT]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>195</wp:term_id><wp:tag_slug>jeunes-salaries</wp:tag_slug><wp:tag_name><![CDATA[jeunes salariés]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>286</wp:term_id><wp:tag_slug>jeux-olympiques</wp:tag_slug><wp:tag_name><![CDATA[Jeux Olympiques]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>294</wp:term_id><wp:tag_slug>journee-mondiale-de-la-securite-sur-internet</wp:tag_slug><wp:tag_name><![CDATA[journée mondiale de la sécurité sur internet]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>121</wp:term_id><wp:tag_slug>label</wp:tag_slug><wp:tag_name><![CDATA[label]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>217</wp:term_id><wp:tag_slug>laureat</wp:tag_slug><wp:tag_name><![CDATA[Lauréat]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>241</wp:term_id><wp:tag_slug>legislation</wp:tag_slug><wp:tag_name><![CDATA[législation]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>253</wp:term_id><wp:tag_slug>liberte-informatique</wp:tag_slug><wp:tag_name><![CDATA[Liberté informatique]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>167</wp:term_id><wp:tag_slug>licenciement</wp:tag_slug><wp:tag_name><![CDATA[licenciement]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>301</wp:term_id><wp:tag_slug>livre-blanc</wp:tag_slug><wp:tag_name><![CDATA[Livre Blanc]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>19</wp:term_id><wp:tag_slug>logiciel</wp:tag_slug><wp:tag_name><![CDATA[logiciel]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>345</wp:term_id><wp:tag_slug>logiciel-crm-en-saas</wp:tag_slug><wp:tag_name><![CDATA[Logiciel CRM en SaaS]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>126</wp:term_id><wp:tag_slug>logiciel-espion</wp:tag_slug><wp:tag_name><![CDATA[Logiciel espion]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>322</wp:term_id><wp:tag_slug>logiciels-de-gestion-clients</wp:tag_slug><wp:tag_name><![CDATA[logiciels de gestion clients]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>347</wp:term_id><wp:tag_slug>logiciels-obsoletes</wp:tag_slug><wp:tag_name><![CDATA[logiciels obsolètes]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>309</wp:term_id><wp:tag_slug>mac</wp:tag_slug><wp:tag_name><![CDATA[Mac]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>139</wp:term_id><wp:tag_slug>maitriser-les-couts</wp:tag_slug><wp:tag_name><![CDATA[Maîtriser les couts]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>303</wp:term_id><wp:tag_slug>malware</wp:tag_slug><wp:tag_name><![CDATA[malware]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>144</wp:term_id><wp:tag_slug>manuel-valls</wp:tag_slug><wp:tag_name><![CDATA[manuel valls]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>344</wp:term_id><wp:tag_slug>marche-du-crm</wp:tag_slug><wp:tag_name><![CDATA[Marché du CRM]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>34</wp:term_id><wp:tag_slug>marketing</wp:tag_slug><wp:tag_name><![CDATA[marketing]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>315</wp:term_id><wp:tag_slug>materiel</wp:tag_slug><wp:tag_name><![CDATA[matériel]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>242</wp:term_id><wp:tag_slug>mcafee</wp:tag_slug><wp:tag_name><![CDATA[mcafee]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>359</wp:term_id><wp:tag_slug>meap</wp:tag_slug><wp:tag_name><![CDATA[MEAP]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>164</wp:term_id><wp:tag_slug>medecine</wp:tag_slug><wp:tag_name><![CDATA[médecine]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>298</wp:term_id><wp:tag_slug>menaces</wp:tag_slug><wp:tag_name><![CDATA[menaces]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>211</wp:term_id><wp:tag_slug>menaces-informatiques</wp:tag_slug><wp:tag_name><![CDATA[menaces informatiques]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>149</wp:term_id><wp:tag_slug>mesures</wp:tag_slug><wp:tag_name><![CDATA[mesures]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>293</wp:term_id><wp:tag_slug>metier</wp:tag_slug><wp:tag_name><![CDATA[métier]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>292</wp:term_id><wp:tag_slug>metiers</wp:tag_slug><wp:tag_name><![CDATA[métiers]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>348</wp:term_id><wp:tag_slug>mettre-a-jour-son-logiciel</wp:tag_slug><wp:tag_name><![CDATA[mettre à jour son logiciel]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>179</wp:term_id><wp:tag_slug>microsoft</wp:tag_slug><wp:tag_name><![CDATA[Microsoft]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>330</wp:term_id><wp:tag_slug>migration</wp:tag_slug><wp:tag_name><![CDATA[migration]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>185</wp:term_id><wp:tag_slug>migration-sepa</wp:tag_slug><wp:tag_name><![CDATA[migration SEPA]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>38</wp:term_id><wp:tag_slug>mobile</wp:tag_slug><wp:tag_name><![CDATA[mobile]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>73</wp:term_id><wp:tag_slug>mobilite</wp:tag_slug><wp:tag_name><![CDATA[Mobilité]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>290</wp:term_id><wp:tag_slug>mobinaute</wp:tag_slug><wp:tag_name><![CDATA[mobinaute]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>11</wp:term_id><wp:tag_slug>mobotix</wp:tag_slug><wp:tag_name><![CDATA[Mobotix]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>110</wp:term_id><wp:tag_slug>moins-cher</wp:tag_slug><wp:tag_name><![CDATA[moins cher]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>143</wp:term_id><wp:tag_slug>montebourg</wp:tag_slug><wp:tag_name><![CDATA[montebourg]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>325</wp:term_id><wp:tag_slug>mooc</wp:tag_slug><wp:tag_name><![CDATA[Mooc]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>250</wp:term_id><wp:tag_slug>navigation-securisee</wp:tag_slug><wp:tag_name><![CDATA[navigation sécurisée]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>375</wp:term_id><wp:tag_slug>netasq</wp:tag_slug><wp:tag_name><![CDATA[netasq]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>114</wp:term_id><wp:tag_slug>nomade</wp:tag_slug><wp:tag_name><![CDATA[nomade]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>158</wp:term_id><wp:tag_slug>notation</wp:tag_slug><wp:tag_name><![CDATA[notation]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>310</wp:term_id><wp:tag_slug>notebook</wp:tag_slug><wp:tag_name><![CDATA[Notebook]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>351</wp:term_id><wp:tag_slug>nouveau-produit</wp:tag_slug><wp:tag_name><![CDATA[nouveau produit]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>5</wp:term_id><wp:tag_slug>nouveaute</wp:tag_slug><wp:tag_name><![CDATA[nouveauté]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>255</wp:term_id><wp:tag_slug>nsa</wp:tag_slug><wp:tag_name><![CDATA[NSA]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>141</wp:term_id><wp:tag_slug>numerique</wp:tag_slug><wp:tag_name><![CDATA[Numérique]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>323</wp:term_id><wp:tag_slug>objets-connectes</wp:tag_slug><wp:tag_name><![CDATA[objets connectés]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>356</wp:term_id><wp:tag_slug>octime</wp:tag_slug><wp:tag_name><![CDATA[Octime]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>274</wp:term_id><wp:tag_slug>operateur</wp:tag_slug><wp:tag_name><![CDATA[opérateur]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>89</wp:term_id><wp:tag_slug>optimisation-de-production</wp:tag_slug><wp:tag_name><![CDATA[optimisation de production]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>272</wp:term_id><wp:tag_slug>orange</wp:tag_slug><wp:tag_name><![CDATA[Orange]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>111</wp:term_id><wp:tag_slug>ordinateur-portable</wp:tag_slug><wp:tag_name><![CDATA[ordinateur portable]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>311</wp:term_id><wp:tag_slug>ordinateur-tactile</wp:tag_slug><wp:tag_name><![CDATA[ordinateur tactile]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>39</wp:term_id><wp:tag_slug>outil-personnel</wp:tag_slug><wp:tag_name><![CDATA[outil personnel]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>281</wp:term_id><wp:tag_slug>outils-danalyse-des-donnees</wp:tag_slug><wp:tag_name><![CDATA[outils d'analyse des données]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>341</wp:term_id><wp:tag_slug>outlook</wp:tag_slug><wp:tag_name><![CDATA[outlook]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>102</wp:term_id><wp:tag_slug>ovh</wp:tag_slug><wp:tag_name><![CDATA[OVH]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>70</wp:term_id><wp:tag_slug>paie</wp:tag_slug><wp:tag_name><![CDATA[Paie]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>103</wp:term_id><wp:tag_slug>palo-alto</wp:tag_slug><wp:tag_name><![CDATA[palo alto]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>275</wp:term_id><wp:tag_slug>palo-alto-certifiee-par-lanssi</wp:tag_slug><wp:tag_name><![CDATA[Palo Alto certifiée par l'ANSSI]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>182</wp:term_id><wp:tag_slug>palo-alto-networks</wp:tag_slug><wp:tag_name><![CDATA[Palo Alto Networks]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>83</wp:term_id><wp:tag_slug>parametrage</wp:tag_slug><wp:tag_name><![CDATA[paramétrage]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>6</wp:term_id><wp:tag_slug>paris</wp:tag_slug><wp:tag_name><![CDATA[Paris]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>355</wp:term_id><wp:tag_slug>partenariat</wp:tag_slug><wp:tag_name><![CDATA[partenariat]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>165</wp:term_id><wp:tag_slug>patient</wp:tag_slug><wp:tag_name><![CDATA[patient]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>40</wp:term_id><wp:tag_slug>pc</wp:tag_slug><wp:tag_name><![CDATA[PC]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>148</wp:term_id><wp:tag_slug>penebilite</wp:tag_slug><wp:tag_name><![CDATA[pénébilité]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>28</wp:term_id><wp:tag_slug>performance-reseau</wp:tag_slug><wp:tag_name><![CDATA[performance réseau]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>115</wp:term_id><wp:tag_slug>peripheriques</wp:tag_slug><wp:tag_name><![CDATA[périphériques]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>35</wp:term_id><wp:tag_slug>personnalisee</wp:tag_slug><wp:tag_name><![CDATA[personnalisée]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>94</wp:term_id><wp:tag_slug>personnelle</wp:tag_slug><wp:tag_name><![CDATA[personnelle]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>172</wp:term_id><wp:tag_slug>personnelles</wp:tag_slug><wp:tag_name><![CDATA[personnelles]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>87</wp:term_id><wp:tag_slug>petit-dejeuner</wp:tag_slug><wp:tag_name><![CDATA[petit déjeuner]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>273</wp:term_id><wp:tag_slug>phishing</wp:tag_slug><wp:tag_name><![CDATA[phishing]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>233</wp:term_id><wp:tag_slug>pilotage</wp:tag_slug><wp:tag_name><![CDATA[pilotage]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>104</wp:term_id><wp:tag_slug>piratage</wp:tag_slug><wp:tag_name><![CDATA[Piratage]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>105</wp:term_id><wp:tag_slug>pirate</wp:tag_slug><wp:tag_name><![CDATA[piraté]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>176</wp:term_id><wp:tag_slug>plus-gros-piratages</wp:tag_slug><wp:tag_name><![CDATA[plus gros piratages]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>46</wp:term_id><wp:tag_slug>pme</wp:tag_slug><wp:tag_name><![CDATA[PME]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>90</wp:term_id><wp:tag_slug>pmi</wp:tag_slug><wp:tag_name><![CDATA[PMI]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>107</wp:term_id><wp:tag_slug>point-dacces</wp:tag_slug><wp:tag_name><![CDATA[point d'accès]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>124</wp:term_id><wp:tag_slug>points-dacces-wi-fi</wp:tag_slug><wp:tag_name><![CDATA[Points d'accès Wi-fi]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>245</wp:term_id><wp:tag_slug>pony</wp:tag_slug><wp:tag_name><![CDATA[pony]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>331</wp:term_id><wp:tag_slug>pop-up</wp:tag_slug><wp:tag_name><![CDATA[pop-up]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>41</wp:term_id><wp:tag_slug>portable</wp:tag_slug><wp:tag_name><![CDATA[portable]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>371</wp:term_id><wp:tag_slug>powerpoint</wp:tag_slug><wp:tag_name><![CDATA[PowerPoint]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>278</wp:term_id><wp:tag_slug>previsions-it-2014</wp:tag_slug><wp:tag_name><![CDATA[prévisions IT 2014]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>228</wp:term_id><wp:tag_slug>procedure-fiscale</wp:tag_slug><wp:tag_name><![CDATA[procédure fiscale]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>65</wp:term_id><wp:tag_slug>production</wp:tag_slug><wp:tag_name><![CDATA[production]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>360</wp:term_id><wp:tag_slug>productivite</wp:tag_slug><wp:tag_name><![CDATA[productivité]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>77</wp:term_id><wp:tag_slug>projet</wp:tag_slug><wp:tag_name><![CDATA[Projet]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>230</wp:term_id><wp:tag_slug>projet-de-loi-de-finance</wp:tag_slug><wp:tag_name><![CDATA[projet de loi de finance]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>130</wp:term_id><wp:tag_slug>protection-des-donnees-personnelles</wp:tag_slug><wp:tag_name><![CDATA[protection des données personnelles]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>120</wp:term_id><wp:tag_slug>quartier-numerique</wp:tag_slug><wp:tag_name><![CDATA[quartier numérique]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>313</wp:term_id><wp:tag_slug>rachat</wp:tag_slug><wp:tag_name><![CDATA[rachat]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>147</wp:term_id><wp:tag_slug>reforme-des-retraites</wp:tag_slug><wp:tag_name><![CDATA[réforme des retraites]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>262</wp:term_id><wp:tag_slug>reglementations</wp:tag_slug><wp:tag_name><![CDATA[réglementations]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>234</wp:term_id><wp:tag_slug>reporting</wp:tag_slug><wp:tag_name><![CDATA[reporting]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>251</wp:term_id><wp:tag_slug>reseau</wp:tag_slug><wp:tag_name><![CDATA[réseau]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>125</wp:term_id><wp:tag_slug>reseau-wi-fi</wp:tag_slug><wp:tag_name><![CDATA[Réseau Wi-fi]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>367</wp:term_id><wp:tag_slug>reseaux-sociaux</wp:tag_slug><wp:tag_name><![CDATA[Réseaux Sociaux]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>80</wp:term_id><wp:tag_slug>ressources-humaines</wp:tag_slug><wp:tag_name><![CDATA[Ressources humaines]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>354</wp:term_id><wp:tag_slug>revendeur</wp:tag_slug><wp:tag_name><![CDATA[revendeur]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>71</wp:term_id><wp:tag_slug>rh</wp:tag_slug><wp:tag_name><![CDATA[RH]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>319</wp:term_id><wp:tag_slug>risques</wp:tag_slug><wp:tag_name><![CDATA[risques]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>321</wp:term_id><wp:tag_slug>saas</wp:tag_slug><wp:tag_name><![CDATA[SaaS]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>364</wp:term_id><wp:tag_slug>sae</wp:tag_slug><wp:tag_name><![CDATA[SAE]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>20</wp:term_id><wp:tag_slug>sage</wp:tag_slug><wp:tag_name><![CDATA[sage]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>51</wp:term_id><wp:tag_slug>sage-100</wp:tag_slug><wp:tag_name><![CDATA[Sage 100]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>74</wp:term_id><wp:tag_slug>sage-30</wp:tag_slug><wp:tag_name><![CDATA[sage 30]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>222</wp:term_id><wp:tag_slug>salaire</wp:tag_slug><wp:tag_name><![CDATA[salaire]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>95</wp:term_id><wp:tag_slug>salarie</wp:tag_slug><wp:tag_name><![CDATA[salarié]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>96</wp:term_id><wp:tag_slug>salaries</wp:tag_slug><wp:tag_name><![CDATA[salariés]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>260</wp:term_id><wp:tag_slug>sante</wp:tag_slug><wp:tag_name><![CDATA[Santé]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>127</wp:term_id><wp:tag_slug>securise</wp:tag_slug><wp:tag_name><![CDATA[sécurisé]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>117</wp:term_id><wp:tag_slug>securite-2</wp:tag_slug><wp:tag_name><![CDATA[sécurité]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>184</wp:term_id><wp:tag_slug>securite-du-cloud</wp:tag_slug><wp:tag_name><![CDATA[Sécurité du cloud]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>350</wp:term_id><wp:tag_slug>securite-inform</wp:tag_slug><wp:tag_name><![CDATA[sécurité inform]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>203</wp:term_id><wp:tag_slug>securite-informatique</wp:tag_slug><wp:tag_name><![CDATA[Sécurité informatique]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>271</wp:term_id><wp:tag_slug>securite-interne</wp:tag_slug><wp:tag_name><![CDATA[sécurité interne]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>314</wp:term_id><wp:tag_slug>securite-reseaux</wp:tag_slug><wp:tag_name><![CDATA[sécurité réseaux]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>295</wp:term_id><wp:tag_slug>securite-sur-internet</wp:tag_slug><wp:tag_name><![CDATA[sécurité sur internet]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>47</wp:term_id><wp:tag_slug>serveur</wp:tag_slug><wp:tag_name><![CDATA[serveur]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>317</wp:term_id><wp:tag_slug>service-des-impots</wp:tag_slug><wp:tag_name><![CDATA[service des impôts]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>191</wp:term_id><wp:tag_slug>services-cloud</wp:tag_slug><wp:tag_name><![CDATA[services Cloud]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>368</wp:term_id><wp:tag_slug>si</wp:tag_slug><wp:tag_name><![CDATA[SI]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>162</wp:term_id><wp:tag_slug>simplification</wp:tag_slug><wp:tag_name><![CDATA[simplification]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>291</wp:term_id><wp:tag_slug>smartphone</wp:tag_slug><wp:tag_name><![CDATA[smartphone]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>129</wp:term_id><wp:tag_slug>smartphones</wp:tag_slug><wp:tag_name><![CDATA[SmartPhones]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>288</wp:term_id><wp:tag_slug>sochi</wp:tag_slug><wp:tag_name><![CDATA[Sochi]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>352</wp:term_id><wp:tag_slug>solution-de-gestion-en-mode-cloud</wp:tag_slug><wp:tag_name><![CDATA[solution de gestion en mode Cloud]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>284</wp:term_id><wp:tag_slug>solution-wi-fi</wp:tag_slug><wp:tag_name><![CDATA[solution wi-fi]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>300</wp:term_id><wp:tag_slug>sophos</wp:tag_slug><wp:tag_name><![CDATA[Sophos]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>257</wp:term_id><wp:tag_slug>souris</wp:tag_slug><wp:tag_name><![CDATA[souris]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>213</wp:term_id><wp:tag_slug>statistique</wp:tag_slug><wp:tag_name><![CDATA[statistique]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>297</wp:term_id><wp:tag_slug>steria</wp:tag_slug><wp:tag_name><![CDATA[steria]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>55</wp:term_id><wp:tag_slug>stock</wp:tag_slug><wp:tag_name><![CDATA[stock]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>374</wp:term_id><wp:tag_slug>stormshield</wp:tag_slug><wp:tag_name><![CDATA[stormshield]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>134</wp:term_id><wp:tag_slug>succes-europeen</wp:tag_slug><wp:tag_name><![CDATA[succès européen]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>196</wp:term_id><wp:tag_slug>suisse</wp:tag_slug><wp:tag_name><![CDATA[Suisse]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>229</wp:term_id><wp:tag_slug>support</wp:tag_slug><wp:tag_name><![CDATA[support]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>197</wp:term_id><wp:tag_slug>swisscom</wp:tag_slug><wp:tag_name><![CDATA[Swisscom]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>178</wp:term_id><wp:tag_slug>switch</wp:tag_slug><wp:tag_name><![CDATA[switch]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>118</wp:term_id><wp:tag_slug>systeme-dinformation</wp:tag_slug><wp:tag_name><![CDATA[système d'information]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>175</wp:term_id><wp:tag_slug>systeme-informatique</wp:tag_slug><wp:tag_name><![CDATA[système informatique]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>43</wp:term_id><wp:tag_slug>tablette</wp:tag_slug><wp:tag_name><![CDATA[tablette]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>128</wp:term_id><wp:tag_slug>tablettes</wp:tag_slug><wp:tag_name><![CDATA[Tablettes]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>267</wp:term_id><wp:tag_slug>target</wp:tag_slug><wp:tag_name><![CDATA[Target]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>145</wp:term_id><wp:tag_slug>technologies</wp:tag_slug><wp:tag_name><![CDATA[technologies]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>218</wp:term_id><wp:tag_slug>technology-fast-500</wp:tag_slug><wp:tag_name><![CDATA[Technology Fast 500]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>231</wp:term_id><wp:tag_slug>teledeclaration</wp:tag_slug><wp:tag_name><![CDATA[télédéclaration]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>163</wp:term_id><wp:tag_slug>telemedecine</wp:tag_slug><wp:tag_name><![CDATA[télémédecine]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>270</wp:term_id><wp:tag_slug>tendances</wp:tag_slug><wp:tag_name><![CDATA[tendances]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>249</wp:term_id><wp:tag_slug>the-onion-router</wp:tag_slug><wp:tag_name><![CDATA[The Onion Router]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>112</wp:term_id><wp:tag_slug>tpe</wp:tag_slug><wp:tag_name><![CDATA[TPE]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>91</wp:term_id><wp:tag_slug>tpi</wp:tag_slug><wp:tag_name><![CDATA[TPI]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>173</wp:term_id><wp:tag_slug>travail</wp:tag_slug><wp:tag_name><![CDATA[travail]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>52</wp:term_id><wp:tag_slug>tresorerie</wp:tag_slug><wp:tag_name><![CDATA[trésorerie]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>357</wp:term_id><wp:tag_slug>unir-deux-solutions</wp:tag_slug><wp:tag_name><![CDATA[Unir deux solutions]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>161</wp:term_id><wp:tag_slug>utilisateurs</wp:tag_slug><wp:tag_name><![CDATA[utilisateurs]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>56</wp:term_id><wp:tag_slug>vente</wp:tag_slug><wp:tag_name><![CDATA[vente]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>13</wp:term_id><wp:tag_slug>video</wp:tag_slug><wp:tag_name><![CDATA[Vidéo]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>14</wp:term_id><wp:tag_slug>videosurveillance</wp:tag_slug><wp:tag_name><![CDATA[vidéosurveillance]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>133</wp:term_id><wp:tag_slug>vie-prive</wp:tag_slug><wp:tag_name><![CDATA[vie privé]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>166</wp:term_id><wp:tag_slug>vieillissement</wp:tag_slug><wp:tag_name><![CDATA[vieillissement]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>48</wp:term_id><wp:tag_slug>virtualisation</wp:tag_slug><wp:tag_name><![CDATA[Virtualisation]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>225</wp:term_id><wp:tag_slug>virus</wp:tag_slug><wp:tag_name><![CDATA[virus]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>7</wp:term_id><wp:tag_slug>vmware</wp:tag_slug><wp:tag_name><![CDATA[vmware]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>269</wp:term_id><wp:tag_slug>vol</wp:tag_slug><wp:tag_name><![CDATA[vol]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>247</wp:term_id><wp:tag_slug>vulnerable</wp:tag_slug><wp:tag_name><![CDATA[vulnérable]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>30</wp:term_id><wp:tag_slug>wi-fi</wp:tag_slug><wp:tag_name><![CDATA[Wi-Fi]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>135</wp:term_id><wp:tag_slug>wi-fi-en-europe</wp:tag_slug><wp:tag_name><![CDATA[Wi-Fi en Europe]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>108</wp:term_id><wp:tag_slug>wifi</wp:tag_slug><wp:tag_name><![CDATA[wifi]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>200</wp:term_id><wp:tag_slug>windows</wp:tag_slug><wp:tag_name><![CDATA[Windows]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>329</wp:term_id><wp:tag_slug>windows-7</wp:tag_slug><wp:tag_name><![CDATA[windows 7]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>307</wp:term_id><wp:tag_slug>windows-7-home-basic</wp:tag_slug><wp:tag_name><![CDATA[windows 7 Home basic]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>308</wp:term_id><wp:tag_slug>windows-7-pro</wp:tag_slug><wp:tag_name><![CDATA[windows 7 pro]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>201</wp:term_id><wp:tag_slug>windows-8</wp:tag_slug><wp:tag_name><![CDATA[Windows 8]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>202</wp:term_id><wp:tag_slug>windows-8-1</wp:tag_slug><wp:tag_name><![CDATA[Windows 8.1]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>223</wp:term_id><wp:tag_slug>windows-xp</wp:tag_slug><wp:tag_name><![CDATA[windows xp]]></wp:tag_name></wp:tag>
	<wp:tag><wp:term_id>370</wp:term_id><wp:tag_slug>word</wp:tag_slug><wp:tag_name><![CDATA[Word]]></wp:tag_name></wp:tag>
	<wp:term><wp:term_id>193</wp:term_id><wp:term_taxonomy>tribe_events_cat</wp:term_taxonomy><wp:term_slug>calendrier</wp:term_slug><wp:term_parent></wp:term_parent><wp:term_name><![CDATA[Calendrier]]></wp:term_name></wp:term>
	<wp:term><wp:term_id>116</wp:term_id><wp:term_taxonomy>nav_menu</wp:term_taxonomy><wp:term_slug>menu-it-news</wp:term_slug><wp:term_name><![CDATA[Menu IT-news]]></wp:term_name></wp:term>

	<generator>http://wordpress.org/?v=4.1.1</generator>

	<item>
		<title>images</title>
		<link>http://www.it-news.fr/?attachment_id=6</link>
		<pubDate>Tue, 21 May 2013 12:19:06 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/05/images.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>6</wp:post_id>
		<wp:post_date>2013-05-21 13:19:06</wp:post_date>
		<wp:post_date_gmt>2013-05-21 12:19:06</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>images</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/05/images.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/05/images.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:137;s:6:"height";i:136;s:4:"file";s:18:"2013/05/images.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_context</wp:meta_key>
			<wp:meta_value><![CDATA[custom-background]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_is_custom_background</wp:meta_key>
			<wp:meta_value><![CDATA[pub/bueno]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-aquastar-vectorisé-+-consulting</title>
		<link>http://www.it-news.fr/?attachment_id=7</link>
		<pubDate>Tue, 21 May 2013 12:19:26 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/05/logo-aquastar-vectorisc3a9-consulting.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>7</wp:post_id>
		<wp:post_date>2013-05-21 13:19:26</wp:post_date>
		<wp:post_date_gmt>2013-05-21 12:19:26</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-aquastar-vectorise-consulting</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/05/logo-aquastar-vectorisc3a9-consulting.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/05/logo-aquastar-vectorisc3a9-consulting.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1181;s:6:"height";i:276;s:4:"file";s:49:"2013/05/logo-aquastar-vectorisc3a9-consulting.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:49:"logo-aquastar-vectorisc3a9-consulting-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:48:"logo-aquastar-vectorisc3a9-consulting-300x70.jpg";s:5:"width";i:300;s:6:"height";i:70;s:9:"mime-type";s:10:"image/jpeg";}s:5:"large";a:4:{s:4:"file";s:50:"logo-aquastar-vectorisc3a9-consulting-1024x239.jpg";s:5:"width";i:1024;s:6:"height";i:239;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:49:"logo-aquastar-vectorisc3a9-consulting-940x198.jpg";s:5:"width";i:940;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_context</wp:meta_key>
			<wp:meta_value><![CDATA[custom-background]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_is_custom_background</wp:meta_key>
			<wp:meta_value><![CDATA[pub/bueno]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-aquastar-vectorisé-+-consulting</title>
		<link>http://www.it-news.fr/?attachment_id=8</link>
		<pubDate>Tue, 21 May 2013 12:24:17 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/05/logo-aquastar-vectorisc3a9-consulting1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>8</wp:post_id>
		<wp:post_date>2013-05-21 13:24:17</wp:post_date>
		<wp:post_date_gmt>2013-05-21 12:24:17</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-aquastar-vectorise-consulting-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/05/logo-aquastar-vectorisc3a9-consulting1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/05/logo-aquastar-vectorisc3a9-consulting1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1181;s:6:"height";i:276;s:4:"file";s:50:"2013/05/logo-aquastar-vectorisc3a9-consulting1.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:50:"logo-aquastar-vectorisc3a9-consulting1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:49:"logo-aquastar-vectorisc3a9-consulting1-300x70.jpg";s:5:"width";i:300;s:6:"height";i:70;s:9:"mime-type";s:10:"image/jpeg";}s:5:"large";a:4:{s:4:"file";s:51:"logo-aquastar-vectorisc3a9-consulting1-1024x239.jpg";s:5:"width";i:1024;s:6:"height";i:239;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:50:"logo-aquastar-vectorisc3a9-consulting1-940x198.jpg";s:5:"width";i:940;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_context</wp:meta_key>
			<wp:meta_value><![CDATA[custom-background]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_is_custom_background</wp:meta_key>
			<wp:meta_value><![CDATA[pub/reddle]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>cropped-logo-aquastar-vectorisc3a9-consulting2.jpg</title>
		<link>http://www.it-news.fr/?attachment_id=9</link>
		<pubDate>Tue, 21 May 2013 12:29:30 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/05/cropped-logo-aquastar-vectorisc3a9-consulting2.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[http://www.it-news.fr/wp-content/uploads/2013/05/cropped-logo-aquastar-vectorisc3a9-consulting2.jpg]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>9</wp:post_id>
		<wp:post_date>2013-05-21 13:29:30</wp:post_date>
		<wp:post_date_gmt>2013-05-21 12:29:30</wp:post_date_gmt>
		<wp:comment_status>closed</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cropped-logo-aquastar-vectorisc3a9-consulting2-jpg</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/05/cropped-logo-aquastar-vectorisc3a9-consulting2.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/05/cropped-logo-aquastar-vectorisc3a9-consulting2.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1000;s:6:"height";i:234;s:4:"file";s:58:"2013/05/cropped-logo-aquastar-vectorisc3a9-consulting2.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:58:"cropped-logo-aquastar-vectorisc3a9-consulting2-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:57:"cropped-logo-aquastar-vectorisc3a9-consulting2-300x70.jpg";s:5:"width";i:300;s:6:"height";i:70;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:58:"cropped-logo-aquastar-vectorisc3a9-consulting2-940x198.jpg";s:5:"width";i:940;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_context</wp:meta_key>
			<wp:meta_value><![CDATA[custom-header]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_is_custom_header</wp:meta_key>
			<wp:meta_value><![CDATA[pub/twentyeleven]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>cropped-logo-aquastar-vectorisc3a9-consulting3.jpg</title>
		<link>http://www.it-news.fr/?attachment_id=10</link>
		<pubDate>Tue, 21 May 2013 12:39:24 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/05/cropped-logo-aquastar-vectorisc3a9-consulting3.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[http://www.it-news.fr/wp-content/uploads/2013/05/cropped-logo-aquastar-vectorisc3a9-consulting3.jpg]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>10</wp:post_id>
		<wp:post_date>2013-05-21 13:39:24</wp:post_date>
		<wp:post_date_gmt>2013-05-21 12:39:24</wp:post_date_gmt>
		<wp:comment_status>closed</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cropped-logo-aquastar-vectorisc3a9-consulting3-jpg</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/05/cropped-logo-aquastar-vectorisc3a9-consulting3.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/05/cropped-logo-aquastar-vectorisc3a9-consulting3.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:940;s:6:"height";i:198;s:4:"file";s:58:"2013/05/cropped-logo-aquastar-vectorisc3a9-consulting3.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:58:"cropped-logo-aquastar-vectorisc3a9-consulting3-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:57:"cropped-logo-aquastar-vectorisc3a9-consulting3-300x63.jpg";s:5:"width";i:300;s:6:"height";i:63;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_context</wp:meta_key>
			<wp:meta_value><![CDATA[custom-header]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_is_custom_header</wp:meta_key>
			<wp:meta_value><![CDATA[pub/twentyten]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_oembed_a464e4bead5753b682c7eb089741f16d</wp:meta_key>
			<wp:meta_value><![CDATA[{{unknown}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>baies_serveurs</title>
		<link>http://www.it-news.fr/?attachment_id=11</link>
		<pubDate>Tue, 21 May 2013 12:48:49 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/05/baies_serveurs.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>11</wp:post_id>
		<wp:post_date>2013-05-21 13:48:49</wp:post_date>
		<wp:post_date_gmt>2013-05-21 12:48:49</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>baies_serveurs</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/05/baies_serveurs.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/05/baies_serveurs.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:400;s:6:"height";i:300;s:4:"file";s:26:"2013/05/baies_serveurs.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:26:"baies_serveurs-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:26:"baies_serveurs-300x225.jpg";s:5:"width";i:300;s:6:"height";i:225;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:26:"baies_serveurs-400x198.jpg";s:5:"width";i:400;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_context</wp:meta_key>
			<wp:meta_value><![CDATA[custom-background]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_is_custom_background</wp:meta_key>
			<wp:meta_value><![CDATA[pub/twentyten]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>1573_1178_passeport_num2</title>
		<link>http://www.it-news.fr/?attachment_id=12</link>
		<pubDate>Tue, 21 May 2013 12:50:49 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/05/1573_1178_passeport_num2.gif</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>12</wp:post_id>
		<wp:post_date>2013-05-21 13:50:49</wp:post_date>
		<wp:post_date_gmt>2013-05-21 12:50:49</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>1573_1178_passeport_num2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/05/1573_1178_passeport_num2.gif</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/05/1573_1178_passeport_num2.gif]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:755;s:6:"height";i:272;s:4:"file";s:36:"2013/05/1573_1178_passeport_num2.gif";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:36:"1573_1178_passeport_num2-150x150.gif";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/gif";}s:6:"medium";a:4:{s:4:"file";s:36:"1573_1178_passeport_num2-300x108.gif";s:5:"width";i:300;s:6:"height";i:108;s:9:"mime-type";s:9:"image/gif";}s:14:"post-thumbnail";a:4:{s:4:"file";s:36:"1573_1178_passeport_num2-755x198.gif";s:5:"width";i:755;s:6:"height";i:198;s:9:"mime-type";s:9:"image/gif";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_context</wp:meta_key>
			<wp:meta_value><![CDATA[custom-background]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_is_custom_background</wp:meta_key>
			<wp:meta_value><![CDATA[pub/twentyten]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Sans titre</title>
		<link>http://www.it-news.fr/nous-contacter/sans-titre/</link>
		<pubDate>Tue, 21 May 2013 13:37:00 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/05/sans-titre.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>46</wp:post_id>
		<wp:post_date>2013-05-21 14:37:00</wp:post_date>
		<wp:post_date_gmt>2013-05-21 13:37:00</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>sans-titre</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>44</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/05/sans-titre.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/05/sans-titre.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:819;s:6:"height";i:460;s:4:"file";s:22:"2013/05/sans-titre.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:22:"sans-titre-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:22:"sans-titre-300x168.jpg";s:5:"width";i:300;s:6:"height";i:168;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:22:"sans-titre-819x198.jpg";s:5:"width";i:819;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Logo-Sage</title>
		<link>http://www.it-news.fr/partenaires/logo-sage/</link>
		<pubDate>Tue, 28 May 2013 10:02:58 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/05/logo-sage.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[Etant le premier éditeur de logiciels de gestion en France (3ème au niveau mondial) du fait de son nombre de clients, Sage rend votre gestion et vos processus métier intuitifs et optimisés. S’exerçant dans dans plus de 6,1 millions d'entreprises à travers le monde, Sage est aujourd'hui une référence incontournable en termes d'édition de logiciels. ]]></content:encoded>
		<excerpt:encoded><![CDATA[Cet éditeur offre une gamme de logiciel et progiciel complète dans le but de répondre à la majorité des domaines d'activité. C'est simple, presque qu'une entreprise sur deux utilise des produits Sage en France. en termes de personnes, cela représente plus de 2 millions d'utilisateurs..]]></excerpt:encoded>
		<wp:post_id>81</wp:post_id>
		<wp:post_date>2013-05-28 11:02:58</wp:post_date>
		<wp:post_date_gmt>2013-05-28 10:02:58</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-sage</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>41</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/05/logo-sage.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/05/logo-sage.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:245;s:6:"height";i:110;s:4:"file";s:21:"2013/05/logo-sage.jpg";s:5:"sizes";a:1:{s:9:"thumbnail";a:4:{s:4:"file";s:21:"logo-sage-150x110.jpg";s:5:"width";i:150;s:6:"height";i:110;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Service informatique</title>
		<link>http://www.it-news.fr/partenaires/logo_akao/</link>
		<pubDate>Tue, 28 May 2013 11:27:21 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/05/logo_akao.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[Rendez votre système d'information cohérent et performant. ]]></excerpt:encoded>
		<wp:post_id>86</wp:post_id>
		<wp:post_date>2013-05-28 12:27:21</wp:post_date>
		<wp:post_date_gmt>2013-05-28 11:27:21</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo_akao</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>41</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/05/logo_akao.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/05/logo_akao.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:245;s:6:"height";i:110;s:4:"file";s:21:"2013/05/logo_akao.jpg";s:5:"sizes";a:1:{s:9:"thumbnail";a:4:{s:4:"file";s:21:"logo_akao-150x110.jpg";s:5:"width";i:150;s:6:"height";i:110;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Réseau WIFI sans fil </title>
		<link>http://www.it-news.fr/partenaires/logo-aruba/</link>
		<pubDate>Tue, 28 May 2013 12:03:09 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/05/logo-aruba.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[Le spécialiste du réseau WIFI. ]]></excerpt:encoded>
		<wp:post_id>95</wp:post_id>
		<wp:post_date>2013-05-28 13:03:09</wp:post_date>
		<wp:post_date_gmt>2013-05-28 12:03:09</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-aruba</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>41</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/05/logo-aruba.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/05/logo-aruba.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:245;s:6:"height";i:110;s:4:"file";s:22:"2013/05/logo-aruba.jpg";s:5:"sizes";a:1:{s:9:"thumbnail";a:4:{s:4:"file";s:22:"logo-aruba-150x110.jpg";s:5:"width";i:150;s:6:"height";i:110;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Sécurité réseau et mobilité</title>
		<link>http://www.it-news.fr/partenaires/logo-vmware/</link>
		<pubDate>Tue, 28 May 2013 12:17:59 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/05/logo-vmware.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[Leader dans le domaine de la mobilité et de la sécurité des accès réseau. ]]></excerpt:encoded>
		<wp:post_id>99</wp:post_id>
		<wp:post_date>2013-05-28 13:17:59</wp:post_date>
		<wp:post_date_gmt>2013-05-28 12:17:59</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-vmware</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>41</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/05/logo-vmware.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/05/logo-vmware.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:245;s:6:"height";i:110;s:4:"file";s:23:"2013/05/logo-vmware.jpg";s:5:"sizes";a:1:{s:9:"thumbnail";a:4:{s:4:"file";s:23:"logo-vmware-150x110.jpg";s:5:"width";i:150;s:6:"height";i:110;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Surveillance et sécurité réseau</title>
		<link>http://www.it-news.fr/partenaires/logo_securactive/</link>
		<pubDate>Tue, 28 May 2013 12:54:46 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/05/logo_securactive.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[La performance de vos infrastructures et réseaux. ]]></excerpt:encoded>
		<wp:post_id>100</wp:post_id>
		<wp:post_date>2013-05-28 13:54:46</wp:post_date>
		<wp:post_date_gmt>2013-05-28 12:54:46</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo_securactive</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>41</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/05/logo_securactive.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/05/logo_securactive.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:245;s:6:"height";i:110;s:4:"file";s:28:"2013/05/logo_securactive.jpg";s:5:"sizes";a:1:{s:9:"thumbnail";a:4:{s:4:"file";s:28:"logo_securactive-150x110.jpg";s:5:"width";i:150;s:6:"height";i:110;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Vidéo surveillance</title>
		<link>http://www.it-news.fr/partenaires/logo-mobotix/</link>
		<pubDate>Tue, 28 May 2013 13:09:37 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/05/logo-mobotix.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[La vidéo surveillance haute résolution. ]]></excerpt:encoded>
		<wp:post_id>101</wp:post_id>
		<wp:post_date>2013-05-28 14:09:37</wp:post_date>
		<wp:post_date_gmt>2013-05-28 13:09:37</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-mobotix</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>41</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/05/logo-mobotix.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/05/logo-mobotix.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:245;s:6:"height";i:110;s:4:"file";s:24:"2013/05/logo-mobotix.jpg";s:5:"sizes";a:1:{s:9:"thumbnail";a:4:{s:4:"file";s:24:"logo-mobotix-150x110.jpg";s:5:"width";i:150;s:6:"height";i:110;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Sécurité informatique</title>
		<link>http://www.it-news.fr/partenaires/logo-netasq/</link>
		<pubDate>Wed, 29 May 2013 06:38:28 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/05/logo-netasq.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[Fondée en 1998, Netasq est un des leaders dans la sécurité informatique. ]]></excerpt:encoded>
		<wp:post_id>112</wp:post_id>
		<wp:post_date>2013-05-29 07:38:28</wp:post_date>
		<wp:post_date_gmt>2013-05-29 06:38:28</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-netasq</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>41</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/05/logo-netasq.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/05/logo-netasq.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:245;s:6:"height";i:110;s:4:"file";s:23:"2013/05/logo-netasq.jpg";s:5:"sizes";a:1:{s:9:"thumbnail";a:4:{s:4:"file";s:23:"logo-netasq-150x110.jpg";s:5:"width";i:150;s:6:"height";i:110;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Mobilité et sécurité réseau</title>
		<link>http://www.it-news.fr/partenaires/logo-ucopia/</link>
		<pubDate>Wed, 29 May 2013 06:59:08 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/05/logo-ucopia.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[Optimisez votre communication.]]></excerpt:encoded>
		<wp:post_id>115</wp:post_id>
		<wp:post_date>2013-05-29 07:59:08</wp:post_date>
		<wp:post_date_gmt>2013-05-29 06:59:08</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-ucopia</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>41</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/05/logo-ucopia.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/05/logo-ucopia.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:245;s:6:"height";i:110;s:4:"file";s:23:"2013/05/logo-ucopia.jpg";s:5:"sizes";a:1:{s:9:"thumbnail";a:4:{s:4:"file";s:23:"logo-ucopia-150x110.jpg";s:5:"width";i:150;s:6:"height";i:110;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Le CRM et les PME en France</title>
		<link>http://www.it-news.fr/livres-blancs/le-crm-et-les-pme-en-france/</link>
		<pubDate>Wed, 29 May 2013 13:32:03 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/05/le-crm-et-les-pme-en-france.pdf</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>136</wp:post_id>
		<wp:post_date>2013-05-29 14:32:03</wp:post_date>
		<wp:post_date_gmt>2013-05-29 13:32:03</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>le-crm-et-les-pme-en-france</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>135</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/05/le-crm-et-les-pme-en-france.pdf</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/05/le-crm-et-les-pme-en-france.pdf]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>7 bonnes raisons d&#039;automatiser le traitement des commandes ERP</title>
		<link>http://www.it-news.fr/livres-blancs/fr_wp_7bonnes_raisons_dautomatiser_le_traitement_des_commandes_tout-erp/</link>
		<pubDate>Wed, 29 May 2013 13:33:47 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/05/fr_wp_7bonnes_raisons_dautomatiser_le_traitement_des_commandes_tout-erp.pdf</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>137</wp:post_id>
		<wp:post_date>2013-05-29 14:33:47</wp:post_date>
		<wp:post_date_gmt>2013-05-29 13:33:47</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>fr_wp_7bonnes_raisons_dautomatiser_le_traitement_des_commandes_tout-erp</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>135</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/05/fr_wp_7bonnes_raisons_dautomatiser_le_traitement_des_commandes_tout-erp.pdf</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/05/fr_wp_7bonnes_raisons_dautomatiser_le_traitement_des_commandes_tout-erp.pdf]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Les avantages metier des solutions ERP hebergees</title>
		<link>http://www.it-news.fr/livres-blancs/les-avantages-metier-des-solutions-erp-hebergees/</link>
		<pubDate>Wed, 29 May 2013 13:38:28 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/05/les-avantages-metier-des-solutions-erp-hebergees.pdf</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>138</wp:post_id>
		<wp:post_date>2013-05-29 14:38:28</wp:post_date>
		<wp:post_date_gmt>2013-05-29 13:38:28</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>les-avantages-metier-des-solutions-erp-hebergees</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>135</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/05/les-avantages-metier-des-solutions-erp-hebergees.pdf</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/05/les-avantages-metier-des-solutions-erp-hebergees.pdf]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Les bonnes pratiques de la relation clients</title>
		<link>http://www.it-news.fr/livres-blancs/les-bonnes-pratiques-de-la-relation-clients/</link>
		<pubDate>Wed, 29 May 2013 13:40:47 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/05/les-bonnes-pratiques-de-la-relation-clients.pdf</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>139</wp:post_id>
		<wp:post_date>2013-05-29 14:40:47</wp:post_date>
		<wp:post_date_gmt>2013-05-29 13:40:47</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>les-bonnes-pratiques-de-la-relation-clients</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>135</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/05/les-bonnes-pratiques-de-la-relation-clients.pdf</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/05/les-bonnes-pratiques-de-la-relation-clients.pdf]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Mobilite et efficacite des forces commerciales</title>
		<link>http://www.it-news.fr/livres-blancs/mobilite-et-efficacite-des-forces-commerciales/</link>
		<pubDate>Wed, 29 May 2013 13:41:51 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/05/mobilite-et-efficacite-des-forces-commerciales.pdf</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>140</wp:post_id>
		<wp:post_date>2013-05-29 14:41:51</wp:post_date>
		<wp:post_date_gmt>2013-05-29 13:41:51</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>mobilite-et-efficacite-des-forces-commerciales</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>135</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/05/mobilite-et-efficacite-des-forces-commerciales.pdf</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/05/mobilite-et-efficacite-des-forces-commerciales.pdf]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Mobilite et la relation client</title>
		<link>http://www.it-news.fr/livres-blancs/mobilite-et-la-relation-client/</link>
		<pubDate>Wed, 29 May 2013 13:42:58 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/05/mobilite-et-la-relation-client.pdf</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>142</wp:post_id>
		<wp:post_date>2013-05-29 14:42:58</wp:post_date>
		<wp:post_date_gmt>2013-05-29 13:42:58</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>mobilite-et-la-relation-client</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>135</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/05/mobilite-et-la-relation-client.pdf</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/05/mobilite-et-la-relation-client.pdf]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Normes IAS/IFRS</title>
		<link>http://www.it-news.fr/livres-blancs/normes-ias-ifrs/</link>
		<pubDate>Wed, 29 May 2013 13:44:45 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/05/normes-ias-ifrs.pdf</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>143</wp:post_id>
		<wp:post_date>2013-05-29 14:44:45</wp:post_date>
		<wp:post_date_gmt>2013-05-29 13:44:45</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>normes-ias-ifrs</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>135</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/05/normes-ias-ifrs.pdf</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/05/normes-ias-ifrs.pdf]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-aquastar-vectorisc3a9-consulting5.jpg</title>
		<link>http://www.it-news.fr/?attachment_id=177</link>
		<pubDate>Thu, 30 May 2013 06:41:27 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/05/logo-aquastar-vectorisc3a9-consulting5.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[http://www.it-news.fr/wp-content/uploads/2013/05/logo-aquastar-vectorisc3a9-consulting5.jpg]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>177</wp:post_id>
		<wp:post_date>2013-05-30 07:41:27</wp:post_date>
		<wp:post_date_gmt>2013-05-30 06:41:27</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-aquastar-vectorisc3a9-consulting5-jpg</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/05/logo-aquastar-vectorisc3a9-consulting5.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/05/logo-aquastar-vectorisc3a9-consulting5.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1181;s:6:"height";i:276;s:4:"file";s:50:"2013/05/logo-aquastar-vectorisc3a9-consulting5.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:50:"logo-aquastar-vectorisc3a9-consulting5-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:49:"logo-aquastar-vectorisc3a9-consulting5-300x70.jpg";s:5:"width";i:300;s:6:"height";i:70;s:9:"mime-type";s:10:"image/jpeg";}s:5:"large";a:4:{s:4:"file";s:51:"logo-aquastar-vectorisc3a9-consulting5-1024x239.jpg";s:5:"width";i:1024;s:6:"height";i:239;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:50:"logo-aquastar-vectorisc3a9-consulting5-940x198.jpg";s:5:"width";i:940;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_context</wp:meta_key>
			<wp:meta_value><![CDATA[custom-header]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>cropped-logo-modif.jpg</title>
		<link>http://www.it-news.fr/?attachment_id=178</link>
		<pubDate>Thu, 30 May 2013 06:43:36 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/05/cropped-logo-modif.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[http://www.it-news.fr/wp-content/uploads/2013/05/cropped-logo-modif.jpg]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>178</wp:post_id>
		<wp:post_date>2013-05-30 07:43:36</wp:post_date>
		<wp:post_date_gmt>2013-05-30 06:43:36</wp:post_date_gmt>
		<wp:comment_status>closed</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cropped-logo-modif-jpg</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/05/cropped-logo-modif.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/05/cropped-logo-modif.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:827;s:6:"height";i:194;s:4:"file";s:30:"2013/05/cropped-logo-modif.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:30:"cropped-logo-modif-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:29:"cropped-logo-modif-300x70.jpg";s:5:"width";i:300;s:6:"height";i:70;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_context</wp:meta_key>
			<wp:meta_value><![CDATA[custom-header]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_is_custom_header</wp:meta_key>
			<wp:meta_value><![CDATA[pub/twentytwelve]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>cropped-logo-modif1.jpg</title>
		<link>http://www.it-news.fr/?attachment_id=179</link>
		<pubDate>Thu, 30 May 2013 06:46:27 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/05/cropped-logo-modif1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[http://www.it-news.fr/wp-content/uploads/2013/05/cropped-logo-modif1.jpg]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>179</wp:post_id>
		<wp:post_date>2013-05-30 07:46:27</wp:post_date>
		<wp:post_date_gmt>2013-05-30 06:46:27</wp:post_date_gmt>
		<wp:comment_status>closed</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cropped-logo-modif1-jpg</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/05/cropped-logo-modif1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/05/cropped-logo-modif1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:579;s:6:"height";i:136;s:4:"file";s:31:"2013/05/cropped-logo-modif1.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:31:"cropped-logo-modif1-150x136.jpg";s:5:"width";i:150;s:6:"height";i:136;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:30:"cropped-logo-modif1-300x70.jpg";s:5:"width";i:300;s:6:"height";i:70;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_context</wp:meta_key>
			<wp:meta_value><![CDATA[custom-header]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_is_custom_header</wp:meta_key>
			<wp:meta_value><![CDATA[pub/twentytwelve]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Réduire les coûts de stockage</title>
		<link>http://www.it-news.fr/livres-blancs/symantec_reduire_cout_stockage/</link>
		<pubDate>Mon, 03 Jun 2013 10:25:46 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/symantec_reduire_cout_stockage.pdf</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>196</wp:post_id>
		<wp:post_date>2013-06-03 11:25:46</wp:post_date>
		<wp:post_date_gmt>2013-06-03 10:25:46</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>symantec_reduire_cout_stockage</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>135</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/symantec_reduire_cout_stockage.pdf</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/symantec_reduire_cout_stockage.pdf]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Les tendances du Cloud en 2013</title>
		<link>http://www.it-news.fr/livres-blancs/tendancescloud2013_v2-0/</link>
		<pubDate>Mon, 03 Jun 2013 10:28:05 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/tendancescloud2013_v2-0.pdf</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>197</wp:post_id>
		<wp:post_date>2013-06-03 11:28:05</wp:post_date>
		<wp:post_date_gmt>2013-06-03 10:28:05</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>tendancescloud2013_v2-0</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>135</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/tendancescloud2013_v2-0.pdf</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/tendancescloud2013_v2-0.pdf]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Microsoft France : Bring Your Own Device (BYOD)</title>
		<link>http://www.it-news.fr/livres-blancs/microsoft-france-bring-your-own-device-byod-vision-securite-et-approche-de-solutions-leslivresblancs-fr/</link>
		<pubDate>Mon, 03 Jun 2013 10:31:12 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/microsoft-france-bring-your-own-device-byod-vision-sc3a9curitc3a9-et-approche-de-solutions-leslivresblancs-fr.pdf</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>200</wp:post_id>
		<wp:post_date>2013-06-03 11:31:12</wp:post_date>
		<wp:post_date_gmt>2013-06-03 10:31:12</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>microsoft-france-bring-your-own-device-byod-vision-securite-et-approche-de-solutions-leslivresblancs-fr</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>135</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/microsoft-france-bring-your-own-device-byod-vision-sc3a9curitc3a9-et-approche-de-solutions-leslivresblancs-fr.pdf</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/microsoft-france-bring-your-own-device-byod-vision-sc3a9curitc3a9-et-approche-de-solutions-leslivresblancs-fr.pdf]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>BYOD : Menace ou opportunité pour la DSI</title>
		<link>http://www.it-news.fr/livres-blancs/osiatis-byod-menace-ou-opportunite-pour-la-dsi-leslivresblancs-fr/</link>
		<pubDate>Mon, 03 Jun 2013 10:32:17 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/osiatis-byod-menace-ou-opportunitc3a9-pour-la-dsi-leslivresblancs-fr.pdf</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>201</wp:post_id>
		<wp:post_date>2013-06-03 11:32:17</wp:post_date>
		<wp:post_date_gmt>2013-06-03 10:32:17</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>osiatis-byod-menace-ou-opportunite-pour-la-dsi-leslivresblancs-fr</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>135</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/osiatis-byod-menace-ou-opportunitc3a9-pour-la-dsi-leslivresblancs-fr.pdf</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/osiatis-byod-menace-ou-opportunitc3a9-pour-la-dsi-leslivresblancs-fr.pdf]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>10 défis pour votre politique de sécurité </title>
		<link>http://www.it-news.fr/livres-blancs/10_defis_politique_securite_gdata_2012/</link>
		<pubDate>Mon, 03 Jun 2013 10:51:15 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/10_defis_politique_securite_gdata_2012.pdf</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>203</wp:post_id>
		<wp:post_date>2013-06-03 11:51:15</wp:post_date>
		<wp:post_date_gmt>2013-06-03 10:51:15</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>10_defis_politique_securite_gdata_2012</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>135</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/10_defis_politique_securite_gdata_2012.pdf</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/10_defis_politique_securite_gdata_2012.pdf]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Sensibilisation à la sécurité de l&#039;information 2.0</title>
		<link>http://www.it-news.fr/livres-blancs/lexsi-sensibilisation-a-la-securite-de-linformation-2-0-leslivresblancs-fr/</link>
		<pubDate>Mon, 03 Jun 2013 12:04:23 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/lexsi-sensibilisation-c3a0-la-sc3a9curitc3a9-de-linformation-2-0-leslivresblancs-fr.pdf</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>214</wp:post_id>
		<wp:post_date>2013-06-03 13:04:23</wp:post_date>
		<wp:post_date_gmt>2013-06-03 12:04:23</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>lexsi-sensibilisation-a-la-securite-de-linformation-2-0-leslivresblancs-fr</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>135</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/lexsi-sensibilisation-c3a0-la-sc3a9curitc3a9-de-linformation-2-0-leslivresblancs-fr.pdf</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/lexsi-sensibilisation-c3a0-la-sc3a9curitc3a9-de-linformation-2-0-leslivresblancs-fr.pdf]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Faire le grand saut de la virtualisation</title>
		<link>http://www.it-news.fr/livres-blancs/21196714_ga_wp_takingtheleaptovirtualization_fr/</link>
		<pubDate>Mon, 03 Jun 2013 12:06:35 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/21196714_ga_wp_takingtheleaptovirtualization_fr.pdf</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>216</wp:post_id>
		<wp:post_date>2013-06-03 13:06:35</wp:post_date>
		<wp:post_date_gmt>2013-06-03 12:06:35</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>21196714_ga_wp_takingtheleaptovirtualization_fr</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>135</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/21196714_ga_wp_takingtheleaptovirtualization_fr.pdf</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/21196714_ga_wp_takingtheleaptovirtualization_fr.pdf]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>cropped-logo-aquastar-vectorisc3a9-consulting.jpg</title>
		<link>http://www.it-news.fr/?attachment_id=218</link>
		<pubDate>Mon, 03 Jun 2013 12:14:02 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/cropped-logo-aquastar-vectorisc3a9-consulting.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[http://www.it-news.fr/wp-content/uploads/2013/06/cropped-logo-aquastar-vectorisc3a9-consulting.jpg]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>218</wp:post_id>
		<wp:post_date>2013-06-03 13:14:02</wp:post_date>
		<wp:post_date_gmt>2013-06-03 12:14:02</wp:post_date_gmt>
		<wp:comment_status>closed</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cropped-logo-aquastar-vectorisc3a9-consulting-jpg</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/cropped-logo-aquastar-vectorisc3a9-consulting.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/cropped-logo-aquastar-vectorisc3a9-consulting.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:940;s:6:"height";i:198;s:4:"file";s:57:"2013/06/cropped-logo-aquastar-vectorisc3a9-consulting.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:57:"cropped-logo-aquastar-vectorisc3a9-consulting-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:56:"cropped-logo-aquastar-vectorisc3a9-consulting-300x63.jpg";s:5:"width";i:300;s:6:"height";i:63;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_context</wp:meta_key>
			<wp:meta_value><![CDATA[custom-header]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_is_custom_header</wp:meta_key>
			<wp:meta_value><![CDATA[pub/twentyten]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-aquastar-nvx.jpg</title>
		<link>http://www.it-news.fr/?attachment_id=219</link>
		<pubDate>Mon, 03 Jun 2013 12:15:26 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-aquastar-nvx.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[http://www.it-news.fr/wp-content/uploads/2013/06/logo-aquastar-nvx.jpg]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>219</wp:post_id>
		<wp:post_date>2013-06-03 13:15:26</wp:post_date>
		<wp:post_date_gmt>2013-06-03 12:15:26</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-aquastar-nvx-jpg</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-aquastar-nvx.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-aquastar-nvx.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:945;s:6:"height";i:221;s:4:"file";s:29:"2013/06/logo-aquastar-nvx.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:29:"logo-aquastar-nvx-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:28:"logo-aquastar-nvx-300x70.jpg";s:5:"width";i:300;s:6:"height";i:70;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:29:"logo-aquastar-nvx-940x198.jpg";s:5:"width";i:940;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_context</wp:meta_key>
			<wp:meta_value><![CDATA[custom-header]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-aquastar-nvx1.jpg</title>
		<link>http://www.it-news.fr/?attachment_id=220</link>
		<pubDate>Mon, 03 Jun 2013 12:16:07 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-aquastar-nvx1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[http://www.it-news.fr/wp-content/uploads/2013/06/logo-aquastar-nvx1.jpg]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>220</wp:post_id>
		<wp:post_date>2013-06-03 13:16:07</wp:post_date>
		<wp:post_date_gmt>2013-06-03 12:16:07</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-aquastar-nvx1-jpg</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-aquastar-nvx1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-aquastar-nvx1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:756;s:6:"height";i:177;s:4:"file";s:30:"2013/06/logo-aquastar-nvx1.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:30:"logo-aquastar-nvx1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:29:"logo-aquastar-nvx1-300x70.jpg";s:5:"width";i:300;s:6:"height";i:70;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_context</wp:meta_key>
			<wp:meta_value><![CDATA[custom-header]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-aquastar-nvx2.jpg</title>
		<link>http://www.it-news.fr/?attachment_id=221</link>
		<pubDate>Mon, 03 Jun 2013 12:16:49 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-aquastar-nvx2.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[http://www.it-news.fr/wp-content/uploads/2013/06/logo-aquastar-nvx2.jpg]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>221</wp:post_id>
		<wp:post_date>2013-06-03 13:16:49</wp:post_date>
		<wp:post_date_gmt>2013-06-03 12:16:49</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-aquastar-nvx2-jpg</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-aquastar-nvx2.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-aquastar-nvx2.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:530;s:6:"height";i:124;s:4:"file";s:30:"2013/06/logo-aquastar-nvx2.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:30:"logo-aquastar-nvx2-150x124.jpg";s:5:"width";i:150;s:6:"height";i:124;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:29:"logo-aquastar-nvx2-300x70.jpg";s:5:"width";i:300;s:6:"height";i:70;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_context</wp:meta_key>
			<wp:meta_value><![CDATA[custom-header]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>image-test</title>
		<link>http://www.it-news.fr/?attachment_id=225</link>
		<pubDate>Thu, 06 Jun 2013 08:08:54 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/image-test.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>225</wp:post_id>
		<wp:post_date>2013-06-06 09:08:54</wp:post_date>
		<wp:post_date_gmt>2013-06-06 08:08:54</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>image-test</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/image-test.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/image-test.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:301;s:6:"height";i:251;s:4:"file";s:22:"2013/06/image-test.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:22:"image-test-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:22:"image-test-300x250.jpg";s:5:"width";i:300;s:6:"height";i:250;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:22:"image-test-301x198.jpg";s:5:"width";i:301;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Vous avez un projet ? </title>
		<link>http://www.it-news.fr/?attachment_id=290</link>
		<pubDate>Mon, 10 Jun 2013 13:03:19 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/vous-avez-un-projet1-e1370869676620.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>290</wp:post_id>
		<wp:post_date>2013-06-10 14:03:19</wp:post_date>
		<wp:post_date_gmt>2013-06-10 13:03:19</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>vous-avez-un-projet</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/vous-avez-un-projet1-e1370869676620.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/vous-avez-un-projet1-e1370869676620.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:190;s:6:"height";i:110;s:4:"file";s:47:"2013/06/vous-avez-un-projet1-e1370869676620.png";s:5:"sizes";a:1:{s:9:"thumbnail";a:4:{s:4:"file";s:47:"vous-avez-un-projet1-e1370869676620-150x110.png";s:5:"width";i:150;s:6:"height";i:110;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_backup_sizes</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{s:9:"full-orig";a:3:{s:5:"width";i:245;s:6:"height";i:142;s:4:"file";s:24:"vous-avez-un-projet1.png";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Projet informatique pour PME ou MGE]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>BYOD</title>
		<link>http://www.it-news.fr/byod-lusage-professionnel-de-peripheriques-personnels-smartphones-ordinateurs/featured-image/</link>
		<pubDate>Mon, 10 Jun 2013 13:17:38 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/featured-image-e1370870349821.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>291</wp:post_id>
		<wp:post_date>2013-06-10 14:17:38</wp:post_date>
		<wp:post_date_gmt>2013-06-10 13:17:38</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>featured-image</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>223</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/featured-image-e1370870349821.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/featured-image-e1370870349821.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:190;s:6:"height";i:104;s:4:"file";s:41:"2013/06/featured-image-e1370870349821.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:5:{s:4:"file";s:41:"featured-image-e1370870349821-150x104.jpg";s:5:"width";i:150;s:6:"height";i:104;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.5% (500&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:41:"featured-image-e1370870349821-150x104.jpg";s:5:"width";i:150;s:6:"height";i:104;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:11:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";s:11:"orientation";i:0;}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Utilisez vos outils personnels dans un but professionnel]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_backup_sizes</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{s:9:"full-orig";a:3:{s:5:"width";i:640;s:6:"height";i:350;s:4:"file";s:18:"featured-image.jpg";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Aquastar Consulting service informatique</title>
		<link>http://www.it-news.fr/?attachment_id=293</link>
		<pubDate>Mon, 10 Jun 2013 13:29:51 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-aquastar-vectorisc3a9-consulting1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[http://www.it-news.fr/wp-content/uploads/2013/06/logo-aquastar-vectorisc3a9-consulting1.jpg]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>293</wp:post_id>
		<wp:post_date>2013-06-10 14:29:51</wp:post_date>
		<wp:post_date_gmt>2013-06-10 13:29:51</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-aquastar-vectorisc3a9-consulting1-jpg</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-aquastar-vectorisc3a9-consulting1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-aquastar-vectorisc3a9-consulting1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:940;s:6:"height";i:198;s:4:"file";s:50:"2013/06/logo-aquastar-vectorisc3a9-consulting1.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:50:"logo-aquastar-vectorisc3a9-consulting1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:49:"logo-aquastar-vectorisc3a9-consulting1-300x63.jpg";s:5:"width";i:300;s:6:"height";i:63;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_context</wp:meta_key>
			<wp:meta_value><![CDATA[custom-header]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_is_custom_header</wp:meta_key>
			<wp:meta_value><![CDATA[pub/twentyten]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Aquastar Consulting solution informatique pour PME et MGE]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Ressource Sage CRM 2</title>
		<link>http://www.it-news.fr/sage-la-crm-en-pleine-revolution/l_ressource_sagecrm-2/</link>
		<pubDate>Mon, 10 Jun 2013 13:35:32 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/l_ressource_sagecrm-2-e1370871444733.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>295</wp:post_id>
		<wp:post_date>2013-06-10 14:35:32</wp:post_date>
		<wp:post_date_gmt>2013-06-10 13:35:32</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>l_ressource_sagecrm-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>180</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/l_ressource_sagecrm-2-e1370871444733.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/l_ressource_sagecrm-2-e1370871444733.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:190;s:6:"height";i:52;s:4:"file";s:48:"2013/06/l_ressource_sagecrm-2-e1370871444733.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:5:{s:4:"file";s:47:"l_ressource_sagecrm-2-e1370871444733-150x52.jpg";s:5:"width";i:150;s:6:"height";i:52;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.9% (347&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:47:"l_ressource_sagecrm-2-e1370871444733-150x52.jpg";s:5:"width";i:150;s:6:"height";i:52;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:11:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";s:11:"orientation";i:0;}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_backup_sizes</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{s:9:"full-orig";a:3:{s:5:"width";i:359;s:6:"height";i:99;s:4:"file";s:25:"l_ressource_sagecrm-2.jpg";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Sage CRM]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Aruba solution wifi</title>
		<link>http://www.it-news.fr/aruba-networks-ameliore-ses-controleurs-wifi/mdl-telecom-aruba-networks-logo/</link>
		<pubDate>Mon, 10 Jun 2013 13:39:41 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/mdl-telecom-aruba-networks-logo-e1370871602287.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>299</wp:post_id>
		<wp:post_date>2013-06-10 14:39:41</wp:post_date>
		<wp:post_date_gmt>2013-06-10 13:39:41</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>mdl-telecom-aruba-networks-logo</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>133</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/mdl-telecom-aruba-networks-logo-e1370871602287.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/mdl-telecom-aruba-networks-logo-e1370871602287.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:190;s:6:"height";i:75;s:4:"file";s:58:"2013/06/mdl-telecom-aruba-networks-logo-e1370871602287.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:5:{s:4:"file";s:57:"mdl-telecom-aruba-networks-logo-e1370871602287-150x75.jpg";s:5:"width";i:150;s:6:"height";i:75;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.1% (344&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:57:"mdl-telecom-aruba-networks-logo-e1370871602287-150x75.jpg";s:5:"width";i:150;s:6:"height";i:75;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:11:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";s:11:"orientation";i:0;}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_backup_sizes</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{s:9:"full-orig";a:3:{s:5:"width";i:682;s:6:"height";i:268;s:4:"file";s:35:"mdl-telecom-aruba-networks-logo.jpg";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Aruba solution Wifi]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Sage efacture</title>
		<link>http://www.it-news.fr/aruba-networks-ameliore-ses-controleurs-wifi/images-2/</link>
		<pubDate>Mon, 10 Jun 2013 13:47:10 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/images1-e1370872051544.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>302</wp:post_id>
		<wp:post_date>2013-06-10 14:47:10</wp:post_date>
		<wp:post_date_gmt>2013-06-10 13:47:10</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>images-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>133</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/images1-e1370872051544.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/images1-e1370872051544.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:170;s:6:"height";i:277;s:4:"file";s:34:"2013/06/images1-e1370872051544.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:34:"images1-e1370872051544-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.5% (272&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:34:"images1-e1370872051544-170x198.jpg";s:5:"width";i:170;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.5% (383&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:34:"images1-e1370872051544-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 4.8% (428&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_backup_sizes</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{s:9:"full-orig";a:3:{s:5:"width";i:176;s:6:"height";i:287;s:4:"file";s:11:"images1.jpg";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Solution e-facture SAGE]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Mobotix</title>
		<link>http://www.it-news.fr/mobotix-augmente-une-nouvelle-fois-la-resolution-de-ses-modeles-mais-pourquoi/logo-mobotix-2/</link>
		<pubDate>Mon, 10 Jun 2013 13:51:01 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-mobotix-e1370872279184.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>304</wp:post_id>
		<wp:post_date>2013-06-10 14:51:01</wp:post_date>
		<wp:post_date_gmt>2013-06-10 13:51:01</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-mobotix-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>110</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-mobotix-e1370872279184.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-mobotix-e1370872279184.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:190;s:6:"height";i:190;s:4:"file";s:39:"2013/06/logo-mobotix-e1370872279184.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:39:"logo-mobotix-e1370872279184-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:39:"logo-mobotix-e1370872279184-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_backup_sizes</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{s:9:"full-orig";a:3:{s:5:"width";i:577;s:6:"height";i:577;s:4:"file";s:16:"logo-mobotix.jpg";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Solution Mobotix haute résolution]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Actualité</title>
		<link>http://www.it-news.fr/?attachment_id=306</link>
		<pubDate>Mon, 10 Jun 2013 14:11:10 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/752fb1121dc80d4e82b8cf1ed3f1fde8_299_505-e1370873506343.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[Découvrez les dernières nouveautés]]></excerpt:encoded>
		<wp:post_id>306</wp:post_id>
		<wp:post_date>2013-06-10 15:11:10</wp:post_date>
		<wp:post_date_gmt>2013-06-10 14:11:10</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>752fb1121dc80d4e82b8cf1ed3f1fde8_299_505</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/752fb1121dc80d4e82b8cf1ed3f1fde8_299_505-e1370873506343.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/752fb1121dc80d4e82b8cf1ed3f1fde8_299_505-e1370873506343.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:190;s:6:"height";i:112;s:4:"file";s:67:"2013/06/752fb1121dc80d4e82b8cf1ed3f1fde8_299_505-e1370873506343.jpg";s:5:"sizes";a:1:{s:9:"thumbnail";a:4:{s:4:"file";s:67:"752fb1121dc80d4e82b8cf1ed3f1fde8_299_505-e1370873506343-150x112.jpg";s:5:"width";i:150;s:6:"height";i:112;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_backup_sizes</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{s:9:"full-orig";a:3:{s:5:"width";i:505;s:6:"height";i:299;s:4:"file";s:44:"752fb1121dc80d4e82b8cf1ed3f1fde8_299_505.jpg";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Nouveauté Aquastar Consulting]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Pub blog</title>
		<link>http://www.it-news.fr/?attachment_id=359</link>
		<pubDate>Thu, 13 Jun 2013 14:28:53 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/pub-blog.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>359</wp:post_id>
		<wp:post_date>2013-06-13 15:28:53</wp:post_date>
		<wp:post_date_gmt>2013-06-13 14:28:53</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>pub-blog</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/pub-blog.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/pub-blog.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:190;s:6:"height";i:166;s:4:"file";s:20:"2013/06/pub-blog.png";s:5:"sizes";a:1:{s:9:"thumbnail";a:4:{s:4:"file";s:20:"pub-blog-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>pub-blog</title>
		<link>http://www.it-news.fr/?attachment_id=360</link>
		<pubDate>Mon, 17 Jun 2013 07:07:55 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/pub-blog1.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>360</wp:post_id>
		<wp:post_date>2013-06-17 08:07:55</wp:post_date>
		<wp:post_date_gmt>2013-06-17 07:07:55</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>pub-blog-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/pub-blog1.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/pub-blog1.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:190;s:6:"height";i:166;s:4:"file";s:21:"2013/06/pub-blog1.png";s:5:"sizes";a:1:{s:9:"thumbnail";a:4:{s:4:"file";s:21:"pub-blog1-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-audio-video-nord</title>
		<link>http://www.it-news.fr/temoignages-clients/logo-audio-video-nord/</link>
		<pubDate>Mon, 17 Jun 2013 08:32:35 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-audio-video-nord.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>379</wp:post_id>
		<wp:post_date>2013-06-17 09:32:35</wp:post_date>
		<wp:post_date_gmt>2013-06-17 08:32:35</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-audio-video-nord</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>36</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-audio-video-nord.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-audio-video-nord.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:33:"2013/06/logo-audio-video-nord.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-big-bazar-bethunois</title>
		<link>http://www.it-news.fr/temoignages-clients/logo-big-bazar-bethunois/</link>
		<pubDate>Mon, 17 Jun 2013 08:32:38 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-big-bazar-bethunois.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>380</wp:post_id>
		<wp:post_date>2013-06-17 09:32:38</wp:post_date>
		<wp:post_date_gmt>2013-06-17 08:32:38</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-big-bazar-bethunois</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>36</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-big-bazar-bethunois.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-big-bazar-bethunois.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:36:"2013/06/logo-big-bazar-bethunois.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-bureau-services</title>
		<link>http://www.it-news.fr/temoignages-clients/logo-bureau-services/</link>
		<pubDate>Mon, 17 Jun 2013 08:32:40 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-bureau-services.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>381</wp:post_id>
		<wp:post_date>2013-06-17 09:32:40</wp:post_date>
		<wp:post_date_gmt>2013-06-17 08:32:40</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-bureau-services</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>36</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-bureau-services.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-bureau-services.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:32:"2013/06/logo-bureau-services.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-cevinor</title>
		<link>http://www.it-news.fr/temoignages-clients/logo-cevinor/</link>
		<pubDate>Mon, 17 Jun 2013 08:32:43 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-cevinor.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>382</wp:post_id>
		<wp:post_date>2013-06-17 09:32:43</wp:post_date>
		<wp:post_date_gmt>2013-06-17 08:32:43</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-cevinor</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>36</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-cevinor.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-cevinor.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:24:"2013/06/logo-cevinor.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-codic</title>
		<link>http://www.it-news.fr/temoignages-clients/logo-codic/</link>
		<pubDate>Mon, 17 Jun 2013 08:32:44 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-codic.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>383</wp:post_id>
		<wp:post_date>2013-06-17 09:32:44</wp:post_date>
		<wp:post_date_gmt>2013-06-17 08:32:44</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-codic</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>36</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-codic.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-codic.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:22:"2013/06/logo-codic.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-cora</title>
		<link>http://www.it-news.fr/temoignages-clients/logo-cora/</link>
		<pubDate>Mon, 17 Jun 2013 08:32:45 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-cora.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>384</wp:post_id>
		<wp:post_date>2013-06-17 09:32:45</wp:post_date>
		<wp:post_date_gmt>2013-06-17 08:32:45</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-cora</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>36</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-cora.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-cora.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:21:"2013/06/logo-cora.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-nicols</title>
		<link>http://www.it-news.fr/temoignages-clients/logo-nicols/</link>
		<pubDate>Mon, 17 Jun 2013 08:32:47 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-nicols.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>385</wp:post_id>
		<wp:post_date>2013-06-17 09:32:47</wp:post_date>
		<wp:post_date_gmt>2013-06-17 08:32:47</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-nicols</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>36</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-nicols.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-nicols.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:23:"2013/06/logo-nicols.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>tape-a-l-oeil</title>
		<link>http://www.it-news.fr/temoignages-clients/logo-tape-a-l-oeil/</link>
		<pubDate>Mon, 17 Jun 2013 08:32:49 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-tape-a-l-oeil.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>386</wp:post_id>
		<wp:post_date>2013-06-17 09:32:49</wp:post_date>
		<wp:post_date_gmt>2013-06-17 08:32:49</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-tape-a-l-oeil</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>36</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-tape-a-l-oeil.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-tape-a-l-oeil.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:30:"2013/06/logo-tape-a-l-oeil.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>top-carrelage</title>
		<link>http://www.it-news.fr/temoignages-clients/logo-top-carrelage/</link>
		<pubDate>Mon, 17 Jun 2013 08:32:50 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-top-carrelage.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>387</wp:post_id>
		<wp:post_date>2013-06-17 09:32:50</wp:post_date>
		<wp:post_date_gmt>2013-06-17 08:32:50</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-top-carrelage</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>36</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-top-carrelage.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-top-carrelage.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:30:"2013/06/logo-top-carrelage.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>tresnois descamps</title>
		<link>http://www.it-news.fr/temoignages-clients/logo-tresnois-descamps/</link>
		<pubDate>Mon, 17 Jun 2013 08:32:52 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-tresnois-descamps.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>388</wp:post_id>
		<wp:post_date>2013-06-17 09:32:52</wp:post_date>
		<wp:post_date_gmt>2013-06-17 08:32:52</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-tresnois-descamps</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>36</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-tresnois-descamps.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-tresnois-descamps.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:34:"2013/06/logo-tresnois-descamps.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>ecole-mine-douai</title>
		<link>http://www.it-news.fr/temoignages-clients/education/ecole-mine-douai/</link>
		<pubDate>Mon, 17 Jun 2013 08:58:57 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/ecole-mine-douai.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>405</wp:post_id>
		<wp:post_date>2013-06-17 09:58:57</wp:post_date>
		<wp:post_date_gmt>2013-06-17 08:58:57</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>ecole-mine-douai</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>398</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/ecole-mine-douai.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/ecole-mine-douai.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:28:"2013/06/ecole-mine-douai.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-dnrfp-douane</title>
		<link>http://www.it-news.fr/temoignages-clients/education/logo-dnrfp-douane/</link>
		<pubDate>Mon, 17 Jun 2013 08:58:59 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-dnrfp-douane.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>406</wp:post_id>
		<wp:post_date>2013-06-17 09:58:59</wp:post_date>
		<wp:post_date_gmt>2013-06-17 08:58:59</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-dnrfp-douane</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>398</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-dnrfp-douane.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-dnrfp-douane.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:29:"2013/06/logo-dnrfp-douane.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-siadep</title>
		<link>http://www.it-news.fr/temoignages-clients/education/logo-siadep/</link>
		<pubDate>Mon, 17 Jun 2013 08:59:01 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-siadep.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>407</wp:post_id>
		<wp:post_date>2013-06-17 09:59:01</wp:post_date>
		<wp:post_date_gmt>2013-06-17 08:59:01</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-siadep</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>398</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-siadep.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-siadep.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:23:"2013/06/logo-siadep.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>cci-lille</title>
		<link>http://www.it-news.fr/temoignages-clients/administration-publique/cci-lille/</link>
		<pubDate>Mon, 17 Jun 2013 09:15:36 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/cci-lille.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>415</wp:post_id>
		<wp:post_date>2013-06-17 10:15:36</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:15:36</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cci-lille</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>411</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/cci-lille.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/cci-lille.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:21:"2013/06/cci-lille.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>communaute-agglomeration-du-douaisis</title>
		<link>http://www.it-news.fr/temoignages-clients/administration-publique/communaute-agglomeration-du-douaisis/</link>
		<pubDate>Mon, 17 Jun 2013 09:15:38 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/communaute-agglomeration-du-douaisis.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>416</wp:post_id>
		<wp:post_date>2013-06-17 10:15:38</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:15:38</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>communaute-agglomeration-du-douaisis</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>411</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/communaute-agglomeration-du-douaisis.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/communaute-agglomeration-du-douaisis.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:48:"2013/06/communaute-agglomeration-du-douaisis.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>consuel</title>
		<link>http://www.it-news.fr/temoignages-clients/administration-publique/consuel/</link>
		<pubDate>Mon, 17 Jun 2013 09:15:39 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/consuel.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>417</wp:post_id>
		<wp:post_date>2013-06-17 10:15:39</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:15:39</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>consuel</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>411</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/consuel.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/consuel.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:19:"2013/06/consuel.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>CUDL-dunkerque</title>
		<link>http://www.it-news.fr/temoignages-clients/administration-publique/cudl-dunkerque/</link>
		<pubDate>Mon, 17 Jun 2013 09:15:41 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/cudl-dunkerque.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>418</wp:post_id>
		<wp:post_date>2013-06-17 10:15:41</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:15:41</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cudl-dunkerque</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>411</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/cudl-dunkerque.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/cudl-dunkerque.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:26:"2013/06/cudl-dunkerque.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>LMH</title>
		<link>http://www.it-news.fr/temoignages-clients/administration-publique/lmh/</link>
		<pubDate>Mon, 17 Jun 2013 09:15:42 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/lmh.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>419</wp:post_id>
		<wp:post_date>2013-06-17 10:15:42</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:15:42</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>lmh</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>411</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/lmh.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/lmh.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:15:"2013/06/lmh.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-CENTRE-GESTION-FONCTION-PUBLIQUE-59</title>
		<link>http://www.it-news.fr/temoignages-clients/administration-publique/logo-centre-gestion-fonction-publique-59/</link>
		<pubDate>Mon, 17 Jun 2013 09:15:44 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-centre-gestion-fonction-publique-59.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>420</wp:post_id>
		<wp:post_date>2013-06-17 10:15:44</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:15:44</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-centre-gestion-fonction-publique-59</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>411</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-centre-gestion-fonction-publique-59.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-centre-gestion-fonction-publique-59.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:52:"2013/06/logo-centre-gestion-fonction-publique-59.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-leers</title>
		<link>http://www.it-news.fr/temoignages-clients/administration-publique/logo-leers/</link>
		<pubDate>Mon, 17 Jun 2013 09:15:46 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-leers.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>421</wp:post_id>
		<wp:post_date>2013-06-17 10:15:46</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:15:46</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-leers</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>411</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-leers.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-leers.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:22:"2013/06/logo-leers.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-mairie-anzin</title>
		<link>http://www.it-news.fr/temoignages-clients/administration-publique/logo-mairie-anzin/</link>
		<pubDate>Mon, 17 Jun 2013 09:15:47 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-mairie-anzin.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>422</wp:post_id>
		<wp:post_date>2013-06-17 10:15:47</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:15:47</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-mairie-anzin</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>411</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-mairie-anzin.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-mairie-anzin.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:29:"2013/06/logo-mairie-anzin.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-mairie-de-divion</title>
		<link>http://www.it-news.fr/temoignages-clients/administration-publique/logo-mairie-de-divion/</link>
		<pubDate>Mon, 17 Jun 2013 09:15:49 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-mairie-de-divion.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>423</wp:post_id>
		<wp:post_date>2013-06-17 10:15:49</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:15:49</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-mairie-de-divion</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>411</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-mairie-de-divion.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-mairie-de-divion.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:33:"2013/06/logo-mairie-de-divion.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-mairie-de-lomme</title>
		<link>http://www.it-news.fr/temoignages-clients/administration-publique/logo-mairie-de-lomme/</link>
		<pubDate>Mon, 17 Jun 2013 09:15:50 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-mairie-de-lomme.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>424</wp:post_id>
		<wp:post_date>2013-06-17 10:15:50</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:15:50</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-mairie-de-lomme</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>411</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-mairie-de-lomme.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-mairie-de-lomme.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:32:"2013/06/logo-mairie-de-lomme.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-sivom</title>
		<link>http://www.it-news.fr/temoignages-clients/administration-publique/logo-sivom/</link>
		<pubDate>Mon, 17 Jun 2013 09:15:51 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-sivom.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>425</wp:post_id>
		<wp:post_date>2013-06-17 10:15:51</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:15:51</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-sivom</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>411</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-sivom.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-sivom.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:22:"2013/06/logo-sivom.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>ville-de-lille</title>
		<link>http://www.it-news.fr/temoignages-clients/administration-publique/ville-de-lille/</link>
		<pubDate>Mon, 17 Jun 2013 09:15:53 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/ville-de-lille.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>426</wp:post_id>
		<wp:post_date>2013-06-17 10:15:53</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:15:53</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>ville-de-lille</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>411</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/ville-de-lille.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/ville-de-lille.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:26:"2013/06/ville-de-lille.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>villedk</title>
		<link>http://www.it-news.fr/temoignages-clients/administration-publique/villedk/</link>
		<pubDate>Mon, 17 Jun 2013 09:15:55 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/villedk.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>427</wp:post_id>
		<wp:post_date>2013-06-17 10:15:55</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:15:55</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>villedk</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>411</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/villedk.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/villedk.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:19:"2013/06/villedk.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>SMP</title>
		<link>http://www.it-news.fr/temoignages-clients/industrie/logo-smp/</link>
		<pubDate>Mon, 17 Jun 2013 09:28:09 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-smp.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>434</wp:post_id>
		<wp:post_date>2013-06-17 10:28:09</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:28:09</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-smp</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>431</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-smp.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-smp.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:20:"2013/06/logo-smp.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-sep-industrie</title>
		<link>http://www.it-news.fr/temoignages-clients/industrie/logo-sep-industrie/</link>
		<pubDate>Mon, 17 Jun 2013 09:28:11 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-sep-industrie.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>435</wp:post_id>
		<wp:post_date>2013-06-17 10:28:11</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:28:11</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-sep-industrie</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>431</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-sep-industrie.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-sep-industrie.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:30:"2013/06/logo-sep-industrie.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>micropross</title>
		<link>http://www.it-news.fr/temoignages-clients/industrie/logo-micropross/</link>
		<pubDate>Mon, 17 Jun 2013 09:28:13 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-micropross.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>436</wp:post_id>
		<wp:post_date>2013-06-17 10:28:13</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:28:13</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-micropross</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>431</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-micropross.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-micropross.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:27:"2013/06/logo-micropross.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-mayr-france</title>
		<link>http://www.it-news.fr/temoignages-clients/industrie/logo-mayr-france/</link>
		<pubDate>Mon, 17 Jun 2013 09:28:15 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-mayr-france.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>437</wp:post_id>
		<wp:post_date>2013-06-17 10:28:15</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:28:15</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-mayr-france</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>431</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-mayr-france.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-mayr-france.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:28:"2013/06/logo-mayr-france.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-howden</title>
		<link>http://www.it-news.fr/temoignages-clients/industrie/logo-howden/</link>
		<pubDate>Mon, 17 Jun 2013 09:28:17 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-howden.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>438</wp:post_id>
		<wp:post_date>2013-06-17 10:28:17</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:28:17</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-howden</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>431</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-howden.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-howden.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:23:"2013/06/logo-howden.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-grain-dor-gel</title>
		<link>http://www.it-news.fr/temoignages-clients/industrie/logo-grain-dor-gel/</link>
		<pubDate>Mon, 17 Jun 2013 09:28:19 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-grain-dor-gel.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>439</wp:post_id>
		<wp:post_date>2013-06-17 10:28:19</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:28:19</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-grain-dor-gel</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>431</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-grain-dor-gel.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-grain-dor-gel.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:30:"2013/06/logo-grain-dor-gel.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-eurovanille</title>
		<link>http://www.it-news.fr/temoignages-clients/industrie/logo-eurovanille/</link>
		<pubDate>Mon, 17 Jun 2013 09:28:21 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-eurovanille.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>440</wp:post_id>
		<wp:post_date>2013-06-17 10:28:21</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:28:21</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-eurovanille</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>431</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-eurovanille.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-eurovanille.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:28:"2013/06/logo-eurovanille.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-euroben</title>
		<link>http://www.it-news.fr/temoignages-clients/industrie/logo-euroben/</link>
		<pubDate>Mon, 17 Jun 2013 09:28:23 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-euroben.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>441</wp:post_id>
		<wp:post_date>2013-06-17 10:28:23</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:28:23</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-euroben</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>431</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-euroben.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-euroben.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:24:"2013/06/logo-euroben.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-duflot-industrie</title>
		<link>http://www.it-news.fr/temoignages-clients/industrie/logo-duflot-industrie/</link>
		<pubDate>Mon, 17 Jun 2013 09:28:25 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-duflot-industrie.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>442</wp:post_id>
		<wp:post_date>2013-06-17 10:28:25</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:28:25</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-duflot-industrie</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>431</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-duflot-industrie.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-duflot-industrie.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:33:"2013/06/logo-duflot-industrie.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-castanet</title>
		<link>http://www.it-news.fr/temoignages-clients/industrie/logo-castanet/</link>
		<pubDate>Mon, 17 Jun 2013 09:28:27 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-castanet.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>443</wp:post_id>
		<wp:post_date>2013-06-17 10:28:27</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:28:27</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-castanet</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>431</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-castanet.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-castanet.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:25:"2013/06/logo-castanet.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-carlier-plastique</title>
		<link>http://www.it-news.fr/temoignages-clients/industrie/logo-carlier-plastique/</link>
		<pubDate>Mon, 17 Jun 2013 09:28:29 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-carlier-plastique.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>444</wp:post_id>
		<wp:post_date>2013-06-17 10:28:29</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:28:29</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-carlier-plastique</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>431</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-carlier-plastique.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-carlier-plastique.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:34:"2013/06/logo-carlier-plastique.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-cadence-industrie</title>
		<link>http://www.it-news.fr/temoignages-clients/industrie/logo-cadence-industrie/</link>
		<pubDate>Mon, 17 Jun 2013 09:28:30 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-cadence-industrie.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>445</wp:post_id>
		<wp:post_date>2013-06-17 10:28:30</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:28:30</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-cadence-industrie</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>431</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-cadence-industrie.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-cadence-industrie.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:34:"2013/06/logo-cadence-industrie.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-adconcept</title>
		<link>http://www.it-news.fr/temoignages-clients/industrie/logo-adconcept/</link>
		<pubDate>Mon, 17 Jun 2013 09:28:32 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-adconcept.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>446</wp:post_id>
		<wp:post_date>2013-06-17 10:28:32</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:28:32</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-adconcept</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>431</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-adconcept.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-adconcept.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:26:"2013/06/logo-adconcept.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>CH-armentieres</title>
		<link>http://www.it-news.fr/temoignages-clients/sante/ch-armentieres/</link>
		<pubDate>Mon, 17 Jun 2013 09:42:13 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/ch-armentieres.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>453</wp:post_id>
		<wp:post_date>2013-06-17 10:42:13</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:42:13</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>ch-armentieres</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>450</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/ch-armentieres.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/ch-armentieres.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:26:"2013/06/ch-armentieres.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>CH-bailleul</title>
		<link>http://www.it-news.fr/temoignages-clients/sante/ch-bailleul/</link>
		<pubDate>Mon, 17 Jun 2013 09:42:15 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/ch-bailleul.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>454</wp:post_id>
		<wp:post_date>2013-06-17 10:42:15</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:42:15</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>ch-bailleul</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>450</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/ch-bailleul.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/ch-bailleul.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:23:"2013/06/ch-bailleul.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>CH-Bethune</title>
		<link>http://www.it-news.fr/temoignages-clients/sante/ch-bethune/</link>
		<pubDate>Mon, 17 Jun 2013 09:42:17 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/ch-bethune.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>455</wp:post_id>
		<wp:post_date>2013-06-17 10:42:17</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:42:17</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>ch-bethune</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>450</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/ch-bethune.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/ch-bethune.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:22:"2013/06/ch-bethune.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>CH-calais</title>
		<link>http://www.it-news.fr/temoignages-clients/sante/ch-calais/</link>
		<pubDate>Mon, 17 Jun 2013 09:42:19 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/ch-calais.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>456</wp:post_id>
		<wp:post_date>2013-06-17 10:42:19</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:42:19</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>ch-calais</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>450</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/ch-calais.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/ch-calais.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:21:"2013/06/ch-calais.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>CH-cambrai</title>
		<link>http://www.it-news.fr/temoignages-clients/sante/ch-cambrai/</link>
		<pubDate>Mon, 17 Jun 2013 09:42:21 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/ch-cambrai.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>457</wp:post_id>
		<wp:post_date>2013-06-17 10:42:21</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:42:21</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>ch-cambrai</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>450</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/ch-cambrai.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/ch-cambrai.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:22:"2013/06/ch-cambrai.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>CH-Carvin</title>
		<link>http://www.it-news.fr/temoignages-clients/sante/ch-carvin/</link>
		<pubDate>Mon, 17 Jun 2013 09:42:23 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/ch-carvin.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>458</wp:post_id>
		<wp:post_date>2013-06-17 10:42:23</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:42:23</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>ch-carvin</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>450</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/ch-carvin.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/ch-carvin.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:21:"2013/06/ch-carvin.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>CH-lequenoy</title>
		<link>http://www.it-news.fr/temoignages-clients/sante/ch-lequenoy/</link>
		<pubDate>Mon, 17 Jun 2013 09:42:25 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/ch-lequenoy.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>459</wp:post_id>
		<wp:post_date>2013-06-17 10:42:25</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:42:25</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>ch-lequenoy</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>450</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/ch-lequenoy.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/ch-lequenoy.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:23:"2013/06/ch-lequenoy.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>CH-Sambre-Avesnois</title>
		<link>http://www.it-news.fr/temoignages-clients/sante/ch-sambre-avesnois/</link>
		<pubDate>Mon, 17 Jun 2013 09:42:27 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/ch-sambre-avesnois.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>460</wp:post_id>
		<wp:post_date>2013-06-17 10:42:27</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:42:27</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>ch-sambre-avesnois</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>450</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/ch-sambre-avesnois.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/ch-sambre-avesnois.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:30:"2013/06/ch-sambre-avesnois.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>CH-seclin</title>
		<link>http://www.it-news.fr/temoignages-clients/sante/ch-seclin/</link>
		<pubDate>Mon, 17 Jun 2013 09:42:29 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/ch-seclin.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>461</wp:post_id>
		<wp:post_date>2013-06-17 10:42:29</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:42:29</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>ch-seclin</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>450</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/ch-seclin.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/ch-seclin.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:21:"2013/06/ch-seclin.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>CH-St-amand</title>
		<link>http://www.it-news.fr/temoignages-clients/sante/ch-st-amand/</link>
		<pubDate>Mon, 17 Jun 2013 09:42:31 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/ch-st-amand.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>462</wp:post_id>
		<wp:post_date>2013-06-17 10:42:31</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:42:31</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>ch-st-amand</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>450</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/ch-st-amand.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/ch-st-amand.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:23:"2013/06/ch-st-amand.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>clinique-acacia-touquet</title>
		<link>http://www.it-news.fr/temoignages-clients/sante/clinique-acacia-touquet/</link>
		<pubDate>Mon, 17 Jun 2013 09:42:33 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/clinique-acacia-touquet.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>463</wp:post_id>
		<wp:post_date>2013-06-17 10:42:33</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:42:33</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>clinique-acacia-touquet</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>450</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/clinique-acacia-touquet.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/clinique-acacia-touquet.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:35:"2013/06/clinique-acacia-touquet.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>clinique-anne-artois</title>
		<link>http://www.it-news.fr/temoignages-clients/sante/clinique-anne-artois/</link>
		<pubDate>Mon, 17 Jun 2013 09:42:35 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/clinique-anne-artois.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>464</wp:post_id>
		<wp:post_date>2013-06-17 10:42:35</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:42:35</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>clinique-anne-artois</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>450</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/clinique-anne-artois.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/clinique-anne-artois.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:32:"2013/06/clinique-anne-artois.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>clinique-cote-dopale</title>
		<link>http://www.it-news.fr/temoignages-clients/sante/clinique-cote-dopale/</link>
		<pubDate>Mon, 17 Jun 2013 09:42:37 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/clinique-cote-dopale.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>465</wp:post_id>
		<wp:post_date>2013-06-17 10:42:37</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:42:37</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>clinique-cote-dopale</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>450</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/clinique-cote-dopale.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/clinique-cote-dopale.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:32:"2013/06/clinique-cote-dopale.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>clinique-courlancy</title>
		<link>http://www.it-news.fr/temoignages-clients/sante/clinique-courlancy/</link>
		<pubDate>Mon, 17 Jun 2013 09:42:39 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/clinique-courlancy.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>466</wp:post_id>
		<wp:post_date>2013-06-17 10:42:39</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:42:39</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>clinique-courlancy</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>450</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/clinique-courlancy.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/clinique-courlancy.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:30:"2013/06/clinique-courlancy.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>clinique-des-2-caps</title>
		<link>http://www.it-news.fr/temoignages-clients/sante/clinique-des-2-caps/</link>
		<pubDate>Mon, 17 Jun 2013 09:42:41 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/clinique-des-2-caps.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>467</wp:post_id>
		<wp:post_date>2013-06-17 10:42:41</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:42:41</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>clinique-des-2-caps</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>450</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/clinique-des-2-caps.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/clinique-des-2-caps.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:31:"2013/06/clinique-des-2-caps.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>clinique-villeneuve-dascq</title>
		<link>http://www.it-news.fr/temoignages-clients/sante/clinique-villeneuve-dascq/</link>
		<pubDate>Mon, 17 Jun 2013 09:42:43 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/clinique-villeneuve-dascq.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>468</wp:post_id>
		<wp:post_date>2013-06-17 10:42:43</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:42:43</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>clinique-villeneuve-dascq</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>450</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/clinique-villeneuve-dascq.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/clinique-villeneuve-dascq.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:37:"2013/06/clinique-villeneuve-dascq.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>epsm-agglomeration-lilloise</title>
		<link>http://www.it-news.fr/temoignages-clients/sante/epsm-agglomeration-lilloise/</link>
		<pubDate>Mon, 17 Jun 2013 09:42:45 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/epsm-agglomeration-lilloise.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>469</wp:post_id>
		<wp:post_date>2013-06-17 10:42:45</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:42:45</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>epsm-agglomeration-lilloise</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>450</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/epsm-agglomeration-lilloise.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/epsm-agglomeration-lilloise.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:39:"2013/06/epsm-agglomeration-lilloise.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>EPSM-Flandres</title>
		<link>http://www.it-news.fr/temoignages-clients/sante/epsm-flandres/</link>
		<pubDate>Mon, 17 Jun 2013 09:42:47 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/epsm-flandres.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>470</wp:post_id>
		<wp:post_date>2013-06-17 10:42:47</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:42:47</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>epsm-flandres</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>450</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/epsm-flandres.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/epsm-flandres.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:25:"2013/06/epsm-flandres.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>EPSM-Lille</title>
		<link>http://www.it-news.fr/temoignages-clients/sante/epsm-lille/</link>
		<pubDate>Mon, 17 Jun 2013 09:42:49 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/epsm-lille.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>471</wp:post_id>
		<wp:post_date>2013-06-17 10:42:49</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:42:49</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>epsm-lille</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>450</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/epsm-lille.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/epsm-lille.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:22:"2013/06/epsm-lille.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>hopital-de-comines</title>
		<link>http://www.it-news.fr/temoignages-clients/sante/hopital-de-comines/</link>
		<pubDate>Mon, 17 Jun 2013 09:42:51 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/hopital-de-comines.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>472</wp:post_id>
		<wp:post_date>2013-06-17 10:42:51</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:42:51</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>hopital-de-comines</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>450</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/hopital-de-comines.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/hopital-de-comines.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:30:"2013/06/hopital-de-comines.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>HOPITAL-DE-FELLERIES-LIESSIES</title>
		<link>http://www.it-news.fr/temoignages-clients/sante/hopital-de-felleries-liessies/</link>
		<pubDate>Mon, 17 Jun 2013 09:42:53 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/hopital-de-felleries-liessies.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>473</wp:post_id>
		<wp:post_date>2013-06-17 10:42:53</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:42:53</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>hopital-de-felleries-liessies</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>450</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/hopital-de-felleries-liessies.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/hopital-de-felleries-liessies.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:41:"2013/06/hopital-de-felleries-liessies.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-ch-tourcoing</title>
		<link>http://www.it-news.fr/temoignages-clients/sante/logo-ch-tourcoing/</link>
		<pubDate>Mon, 17 Jun 2013 09:42:55 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-ch-tourcoing.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>474</wp:post_id>
		<wp:post_date>2013-06-17 10:42:55</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:42:55</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-ch-tourcoing</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>450</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-ch-tourcoing.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-ch-tourcoing.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:29:"2013/06/logo-ch-tourcoing.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-clinique-lomme</title>
		<link>http://www.it-news.fr/temoignages-clients/sante/logo-clinique-lomme/</link>
		<pubDate>Mon, 17 Jun 2013 09:42:57 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-clinique-lomme.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>475</wp:post_id>
		<wp:post_date>2013-06-17 10:42:57</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:42:57</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-clinique-lomme</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>450</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-clinique-lomme.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-clinique-lomme.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:31:"2013/06/logo-clinique-lomme.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-FAM-LA-VIE-DEVANT-SOI</title>
		<link>http://www.it-news.fr/temoignages-clients/sante/logo-fam-la-vie-devant-soi/</link>
		<pubDate>Mon, 17 Jun 2013 09:42:59 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-fam-la-vie-devant-soi.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>476</wp:post_id>
		<wp:post_date>2013-06-17 10:42:59</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:42:59</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-fam-la-vie-devant-soi</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>450</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-fam-la-vie-devant-soi.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-fam-la-vie-devant-soi.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:38:"2013/06/logo-fam-la-vie-devant-soi.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-fongecif-npdc</title>
		<link>http://www.it-news.fr/temoignages-clients/sante/logo-fongecif-npdc/</link>
		<pubDate>Mon, 17 Jun 2013 09:43:00 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-fongecif-npdc.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>477</wp:post_id>
		<wp:post_date>2013-06-17 10:43:00</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:43:00</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-fongecif-npdc</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>450</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-fongecif-npdc.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-fongecif-npdc.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:30:"2013/06/logo-fongecif-npdc.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-samps-asso</title>
		<link>http://www.it-news.fr/temoignages-clients/sante/logo-samps-asso/</link>
		<pubDate>Mon, 17 Jun 2013 09:43:04 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-samps-asso.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>478</wp:post_id>
		<wp:post_date>2013-06-17 10:43:04</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:43:04</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-samps-asso</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>450</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-samps-asso.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-samps-asso.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:27:"2013/06/logo-samps-asso.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-unis</title>
		<link>http://www.it-news.fr/temoignages-clients/services/logo-unis/</link>
		<pubDate>Mon, 17 Jun 2013 09:49:04 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-unis.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>482</wp:post_id>
		<wp:post_date>2013-06-17 10:49:04</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:49:04</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-unis</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>493</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-unis.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-unis.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:21:"2013/06/logo-unis.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Logo-teinturerie-lenfant</title>
		<link>http://www.it-news.fr/temoignages-clients/services/logo-teinturerie-lenfant/</link>
		<pubDate>Mon, 17 Jun 2013 09:49:06 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-teinturerie-lenfant.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>483</wp:post_id>
		<wp:post_date>2013-06-17 10:49:06</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:49:06</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-teinturerie-lenfant</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>493</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-teinturerie-lenfant.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-teinturerie-lenfant.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:36:"2013/06/logo-teinturerie-lenfant.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-sacree-prod-cesam-international</title>
		<link>http://www.it-news.fr/temoignages-clients/services/logo-sacree-prod-cesam-international/</link>
		<pubDate>Mon, 17 Jun 2013 09:49:08 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-sacree-prod-cesam-international.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>484</wp:post_id>
		<wp:post_date>2013-06-17 10:49:08</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:49:08</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-sacree-prod-cesam-international</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>493</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-sacree-prod-cesam-international.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-sacree-prod-cesam-international.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:48:"2013/06/logo-sacree-prod-cesam-international.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-office-de-la-jeunesse-bruay-la-brussiere</title>
		<link>http://www.it-news.fr/temoignages-clients/services/logo-office-de-la-jeunesse-bruay-la-brussiere/</link>
		<pubDate>Mon, 17 Jun 2013 09:49:10 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-office-de-la-jeunesse-bruay-la-brussiere.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>485</wp:post_id>
		<wp:post_date>2013-06-17 10:49:10</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:49:10</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-office-de-la-jeunesse-bruay-la-brussiere</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>493</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-office-de-la-jeunesse-bruay-la-brussiere.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-office-de-la-jeunesse-bruay-la-brussiere.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:57:"2013/06/logo-office-de-la-jeunesse-bruay-la-brussiere.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-mediama</title>
		<link>http://www.it-news.fr/temoignages-clients/services/logo-mediama/</link>
		<pubDate>Mon, 17 Jun 2013 09:49:12 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-mediama.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>486</wp:post_id>
		<wp:post_date>2013-06-17 10:49:12</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:49:12</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-mediama</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>493</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-mediama.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-mediama.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:24:"2013/06/logo-mediama.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-eurasante-gie</title>
		<link>http://www.it-news.fr/temoignages-clients/services/logo-eurasante-gie/</link>
		<pubDate>Mon, 17 Jun 2013 09:49:14 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-eurasante-gie.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>487</wp:post_id>
		<wp:post_date>2013-06-17 10:49:14</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:49:14</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-eurasante-gie</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>493</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-eurasante-gie.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-eurasante-gie.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:30:"2013/06/logo-eurasante-gie.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-domoveil</title>
		<link>http://www.it-news.fr/temoignages-clients/services/logo-domoveil/</link>
		<pubDate>Mon, 17 Jun 2013 09:49:16 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-domoveil.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>488</wp:post_id>
		<wp:post_date>2013-06-17 10:49:16</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:49:16</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-domoveil</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>493</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-domoveil.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-domoveil.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:25:"2013/06/logo-domoveil.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Logo-Dimelco</title>
		<link>http://www.it-news.fr/temoignages-clients/services/logo-dimelco/</link>
		<pubDate>Mon, 17 Jun 2013 09:49:18 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-dimelco.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>489</wp:post_id>
		<wp:post_date>2013-06-17 10:49:18</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:49:18</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-dimelco</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>493</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-dimelco.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-dimelco.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:24:"2013/06/logo-dimelco.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-critm2a</title>
		<link>http://www.it-news.fr/temoignages-clients/services/logo-critm2a/</link>
		<pubDate>Mon, 17 Jun 2013 09:49:20 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-critm2a.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>490</wp:post_id>
		<wp:post_date>2013-06-17 10:49:20</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:49:20</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-critm2a</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>493</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-critm2a.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-critm2a.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:24:"2013/06/logo-critm2a.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-crepim</title>
		<link>http://www.it-news.fr/temoignages-clients/services/logo-crepim/</link>
		<pubDate>Mon, 17 Jun 2013 09:49:22 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-crepim.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>491</wp:post_id>
		<wp:post_date>2013-06-17 10:49:22</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:49:22</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-crepim</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>493</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-crepim.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-crepim.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:23:"2013/06/logo-crepim.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-acean-sacel</title>
		<link>http://www.it-news.fr/temoignages-clients/services/logo-acean-sacel/</link>
		<pubDate>Mon, 17 Jun 2013 09:49:24 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/logo-acean-sacel.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>492</wp:post_id>
		<wp:post_date>2013-06-17 10:49:24</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:49:24</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-acean-sacel</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>493</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/logo-acean-sacel.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/logo-acean-sacel.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:28:"2013/06/logo-acean-sacel.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>schema_vmware_vconverter</title>
		<link>http://www.it-news.fr/vmware-virtualiser-vos-serveurs/schema_vmware_vconverter/</link>
		<pubDate>Mon, 17 Jun 2013 14:10:48 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/schema_vmware_vconverter.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>500</wp:post_id>
		<wp:post_date>2013-06-17 15:10:48</wp:post_date>
		<wp:post_date_gmt>2013-06-17 14:10:48</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>schema_vmware_vconverter</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>323</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/schema_vmware_vconverter.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/schema_vmware_vconverter.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:452;s:6:"height";i:306;s:4:"file";s:36:"2013/06/schema_vmware_vconverter.png";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:36:"schema_vmware_vconverter-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:6:"medium";a:4:{s:4:"file";s:36:"schema_vmware_vconverter-300x203.png";s:5:"width";i:300;s:6:"height";i:203;s:9:"mime-type";s:9:"image/png";}s:14:"post-thumbnail";a:4:{s:4:"file";s:36:"schema_vmware_vconverter-452x198.png";s:5:"width";i:452;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>mobile-iphone1</title>
		<link>http://www.it-news.fr/connectez-vous-ou-que-vous-soyez/mobile-iphone1/</link>
		<pubDate>Tue, 18 Jun 2013 08:20:06 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/mobile-iphone1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>507</wp:post_id>
		<wp:post_date>2013-06-18 09:20:06</wp:post_date>
		<wp:post_date_gmt>2013-06-18 08:20:06</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>mobile-iphone1</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>344</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/mobile-iphone1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/mobile-iphone1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:265;s:6:"height";i:144;s:4:"file";s:26:"2013/06/mobile-iphone1.jpg";s:5:"sizes";a:1:{s:9:"thumbnail";a:4:{s:4:"file";s:26:"mobile-iphone1-150x144.jpg";s:5:"width";i:150;s:6:"height";i:144;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>sage 100 mobile</title>
		<link>http://www.it-news.fr/connectez-vous-ou-que-vous-soyez/sagebusinessmobile/</link>
		<pubDate>Tue, 18 Jun 2013 08:52:51 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/sagebusinessmobile.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>510</wp:post_id>
		<wp:post_date>2013-06-18 09:52:51</wp:post_date>
		<wp:post_date_gmt>2013-06-18 08:52:51</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>sagebusinessmobile</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>344</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/sagebusinessmobile.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/sagebusinessmobile.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:339;s:6:"height";i:220;s:4:"file";s:30:"2013/06/sagebusinessmobile.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:30:"sagebusinessmobile-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.2% (410&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:30:"sagebusinessmobile-300x194.jpg";s:5:"width";i:300;s:6:"height";i:194;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:27:"Reduced by 7.3% (1&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:30:"sagebusinessmobile-339x198.jpg";s:5:"width";i:339;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 7.6% (1.4&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:30:"sagebusinessmobile-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:11:"William Pit";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:1280921597;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 1.4% (336&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Aide à la décision</title>
		<link>http://www.it-news.fr/prendre-les-bonnes-decisions-grace-a-nos-outils/question-blue/</link>
		<pubDate>Tue, 18 Jun 2013 09:25:50 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/question-blue.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>515</wp:post_id>
		<wp:post_date>2013-06-18 10:25:50</wp:post_date>
		<wp:post_date_gmt>2013-06-18 09:25:50</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>question-blue</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>342</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/question-blue.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/question-blue.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:300;s:6:"height";i:375;s:4:"file";s:25:"2013/06/question-blue.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:25:"question-blue-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:25:"question-blue-240x300.jpg";s:5:"width";i:240;s:6:"height";i:300;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:25:"question-blue-300x198.jpg";s:5:"width";i:300;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Sage décisionnel]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Gestion de la paie</title>
		<link>http://www.it-news.fr/prendre-les-bonnes-decisions-grace-a-nos-outils/paie4/</link>
		<pubDate>Tue, 18 Jun 2013 09:26:20 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/paie4.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>516</wp:post_id>
		<wp:post_date>2013-06-18 10:26:20</wp:post_date>
		<wp:post_date_gmt>2013-06-18 09:26:20</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>paie4</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>342</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/paie4.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/paie4.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1280;s:6:"height";i:858;s:4:"file";s:17:"2013/06/paie4.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:17:"paie4-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:17:"paie4-300x201.jpg";s:5:"width";i:300;s:6:"height";i:201;s:9:"mime-type";s:10:"image/jpeg";}s:5:"large";a:4:{s:4:"file";s:18:"paie4-1024x686.jpg";s:5:"width";i:1024;s:6:"height";i:686;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:17:"paie4-940x198.jpg";s:5:"width";i:940;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Aide à la décision paie]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Industrie production</title>
		<link>http://www.it-news.fr/?attachment_id=523</link>
		<pubDate>Tue, 18 Jun 2013 10:14:22 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/usine.gif</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>523</wp:post_id>
		<wp:post_date>2013-06-18 11:14:22</wp:post_date>
		<wp:post_date_gmt>2013-06-18 10:14:22</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>usine</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/usine.gif</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/usine.gif]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:443;s:6:"height";i:365;s:4:"file";s:17:"2013/06/usine.gif";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:17:"usine-150x150.gif";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/gif";}s:6:"medium";a:4:{s:4:"file";s:17:"usine-300x247.gif";s:5:"width";i:300;s:6:"height";i:247;s:9:"mime-type";s:9:"image/gif";}s:14:"post-thumbnail";a:4:{s:4:"file";s:17:"usine-443x198.gif";s:5:"width";i:443;s:6:"height";i:198;s:9:"mime-type";s:9:"image/gif";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Sage 100 i7 production]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>sage gestion production</title>
		<link>http://www.it-news.fr/?attachment_id=524</link>
		<pubDate>Tue, 18 Jun 2013 10:14:24 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/sage_gestprod.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>524</wp:post_id>
		<wp:post_date>2013-06-18 11:14:24</wp:post_date>
		<wp:post_date_gmt>2013-06-18 10:14:24</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>sage_gestprod</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/sage_gestprod.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/sage_gestprod.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:360;s:6:"height";i:266;s:4:"file";s:25:"2013/06/sage_gestprod.png";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:25:"sage_gestprod-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:6:"medium";a:4:{s:4:"file";s:25:"sage_gestprod-300x221.png";s:5:"width";i:300;s:6:"height";i:221;s:9:"mime-type";s:9:"image/png";}s:14:"post-thumbnail";a:4:{s:4:"file";s:25:"sage_gestprod-360x198.png";s:5:"width";i:360;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Sage 100 production]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>GDI dématérialisation</title>
		<link>http://www.it-news.fr/dematerialiser-ses-documents-et-automatiser-ses-processus/gdi-circle-network-downline/</link>
		<pubDate>Tue, 18 Jun 2013 14:01:42 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/gdi-circle-network-downline.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>534</wp:post_id>
		<wp:post_date>2013-06-18 15:01:42</wp:post_date>
		<wp:post_date_gmt>2013-06-18 14:01:42</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>gdi-circle-network-downline</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>336</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/gdi-circle-network-downline.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/gdi-circle-network-downline.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:461;s:6:"height";i:307;s:4:"file";s:39:"2013/06/gdi-circle-network-downline.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:39:"gdi-circle-network-downline-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:39:"gdi-circle-network-downline-300x199.jpg";s:5:"width";i:300;s:6:"height";i:199;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:39:"gdi-circle-network-downline-461x198.jpg";s:5:"width";i:461;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[GDI dématérialisation]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Sage gestion commerciale</title>
		<link>http://www.it-news.fr/gestion-commerciale-maitriser-tous-les-domaines-de-votre-pme/boite6_gestionco_opt/</link>
		<pubDate>Thu, 20 Jun 2013 06:43:50 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/boite6_gestionco_opt.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>542</wp:post_id>
		<wp:post_date>2013-06-20 07:43:50</wp:post_date>
		<wp:post_date_gmt>2013-06-20 06:43:50</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>boite6_gestionco_opt</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>334</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/boite6_gestionco_opt.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/boite6_gestionco_opt.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:170;s:6:"height";i:150;s:4:"file";s:32:"2013/06/boite6_gestionco_opt.jpg";s:5:"sizes";a:1:{s:9:"thumbnail";a:4:{s:4:"file";s:32:"boite6_gestionco_opt-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>gestion_commerciale_comptable_sage</title>
		<link>http://www.it-news.fr/gestion-commerciale-maitriser-tous-les-domaines-de-votre-pme/gestion_commerciale_comptable_sage/</link>
		<pubDate>Thu, 20 Jun 2013 07:40:51 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/gestion_commerciale_comptable_sage.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>544</wp:post_id>
		<wp:post_date>2013-06-20 08:40:51</wp:post_date>
		<wp:post_date_gmt>2013-06-20 07:40:51</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>gestion_commerciale_comptable_sage</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>334</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/gestion_commerciale_comptable_sage.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/gestion_commerciale_comptable_sage.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1536;s:6:"height";i:1416;s:4:"file";s:46:"2013/06/gestion_commerciale_comptable_sage.png";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:46:"gestion_commerciale_comptable_sage-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:6:"medium";a:4:{s:4:"file";s:46:"gestion_commerciale_comptable_sage-300x276.png";s:5:"width";i:300;s:6:"height";i:276;s:9:"mime-type";s:9:"image/png";}s:5:"large";a:4:{s:4:"file";s:47:"gestion_commerciale_comptable_sage-1024x944.png";s:5:"width";i:1024;s:6:"height";i:944;s:9:"mime-type";s:9:"image/png";}s:14:"post-thumbnail";a:4:{s:4:"file";s:46:"gestion_commerciale_comptable_sage-940x198.png";s:5:"width";i:940;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Sage 100 gestion commerciale]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Sage 100 Trésorerie i7</title>
		<link>http://www.it-news.fr/visualisez-en-temps-reel-votre-tresorerie/sage-100_-tresorerie-i7/</link>
		<pubDate>Thu, 20 Jun 2013 09:11:05 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/sage-100_-trc3a9sorerie-i7.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>548</wp:post_id>
		<wp:post_date>2013-06-20 10:11:05</wp:post_date>
		<wp:post_date_gmt>2013-06-20 09:11:05</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>sage-100_-tresorerie-i7</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>332</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/sage-100_-trc3a9sorerie-i7.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/sage-100_-trc3a9sorerie-i7.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:308;s:6:"height";i:335;s:4:"file";s:38:"2013/06/sage-100_-trc3a9sorerie-i7.png";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:38:"sage-100_-trc3a9sorerie-i7-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:6:"medium";a:4:{s:4:"file";s:38:"sage-100_-trc3a9sorerie-i7-275x300.png";s:5:"width";i:275;s:6:"height";i:300;s:9:"mime-type";s:9:"image/png";}s:14:"post-thumbnail";a:4:{s:4:"file";s:38:"sage-100_-trc3a9sorerie-i7-308x198.png";s:5:"width";i:308;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Sage trésorerie i7]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Gestion RH : gestion des carrières</title>
		<link>http://www.it-news.fr/?attachment_id=554</link>
		<pubDate>Thu, 20 Jun 2013 10:15:46 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/formation.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>554</wp:post_id>
		<wp:post_date>2013-06-20 11:15:46</wp:post_date>
		<wp:post_date_gmt>2013-06-20 10:15:46</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>formation</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/formation.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/formation.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1964;s:6:"height";i:1718;s:4:"file";s:21:"2013/06/formation.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:21:"formation-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:21:"formation-300x262.jpg";s:5:"width";i:300;s:6:"height";i:262;s:9:"mime-type";s:10:"image/jpeg";}s:5:"large";a:4:{s:4:"file";s:22:"formation-1024x895.jpg";s:5:"width";i:1024;s:6:"height";i:895;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:21:"formation-940x198.jpg";s:5:"width";i:940;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Gestion des carrières : Formation]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>DIF - Formation</title>
		<link>http://www.it-news.fr/?attachment_id=559</link>
		<pubDate>Thu, 20 Jun 2013 13:51:18 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/dossier-dif2.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>559</wp:post_id>
		<wp:post_date>2013-06-20 14:51:18</wp:post_date>
		<wp:post_date_gmt>2013-06-20 13:51:18</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>blackboard</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/dossier-dif2.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/dossier-dif2.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:501;s:6:"height";i:277;s:4:"file";s:24:"2013/06/dossier-dif2.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:24:"dossier-dif2-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:24:"dossier-dif2-300x165.jpg";s:5:"width";i:300;s:6:"height";i:165;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:24:"dossier-dif2-501x198.jpg";s:5:"width";i:501;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:23:"Hugo Candeias - Fotolia";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:23:"Hugo Candeias - Fotolia";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:10:"Blackboard";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>googleplus-logo</title>
		<link>http://www.it-news.fr/?attachment_id=570</link>
		<pubDate>Fri, 21 Jun 2013 08:27:43 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/googleplus-logo.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>570</wp:post_id>
		<wp:post_date>2013-06-21 09:27:43</wp:post_date>
		<wp:post_date_gmt>2013-06-21 08:27:43</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>googleplus-logo</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/googleplus-logo.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/googleplus-logo.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:36;s:6:"height";i:36;s:4:"file";s:27:"2013/06/googleplus-logo.png";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>twitter-logo</title>
		<link>http://www.it-news.fr/?attachment_id=571</link>
		<pubDate>Fri, 21 Jun 2013 08:27:45 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/twitter-logo.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>571</wp:post_id>
		<wp:post_date>2013-06-21 09:27:45</wp:post_date>
		<wp:post_date_gmt>2013-06-21 08:27:45</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>twitter-logo</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/twitter-logo.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/twitter-logo.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:36;s:6:"height";i:36;s:4:"file";s:24:"2013/06/twitter-logo.png";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>viadeo</title>
		<link>http://www.it-news.fr/?attachment_id=572</link>
		<pubDate>Fri, 21 Jun 2013 08:27:46 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/viadeo.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>572</wp:post_id>
		<wp:post_date>2013-06-21 09:27:46</wp:post_date>
		<wp:post_date_gmt>2013-06-21 08:27:46</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>viadeo</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/viadeo.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/viadeo.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:35;s:6:"height";i:36;s:4:"file";s:18:"2013/06/viadeo.png";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>YouTube-icon</title>
		<link>http://www.it-news.fr/?attachment_id=573</link>
		<pubDate>Fri, 21 Jun 2013 08:27:47 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/youtube-icon.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>573</wp:post_id>
		<wp:post_date>2013-06-21 09:27:47</wp:post_date>
		<wp:post_date_gmt>2013-06-21 08:27:47</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>youtube-icon</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/youtube-icon.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/youtube-icon.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:36;s:6:"height";i:36;s:4:"file";s:24:"2013/06/youtube-icon.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>CICE </title>
		<link>http://www.it-news.fr/parametrage-du-cice-dans-votre-logiciel-de-paie/edf-gdf-gabegie-cice-296x300/</link>
		<pubDate>Fri, 21 Jun 2013 10:03:41 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/edf-gdf-gabegie-cice-296x300.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>580</wp:post_id>
		<wp:post_date>2013-06-21 11:03:41</wp:post_date>
		<wp:post_date_gmt>2013-06-21 10:03:41</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>edf-gdf-gabegie-cice-296x300</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>578</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/edf-gdf-gabegie-cice-296x300.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/edf-gdf-gabegie-cice-296x300.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:296;s:6:"height";i:300;s:4:"file";s:40:"2013/06/edf-gdf-gabegie-cice-296x300.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:40:"edf-gdf-gabegie-cice-296x300-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:40:"edf-gdf-gabegie-cice-296x300-296x198.jpg";s:5:"width";i:296;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Paramétrage CICE]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>hausse de la productivité</title>
		<link>http://www.it-news.fr/petit-dejeuner-du-4-juillet-2013-augmenter-sa-rentabilite-sans-changer-son-outil-de-production/hausse-creation-entreprise-france/</link>
		<pubDate>Tue, 25 Jun 2013 09:38:40 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/hausse-creation-entreprise-france.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>645</wp:post_id>
		<wp:post_date>2013-06-25 10:38:40</wp:post_date>
		<wp:post_date_gmt>2013-06-25 09:38:40</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>hausse-creation-entreprise-france</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>644</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/hausse-creation-entreprise-france.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/hausse-creation-entreprise-france.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1600;s:6:"height";i:1200;s:4:"file";s:45:"2013/06/hausse-creation-entreprise-france.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:45:"hausse-creation-entreprise-france-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:45:"hausse-creation-entreprise-france-300x225.jpg";s:5:"width";i:300;s:6:"height";i:225;s:9:"mime-type";s:10:"image/jpeg";}s:5:"large";a:4:{s:4:"file";s:46:"hausse-creation-entreprise-france-1024x768.jpg";s:5:"width";i:1024;s:6:"height";i:768;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:45:"hausse-creation-entreprise-france-940x198.jpg";s:5:"width";i:940;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[augmenter sa productivité]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>vous-avez-un-projet</title>
		<link>http://www.it-news.fr/?attachment_id=648</link>
		<pubDate>Wed, 26 Jun 2013 07:52:20 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/vous-avez-un-projet2.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>648</wp:post_id>
		<wp:post_date>2013-06-26 08:52:20</wp:post_date>
		<wp:post_date_gmt>2013-06-26 07:52:20</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>vous-avez-un-projet-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/vous-avez-un-projet2.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/vous-avez-un-projet2.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:245;s:6:"height";i:142;s:4:"file";s:32:"2013/06/vous-avez-un-projet2.png";s:5:"sizes";a:1:{s:9:"thumbnail";a:4:{s:4:"file";s:32:"vous-avez-un-projet2-150x142.png";s:5:"width";i:150;s:6:"height";i:142;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Le BYOD dans l&#039;entreprise</title>
		<link>http://www.it-news.fr/livres-blancs/le-byod-dans-l-entreprise/</link>
		<pubDate>Fri, 12 Jul 2013 06:59:58 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/07/le-byod-dans-l-entreprise.pdf</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>650</wp:post_id>
		<wp:post_date>2013-07-12 07:59:58</wp:post_date>
		<wp:post_date_gmt>2013-07-12 06:59:58</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>le-byod-dans-l-entreprise</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>135</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/07/le-byod-dans-l-entreprise.pdf</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/07/le-byod-dans-l-entreprise.pdf]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Forum International de la Cybersécurité </title>
		<link>http://www.it-news.fr/aquastar-consulting-participera-au-forum-international-de-la-cybersecurite-fic/1013388_545748418815567_105728121_n/</link>
		<pubDate>Fri, 12 Jul 2013 08:01:12 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/07/1013388_545748418815567_105728121_n.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>654</wp:post_id>
		<wp:post_date>2013-07-12 09:01:12</wp:post_date>
		<wp:post_date_gmt>2013-07-12 08:01:12</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>1013388_545748418815567_105728121_n</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>653</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/07/1013388_545748418815567_105728121_n.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/07/1013388_545748418815567_105728121_n.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:160;s:6:"height";i:160;s:4:"file";s:47:"2013/07/1013388_545748418815567_105728121_n.png";s:5:"sizes";a:1:{s:9:"thumbnail";a:4:{s:4:"file";s:47:"1013388_545748418815567_105728121_n-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>icone PDF</title>
		<link>http://www.it-news.fr/temoignages-clients-2/mobilite/iconepdf/</link>
		<pubDate>Wed, 17 Jul 2013 07:09:15 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/07/iconepdf.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>678</wp:post_id>
		<wp:post_date>2013-07-17 08:09:15</wp:post_date>
		<wp:post_date_gmt>2013-07-17 07:09:15</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>iconepdf</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>675</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/07/iconepdf.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/07/iconepdf.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:40;s:6:"height";i:40;s:4:"file";s:20:"2013/07/iconepdf.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[PDF]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>news du DSI</title>
		<link>http://www.it-news.fr/?attachment_id=686</link>
		<pubDate>Thu, 18 Jul 2013 08:55:08 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/07/news-du-dsi.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>686</wp:post_id>
		<wp:post_date>2013-07-18 09:55:08</wp:post_date>
		<wp:post_date_gmt>2013-07-18 08:55:08</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>news-du-dsi</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/07/news-du-dsi.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/07/news-du-dsi.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:940;s:6:"height";i:198;s:4:"file";s:23:"2013/07/news-du-dsi.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:23:"news-du-dsi-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:22:"news-du-dsi-300x63.jpg";s:5:"width";i:300;s:6:"height";i:63;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>news-du-dsi1.jpg</title>
		<link>http://www.it-news.fr/?attachment_id=687</link>
		<pubDate>Thu, 18 Jul 2013 08:55:48 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/07/news-du-dsi1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[http://www.it-news.fr/wp-content/uploads/2013/07/news-du-dsi1.jpg]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>687</wp:post_id>
		<wp:post_date>2013-07-18 09:55:48</wp:post_date>
		<wp:post_date_gmt>2013-07-18 08:55:48</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>news-du-dsi1-jpg</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/07/news-du-dsi1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/07/news-du-dsi1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:940;s:6:"height";i:198;s:4:"file";s:24:"2013/07/news-du-dsi1.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:24:"news-du-dsi1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:23:"news-du-dsi1-300x63.jpg";s:5:"width";i:300;s:6:"height";i:63;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_context</wp:meta_key>
			<wp:meta_value><![CDATA[custom-header]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_is_custom_header</wp:meta_key>
			<wp:meta_value><![CDATA[pub/twentyten]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>calendrier</title>
		<link>http://www.it-news.fr/aquastar-consulting-participera-au-forum-international-de-la-cybersecurite-fic/calendrier/</link>
		<pubDate>Fri, 19 Jul 2013 07:02:51 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/07/calendrier.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>691</wp:post_id>
		<wp:post_date>2013-07-19 08:02:51</wp:post_date>
		<wp:post_date_gmt>2013-07-19 07:02:51</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>calendrier</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>653</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/07/calendrier.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/07/calendrier.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:150;s:6:"height";i:150;s:4:"file";s:22:"2013/07/calendrier.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:18:"M.studio - Fotolia";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>progres_carriere</title>
		<link>http://www.it-news.fr/les-ressources-humaines-gestion-des-carrieres/progres_carriere/</link>
		<pubDate>Fri, 19 Jul 2013 07:37:20 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/07/progres_carriere.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>704</wp:post_id>
		<wp:post_date>2013-07-19 08:37:20</wp:post_date>
		<wp:post_date_gmt>2013-07-19 07:37:20</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>progres_carriere</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>563</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/07/progres_carriere.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/07/progres_carriere.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:250;s:6:"height";i:205;s:4:"file";s:28:"2013/07/progres_carriere.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:28:"progres_carriere-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:28:"progres_carriere-250x198.jpg";s:5:"width";i:250;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Palo-banniere1</title>
		<link>http://www.it-news.fr/?attachment_id=708</link>
		<pubDate>Fri, 19 Jul 2013 07:46:45 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/07/palo-banniere1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>708</wp:post_id>
		<wp:post_date>2013-07-19 08:46:45</wp:post_date>
		<wp:post_date_gmt>2013-07-19 07:46:45</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>palo-banniere1</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/07/palo-banniere1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/07/palo-banniere1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:122;s:6:"height";i:547;s:4:"file";s:26:"2013/07/palo-banniere1.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:26:"palo-banniere1-122x150.jpg";s:5:"width";i:122;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:25:"palo-banniere1-66x300.jpg";s:5:"width";i:66;s:6:"height";i:300;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:26:"palo-banniere1-122x198.jpg";s:5:"width";i:122;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>PMI - TPI</title>
		<link>http://www.it-news.fr/pmi-tpi-investissez-mieux-en-depensant-moins/print-copie/</link>
		<pubDate>Fri, 19 Jul 2013 14:31:03 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/07/industrie-chinoise.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>719</wp:post_id>
		<wp:post_date>2013-07-19 15:31:03</wp:post_date>
		<wp:post_date_gmt>2013-07-19 14:31:03</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>print-copie</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>713</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/07/industrie-chinoise.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/07/industrie-chinoise.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:152;s:6:"height";i:112;s:4:"file";s:30:"2013/07/industrie-chinoise.jpg";s:5:"sizes";a:1:{s:9:"thumbnail";a:4:{s:4:"file";s:30:"industrie-chinoise-150x112.jpg";s:5:"width";i:150;s:6:"height";i:112;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:13:"Print - copie";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>facebook-au-taf</title>
		<link>http://www.it-news.fr/les-connexions-personnelles-au-travail-representent-plus-dun-mois-de-travail-perdu-par-an/facebook-au-taf/</link>
		<pubDate>Mon, 22 Jul 2013 13:16:42 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/07/facebook-au-taf.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>727</wp:post_id>
		<wp:post_date>2013-07-22 14:16:42</wp:post_date>
		<wp:post_date_gmt>2013-07-22 13:16:42</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>facebook-au-taf</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>723</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/07/facebook-au-taf.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/07/facebook-au-taf.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:182;s:6:"height";i:126;s:4:"file";s:27:"2013/07/facebook-au-taf.jpg";s:5:"sizes";a:1:{s:9:"thumbnail";a:4:{s:4:"file";s:27:"facebook-au-taf-150x126.jpg";s:5:"width";i:150;s:6:"height";i:126;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>hacker-philosophy</title>
		<link>http://www.it-news.fr/ovh-apple-pirates-quelle-solutions-pour-se-sortir-du-piratage/hacker-philosophy/</link>
		<pubDate>Thu, 25 Jul 2013 07:53:10 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/07/hacker-philosophy.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>737</wp:post_id>
		<wp:post_date>2013-07-25 08:53:10</wp:post_date>
		<wp:post_date_gmt>2013-07-25 07:53:10</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>hacker-philosophy</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>736</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/07/hacker-philosophy.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/07/hacker-philosophy.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1600;s:6:"height";i:1079;s:4:"file";s:29:"2013/07/hacker-philosophy.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:29:"hacker-philosophy-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:29:"hacker-philosophy-300x202.jpg";s:5:"width";i:300;s:6:"height";i:202;s:9:"mime-type";s:10:"image/jpeg";}s:5:"large";a:4:{s:4:"file";s:30:"hacker-philosophy-1024x690.jpg";s:5:"width";i:1024;s:6:"height";i:690;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:29:"hacker-philosophy-940x198.jpg";s:5:"width";i:940;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Pirate du web]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>rsa-securid</title>
		<link>http://www.it-news.fr/ovh-apple-pirates-quelle-solutions-pour-se-sortir-du-piratage/800-rsa-securid/</link>
		<pubDate>Thu, 25 Jul 2013 08:51:46 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/07/800-rsa-securid.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>739</wp:post_id>
		<wp:post_date>2013-07-25 09:51:46</wp:post_date>
		<wp:post_date_gmt>2013-07-25 08:51:46</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>800-rsa-securid</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>736</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/07/800-rsa-securid.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/07/800-rsa-securid.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:800;s:6:"height";i:679;s:4:"file";s:27:"2013/07/800-rsa-securid.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:27:"800-rsa-securid-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:27:"800-rsa-securid-300x254.jpg";s:5:"width";i:300;s:6:"height";i:254;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:27:"800-rsa-securid-800x198.jpg";s:5:"width";i:800;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";d:6.2999999999999998;s:6:"credit";s:0:"";s:6:"camera";s:9:"NIKON D2X";s:7:"caption";s:0:"";s:17:"created_timestamp";i:1142951706;s:9:"copyright";s:0:"";s:12:"focal_length";s:2:"80";s:3:"iso";s:3:"100";s:13:"shutter_speed";s:17:"0.076923076923077";s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[RSA securID Imprivata]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Aquastar-Consulting</title>
		<link>http://www.it-news.fr/?attachment_id=742</link>
		<pubDate>Thu, 25 Jul 2013 09:03:11 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/07/aquastar-consulting.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>742</wp:post_id>
		<wp:post_date>2013-07-25 10:03:11</wp:post_date>
		<wp:post_date_gmt>2013-07-25 09:03:11</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>aquastar-consulting</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/07/aquastar-consulting.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/07/aquastar-consulting.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:185;s:6:"height";i:167;s:4:"file";s:31:"2013/07/aquastar-consulting.jpg";s:5:"sizes";a:1:{s:9:"thumbnail";a:4:{s:4:"file";s:31:"aquastar-consulting-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Aquastar Consulting]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>e-mail aquastar</title>
		<link>http://www.it-news.fr/?attachment_id=744</link>
		<pubDate>Thu, 25 Jul 2013 09:15:44 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/07/icone-mail.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>744</wp:post_id>
		<wp:post_date>2013-07-25 10:15:44</wp:post_date>
		<wp:post_date_gmt>2013-07-25 09:15:44</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>icone-mail</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/07/icone-mail.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/07/icone-mail.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:185;s:6:"height";i:164;s:4:"file";s:22:"2013/07/icone-mail.jpg";s:5:"sizes";a:1:{s:9:"thumbnail";a:4:{s:4:"file";s:22:"icone-mail-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[e-mail aquastar]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>adresse aquastar</title>
		<link>http://www.it-news.fr/?attachment_id=745</link>
		<pubDate>Thu, 25 Jul 2013 09:23:30 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/07/icone-adresse.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>745</wp:post_id>
		<wp:post_date>2013-07-25 10:23:30</wp:post_date>
		<wp:post_date_gmt>2013-07-25 09:23:30</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>icone-adresse</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/07/icone-adresse.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/07/icone-adresse.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:185;s:6:"height";i:164;s:4:"file";s:25:"2013/07/icone-adresse.jpg";s:5:"sizes";a:1:{s:9:"thumbnail";a:4:{s:4:"file";s:25:"icone-adresse-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[adresse aquastar]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>RSS aquastar </title>
		<link>http://www.it-news.fr/?attachment_id=746</link>
		<pubDate>Thu, 25 Jul 2013 09:37:18 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/07/rss.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>746</wp:post_id>
		<wp:post_date>2013-07-25 10:37:18</wp:post_date>
		<wp:post_date_gmt>2013-07-25 09:37:18</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>rss-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/07/rss.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/07/rss.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:185;s:6:"height";i:164;s:4:"file";s:15:"2013/07/rss.jpg";s:5:"sizes";a:1:{s:9:"thumbnail";a:4:{s:4:"file";s:15:"rss-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[RSS aquastar]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Piratage </title>
		<link>http://www.it-news.fr/ovh-apple-pirates-quelle-solutions-pour-se-sortir-du-piratage/anonymus-6744/</link>
		<pubDate>Thu, 25 Jul 2013 10:18:22 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/07/anonymus-6744.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>749</wp:post_id>
		<wp:post_date>2013-07-25 11:18:22</wp:post_date>
		<wp:post_date_gmt>2013-07-25 10:18:22</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>anonymus-6744</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>736</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/07/anonymus-6744.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/07/anonymus-6744.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:800;s:6:"height";i:531;s:4:"file";s:25:"2013/07/anonymus-6744.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:25:"anonymus-6744-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:25:"anonymus-6744-300x199.jpg";s:5:"width";i:300;s:6:"height";i:199;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:25:"anonymus-6744-800x198.jpg";s:5:"width";i:800;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Piratage OVH Apple]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>ovh</title>
		<link>http://www.it-news.fr/ovh-apple-pirates-quelle-solutions-pour-se-sortir-du-piratage/logo_ovh-svg/</link>
		<pubDate>Thu, 25 Jul 2013 10:30:31 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/07/logo_ovh-svg.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>750</wp:post_id>
		<wp:post_date>2013-07-25 11:30:31</wp:post_date>
		<wp:post_date_gmt>2013-07-25 10:30:31</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo_ovh-svg</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>736</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/07/logo_ovh-svg.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/07/logo_ovh-svg.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:220;s:6:"height";i:220;s:4:"file";s:24:"2013/07/logo_ovh-svg.png";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:24:"logo_ovh-svg-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:14:"post-thumbnail";a:4:{s:4:"file";s:24:"logo_ovh-svg-220x198.png";s:5:"width";i:220;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[ovh]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>apple</title>
		<link>http://www.it-news.fr/ovh-apple-pirates-quelle-solutions-pour-se-sortir-du-piratage/logo-apple/</link>
		<pubDate>Thu, 25 Jul 2013 10:31:18 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/07/logo-apple.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>751</wp:post_id>
		<wp:post_date>2013-07-25 11:31:18</wp:post_date>
		<wp:post_date_gmt>2013-07-25 10:31:18</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-apple</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>736</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/07/logo-apple.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/07/logo-apple.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:640;s:6:"height";i:480;s:4:"file";s:22:"2013/07/logo-apple.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:22:"logo-apple-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:22:"logo-apple-300x225.jpg";s:5:"width";i:300;s:6:"height";i:225;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:22:"logo-apple-640x198.jpg";s:5:"width";i:640;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[apple]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>ubuntu-flavours</title>
		<link>http://www.it-news.fr/ovh-apple-pirates-quelle-solutions-pour-se-sortir-du-piratage/ubuntu-flavours/</link>
		<pubDate>Thu, 25 Jul 2013 10:31:52 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/07/ubuntu-flavours.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>752</wp:post_id>
		<wp:post_date>2013-07-25 11:31:52</wp:post_date>
		<wp:post_date_gmt>2013-07-25 10:31:52</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>ubuntu-flavours</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>736</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/07/ubuntu-flavours.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/07/ubuntu-flavours.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:800;s:6:"height";i:480;s:4:"file";s:27:"2013/07/ubuntu-flavours.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:27:"ubuntu-flavours-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:27:"ubuntu-flavours-300x180.jpg";s:5:"width";i:300;s:6:"height";i:180;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:27:"ubuntu-flavours-800x198.jpg";s:5:"width";i:800;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[ubuntu-flavours]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Aruba</title>
		<link>http://www.it-news.fr/les-nouveaux-points-dacces-wifi-aruba-networks/aruba/</link>
		<pubDate>Thu, 25 Jul 2013 12:28:36 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/07/aruba.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>762</wp:post_id>
		<wp:post_date>2013-07-25 13:28:36</wp:post_date>
		<wp:post_date_gmt>2013-07-25 12:28:36</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>aruba</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>760</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/07/aruba.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/07/aruba.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:372;s:6:"height";i:410;s:4:"file";s:17:"2013/07/aruba.png";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:17:"aruba-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:6:"medium";a:4:{s:4:"file";s:17:"aruba-272x300.png";s:5:"width";i:272;s:6:"height";i:300;s:9:"mime-type";s:9:"image/png";}s:14:"post-thumbnail";a:4:{s:4:"file";s:17:"aruba-372x198.png";s:5:"width";i:372;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Aruba point d'accès wifi]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>serveur</title>
		<link>http://www.it-news.fr/tpe-pme-les-indicateurs-qui-demontrent-la-necessite-dutiliser-un-serveur/0-iiuonsc2-serveur-piece-vladru-dreamstime-com-s/</link>
		<pubDate>Fri, 26 Jul 2013 08:25:22 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/07/0-iiuonsc2-serveur-piece-vladru-dreamstime-com-s.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>775</wp:post_id>
		<wp:post_date>2013-07-26 09:25:22</wp:post_date>
		<wp:post_date_gmt>2013-07-26 08:25:22</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>0-iiuonsc2-serveur-piece-vladru-dreamstime-com-s</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>774</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/07/0-iiuonsc2-serveur-piece-vladru-dreamstime-com-s.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/07/0-iiuonsc2-serveur-piece-vladru-dreamstime-com-s.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:150;s:6:"height";i:112;s:4:"file";s:60:"2013/07/0-iiuonsc2-serveur-piece-vladru-dreamstime-com-s.png";s:5:"sizes";a:2:{s:9:"thumbnail";a:5:{s:4:"file";s:60:"0-iiuonsc2-serveur-piece-vladru-dreamstime-com-s-150x112.png";s:5:"width";i:150;s:6:"height";i:112;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:29:"Reduced by 5.9% (1.2&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:60:"0-iiuonsc2-serveur-piece-vladru-dreamstime-com-s-150x112.png";s:5:"width";i:150;s:6:"height";i:112;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:11:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";s:11:"orientation";i:0;}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Pièce serveur]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Efficacité gestion</title>
		<link>http://www.it-news.fr/tpe-pme-les-indicateurs-qui-demontrent-la-necessite-dutiliser-un-serveur/image_article-3/</link>
		<pubDate>Fri, 26 Jul 2013 09:27:49 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/07/image_article-3.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>777</wp:post_id>
		<wp:post_date>2013-07-26 10:27:49</wp:post_date>
		<wp:post_date_gmt>2013-07-26 09:27:49</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>image_article-3</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>774</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/07/image_article-3.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/07/image_article-3.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1500;s:6:"height";i:725;s:4:"file";s:27:"2013/07/image_article-3.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:27:"image_article-3-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:27:"image_article-3-300x145.jpg";s:5:"width";i:300;s:6:"height";i:145;s:9:"mime-type";s:10:"image/jpeg";}s:5:"large";a:4:{s:4:"file";s:28:"image_article-3-1024x494.jpg";s:5:"width";i:1024;s:6:"height";i:494;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:27:"image_article-3-940x198.jpg";s:5:"width";i:940;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Efficacité de gestion]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>BYOD</title>
		<link>http://www.it-news.fr/byod-letude-vmware-confirme-linteret-des-salaries-francais-a-cette-pratique/byod-pic/</link>
		<pubDate>Mon, 29 Jul 2013 08:03:25 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/07/byod-pic.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>795</wp:post_id>
		<wp:post_date>2013-07-29 09:03:25</wp:post_date>
		<wp:post_date_gmt>2013-07-29 08:03:25</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>byod-pic</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>789</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/07/byod-pic.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/07/byod-pic.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:254;s:6:"height";i:219;s:4:"file";s:20:"2013/07/byod-pic.png";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:20:"byod-pic-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:14:"post-thumbnail";a:4:{s:4:"file";s:20:"byod-pic-254x198.png";s:5:"width";i:254;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[BYOD]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>byod2013</title>
		<link>http://www.it-news.fr/byod-letude-vmware-confirme-linteret-des-salaries-francais-a-cette-pratique/byod2013-2/</link>
		<pubDate>Mon, 29 Jul 2013 08:09:05 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/07/byod2013-2.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>796</wp:post_id>
		<wp:post_date>2013-07-29 09:09:05</wp:post_date>
		<wp:post_date_gmt>2013-07-29 08:09:05</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>byod2013-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>789</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/07/byod2013-2.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/07/byod2013-2.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:617;s:6:"height";i:338;s:4:"file";s:22:"2013/07/byod2013-2.png";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:22:"byod2013-2-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:6:"medium";a:4:{s:4:"file";s:22:"byod2013-2-300x164.png";s:5:"width";i:300;s:6:"height";i:164;s:9:"mime-type";s:9:"image/png";}s:14:"post-thumbnail";a:4:{s:4:"file";s:22:"byod2013-2-617x198.png";s:5:"width";i:617;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[byod2013]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>aquastar-consulting</title>
		<link>http://www.it-news.fr/?attachment_id=816</link>
		<pubDate>Wed, 31 Jul 2013 12:55:45 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/07/aquastar-consulting1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>816</wp:post_id>
		<wp:post_date>2013-07-31 13:55:45</wp:post_date>
		<wp:post_date_gmt>2013-07-31 12:55:45</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>aquastar-consulting-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/07/aquastar-consulting1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/07/aquastar-consulting1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:185;s:6:"height";i:167;s:4:"file";s:32:"2013/07/aquastar-consulting1.jpg";s:5:"sizes";a:1:{s:9:"thumbnail";a:4:{s:4:"file";s:32:"aquastar-consulting1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>alarme</title>
		<link>http://www.it-news.fr/la-securisation-des-actifs-logiciels-passe-par-la-securisation-du-systeme-d-information/alarme/</link>
		<pubDate>Mon, 05 Aug 2013 07:08:32 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/08/alarme.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>824</wp:post_id>
		<wp:post_date>2013-08-05 08:08:32</wp:post_date>
		<wp:post_date_gmt>2013-08-05 07:08:32</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>alarme</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>820</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/08/alarme.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/08/alarme.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:160;s:6:"height";i:134;s:4:"file";s:18:"2013/08/alarme.jpg";s:5:"sizes";a:1:{s:9:"thumbnail";a:4:{s:4:"file";s:18:"alarme-150x134.jpg";s:5:"width";i:150;s:6:"height";i:134;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Quartier Numérique</title>
		<link>http://www.it-news.fr/nouveau-projet-du-gouvernement-les-quartiers-numeriques/quartier-numerique/</link>
		<pubDate>Tue, 06 Aug 2013 06:45:04 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/08/Quartier-Numérique.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>828</wp:post_id>
		<wp:post_date>2013-08-06 07:45:04</wp:post_date>
		<wp:post_date_gmt>2013-08-06 06:45:04</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>quartier-numerique</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>827</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/08/Quartier-Numérique.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/08/Quartier-Numérique.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:222;s:6:"height";i:184;s:4:"file";s:31:"2013/08/Quartier-Numérique.jpg";s:5:"sizes";a:1:{s:9:"thumbnail";a:4:{s:4:"file";s:31:"Quartier-Numérique-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Quartier Numérique]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Danger Wi-fi public</title>
		<link>http://www.it-news.fr/le-danger-des-points-dacces-wi-fi/images-3/</link>
		<pubDate>Tue, 13 Aug 2013 07:27:56 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/08/images.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>850</wp:post_id>
		<wp:post_date>2013-08-13 08:27:56</wp:post_date>
		<wp:post_date_gmt>2013-08-13 07:27:56</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>images-3</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>849</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/08/images.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/08/images.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:246;s:6:"height";i:205;s:4:"file";s:18:"2013/08/images.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:18:"images-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:18:"images-246x198.jpg";s:5:"width";i:246;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Danger Wi-fi public]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Accès Wi-fi public</title>
		<link>http://www.it-news.fr/le-danger-des-points-dacces-wi-fi/jpg/</link>
		<pubDate>Tue, 13 Aug 2013 08:49:16 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/08/jpg.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>851</wp:post_id>
		<wp:post_date>2013-08-13 09:49:16</wp:post_date>
		<wp:post_date_gmt>2013-08-13 08:49:16</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>jpg</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>849</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/08/jpg.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/08/jpg.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:770;s:6:"height";i:380;s:4:"file";s:15:"2013/08/jpg.jpg";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:15:"jpg-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.6% (781&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:15:"jpg-300x148.jpg";s:5:"width";i:300;s:6:"height";i:148;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 7.0% (1.1&nbsp;KB)";}s:22:"wysija-newsletters-max";a:5:{s:4:"file";s:15:"jpg-600x296.jpg";s:5:"width";i:600;s:6:"height";i:296;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 5.9% (2.5&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:15:"jpg-770x198.jpg";s:5:"width";i:770;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 5.2% (1.7&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:15:"jpg-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 2.0% (821&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Accès Wi-fi public]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Zemanta Related Posts Thumbnail</title>
		<link>http://www.it-news.fr/le-danger-des-points-dacces-wi-fi/zemanta-related-posts-thumbnail/</link>
		<pubDate>Wed, 14 Aug 2013 07:47:59 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/08/images-150x150.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>861</wp:post_id>
		<wp:post_date>2013-08-14 08:47:59</wp:post_date>
		<wp:post_date_gmt>2013-08-14 07:47:59</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>zemanta-related-posts-thumbnail</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>849</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/08/images-150x1501.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/08/images-150x1501.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:150;s:4:"file";s:27:"2013/08/images-150x1501.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Zemanta Related Posts Thumbnail</title>
		<link>http://www.it-news.fr/nouveau-projet-du-gouvernement-les-quartiers-numeriques/zemanta-related-posts-thumbnail-2/</link>
		<pubDate>Wed, 14 Aug 2013 07:47:59 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/08/Quartier-Numérique-150x150.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>862</wp:post_id>
		<wp:post_date>2013-08-14 08:47:59</wp:post_date>
		<wp:post_date_gmt>2013-08-14 07:47:59</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>zemanta-related-posts-thumbnail-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>827</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/08/Quartier-Numérique-150x1501.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/08/Quartier-Numérique-150x1501.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:150;s:6:"height";i:150;s:4:"file";s:40:"2013/08/Quartier-Numérique-150x1501.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 7.5% (744&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>aquastar</title>
		<link>http://www.it-news.fr/aquastar-conserve-la-note-de-g4/aquastar/</link>
		<pubDate>Wed, 14 Aug 2013 07:47:59 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/08/aquastar.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>863</wp:post_id>
		<wp:post_date>2013-08-14 08:47:59</wp:post_date>
		<wp:post_date_gmt>2013-08-14 07:47:59</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>aquastar</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>963</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/08/aquastar.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/08/aquastar.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:172;s:6:"height";i:171;s:4:"file";s:20:"2013/08/aquastar.png";s:5:"sizes";a:2:{s:9:"thumbnail";a:5:{s:4:"file";s:20:"aquastar-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:28:"Reduced by 3.3% (824&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:20:"aquastar-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 8.3% (853&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[aquastar]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Zemanta Related Posts Thumbnail</title>
		<link>http://www.it-news.fr/byod-letude-vmware-confirme-linteret-des-salaries-francais-a-cette-pratique/zemanta-related-posts-thumbnail-3/</link>
		<pubDate>Wed, 14 Aug 2013 07:47:59 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/07/byod-pic.png?w=150</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>865</wp:post_id>
		<wp:post_date>2013-08-14 08:47:59</wp:post_date>
		<wp:post_date_gmt>2013-08-14 07:47:59</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>zemanta-related-posts-thumbnail-3</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>789</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/07/byod-pic1.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/07/byod-pic1.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:254;s:6:"height";i:219;s:4:"file";s:21:"2013/07/byod-pic1.png";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:21:"byod-pic1-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:14:"post-thumbnail";a:4:{s:4:"file";s:21:"byod-pic1-254x198.png";s:5:"width";i:254;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:21:"byod-pic1-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Zemanta Related Posts Thumbnail</title>
		<link>http://www.it-news.fr/les-nouveaux-points-dacces-wifi-aruba-networks/zemanta-related-posts-thumbnail-4/</link>
		<pubDate>Wed, 14 Aug 2013 07:47:59 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/07/aruba.png?w=136</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>866</wp:post_id>
		<wp:post_date>2013-08-14 08:47:59</wp:post_date>
		<wp:post_date_gmt>2013-08-14 07:47:59</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>zemanta-related-posts-thumbnail-4</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>760</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/07/aruba1.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/07/aruba1.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:372;s:6:"height";i:410;s:4:"file";s:18:"2013/07/aruba1.png";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:18:"aruba1-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:6:"medium";a:4:{s:4:"file";s:18:"aruba1-272x300.png";s:5:"width";i:272;s:6:"height";i:300;s:9:"mime-type";s:9:"image/png";}s:14:"post-thumbnail";a:4:{s:4:"file";s:18:"aruba1-372x198.png";s:5:"width";i:372;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:18:"aruba1-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Zemanta Related Posts Thumbnail</title>
		<link>http://www.it-news.fr/ovh-apple-pirates-quelle-solutions-pour-se-sortir-du-piratage/zemanta-related-posts-thumbnail-5/</link>
		<pubDate>Wed, 14 Aug 2013 07:47:59 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/07/anonymus-6744.jpg?w=150</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>867</wp:post_id>
		<wp:post_date>2013-08-14 08:47:59</wp:post_date>
		<wp:post_date_gmt>2013-08-14 07:47:59</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>zemanta-related-posts-thumbnail-5</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>736</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/07/anonymus-67441.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/07/anonymus-67441.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:800;s:6:"height";i:531;s:4:"file";s:26:"2013/07/anonymus-67441.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:26:"anonymus-67441-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:26:"anonymus-67441-300x199.jpg";s:5:"width";i:300;s:6:"height";i:199;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:26:"anonymus-67441-800x198.jpg";s:5:"width";i:800;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:26:"anonymus-67441-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Zemanta Related Posts Thumbnail</title>
		<link>http://www.it-news.fr/parametrage-du-cice-dans-votre-logiciel-de-paie/zemanta-related-posts-thumbnail-6/</link>
		<pubDate>Wed, 14 Aug 2013 07:48:00 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/edf-gdf-gabegie-cice-296x300.jpg?w=148</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>870</wp:post_id>
		<wp:post_date>2013-08-14 08:48:00</wp:post_date>
		<wp:post_date_gmt>2013-08-14 07:48:00</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>zemanta-related-posts-thumbnail-6</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>578</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/edf-gdf-gabegie-cice-296x3001.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/edf-gdf-gabegie-cice-296x3001.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:296;s:6:"height";i:300;s:4:"file";s:41:"2013/06/edf-gdf-gabegie-cice-296x3001.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:41:"edf-gdf-gabegie-cice-296x3001-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:41:"edf-gdf-gabegie-cice-296x3001-296x198.jpg";s:5:"width";i:296;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:41:"edf-gdf-gabegie-cice-296x3001-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Zemanta Related Posts Thumbnail</title>
		<link>http://www.it-news.fr/les-ressources-humaines-gestion-des-carrieres/zemanta-related-posts-thumbnail-7/</link>
		<pubDate>Wed, 14 Aug 2013 07:48:00 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/07/progres_carriere.jpg?w=150</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>871</wp:post_id>
		<wp:post_date>2013-08-14 08:48:00</wp:post_date>
		<wp:post_date_gmt>2013-08-14 07:48:00</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>zemanta-related-posts-thumbnail-7</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>563</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/progres_carriere.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/progres_carriere.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:250;s:6:"height";i:205;s:4:"file";s:28:"2013/06/progres_carriere.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:28:"progres_carriere-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:28:"progres_carriere-250x198.jpg";s:5:"width";i:250;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:28:"progres_carriere-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Zemanta Related Posts Thumbnail</title>
		<link>http://www.it-news.fr/prendre-les-bonnes-decisions-grace-a-nos-outils/zemanta-related-posts-thumbnail-8/</link>
		<pubDate>Wed, 14 Aug 2013 07:48:00 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/question-blue.jpg?w=120</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>873</wp:post_id>
		<wp:post_date>2013-08-14 08:48:00</wp:post_date>
		<wp:post_date_gmt>2013-08-14 07:48:00</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>zemanta-related-posts-thumbnail-8</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>342</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/question-blue1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/question-blue1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:300;s:6:"height";i:375;s:4:"file";s:26:"2013/06/question-blue1.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:26:"question-blue1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:26:"question-blue1-240x300.jpg";s:5:"width";i:240;s:6:"height";i:300;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:26:"question-blue1-300x198.jpg";s:5:"width";i:300;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:26:"question-blue1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Zemanta Related Posts Thumbnail</title>
		<link>http://www.it-news.fr/dematerialiser-ses-documents-et-automatiser-ses-processus/zemanta-related-posts-thumbnail-9/</link>
		<pubDate>Wed, 14 Aug 2013 07:48:00 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/gdi-circle-network-downline.jpg?w=150</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>874</wp:post_id>
		<wp:post_date>2013-08-14 08:48:00</wp:post_date>
		<wp:post_date_gmt>2013-08-14 07:48:00</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>zemanta-related-posts-thumbnail-9</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>336</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/gdi-circle-network-downline1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/gdi-circle-network-downline1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:461;s:6:"height";i:307;s:4:"file";s:40:"2013/06/gdi-circle-network-downline1.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:40:"gdi-circle-network-downline1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:40:"gdi-circle-network-downline1-300x199.jpg";s:5:"width";i:300;s:6:"height";i:199;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:40:"gdi-circle-network-downline1-461x198.jpg";s:5:"width";i:461;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:40:"gdi-circle-network-downline1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Zemanta Related Posts Thumbnail</title>
		<link>http://www.it-news.fr/gestion-commerciale-maitriser-tous-les-domaines-de-votre-pme/zemanta-related-posts-thumbnail-10/</link>
		<pubDate>Wed, 14 Aug 2013 07:48:00 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/boite6_gestionco_opt.jpg?w=150</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>875</wp:post_id>
		<wp:post_date>2013-08-14 08:48:00</wp:post_date>
		<wp:post_date_gmt>2013-08-14 07:48:00</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>zemanta-related-posts-thumbnail-10</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>334</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/boite6_gestionco_opt1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/boite6_gestionco_opt1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:170;s:6:"height";i:150;s:4:"file";s:33:"2013/06/boite6_gestionco_opt1.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:33:"boite6_gestionco_opt1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:33:"boite6_gestionco_opt1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Zemanta Related Posts Thumbnail</title>
		<link>http://www.it-news.fr/visualisez-en-temps-reel-votre-tresorerie/zemanta-related-posts-thumbnail-11/</link>
		<pubDate>Wed, 14 Aug 2013 07:48:00 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/sage-100_-trc3a9sorerie-i7.png?w=137</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>876</wp:post_id>
		<wp:post_date>2013-08-14 08:48:00</wp:post_date>
		<wp:post_date_gmt>2013-08-14 07:48:00</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>zemanta-related-posts-thumbnail-11</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>332</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/sage-100_-trc3a9sorerie-i71.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/sage-100_-trc3a9sorerie-i71.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:308;s:6:"height";i:335;s:4:"file";s:39:"2013/06/sage-100_-trc3a9sorerie-i71.png";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:39:"sage-100_-trc3a9sorerie-i71-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:6:"medium";a:4:{s:4:"file";s:39:"sage-100_-trc3a9sorerie-i71-275x300.png";s:5:"width";i:275;s:6:"height";i:300;s:9:"mime-type";s:9:"image/png";}s:14:"post-thumbnail";a:4:{s:4:"file";s:39:"sage-100_-trc3a9sorerie-i71-308x198.png";s:5:"width";i:308;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:39:"sage-100_-trc3a9sorerie-i71-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Protection des données personnelles</title>
		<link>http://www.it-news.fr/protectiondesdonneespersonnelles-on-manque-dinformation/protection-des-donnees-personnelles/</link>
		<pubDate>Wed, 14 Aug 2013 12:48:14 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/08/Protection-des-données-personnelles.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>881</wp:post_id>
		<wp:post_date>2013-08-14 13:48:14</wp:post_date>
		<wp:post_date_gmt>2013-08-14 12:48:14</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>protection-des-donnees-personnelles</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>880</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/08/Protection-des-données-personnelles.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/08/Protection-des-données-personnelles.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:288;s:6:"height";i:192;s:4:"file";s:48:"2013/08/Protection-des-données-personnelles.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:48:"Protection-des-données-personnelles-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:48:"Protection-des-données-personnelles-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Protection des données personnelles]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Protection des données personnelles</title>
		<link>http://www.it-news.fr/protectiondesdonneespersonnelles-on-manque-dinformation/protection-des-donnees-personnelles-2/</link>
		<pubDate>Wed, 14 Aug 2013 12:49:47 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/08/Protection-des-données-personnelles1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>882</wp:post_id>
		<wp:post_date>2013-08-14 13:49:47</wp:post_date>
		<wp:post_date_gmt>2013-08-14 12:49:47</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>protection-des-donnees-personnelles-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>880</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/08/Protection-des-données-personnelles1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/08/Protection-des-données-personnelles1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:173;s:6:"height";i:116;s:4:"file";s:49:"2013/08/Protection-des-données-personnelles1.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:49:"Protection-des-données-personnelles1-150x116.jpg";s:5:"width";i:150;s:6:"height";i:116;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:49:"Protection-des-données-personnelles1-150x116.jpg";s:5:"width";i:150;s:6:"height";i:116;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Protection des données personnelles]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>zone wifi</title>
		<link>http://www.it-news.fr/le-danger-des-points-dacces-wi-fi/379_wifi/</link>
		<pubDate>Mon, 19 Aug 2013 06:47:07 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/08/379_wifi.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>886</wp:post_id>
		<wp:post_date>2013-08-19 07:47:07</wp:post_date>
		<wp:post_date_gmt>2013-08-19 06:47:07</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>379_wifi</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>849</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/08/379_wifi.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/08/379_wifi.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:152;s:6:"height";i:128;s:4:"file";s:20:"2013/08/379_wifi.png";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:20:"379_wifi-150x128.png";s:5:"width";i:150;s:6:"height";i:128;s:9:"mime-type";s:9:"image/png";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:20:"379_wifi-150x128.png";s:5:"width";i:150;s:6:"height";i:128;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[zone wifi]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Firewalls Palo Alto</title>
		<link>http://www.it-news.fr/?attachment_id=888</link>
		<pubDate>Mon, 19 Aug 2013 08:15:44 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/08/Firewalls-Palo-Alto.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>888</wp:post_id>
		<wp:post_date>2013-08-19 09:15:44</wp:post_date>
		<wp:post_date_gmt>2013-08-19 08:15:44</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>firewalls-palo-alto</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/08/Firewalls-Palo-Alto.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/08/Firewalls-Palo-Alto.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:120;s:6:"height";i:544;s:4:"file";s:31:"2013/08/Firewalls-Palo-Alto.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:31:"Firewalls-Palo-Alto-120x150.jpg";s:5:"width";i:120;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:30:"Firewalls-Palo-Alto-66x300.jpg";s:5:"width";i:66;s:6:"height";i:300;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:31:"Firewalls-Palo-Alto-120x198.jpg";s:5:"width";i:120;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:31:"Firewalls-Palo-Alto-120x150.jpg";s:5:"width";i:120;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Sage 100 i7</title>
		<link>http://www.it-news.fr/?attachment_id=889</link>
		<pubDate>Mon, 19 Aug 2013 08:16:03 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/08/Sans-titre.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>889</wp:post_id>
		<wp:post_date>2013-08-19 09:16:03</wp:post_date>
		<wp:post_date_gmt>2013-08-19 08:16:03</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>sans-titre-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/08/Sans-titre.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/08/Sans-titre.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:192;s:6:"height";i:167;s:4:"file";s:22:"2013/08/Sans-titre.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:22:"Sans-titre-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:22:"Sans-titre-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Sage 100 i7]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>viadeo</title>
		<link>http://www.it-news.fr/?attachment_id=890</link>
		<pubDate>Mon, 19 Aug 2013 08:19:02 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/08/viadeo.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>890</wp:post_id>
		<wp:post_date>2013-08-19 09:19:02</wp:post_date>
		<wp:post_date_gmt>2013-08-19 08:19:02</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>viadeo-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/08/viadeo.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/08/viadeo.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:35;s:6:"height";i:36;s:4:"file";s:18:"2013/08/viadeo.png";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>YouTube-icon</title>
		<link>http://www.it-news.fr/?attachment_id=891</link>
		<pubDate>Mon, 19 Aug 2013 08:19:03 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/08/YouTube-icon.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>891</wp:post_id>
		<wp:post_date>2013-08-19 09:19:03</wp:post_date>
		<wp:post_date_gmt>2013-08-19 08:19:03</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>youtube-icon-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/08/YouTube-icon.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/08/YouTube-icon.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:36;s:6:"height";i:36;s:4:"file";s:24:"2013/08/YouTube-icon.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>googleplus-logo</title>
		<link>http://www.it-news.fr/?attachment_id=892</link>
		<pubDate>Mon, 19 Aug 2013 08:19:07 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/08/googleplus-logo.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>892</wp:post_id>
		<wp:post_date>2013-08-19 09:19:07</wp:post_date>
		<wp:post_date_gmt>2013-08-19 08:19:07</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>googleplus-logo-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/08/googleplus-logo.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/08/googleplus-logo.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:36;s:6:"height";i:36;s:4:"file";s:27:"2013/08/googleplus-logo.png";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>twitter-logo</title>
		<link>http://www.it-news.fr/?attachment_id=893</link>
		<pubDate>Mon, 19 Aug 2013 08:19:08 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/08/twitter-logo.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>893</wp:post_id>
		<wp:post_date>2013-08-19 09:19:08</wp:post_date>
		<wp:post_date_gmt>2013-08-19 08:19:08</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>twitter-logo-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/08/twitter-logo.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/08/twitter-logo.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:36;s:6:"height";i:36;s:4:"file";s:24:"2013/08/twitter-logo.png";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Protection des données personnelles emails</title>
		<link>http://www.it-news.fr/protectiondesdonneespersonnelles-on-manque-dinformation/protection-des-donnees-personnelles-emails/</link>
		<pubDate>Mon, 19 Aug 2013 08:24:51 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/08/Protection-des-données-personnelles-emails.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>894</wp:post_id>
		<wp:post_date>2013-08-19 09:24:51</wp:post_date>
		<wp:post_date_gmt>2013-08-19 08:24:51</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>protection-des-donnees-personnelles-emails</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>880</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/08/Protection-des-données-personnelles-emails.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/08/Protection-des-données-personnelles-emails.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:388;s:6:"height";i:309;s:4:"file";s:55:"2013/08/Protection-des-données-personnelles-emails.png";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:55:"Protection-des-données-personnelles-emails-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}s:6:"medium";a:4:{s:4:"file";s:55:"Protection-des-données-personnelles-emails-300x238.png";s:5:"width";i:300;s:6:"height";i:238;s:9:"mime-type";s:9:"image/png";}s:14:"post-thumbnail";a:4:{s:4:"file";s:55:"Protection-des-données-personnelles-emails-388x198.png";s:5:"width";i:388;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:55:"Protection-des-données-personnelles-emails-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Protection des données personnelles emails]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>anti-intrusion</title>
		<link>http://www.it-news.fr/protectiondesdonneespersonnelles-on-manque-dinformation/anti-intrusion-jpeg-ks/</link>
		<pubDate>Mon, 19 Aug 2013 09:38:19 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/08/anti-intrusion-jpeg-kS.jpeg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>895</wp:post_id>
		<wp:post_date>2013-08-19 10:38:19</wp:post_date>
		<wp:post_date_gmt>2013-08-19 09:38:19</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>anti-intrusion-jpeg-ks</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>880</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/08/anti-intrusion-jpeg-kS.jpeg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/08/anti-intrusion-jpeg-kS.jpeg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:225;s:6:"height";i:225;s:4:"file";s:35:"2013/08/anti-intrusion-jpeg-kS.jpeg";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:35:"anti-intrusion-jpeg-kS-150x150.jpeg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:35:"anti-intrusion-jpeg-kS-225x198.jpeg";s:5:"width";i:225;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:35:"anti-intrusion-jpeg-kS-150x150.jpeg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[anti-intrusion]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Protection des données personnelles</title>
		<link>http://www.it-news.fr/protectiondesdonneespersonnelles-on-manque-dinformation/protection-des-donnees-personnelles-3/</link>
		<pubDate>Mon, 19 Aug 2013 10:07:31 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/08/Protection-des-données-personnelles.jpeg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>897</wp:post_id>
		<wp:post_date>2013-08-19 11:07:31</wp:post_date>
		<wp:post_date_gmt>2013-08-19 10:07:31</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>protection-des-donnees-personnelles-3</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>880</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/08/Protection-des-données-personnelles.jpeg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/08/Protection-des-données-personnelles.jpeg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:182;s:6:"height";i:137;s:4:"file";s:49:"2013/08/Protection-des-données-personnelles.jpeg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:49:"Protection-des-données-personnelles-150x137.jpeg";s:5:"width";i:150;s:6:"height";i:137;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:49:"Protection-des-données-personnelles-150x137.jpeg";s:5:"width";i:150;s:6:"height";i:137;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Protection des données personnelles]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Wi-Fi en europe</title>
		<link>http://www.it-news.fr/le-succes-du-wi-fi-en-europe/wi-fi-en-europe/</link>
		<pubDate>Mon, 19 Aug 2013 10:23:27 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/08/Wi-Fi-en-europe.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>902</wp:post_id>
		<wp:post_date>2013-08-19 11:23:27</wp:post_date>
		<wp:post_date_gmt>2013-08-19 10:23:27</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>wi-fi-en-europe</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>900</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/08/Wi-Fi-en-europe.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/08/Wi-Fi-en-europe.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:144;s:6:"height";i:144;s:4:"file";s:27:"2013/08/Wi-Fi-en-europe.png";s:5:"sizes";a:0:{}s:10:"image_meta";a:11:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";s:11:"orientation";i:0;}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Wi-Fi en europe]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Le numérique en France</title>
		<link>http://www.it-news.fr/le-numerique-en-france/le-numerique-en-france/</link>
		<pubDate>Tue, 20 Aug 2013 14:07:19 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/08/Le-numérique-en-France.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>909</wp:post_id>
		<wp:post_date>2013-08-20 15:07:19</wp:post_date>
		<wp:post_date_gmt>2013-08-20 14:07:19</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>le-numerique-en-france</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>907</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/08/Le-numérique-en-France.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/08/Le-numérique-en-France.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:150;s:6:"height";i:150;s:4:"file";s:35:"2013/08/Le-numérique-en-France.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 7.5% (519&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Le numérique en France]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Coûts IT</title>
		<link>http://www.it-news.fr/comment-maitriser-les-couts-it/money/</link>
		<pubDate>Tue, 27 Aug 2013 07:58:01 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/08/argent-public-subvention-depense.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>928</wp:post_id>
		<wp:post_date>2013-08-27 08:58:01</wp:post_date>
		<wp:post_date_gmt>2013-08-27 07:58:01</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>money</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>927</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/08/argent-public-subvention-depense.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/08/argent-public-subvention-depense.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:150;s:6:"height";i:112;s:4:"file";s:44:"2013/08/argent-public-subvention-depense.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:5:{s:4:"file";s:44:"argent-public-subvention-depense-150x112.jpg";s:5:"width";i:150;s:6:"height";i:112;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.5% (754&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:44:"argent-public-subvention-depense-150x112.jpg";s:5:"width";i:150;s:6:"height";i:112;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:11:{s:8:"aperture";d:4.7999999999999998;s:6:"credit";s:6:"ElenaR";s:6:"camera";s:5:"E4200";s:7:"caption";s:0:"";s:17:"created_timestamp";i:1189200681;s:9:"copyright";s:6:"ElenaR";s:12:"focal_length";s:3:"7.8";s:3:"iso";s:2:"79";s:13:"shutter_speed";s:18:"0.0029239766081871";s:5:"title";s:5:"Money";s:11:"orientation";i:1;}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Coûts IT]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Enjeux DSI</title>
		<link>http://www.it-news.fr/comment-maitriser-les-couts-it/enjeux-dsi/</link>
		<pubDate>Tue, 27 Aug 2013 12:09:27 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/08/Enjeux-DSI.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>933</wp:post_id>
		<wp:post_date>2013-08-27 13:09:27</wp:post_date>
		<wp:post_date_gmt>2013-08-27 12:09:27</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>enjeux-dsi</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>927</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/08/Enjeux-DSI.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/08/Enjeux-DSI.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:438;s:6:"height";i:329;s:4:"file";s:22:"2013/08/Enjeux-DSI.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:22:"Enjeux-DSI-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:22:"Enjeux-DSI-300x225.jpg";s:5:"width";i:300;s:6:"height";i:225;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:22:"Enjeux-DSI-438x198.jpg";s:5:"width";i:438;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:22:"Enjeux-DSI-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Enjeux DSI]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>A quoi sert la Big Data</title>
		<link>http://www.it-news.fr/comment-maitriser-les-couts-it/a-quoi-sert-la-big-data/</link>
		<pubDate>Tue, 27 Aug 2013 12:11:12 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/08/A-quoi-sert-la-Big-Data.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>934</wp:post_id>
		<wp:post_date>2013-08-27 13:11:12</wp:post_date>
		<wp:post_date_gmt>2013-08-27 12:11:12</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>a-quoi-sert-la-big-data</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>927</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/08/A-quoi-sert-la-Big-Data.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/08/A-quoi-sert-la-Big-Data.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:460;s:6:"height";i:260;s:4:"file";s:35:"2013/08/A-quoi-sert-la-Big-Data.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:35:"A-quoi-sert-la-Big-Data-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:35:"A-quoi-sert-la-Big-Data-300x169.jpg";s:5:"width";i:300;s:6:"height";i:169;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:35:"A-quoi-sert-la-Big-Data-460x198.jpg";s:5:"width";i:460;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:35:"A-quoi-sert-la-Big-Data-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[A quoi sert la Big Data]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Hashcat mot de passe long</title>
		<link>http://www.it-news.fr/mot-de-passe-proteger-du-piratage/hashcat-mot-de-passe-long/</link>
		<pubDate>Fri, 30 Aug 2013 10:10:25 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/08/Hashcat-mot-de-passe-long.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>942</wp:post_id>
		<wp:post_date>2013-08-30 11:10:25</wp:post_date>
		<wp:post_date_gmt>2013-08-30 10:10:25</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>hashcat-mot-de-passe-long</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>940</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/08/Hashcat-mot-de-passe-long-e1377857513485.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/08/Hashcat-mot-de-passe-long-e1377857513485.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:118;s:6:"height";i:138;s:4:"file";s:52:"2013/08/Hashcat-mot-de-passe-long-e1377857513485.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Hashcat mot de passe long]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_backup_sizes</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{s:9:"full-orig";a:3:{s:5:"width";i:118;s:6:"height";i:138;s:4:"file";s:29:"Hashcat-mot-de-passe-long.jpg";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>mot de passe long hacker</title>
		<link>http://www.it-news.fr/mot-de-passe-proteger-du-piratage/mot-de-passe-long-hacker/</link>
		<pubDate>Fri, 30 Aug 2013 12:37:54 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/08/mot-de-passe-long-hacker.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>943</wp:post_id>
		<wp:post_date>2013-08-30 13:37:54</wp:post_date>
		<wp:post_date_gmt>2013-08-30 12:37:54</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>mot-de-passe-long-hacker</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>940</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/08/mot-de-passe-long-hacker.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/08/mot-de-passe-long-hacker.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:602;s:6:"height";i:340;s:4:"file";s:36:"2013/08/mot-de-passe-long-hacker.jpg";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:36:"mot-de-passe-long-hacker-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.8% (742&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:36:"mot-de-passe-long-hacker-300x169.jpg";s:5:"width";i:300;s:6:"height";i:169;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.9% (1.1&nbsp;KB)";}s:22:"wysija-newsletters-max";a:5:{s:4:"file";s:36:"mot-de-passe-long-hacker-600x338.jpg";s:5:"width";i:600;s:6:"height";i:338;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 5.7% (2.5&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:36:"mot-de-passe-long-hacker-602x198.jpg";s:5:"width";i:602;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.4% (1.9&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:36:"mot-de-passe-long-hacker-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:11:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";s:11:"orientation";i:0;}s:10:"wp_smushit";s:29:"Reduced by 8.3% (7.7&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[mot de passe long hacker]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Réforme des retraites</title>
		<link>http://www.it-news.fr/reforme-des-retraites/reforme-des-retraites/</link>
		<pubDate>Mon, 02 Sep 2013 14:25:54 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/Réforme-des-retraites.gif</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>948</wp:post_id>
		<wp:post_date>2013-09-02 15:25:54</wp:post_date>
		<wp:post_date_gmt>2013-09-02 14:25:54</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>reforme-des-retraites</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>947</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/Réforme-des-retraites.gif</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/Réforme-des-retraites.gif]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:150;s:6:"height";i:120;s:4:"file";s:34:"2013/09/Réforme-des-retraites.gif";s:5:"sizes";a:2:{s:9:"thumbnail";a:5:{s:4:"file";s:34:"Réforme-des-retraites-150x120.gif";s:5:"width";i:150;s:6:"height";i:120;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 27.1% (1.7&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:34:"Réforme-des-retraites-150x120.gif";s:5:"width";i:150;s:6:"height";i:120;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:11:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";s:11:"orientation";i:0;}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Réforme des retraites]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Pénébilité réforme des retraites</title>
		<link>http://www.it-news.fr/reforme-des-retraites/penebilite-reforme-des-retraites/</link>
		<pubDate>Mon, 02 Sep 2013 15:05:31 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/Pénébilité-réforme-des-retraites.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>949</wp:post_id>
		<wp:post_date>2013-09-02 16:05:31</wp:post_date>
		<wp:post_date_gmt>2013-09-02 15:05:31</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>penebilite-reforme-des-retraites</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>947</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/Pénébilité-réforme-des-retraites.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/Pénébilité-réforme-des-retraites.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:300;s:6:"height";i:300;s:4:"file";s:48:"2013/09/Pénébilité-réforme-des-retraites.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:48:"Pénébilité-réforme-des-retraites-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:48:"Pénébilité-réforme-des-retraites-300x198.jpg";s:5:"width";i:300;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:48:"Pénébilité-réforme-des-retraites-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Pénébilité réforme des retraites]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>CICE</title>
		<link>http://www.it-news.fr/objectifs-cice-soulager-tresorerie/cice/</link>
		<pubDate>Mon, 02 Sep 2013 21:42:29 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/CICE.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>954</wp:post_id>
		<wp:post_date>2013-09-02 22:42:29</wp:post_date>
		<wp:post_date_gmt>2013-09-02 21:42:29</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cice</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>953</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/CICE.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/CICE.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:149;s:6:"height";i:148;s:4:"file";s:16:"2013/09/CICE.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[CICE]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Graphique usage CICE</title>
		<link>http://www.it-news.fr/objectifs-cice-soulager-tresorerie/graphique-usage-cice/</link>
		<pubDate>Mon, 02 Sep 2013 22:07:49 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/Graphique-usage-CICE.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>957</wp:post_id>
		<wp:post_date>2013-09-02 23:07:49</wp:post_date>
		<wp:post_date_gmt>2013-09-02 22:07:49</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>graphique-usage-cice</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>953</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/Graphique-usage-CICE.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/Graphique-usage-CICE.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:876;s:6:"height";i:502;s:4:"file";s:32:"2013/09/Graphique-usage-CICE.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:32:"Graphique-usage-CICE-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:32:"Graphique-usage-CICE-300x171.jpg";s:5:"width";i:300;s:6:"height";i:171;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:32:"Graphique-usage-CICE-876x198.jpg";s:5:"width";i:876;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:32:"Graphique-usage-CICE-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Graphique usage CICE]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>CRM d&#039;usage</title>
		<link>http://www.it-news.fr/crm-dusage-met-crm-classique-porte/crm-dusage/</link>
		<pubDate>Wed, 04 Sep 2013 21:34:41 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/CRM-dusage.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>969</wp:post_id>
		<wp:post_date>2013-09-04 22:34:41</wp:post_date>
		<wp:post_date_gmt>2013-09-04 21:34:41</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>crm-dusage</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>967</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/CRM-dusage.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/CRM-dusage.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:500;s:6:"height";i:375;s:4:"file";s:22:"2013/09/CRM-dusage.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:22:"CRM-dusage-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:22:"CRM-dusage-300x225.jpg";s:5:"width";i:300;s:6:"height";i:225;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:22:"CRM-dusage-500x198.jpg";s:5:"width";i:500;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:22:"CRM-dusage-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[CRM d'usage]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Simplification CRM d&#039;usage</title>
		<link>http://www.it-news.fr/crm-dusage-met-crm-classique-porte/simplification-crm-dusage/</link>
		<pubDate>Wed, 04 Sep 2013 22:32:12 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/Simplification-CRM-dusage.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>972</wp:post_id>
		<wp:post_date>2013-09-04 23:32:12</wp:post_date>
		<wp:post_date_gmt>2013-09-04 22:32:12</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>simplification-crm-dusage</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>967</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/Simplification-CRM-dusage.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/Simplification-CRM-dusage.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:400;s:6:"height";i:300;s:4:"file";s:37:"2013/09/Simplification-CRM-dusage.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:37:"Simplification-CRM-dusage-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:37:"Simplification-CRM-dusage-300x225.jpg";s:5:"width";i:300;s:6:"height";i:225;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:37:"Simplification-CRM-dusage-400x198.jpg";s:5:"width";i:400;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:37:"Simplification-CRM-dusage-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Simplification CRM d'usage]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>telemedecine</title>
		<link>http://www.it-news.fr/la-telemedecine/telemedecine/</link>
		<pubDate>Mon, 09 Sep 2013 08:16:28 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/telemedecine.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>981</wp:post_id>
		<wp:post_date>2013-09-09 09:16:28</wp:post_date>
		<wp:post_date_gmt>2013-09-09 08:16:28</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>telemedecine</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>980</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/telemedecine.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/telemedecine.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:380;s:6:"height";i:337;s:4:"file";s:24:"2013/09/telemedecine.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:24:"telemedecine-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:24:"telemedecine-300x266.jpg";s:5:"width";i:300;s:6:"height";i:266;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:24:"telemedecine-380x198.jpg";s:5:"width";i:380;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:24:"telemedecine-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[telemedecine]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>La télémédecine</title>
		<link>http://www.it-news.fr/la-telemedecine/la-telemedecine/</link>
		<pubDate>Mon, 09 Sep 2013 09:12:30 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/La-télémédecine.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>982</wp:post_id>
		<wp:post_date>2013-09-09 10:12:30</wp:post_date>
		<wp:post_date_gmt>2013-09-09 09:12:30</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>la-telemedecine</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>980</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/La-télémédecine.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/La-télémédecine.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1680;s:6:"height";i:1260;s:4:"file";s:30:"2013/09/La-télémédecine.jpg";s:5:"sizes";a:5:{s:9:"thumbnail";a:4:{s:4:"file";s:30:"La-télémédecine-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:30:"La-télémédecine-300x225.jpg";s:5:"width";i:300;s:6:"height";i:225;s:9:"mime-type";s:10:"image/jpeg";}s:5:"large";a:4:{s:4:"file";s:31:"La-télémédecine-1024x768.jpg";s:5:"width";i:1024;s:6:"height";i:768;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:30:"La-télémédecine-940x198.jpg";s:5:"width";i:940;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:30:"La-télémédecine-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";d:3.2000000000000002;s:6:"credit";s:0:"";s:6:"camera";s:8:"DMC-FZ38";s:7:"caption";s:0:"";s:17:"created_timestamp";i:1336064320;s:9:"copyright";s:0:"";s:12:"focal_length";s:3:"8.5";s:3:"iso";s:3:"400";s:13:"shutter_speed";s:17:"0.033333333333333";s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[La télémédecine]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>tablettes-tactiles</title>
		<link>http://www.it-news.fr/les-tablettes-tactiles-pc-portables/tablettes-tactiles/</link>
		<pubDate>Tue, 10 Sep 2013 14:21:47 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/tablettes-tactiles.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1001</wp:post_id>
		<wp:post_date>2013-09-10 15:21:47</wp:post_date>
		<wp:post_date_gmt>2013-09-10 14:21:47</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>tablettes-tactiles</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1000</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/tablettes-tactiles.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/tablettes-tactiles.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:450;s:6:"height";i:338;s:4:"file";s:30:"2013/09/tablettes-tactiles.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:30:"tablettes-tactiles-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:30:"tablettes-tactiles-300x225.jpg";s:5:"width";i:300;s:6:"height";i:225;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:30:"tablettes-tactiles-450x198.jpg";s:5:"width";i:450;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:30:"tablettes-tactiles-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[tablettes-tactiles]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>tablettes-tactiles-Asus</title>
		<link>http://www.it-news.fr/les-tablettes-tactiles-pc-portables/tablettes-tactiles-asus/</link>
		<pubDate>Tue, 10 Sep 2013 14:42:49 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/tablettes-tactiles-Asus.jpeg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1002</wp:post_id>
		<wp:post_date>2013-09-10 15:42:49</wp:post_date>
		<wp:post_date_gmt>2013-09-10 14:42:49</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>tablettes-tactiles-asus</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1000</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/tablettes-tactiles-Asus.jpeg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/tablettes-tactiles-Asus.jpeg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:600;s:6:"height";i:316;s:4:"file";s:36:"2013/09/tablettes-tactiles-Asus.jpeg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:36:"tablettes-tactiles-Asus-150x150.jpeg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:36:"tablettes-tactiles-Asus-300x158.jpeg";s:5:"width";i:300;s:6:"height";i:158;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:36:"tablettes-tactiles-Asus-600x198.jpeg";s:5:"width";i:600;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:36:"tablettes-tactiles-Asus-150x150.jpeg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[tablettes-tactiles-Asus]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Tablettes tactiles vs ordinateurs portables</title>
		<link>http://www.it-news.fr/les-tablettes-tactiles-pc-portables/tablettes-tactiles-vs-ordinateurs-portables/</link>
		<pubDate>Tue, 10 Sep 2013 15:13:11 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/Tablettes-tactiles-vs-ordinateurs-portables.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1004</wp:post_id>
		<wp:post_date>2013-09-10 16:13:11</wp:post_date>
		<wp:post_date_gmt>2013-09-10 15:13:11</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>tablettes-tactiles-vs-ordinateurs-portables</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1000</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/Tablettes-tactiles-vs-ordinateurs-portables.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/Tablettes-tactiles-vs-ordinateurs-portables.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:590;s:6:"height";i:420;s:4:"file";s:55:"2013/09/Tablettes-tactiles-vs-ordinateurs-portables.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:55:"Tablettes-tactiles-vs-ordinateurs-portables-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:55:"Tablettes-tactiles-vs-ordinateurs-portables-300x213.jpg";s:5:"width";i:300;s:6:"height";i:213;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:55:"Tablettes-tactiles-vs-ordinateurs-portables-590x198.jpg";s:5:"width";i:590;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:55:"Tablettes-tactiles-vs-ordinateurs-portables-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Tablettes tactiles vs ordinateurs portables]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Vol de données</title>
		<link>http://www.it-news.fr/le-prejudice-moyen-vol-de-donnees/vol-de-donnees/</link>
		<pubDate>Wed, 11 Sep 2013 15:23:43 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/Vol-de-données.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1007</wp:post_id>
		<wp:post_date>2013-09-11 16:23:43</wp:post_date>
		<wp:post_date_gmt>2013-09-11 15:23:43</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>vol-de-donnees</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1006</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/Vol-de-données.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/Vol-de-données.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:110;s:4:"file";s:27:"2013/09/Vol-de-données.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Vol de données]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Vol de données</title>
		<link>http://www.it-news.fr/le-prejudice-moyen-vol-de-donnees/vol-de-donnees-2/</link>
		<pubDate>Thu, 12 Sep 2013 12:03:54 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/Vol-de-données1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1013</wp:post_id>
		<wp:post_date>2013-09-12 13:03:54</wp:post_date>
		<wp:post_date_gmt>2013-09-12 12:03:54</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>vol-de-donnees-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1006</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/Vol-de-données1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/Vol-de-données1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:400;s:6:"height";i:267;s:4:"file";s:28:"2013/09/Vol-de-données1.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:28:"Vol-de-données1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:28:"Vol-de-données1-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:28:"Vol-de-données1-400x198.jpg";s:5:"width";i:400;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:28:"Vol-de-données1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:9:"Saniphoto";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:1241880988;s:9:"copyright";s:14:"Saniphoto 2010";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Vol de données]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Objets internet</title>
		<link>http://www.it-news.fr/objets-internet-et-inquietudes/objets-internet/</link>
		<pubDate>Fri, 13 Sep 2013 13:06:05 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/Objets-internet.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1018</wp:post_id>
		<wp:post_date>2013-09-13 14:06:05</wp:post_date>
		<wp:post_date_gmt>2013-09-13 13:06:05</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>objets-internet</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1016</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/Objets-internet.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/Objets-internet.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:160;s:6:"height";i:120;s:4:"file";s:27:"2013/09/Objets-internet.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:27:"Objets-internet-150x120.jpg";s:5:"width";i:150;s:6:"height";i:120;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:27:"Objets-internet-150x120.jpg";s:5:"width";i:150;s:6:"height";i:120;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Objets internet]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Les objets internet</title>
		<link>http://www.it-news.fr/objets-internet-et-inquietudes/les-objets-internet/</link>
		<pubDate>Fri, 13 Sep 2013 14:02:01 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/Les-objets-internet.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1021</wp:post_id>
		<wp:post_date>2013-09-13 15:02:01</wp:post_date>
		<wp:post_date_gmt>2013-09-13 14:02:01</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>les-objets-internet</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1016</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/Les-objets-internet.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/Les-objets-internet.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:600;s:6:"height";i:333;s:4:"file";s:31:"2013/09/Les-objets-internet.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:31:"Les-objets-internet-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:31:"Les-objets-internet-300x166.jpg";s:5:"width";i:300;s:6:"height";i:166;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:31:"Les-objets-internet-600x198.jpg";s:5:"width";i:600;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:31:"Les-objets-internet-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Les objets internet]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>licenciement facebook</title>
		<link>http://www.it-news.fr/licenciement-facebook-nouveau-cas/facebook/</link>
		<pubDate>Mon, 16 Sep 2013 13:44:38 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/facebook.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1025</wp:post_id>
		<wp:post_date>2013-09-16 14:44:38</wp:post_date>
		<wp:post_date_gmt>2013-09-16 13:44:38</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>facebook</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1024</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/facebook.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/facebook.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:150;s:6:"height";i:150;s:4:"file";s:20:"2013/09/facebook.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[licenciement facebook]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Licenciement Facebook</title>
		<link>http://www.it-news.fr/licenciement-facebook-nouveau-cas/licenciement-facebook/</link>
		<pubDate>Mon, 16 Sep 2013 14:32:29 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/Licenciement-Facebook.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1026</wp:post_id>
		<wp:post_date>2013-09-16 15:32:29</wp:post_date>
		<wp:post_date_gmt>2013-09-16 14:32:29</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>licenciement-facebook</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1024</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/Licenciement-Facebook.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/Licenciement-Facebook.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:605;s:6:"height";i:270;s:4:"file";s:33:"2013/09/Licenciement-Facebook.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:33:"Licenciement-Facebook-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:33:"Licenciement-Facebook-300x133.jpg";s:5:"width";i:300;s:6:"height";i:133;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:33:"Licenciement-Facebook-605x198.jpg";s:5:"width";i:605;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:33:"Licenciement-Facebook-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Licenciement Facebook]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>BYOD et sécurité</title>
		<link>http://www.it-news.fr/byod-et-securite/byod-147x150/</link>
		<pubDate>Tue, 17 Sep 2013 15:20:07 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/byod-147x150.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1031</wp:post_id>
		<wp:post_date>2013-09-17 16:20:07</wp:post_date>
		<wp:post_date_gmt>2013-09-17 15:20:07</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>byod-147x150</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1030</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/byod-147x150.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/byod-147x150.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:147;s:6:"height";i:150;s:4:"file";s:24:"2013/09/byod-147x150.png";s:5:"sizes";a:0:{}s:10:"image_meta";a:11:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";s:11:"orientation";i:0;}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[BYOD et sécurité]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>BYOD et sécurité MDM</title>
		<link>http://www.it-news.fr/byod-et-securite/byod-et-securite-mdm/</link>
		<pubDate>Tue, 17 Sep 2013 15:38:31 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/BYOD-et-sécurité-MDM.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1033</wp:post_id>
		<wp:post_date>2013-09-17 16:38:31</wp:post_date>
		<wp:post_date_gmt>2013-09-17 15:38:31</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>byod-et-securite-mdm</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1030</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/BYOD-et-sécurité-MDM.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/BYOD-et-sécurité-MDM.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1000;s:6:"height";i:667;s:4:"file";s:34:"2013/09/BYOD-et-sécurité-MDM.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:34:"BYOD-et-sécurité-MDM-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:34:"BYOD-et-sécurité-MDM-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:34:"BYOD-et-sécurité-MDM-940x198.jpg";s:5:"width";i:940;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:34:"BYOD-et-sécurité-MDM-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[BYOD et sécurité MDM]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>BYOD et sécurité</title>
		<link>http://www.it-news.fr/byod-et-securite/infographie-citrix-mobilite/</link>
		<pubDate>Tue, 17 Sep 2013 16:02:32 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/infographie-citrix-mobilite.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1034</wp:post_id>
		<wp:post_date>2013-09-17 17:02:32</wp:post_date>
		<wp:post_date_gmt>2013-09-17 16:02:32</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>infographie-citrix-mobilite</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1030</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/infographie-citrix-mobilite.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/infographie-citrix-mobilite.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1179;s:6:"height";i:5960;s:4:"file";s:39:"2013/09/infographie-citrix-mobilite.jpg";s:5:"sizes";a:5:{s:9:"thumbnail";a:4:{s:4:"file";s:39:"infographie-citrix-mobilite-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:38:"infographie-citrix-mobilite-59x300.jpg";s:5:"width";i:59;s:6:"height";i:300;s:9:"mime-type";s:10:"image/jpeg";}s:5:"large";a:4:{s:4:"file";s:40:"infographie-citrix-mobilite-202x1024.jpg";s:5:"width";i:202;s:6:"height";i:1024;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:39:"infographie-citrix-mobilite-940x198.jpg";s:5:"width";i:940;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:39:"infographie-citrix-mobilite-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[BYOD et sécurité]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Simplifier son entreprise</title>
		<link>http://www.it-news.fr/simplifier-son-entreprise/simplifier-son-entreprise/</link>
		<pubDate>Wed, 18 Sep 2013 13:16:48 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/Simplifier-son-entreprise.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1038</wp:post_id>
		<wp:post_date>2013-09-18 14:16:48</wp:post_date>
		<wp:post_date_gmt>2013-09-18 13:16:48</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>simplifier-son-entreprise</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1037</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/Simplifier-son-entreprise.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/Simplifier-son-entreprise.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:160;s:6:"height";i:155;s:4:"file";s:37:"2013/09/Simplifier-son-entreprise.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:5:{s:4:"file";s:37:"Simplifier-son-entreprise-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.2% (533&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:37:"Simplifier-son-entreprise-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 9.2% (937&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Simplifier son entreprise]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Simplifier son entreprise avec la facture électronique</title>
		<link>http://www.it-news.fr/simplifier-son-entreprise/simplifier-son-entreprise-avec-la-facture-electronique/</link>
		<pubDate>Wed, 18 Sep 2013 13:59:04 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/Simplifier-son-entreprise-avec-la-facture-électronique.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1040</wp:post_id>
		<wp:post_date>2013-09-18 14:59:04</wp:post_date>
		<wp:post_date_gmt>2013-09-18 13:59:04</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>simplifier-son-entreprise-avec-la-facture-electronique</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1037</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/Simplifier-son-entreprise-avec-la-facture-électronique.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/Simplifier-son-entreprise-avec-la-facture-électronique.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:400;s:6:"height";i:400;s:4:"file";s:67:"2013/09/Simplifier-son-entreprise-avec-la-facture-électronique.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:67:"Simplifier-son-entreprise-avec-la-facture-électronique-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:67:"Simplifier-son-entreprise-avec-la-facture-électronique-300x300.jpg";s:5:"width";i:300;s:6:"height";i:300;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:67:"Simplifier-son-entreprise-avec-la-facture-électronique-400x198.jpg";s:5:"width";i:400;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:67:"Simplifier-son-entreprise-avec-la-facture-électronique-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Simplifier son entreprise avec la facture électronique]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Les plus gros piratages</title>
		<link>http://www.it-news.fr/les-plus-gros-piratages-en-2013/les-plus-gros-piratages/</link>
		<pubDate>Thu, 19 Sep 2013 13:29:44 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/Les-plus-gros-piratages.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1044</wp:post_id>
		<wp:post_date>2013-09-19 14:29:44</wp:post_date>
		<wp:post_date_gmt>2013-09-19 13:29:44</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>les-plus-gros-piratages</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1043</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/Les-plus-gros-piratages.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/Les-plus-gros-piratages.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:600;s:6:"height";i:482;s:4:"file";s:35:"2013/09/Les-plus-gros-piratages.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:35:"Les-plus-gros-piratages-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:35:"Les-plus-gros-piratages-300x241.jpg";s:5:"width";i:300;s:6:"height";i:241;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:35:"Les-plus-gros-piratages-600x198.jpg";s:5:"width";i:600;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:35:"Les-plus-gros-piratages-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Les plus gros piratages]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>inscription</title>
		<link>http://www.it-news.fr/?attachment_id=1051</link>
		<pubDate>Thu, 19 Sep 2013 14:08:24 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/inscription.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1051</wp:post_id>
		<wp:post_date>2013-09-19 15:08:24</wp:post_date>
		<wp:post_date_gmt>2013-09-19 14:08:24</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>inscription</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/inscription.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/inscription.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:192;s:6:"height";i:167;s:4:"file";s:23:"2013/09/inscription.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:23:"inscription-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:23:"inscription-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>les plus gros piratages distributeurs</title>
		<link>http://www.it-news.fr/les-plus-gros-piratages-en-2013/les-plus-gros-piratages-distributeurs/</link>
		<pubDate>Thu, 19 Sep 2013 14:18:56 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/les-plus-gros-piratages-distributeurs.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1052</wp:post_id>
		<wp:post_date>2013-09-19 15:18:56</wp:post_date>
		<wp:post_date_gmt>2013-09-19 14:18:56</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>les-plus-gros-piratages-distributeurs</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1043</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/les-plus-gros-piratages-distributeurs.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/les-plus-gros-piratages-distributeurs.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:512;s:6:"height";i:341;s:4:"file";s:49:"2013/09/les-plus-gros-piratages-distributeurs.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:49:"les-plus-gros-piratages-distributeurs-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:49:"les-plus-gros-piratages-distributeurs-300x199.jpg";s:5:"width";i:300;s:6:"height";i:199;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:49:"les-plus-gros-piratages-distributeurs-512x198.jpg";s:5:"width";i:512;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:49:"les-plus-gros-piratages-distributeurs-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[les plus gros piratages distributeurs]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Banniere-mobotix</title>
		<link>http://www.it-news.fr/?attachment_id=1054</link>
		<pubDate>Thu, 19 Sep 2013 14:31:05 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/Banniere-mobotix.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1054</wp:post_id>
		<wp:post_date>2013-09-19 15:31:05</wp:post_date>
		<wp:post_date_gmt>2013-09-19 14:31:05</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>banniere-mobotix</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/Banniere-mobotix.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/Banniere-mobotix.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:192;s:6:"height";i:861;s:4:"file";s:28:"2013/09/Banniere-mobotix.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:28:"Banniere-mobotix-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:27:"Banniere-mobotix-66x300.jpg";s:5:"width";i:66;s:6:"height";i:300;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:28:"Banniere-mobotix-192x198.jpg";s:5:"width";i:192;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:28:"Banniere-mobotix-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_redirect</wp:meta_key>
			<wp:meta_value><![CDATA[http://www.mobotix.com/fre_FR/]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Plus gros piratages système informatique</title>
		<link>http://www.it-news.fr/les-plus-gros-piratages-en-2013/plus-gros-piratages-systeme-informatique/</link>
		<pubDate>Thu, 19 Sep 2013 15:32:12 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/Plus-gros-piratages-système-informatique.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1055</wp:post_id>
		<wp:post_date>2013-09-19 16:32:12</wp:post_date>
		<wp:post_date_gmt>2013-09-19 15:32:12</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>plus-gros-piratages-systeme-informatique</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1043</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/Plus-gros-piratages-système-informatique.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/Plus-gros-piratages-système-informatique.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:357;s:6:"height";i:237;s:4:"file";s:53:"2013/09/Plus-gros-piratages-système-informatique.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:53:"Plus-gros-piratages-système-informatique-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:53:"Plus-gros-piratages-système-informatique-300x199.jpg";s:5:"width";i:300;s:6:"height";i:199;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:53:"Plus-gros-piratages-système-informatique-357x198.jpg";s:5:"width";i:357;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:53:"Plus-gros-piratages-système-informatique-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Plus gros piratages système informatique]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Le numérique en France</title>
		<link>http://www.it-news.fr/le-numerique-en-france-2/at-national-france/</link>
		<pubDate>Fri, 20 Sep 2013 14:52:19 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/Le-numérique-en-France.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1061</wp:post_id>
		<wp:post_date>2013-09-20 15:52:19</wp:post_date>
		<wp:post_date_gmt>2013-09-20 14:52:19</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>at-national-france</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1059</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/Le-numérique-en-France.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/Le-numérique-en-France.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:150;s:6:"height";i:150;s:4:"file";s:35:"2013/09/Le-numérique-en-France.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:16:"PixBox - Fotolia";s:6:"camera";s:0:"";s:7:"caption";s:73:"silver shiny chrome @-symbol on white background with France flag texture";s:17:"created_timestamp";i:1247168105;s:9:"copyright";s:16:"PixBox - Fotolia";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:20:"AT National - France";}s:10:"wp_smushit";s:28:"Reduced by 4.4% (711&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Le numérique en France]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Danger Windows XP</title>
		<link>http://www.it-news.fr/danger-windows-xp/danger-windows-xp/</link>
		<pubDate>Mon, 23 Sep 2013 08:45:03 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/Danger-Windows-XP.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1067</wp:post_id>
		<wp:post_date>2013-09-23 09:45:03</wp:post_date>
		<wp:post_date_gmt>2013-09-23 08:45:03</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>danger-windows-xp</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1066</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/Danger-Windows-XP.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/Danger-Windows-XP.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:150;s:6:"height";i:112;s:4:"file";s:29:"2013/09/Danger-Windows-XP.png";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 21.8% (9.4&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Danger Windows XP]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Danger windows xp 2014</title>
		<link>http://www.it-news.fr/danger-windows-xp/danger-windows-xp-2014/</link>
		<pubDate>Mon, 23 Sep 2013 09:16:08 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/Danger-windows-xp-2014.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1071</wp:post_id>
		<wp:post_date>2013-09-23 10:16:08</wp:post_date>
		<wp:post_date_gmt>2013-09-23 09:16:08</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>danger-windows-xp-2014</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1066</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/Danger-windows-xp-2014.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/Danger-windows-xp-2014.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1024;s:6:"height";i:768;s:4:"file";s:34:"2013/09/Danger-windows-xp-2014.jpg";s:5:"sizes";a:5:{s:9:"thumbnail";a:4:{s:4:"file";s:34:"Danger-windows-xp-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:34:"Danger-windows-xp-2014-300x225.jpg";s:5:"width";i:300;s:6:"height";i:225;s:9:"mime-type";s:10:"image/jpeg";}s:22:"wysija-newsletters-max";a:4:{s:4:"file";s:34:"Danger-windows-xp-2014-600x450.jpg";s:5:"width";i:600;s:6:"height";i:450;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:34:"Danger-windows-xp-2014-940x198.jpg";s:5:"width";i:940;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:34:"Danger-windows-xp-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Danger windows xp 2014]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Déploiement ERP</title>
		<link>http://www.it-news.fr/?attachment_id=1075</link>
		<pubDate>Wed, 25 Sep 2013 14:15:54 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/Déploiement-ERP.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1075</wp:post_id>
		<wp:post_date>2013-09-25 15:15:54</wp:post_date>
		<wp:post_date_gmt>2013-09-25 14:15:54</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>deploiement-erp</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/Déploiement-ERP.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/Déploiement-ERP.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:204;s:6:"height";i:168;s:4:"file";s:28:"2013/09/Déploiement-ERP.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:5:{s:4:"file";s:28:"Déploiement-ERP-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.6% (306&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:28:"Déploiement-ERP-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 8.2% (711&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Déploiement ERP]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Déploiement ERP (2)</title>
		<link>http://www.it-news.fr/deploiement-erp-quels-risques/deploiement-erp-2/</link>
		<pubDate>Wed, 25 Sep 2013 18:52:54 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/Déploiement-ERP-2.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1084</wp:post_id>
		<wp:post_date>2013-09-25 19:52:54</wp:post_date>
		<wp:post_date_gmt>2013-09-25 18:52:54</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>deploiement-erp-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1076</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/Déploiement-ERP-2.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/Déploiement-ERP-2.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:1000;s:6:"height";i:592;s:4:"file";s:30:"2013/09/Déploiement-ERP-2.jpg";s:5:"sizes";a:5:{s:9:"thumbnail";a:4:{s:4:"file";s:30:"Déploiement-ERP-2-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:30:"Déploiement-ERP-2-300x177.jpg";s:5:"width";i:300;s:6:"height";i:177;s:9:"mime-type";s:10:"image/jpeg";}s:22:"wysija-newsletters-max";a:4:{s:4:"file";s:30:"Déploiement-ERP-2-600x355.jpg";s:5:"width";i:600;s:6:"height";i:355;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:30:"Déploiement-ERP-2-940x198.jpg";s:5:"width";i:940;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:30:"Déploiement-ERP-2-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Déploiement ERP (2)]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>ERP planification</title>
		<link>http://www.it-news.fr/deploiement-erp-quels-risques/erp-planification/</link>
		<pubDate>Wed, 25 Sep 2013 18:54:24 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/ERP-planification.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1086</wp:post_id>
		<wp:post_date>2013-09-25 19:54:24</wp:post_date>
		<wp:post_date_gmt>2013-09-25 18:54:24</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>erp-planification</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1076</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/ERP-planification.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/ERP-planification.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:609;s:6:"height";i:373;s:4:"file";s:29:"2013/09/ERP-planification.jpg";s:5:"sizes";a:5:{s:9:"thumbnail";a:4:{s:4:"file";s:29:"ERP-planification-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:29:"ERP-planification-300x183.jpg";s:5:"width";i:300;s:6:"height";i:183;s:9:"mime-type";s:10:"image/jpeg";}s:22:"wysija-newsletters-max";a:4:{s:4:"file";s:29:"ERP-planification-600x367.jpg";s:5:"width";i:600;s:6:"height";i:367;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:29:"ERP-planification-609x198.jpg";s:5:"width";i:609;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:29:"ERP-planification-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[ERP planification]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Article_Microsoft sans Bill Gates_08102013</title>
		<link>http://www.it-news.fr/microsoft-bill-gates/article_microsoft-sans-bill-gates_08102013/</link>
		<pubDate>Wed, 09 Oct 2013 12:30:49 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/Article_Microsoft-sans-Bill-Gates_08102013.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1100</wp:post_id>
		<wp:post_date>2013-10-09 13:30:49</wp:post_date>
		<wp:post_date_gmt>2013-10-09 12:30:49</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>article_microsoft-sans-bill-gates_08102013</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1099</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/Article_Microsoft-sans-Bill-Gates_08102013.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/Article_Microsoft-sans-Bill-Gates_08102013.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:290;s:6:"height";i:174;s:4:"file";s:54:"2013/10/Article_Microsoft-sans-Bill-Gates_08102013.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:5:{s:4:"file";s:54:"Article_Microsoft-sans-Bill-Gates_08102013-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.7% (534&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:54:"Article_Microsoft-sans-Bill-Gates_08102013-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Conservation-des-donnees</title>
		<link>http://www.it-news.fr/conservation-donnees-surtout-comment/conservation-des-donnees/</link>
		<pubDate>Wed, 09 Oct 2013 15:15:27 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/Conservation-des-données.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1109</wp:post_id>
		<wp:post_date>2013-10-09 16:15:27</wp:post_date>
		<wp:post_date_gmt>2013-10-09 15:15:27</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>conservation-des-donnees</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1108</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/Conservation-des-données.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/Conservation-des-données.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:268;s:6:"height";i:166;s:4:"file";s:37:"2013/10/Conservation-des-données.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:5:{s:4:"file";s:37:"Conservation-des-données-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.7% (254&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:37:"Conservation-des-données-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>cybercriminel</title>
		<link>http://www.it-news.fr/lorsque-cloud-fait-peur-aux-entreprises/cybercriminel/</link>
		<pubDate>Mon, 14 Oct 2013 15:01:49 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/cybercriminel.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1128</wp:post_id>
		<wp:post_date>2013-10-14 16:01:49</wp:post_date>
		<wp:post_date_gmt>2013-10-14 15:01:49</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cybercriminel</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1127</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/cybercriminel.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/cybercriminel.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:271;s:6:"height";i:186;s:4:"file";s:25:"2013/10/cybercriminel.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:25:"cybercriminel-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:25:"cybercriminel-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Cloud</title>
		<link>http://www.it-news.fr/lorsque-cloud-fait-peur-aux-entreprises/cloud/</link>
		<pubDate>Mon, 14 Oct 2013 15:01:51 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/Cloud.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1129</wp:post_id>
		<wp:post_date>2013-10-14 16:01:51</wp:post_date>
		<wp:post_date_gmt>2013-10-14 15:01:51</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cloud</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1127</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/Cloud.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/Cloud.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:225;s:6:"height";i:225;s:4:"file";s:17:"2013/10/Cloud.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:17:"Cloud-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:17:"Cloud-225x198.jpg";s:5:"width";i:225;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:17:"Cloud-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:comment>
			<wp:comment_id>1380</wp:comment_id>
			<wp:comment_author><![CDATA[Ray Ban Aviator]]></wp:comment_author>
			<wp:comment_author_email></wp:comment_author_email>
			<wp:comment_author_url>http://www.allevatoridoc.it/casafey/rayban.asp</wp:comment_author_url>
			<wp:comment_author_IP>120.71.7.43</wp:comment_author_IP>
			<wp:comment_date>2014-11-16 04:47:46</wp:comment_date>
			<wp:comment_date_gmt>2014-11-16 03:47:46</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[<strong>Ray Ban Aviator</strong>

mots cles :vente priv茅e vanessa bruno 2010 - vanessa bruno outlet - ventes priv茅es vanessa bruno - outlet vanessa bruno - vente presse vanessa bruno 2010 - vanessa]]></wp:comment_content>
			<wp:comment_approved>trash</wp:comment_approved>
			<wp:comment_type>trackback</wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
			<wp:commentmeta>
				<wp:meta_key>_wp_trash_meta_status</wp:meta_key>
				<wp:meta_value><![CDATA[0]]></wp:meta_value>
			</wp:commentmeta>
			<wp:commentmeta>
				<wp:meta_key>_wp_trash_meta_time</wp:meta_key>
				<wp:meta_value><![CDATA[1423842780]]></wp:meta_value>
			</wp:commentmeta>
		</wp:comment>
	</item>
	<item>
		<title>Lorsque-le-cloud-fait-peur-aux-entreprises-bis</title>
		<link>http://www.it-news.fr/lorsque-cloud-fait-peur-aux-entreprises/lorsque-le-cloud-fait-peur-aux-entreprises-bis/</link>
		<pubDate>Mon, 14 Oct 2013 15:36:40 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/Lorsque-le-cloud-fait-peur-aux-entreprises-bis.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1151</wp:post_id>
		<wp:post_date>2013-10-14 16:36:40</wp:post_date>
		<wp:post_date_gmt>2013-10-14 15:36:40</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>lorsque-le-cloud-fait-peur-aux-entreprises-bis</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1127</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/Lorsque-le-cloud-fait-peur-aux-entreprises-bis.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/Lorsque-le-cloud-fait-peur-aux-entreprises-bis.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:230;s:6:"height";i:219;s:4:"file";s:58:"2013/10/Lorsque-le-cloud-fait-peur-aux-entreprises-bis.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:58:"Lorsque-le-cloud-fait-peur-aux-entreprises-bis-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:58:"Lorsque-le-cloud-fait-peur-aux-entreprises-bis-230x198.jpg";s:5:"width";i:230;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:58:"Lorsque-le-cloud-fait-peur-aux-entreprises-bis-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Lorsque-le-cloud-fait-peur-aux-entreprises</title>
		<link>http://www.it-news.fr/lorsque-cloud-fait-peur-aux-entreprises/lorsque-le-cloud-fait-peur-aux-entreprises/</link>
		<pubDate>Mon, 14 Oct 2013 15:36:41 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/Lorsque-le-cloud-fait-peur-aux-entreprises.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1152</wp:post_id>
		<wp:post_date>2013-10-14 16:36:41</wp:post_date>
		<wp:post_date_gmt>2013-10-14 15:36:41</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>lorsque-le-cloud-fait-peur-aux-entreprises</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1127</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/Lorsque-le-cloud-fait-peur-aux-entreprises.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/Lorsque-le-cloud-fait-peur-aux-entreprises.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:271;s:6:"height";i:186;s:4:"file";s:54:"2013/10/Lorsque-le-cloud-fait-peur-aux-entreprises.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:54:"Lorsque-le-cloud-fait-peur-aux-entreprises-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:54:"Lorsque-le-cloud-fait-peur-aux-entreprises-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Lorsque-le-cloud-fait-peur-aux-entreprises-bis</title>
		<link>http://www.it-news.fr/lorsque-cloud-fait-peur-aux-entreprises/lorsque-le-cloud-fait-peur-aux-entreprises-bis-2/</link>
		<pubDate>Mon, 14 Oct 2013 15:37:55 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/Lorsque-le-cloud-fait-peur-aux-entreprises-bis1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1153</wp:post_id>
		<wp:post_date>2013-10-14 16:37:55</wp:post_date>
		<wp:post_date_gmt>2013-10-14 15:37:55</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>lorsque-le-cloud-fait-peur-aux-entreprises-bis-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1127</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/Lorsque-le-cloud-fait-peur-aux-entreprises-bis1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/Lorsque-le-cloud-fait-peur-aux-entreprises-bis1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:225;s:6:"height";i:225;s:4:"file";s:59:"2013/10/Lorsque-le-cloud-fait-peur-aux-entreprises-bis1.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:59:"Lorsque-le-cloud-fait-peur-aux-entreprises-bis1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:59:"Lorsque-le-cloud-fait-peur-aux-entreprises-bis1-225x198.jpg";s:5:"width";i:225;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:59:"Lorsque-le-cloud-fait-peur-aux-entreprises-bis1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>attendre-cest-mettre-en-danger-son-entreprise</title>
		<link>http://www.it-news.fr/lorsque-migration-sepa-devient-urgence/attendre-cest-mettre-en-danger-son-entreprise/</link>
		<pubDate>Tue, 15 Oct 2013 08:08:45 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/attendre-cest-mettre-en-danger-son-entreprise.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1158</wp:post_id>
		<wp:post_date>2013-10-15 09:08:45</wp:post_date>
		<wp:post_date_gmt>2013-10-15 08:08:45</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>attendre-cest-mettre-en-danger-son-entreprise</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1156</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/attendre-cest-mettre-en-danger-son-entreprise.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/attendre-cest-mettre-en-danger-son-entreprise.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:368;s:6:"height";i:137;s:4:"file";s:57:"2013/10/attendre-cest-mettre-en-danger-son-entreprise.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:57:"attendre-cest-mettre-en-danger-son-entreprise-150x137.jpg";s:5:"width";i:150;s:6:"height";i:137;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:57:"attendre-cest-mettre-en-danger-son-entreprise-300x111.jpg";s:5:"width";i:300;s:6:"height";i:111;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:57:"attendre-cest-mettre-en-danger-son-entreprise-150x137.jpg";s:5:"width";i:150;s:6:"height";i:137;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>lorsque-la-migration-sepa-devient-une-urgence-2</title>
		<link>http://www.it-news.fr/lorsque-migration-sepa-devient-urgence/lorsque-la-migration-sepa-devient-une-urgence-2/</link>
		<pubDate>Tue, 15 Oct 2013 08:08:46 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/lorsque-la-migration-sepa-devient-une-urgence-2.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1159</wp:post_id>
		<wp:post_date>2013-10-15 09:08:46</wp:post_date>
		<wp:post_date_gmt>2013-10-15 08:08:46</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>lorsque-la-migration-sepa-devient-une-urgence-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1156</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/lorsque-la-migration-sepa-devient-une-urgence-2.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/lorsque-la-migration-sepa-devient-une-urgence-2.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:233;s:6:"height";i:138;s:4:"file";s:59:"2013/10/lorsque-la-migration-sepa-devient-une-urgence-2.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:59:"lorsque-la-migration-sepa-devient-une-urgence-2-150x138.jpg";s:5:"width";i:150;s:6:"height";i:138;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:59:"lorsque-la-migration-sepa-devient-une-urgence-2-150x138.jpg";s:5:"width";i:150;s:6:"height";i:138;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>lorsque-la-migration-sepa-devient-une-urgence-1</title>
		<link>http://www.it-news.fr/lorsque-migration-sepa-devient-urgence/lorsque-la-migration-sepa-devient-une-urgence-1/</link>
		<pubDate>Tue, 15 Oct 2013 08:08:48 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/lorsque-la-migration-sepa-devient-une-urgence-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1160</wp:post_id>
		<wp:post_date>2013-10-15 09:08:48</wp:post_date>
		<wp:post_date_gmt>2013-10-15 08:08:48</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>lorsque-la-migration-sepa-devient-une-urgence-1</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1156</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/lorsque-la-migration-sepa-devient-une-urgence-1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/lorsque-la-migration-sepa-devient-une-urgence-1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:305;s:6:"height";i:165;s:4:"file";s:59:"2013/10/lorsque-la-migration-sepa-devient-une-urgence-1.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:59:"lorsque-la-migration-sepa-devient-une-urgence-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:59:"lorsque-la-migration-sepa-devient-une-urgence-1-300x162.jpg";s:5:"width";i:300;s:6:"height";i:162;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:59:"lorsque-la-migration-sepa-devient-une-urgence-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>lorsque-la-migration-sepa-devient-une-urgence</title>
		<link>http://www.it-news.fr/lorsque-migration-sepa-devient-urgence/lorsque-la-migration-sepa-devient-une-urgence/</link>
		<pubDate>Tue, 15 Oct 2013 08:08:50 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/lorsque-la-migration-sepa-devient-une-urgence.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1161</wp:post_id>
		<wp:post_date>2013-10-15 09:08:50</wp:post_date>
		<wp:post_date_gmt>2013-10-15 08:08:50</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>lorsque-la-migration-sepa-devient-une-urgence</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1156</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/lorsque-la-migration-sepa-devient-une-urgence.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/lorsque-la-migration-sepa-devient-une-urgence.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:200;s:6:"height";i:200;s:4:"file";s:57:"2013/10/lorsque-la-migration-sepa-devient-une-urgence.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:57:"lorsque-la-migration-sepa-devient-une-urgence-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:57:"lorsque-la-migration-sepa-devient-une-urgence-200x198.jpg";s:5:"width";i:200;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:57:"lorsque-la-migration-sepa-devient-une-urgence-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>lorsque-la-migration-sepa-devient-une-urgence-</title>
		<link>http://www.it-news.fr/lorsque-migration-sepa-devient-urgence/lorsque-la-migration-sepa-devient-une-urgence-3/</link>
		<pubDate>Tue, 15 Oct 2013 08:09:58 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/lorsque-la-migration-sepa-devient-une-urgence-.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1162</wp:post_id>
		<wp:post_date>2013-10-15 09:09:58</wp:post_date>
		<wp:post_date_gmt>2013-10-15 08:09:58</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>lorsque-la-migration-sepa-devient-une-urgence-3</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1156</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/lorsque-la-migration-sepa-devient-une-urgence-.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/lorsque-la-migration-sepa-devient-une-urgence-.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:373;s:6:"height";i:135;s:4:"file";s:58:"2013/10/lorsque-la-migration-sepa-devient-une-urgence-.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:58:"lorsque-la-migration-sepa-devient-une-urgence--150x135.jpg";s:5:"width";i:150;s:6:"height";i:135;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 9.0% (788&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:58:"lorsque-la-migration-sepa-devient-une-urgence--300x108.jpg";s:5:"width";i:300;s:6:"height";i:108;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 10.2% (1.5&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:58:"lorsque-la-migration-sepa-devient-une-urgence--150x135.jpg";s:5:"width";i:150;s:6:"height";i:135;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:11:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";s:11:"orientation";i:0;}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>adobe-a-ete-cyberattaque</title>
		<link>http://www.it-news.fr/adobe-ete-cyberattaque/adobe-a-ete-cyberattaque/</link>
		<pubDate>Tue, 15 Oct 2013 14:11:23 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/adobe-a-ete-cyberattaque.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1173</wp:post_id>
		<wp:post_date>2013-10-15 15:11:23</wp:post_date>
		<wp:post_date_gmt>2013-10-15 14:11:23</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>adobe-a-ete-cyberattaque</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1172</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/adobe-a-ete-cyberattaque.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/adobe-a-ete-cyberattaque.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:225;s:6:"height";i:225;s:4:"file";s:36:"2013/10/adobe-a-ete-cyberattaque.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:36:"adobe-a-ete-cyberattaque-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:36:"adobe-a-ete-cyberattaque-225x198.jpg";s:5:"width";i:225;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:36:"adobe-a-ete-cyberattaque-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>lorsque-les-applications-deviennent-la-norme</title>
		<link>http://www.it-news.fr/lorsque-les-applications-deviennent-norme/lorsque-les-applications-deviennent-la-norme/</link>
		<pubDate>Tue, 15 Oct 2013 14:22:56 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/lorsque-les-applications-deviennent-la-norme.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1181</wp:post_id>
		<wp:post_date>2013-10-15 15:22:56</wp:post_date>
		<wp:post_date_gmt>2013-10-15 14:22:56</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>lorsque-les-applications-deviennent-la-norme</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1180</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/lorsque-les-applications-deviennent-la-norme.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/lorsque-les-applications-deviennent-la-norme.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:302;s:6:"height";i:167;s:4:"file";s:56:"2013/10/lorsque-les-applications-deviennent-la-norme.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:56:"lorsque-les-applications-deviennent-la-norme-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:56:"lorsque-les-applications-deviennent-la-norme-300x165.jpg";s:5:"width";i:300;s:6:"height";i:165;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:56:"lorsque-les-applications-deviennent-la-norme-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-3</title>
		<link>http://www.it-news.fr/?attachment_id=1187</link>
		<pubDate>Tue, 15 Oct 2013 14:33:03 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-3.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1187</wp:post_id>
		<wp:post_date>2013-10-15 15:33:03</wp:post_date>
		<wp:post_date_gmt>2013-10-15 14:33:03</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>quelques-conseils-pour-bien-choisir-son-fournisseur-de-services-cloud-3</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-3.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-3.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:657;s:6:"height";i:365;s:4:"file";s:83:"2013/10/Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-3.jpg";s:5:"sizes";a:5:{s:9:"thumbnail";a:4:{s:4:"file";s:83:"Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-3-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:83:"Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-3-300x166.jpg";s:5:"width";i:300;s:6:"height";i:166;s:9:"mime-type";s:10:"image/jpeg";}s:22:"wysija-newsletters-max";a:4:{s:4:"file";s:83:"Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-3-600x333.jpg";s:5:"width";i:600;s:6:"height";i:333;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:83:"Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-3-657x198.jpg";s:5:"width";i:657;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:83:"Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-3-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-2</title>
		<link>http://www.it-news.fr/?attachment_id=1188</link>
		<pubDate>Tue, 15 Oct 2013 14:33:04 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-2.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1188</wp:post_id>
		<wp:post_date>2013-10-15 15:33:04</wp:post_date>
		<wp:post_date_gmt>2013-10-15 14:33:04</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>quelques-conseils-pour-bien-choisir-son-fournisseur-de-services-cloud-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-2.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-2.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:652;s:6:"height";i:183;s:4:"file";s:83:"2013/10/Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-2.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:83:"Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-2-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:82:"Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-2-300x84.jpg";s:5:"width";i:300;s:6:"height";i:84;s:9:"mime-type";s:10:"image/jpeg";}s:22:"wysija-newsletters-max";a:4:{s:4:"file";s:83:"Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-2-600x168.jpg";s:5:"width";i:600;s:6:"height";i:168;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:83:"Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-2-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-1</title>
		<link>http://www.it-news.fr/?attachment_id=1189</link>
		<pubDate>Tue, 15 Oct 2013 14:33:06 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1189</wp:post_id>
		<wp:post_date>2013-10-15 15:33:06</wp:post_date>
		<wp:post_date_gmt>2013-10-15 14:33:06</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>quelques-conseils-pour-bien-choisir-son-fournisseur-de-services-cloud-1</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:652;s:6:"height";i:183;s:4:"file";s:83:"2013/10/Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-1.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:83:"Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:82:"Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-1-300x84.jpg";s:5:"width";i:300;s:6:"height";i:84;s:9:"mime-type";s:10:"image/jpeg";}s:22:"wysija-newsletters-max";a:4:{s:4:"file";s:83:"Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-1-600x168.jpg";s:5:"width";i:600;s:6:"height";i:168;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:83:"Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud</title>
		<link>http://www.it-news.fr/?attachment_id=1190</link>
		<pubDate>Tue, 15 Oct 2013 14:33:06 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1190</wp:post_id>
		<wp:post_date>2013-10-15 15:33:06</wp:post_date>
		<wp:post_date_gmt>2013-10-15 14:33:06</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>quelques-conseils-pour-bien-choisir-son-fournisseur-de-services-cloud</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:236;s:6:"height";i:214;s:4:"file";s:81:"2013/10/Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:81:"Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:81:"Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-236x198.jpg";s:5:"width";i:236;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:81:"Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_image_alt</wp:meta_key>
			<wp:meta_value><![CDATA[Quelques Conseils pour bien choisir son fournisseur de services Cloud]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>la-souverainee-du-cloud-une-problematique-importante</title>
		<link>http://www.it-news.fr/?attachment_id=1191</link>
		<pubDate>Tue, 15 Oct 2013 14:33:08 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/la-souverainee-du-cloud-une-problematique-importante.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1191</wp:post_id>
		<wp:post_date>2013-10-15 15:33:08</wp:post_date>
		<wp:post_date_gmt>2013-10-15 14:33:08</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>la-souverainee-du-cloud-une-problematique-importante</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/la-souverainee-du-cloud-une-problematique-importante.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/la-souverainee-du-cloud-une-problematique-importante.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:266;s:6:"height";i:189;s:4:"file";s:64:"2013/10/la-souverainee-du-cloud-une-problematique-importante.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:64:"la-souverainee-du-cloud-une-problematique-importante-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:64:"la-souverainee-du-cloud-une-problematique-importante-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-2</title>
		<link>http://www.it-news.fr/?attachment_id=1193</link>
		<pubDate>Tue, 15 Oct 2013 14:37:42 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-21.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1193</wp:post_id>
		<wp:post_date>2013-10-15 15:37:42</wp:post_date>
		<wp:post_date_gmt>2013-10-15 14:37:42</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>quelques-conseils-pour-bien-choisir-son-fournisseur-de-services-cloud-2-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-21.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-21.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:652;s:6:"height";i:86;s:4:"file";s:84:"2013/10/Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-21.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:83:"Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-21-150x86.jpg";s:5:"width";i:150;s:6:"height";i:86;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:83:"Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-21-300x39.jpg";s:5:"width";i:300;s:6:"height";i:39;s:9:"mime-type";s:10:"image/jpeg";}s:22:"wysija-newsletters-max";a:4:{s:4:"file";s:83:"Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-21-600x79.jpg";s:5:"width";i:600;s:6:"height";i:79;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:83:"Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-21-150x86.jpg";s:5:"width";i:150;s:6:"height";i:86;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-1</title>
		<link>http://www.it-news.fr/?attachment_id=1194</link>
		<pubDate>Tue, 15 Oct 2013 14:37:43 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-11.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1194</wp:post_id>
		<wp:post_date>2013-10-15 15:37:43</wp:post_date>
		<wp:post_date_gmt>2013-10-15 14:37:43</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>quelques-conseils-pour-bien-choisir-son-fournisseur-de-services-cloud-1-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-11.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-11.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:652;s:6:"height";i:89;s:4:"file";s:84:"2013/10/Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-11.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:83:"Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-11-150x89.jpg";s:5:"width";i:150;s:6:"height";i:89;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:83:"Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-11-300x40.jpg";s:5:"width";i:300;s:6:"height";i:40;s:9:"mime-type";s:10:"image/jpeg";}s:22:"wysija-newsletters-max";a:4:{s:4:"file";s:83:"Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-11-600x81.jpg";s:5:"width";i:600;s:6:"height";i:81;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:83:"Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-11-150x89.jpg";s:5:"width";i:150;s:6:"height";i:89;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>cloud-&amp;-it-expo</title>
		<link>http://www.it-news.fr/event/cloud-it-expo-2/cloud-it-expo-3/</link>
		<pubDate>Wed, 23 Oct 2013 07:32:16 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/cloud-it-expo.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1224</wp:post_id>
		<wp:post_date>2013-10-23 08:32:16</wp:post_date>
		<wp:post_date_gmt>2013-10-23 07:32:16</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cloud-it-expo-3</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1219</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/cloud-it-expo.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/cloud-it-expo.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:269;s:6:"height";i:183;s:4:"file";s:25:"2013/10/cloud-it-expo.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:25:"cloud-it-expo-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:25:"cloud-it-expo-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>cloud-and-it-expo</title>
		<link>http://www.it-news.fr/event/cloud-it-expo-2/cloud-and-it-expo/</link>
		<pubDate>Wed, 23 Oct 2013 07:34:14 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/cloud-and-it-expo.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1225</wp:post_id>
		<wp:post_date>2013-10-23 08:34:14</wp:post_date>
		<wp:post_date_gmt>2013-10-23 07:34:14</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cloud-and-it-expo</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1219</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/cloud-and-it-expo.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/cloud-and-it-expo.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:29:"2013/10/cloud-and-it-expo.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>it-tour</title>
		<link>http://www.it-news.fr/event/it-tour/it-tour-2/</link>
		<pubDate>Wed, 23 Oct 2013 08:49:45 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/it-tour.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1243</wp:post_id>
		<wp:post_date>2013-10-23 09:49:45</wp:post_date>
		<wp:post_date_gmt>2013-10-23 08:49:45</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>it-tour-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1240</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/it-tour.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/it-tour.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:98;s:4:"file";s:19:"2013/10/it-tour.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>supply-chain-event-2013</title>
		<link>http://www.it-news.fr/event/supply-chain-event/supply-chain-event-2013/</link>
		<pubDate>Wed, 23 Oct 2013 09:27:11 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/supply-chain-event-2013.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1251</wp:post_id>
		<wp:post_date>2013-10-23 10:27:11</wp:post_date>
		<wp:post_date_gmt>2013-10-23 09:27:11</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>supply-chain-event-2013</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1248</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/supply-chain-event-2013.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/supply-chain-event-2013.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:140;s:6:"height";i:99;s:4:"file";s:35:"2013/10/supply-chain-event-2013.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>RSA conférence Europe 2013</title>
		<link>http://www.it-news.fr/event/rsa-conference-europe-2013/rsa-conference-europe-2013-2/</link>
		<pubDate>Wed, 23 Oct 2013 09:54:23 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/rsa-conference-europe-2013.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1253</wp:post_id>
		<wp:post_date>2013-10-23 10:54:23</wp:post_date>
		<wp:post_date_gmt>2013-10-23 09:54:23</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>rsa-conference-europe-2013-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1245</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/rsa-conference-europe-2013.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/rsa-conference-europe-2013.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:174;s:6:"height";i:183;s:4:"file";s:38:"2013/10/rsa-conference-europe-2013.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:38:"rsa-conference-europe-2013-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:38:"rsa-conference-europe-2013-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>La-rebellion-de-la-generation-y</title>
		<link>http://www.it-news.fr/rebellion-jeunes-salaries/la-rebellion-de-la-generation-y/</link>
		<pubDate>Thu, 24 Oct 2013 07:13:59 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/La-rebellion-de-la-generation-y.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1258</wp:post_id>
		<wp:post_date>2013-10-24 08:13:59</wp:post_date>
		<wp:post_date_gmt>2013-10-24 07:13:59</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>la-rebellion-de-la-generation-y</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1257</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/La-rebellion-de-la-generation-y.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/La-rebellion-de-la-generation-y.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:259;s:6:"height";i:195;s:4:"file";s:43:"2013/10/La-rebellion-de-la-generation-y.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:43:"La-rebellion-de-la-generation-y-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:43:"La-rebellion-de-la-generation-y-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>saas-pour-ou-contre</title>
		<link>http://www.it-news.fr/saas-contre/saas-pour-ou-contre/</link>
		<pubDate>Thu, 24 Oct 2013 07:27:40 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/saas-pour-ou-contre.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1263</wp:post_id>
		<wp:post_date>2013-10-24 08:27:40</wp:post_date>
		<wp:post_date_gmt>2013-10-24 07:27:40</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>saas-pour-ou-contre</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1262</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/saas-pour-ou-contre.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/saas-pour-ou-contre.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:275;s:6:"height";i:183;s:4:"file";s:31:"2013/10/saas-pour-ou-contre.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:31:"saas-pour-ou-contre-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:31:"saas-pour-ou-contre-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>contre-le-saas</title>
		<link>http://www.it-news.fr/saas-contre/contre-le-saas/</link>
		<pubDate>Thu, 24 Oct 2013 07:32:00 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/contre-le-saas.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1267</wp:post_id>
		<wp:post_date>2013-10-24 08:32:00</wp:post_date>
		<wp:post_date_gmt>2013-10-24 07:32:00</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>contre-le-saas</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1262</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/contre-le-saas.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/contre-le-saas.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:132;s:6:"height";i:183;s:4:"file";s:26:"2013/10/contre-le-saas.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:26:"contre-le-saas-132x150.jpg";s:5:"width";i:132;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:26:"contre-le-saas-132x150.jpg";s:5:"width";i:132;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>pour-le-saas</title>
		<link>http://www.it-news.fr/saas-contre/pour-le-saas/</link>
		<pubDate>Thu, 24 Oct 2013 07:32:01 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/pour-le-saas.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1268</wp:post_id>
		<wp:post_date>2013-10-24 08:32:01</wp:post_date>
		<wp:post_date_gmt>2013-10-24 07:32:01</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>pour-le-saas</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1262</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/pour-le-saas.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/pour-le-saas.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:132;s:6:"height";i:183;s:4:"file";s:24:"2013/10/pour-le-saas.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:24:"pour-le-saas-132x150.jpg";s:5:"width";i:132;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:24:"pour-le-saas-132x150.jpg";s:5:"width";i:132;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>pour-le-saas</title>
		<link>http://www.it-news.fr/saas-contre/pour-le-saas-2/</link>
		<pubDate>Thu, 24 Oct 2013 07:34:08 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/pour-le-saas1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1269</wp:post_id>
		<wp:post_date>2013-10-24 08:34:08</wp:post_date>
		<wp:post_date_gmt>2013-10-24 07:34:08</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>pour-le-saas-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1262</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/pour-le-saas1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/pour-le-saas1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:150;s:4:"file";s:25:"2013/10/pour-le-saas1.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>contre-le-saas</title>
		<link>http://www.it-news.fr/saas-contre/contre-le-saas-2/</link>
		<pubDate>Thu, 24 Oct 2013 07:35:29 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/contre-le-saas1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1270</wp:post_id>
		<wp:post_date>2013-10-24 08:35:29</wp:post_date>
		<wp:post_date_gmt>2013-10-24 07:35:29</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>contre-le-saas-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1262</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/contre-le-saas1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/contre-le-saas1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:150;s:4:"file";s:27:"2013/10/contre-le-saas1.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>modification-des-taux-de-tva-au1-janvier-2014</title>
		<link>http://www.it-news.fr/modification-taux-tva-au-1-janvier-2014/modification-des-taux-de-tva-au1-janvier-2014/</link>
		<pubDate>Thu, 24 Oct 2013 07:43:59 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/modification-des-taux-de-tva-au1-janvier-2014.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1276</wp:post_id>
		<wp:post_date>2013-10-24 08:43:59</wp:post_date>
		<wp:post_date_gmt>2013-10-24 07:43:59</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>modification-des-taux-de-tva-au1-janvier-2014</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1273</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/modification-des-taux-de-tva-au1-janvier-2014.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/modification-des-taux-de-tva-au1-janvier-2014.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:237;s:6:"height";i:213;s:4:"file";s:57:"2013/10/modification-des-taux-de-tva-au1-janvier-2014.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:57:"modification-des-taux-de-tva-au1-janvier-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:57:"modification-des-taux-de-tva-au1-janvier-2014-237x198.jpg";s:5:"width";i:237;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:57:"modification-des-taux-de-tva-au1-janvier-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>lorsque-la-France-est-aussi-une-victime-de-la-nsa</title>
		<link>http://www.it-news.fr/lorsque-france-victime-nsa/lorsque-la-france-est-aussi-une-victime-de-la-nsa/</link>
		<pubDate>Thu, 24 Oct 2013 11:37:04 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/lorsque-la-France-est-aussi-une-victime-de-la-nsa.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1286</wp:post_id>
		<wp:post_date>2013-10-24 12:37:04</wp:post_date>
		<wp:post_date_gmt>2013-10-24 11:37:04</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>lorsque-la-france-est-aussi-une-victime-de-la-nsa</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1283</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/lorsque-la-France-est-aussi-une-victime-de-la-nsa.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/lorsque-la-France-est-aussi-une-victime-de-la-nsa.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:263;s:6:"height";i:191;s:4:"file";s:61:"2013/10/lorsque-la-France-est-aussi-une-victime-de-la-nsa.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:61:"lorsque-la-France-est-aussi-une-victime-de-la-nsa-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:61:"lorsque-la-France-est-aussi-une-victime-de-la-nsa-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Changement du taux de TVA</title>
		<link>http://www.it-news.fr/modification-taux-tva-au-1-janvier-2014/changement-du-taux-de-tva/</link>
		<pubDate>Thu, 31 Oct 2013 10:03:00 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/Changement-du-taux-de-TVA.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1309</wp:post_id>
		<wp:post_date>2013-10-31 11:03:00</wp:post_date>
		<wp:post_date_gmt>2013-10-31 10:03:00</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>changement-du-taux-de-tva</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1273</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/Changement-du-taux-de-TVA.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/Changement-du-taux-de-TVA.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:239;s:6:"height";i:211;s:4:"file";s:37:"2013/10/Changement-du-taux-de-TVA.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:37:"Changement-du-taux-de-TVA-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:37:"Changement-du-taux-de-TVA-239x198.jpg";s:5:"width";i:239;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:37:"Changement-du-taux-de-TVA-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>cloud-computing-réversibilité</title>
		<link>http://www.it-news.fr/cloud-computing-et-la-reversibilite-1ere-decision-judiciaire/cloud-computing-reversibilite/</link>
		<pubDate>Thu, 31 Oct 2013 10:41:19 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/cloud-computing-réversibilité.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1322</wp:post_id>
		<wp:post_date>2013-10-31 11:41:19</wp:post_date>
		<wp:post_date_gmt>2013-10-31 10:41:19</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cloud-computing-reversibilite</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1320</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/cloud-computing-réversibilité.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/cloud-computing-réversibilité.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:259;s:6:"height";i:195;s:4:"file";s:43:"2013/10/cloud-computing-réversibilité.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:5:{s:4:"file";s:43:"cloud-computing-réversibilité-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 10.2% (598&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:43:"cloud-computing-réversibilité-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 20.8% (4&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>cloud-computing-reversibilite</title>
		<link>http://www.it-news.fr/cloud-computing-et-la-reversibilite-1ere-decision-judiciaire/cloud-computing-reversibilite-2/</link>
		<pubDate>Thu, 31 Oct 2013 10:44:54 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/cloud-computing-reversibilite.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1323</wp:post_id>
		<wp:post_date>2013-10-31 11:44:54</wp:post_date>
		<wp:post_date_gmt>2013-10-31 10:44:54</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cloud-computing-reversibilite-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1320</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/cloud-computing-reversibilite.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/cloud-computing-reversibilite.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:150;s:4:"file";s:41:"2013/10/cloud-computing-reversibilite.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>favicon</title>
		<link>http://www.it-news.fr/?attachment_id=1330</link>
		<pubDate>Thu, 31 Oct 2013 13:53:16 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/favicon.ico</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1330</wp:post_id>
		<wp:post_date>2013-10-31 14:53:16</wp:post_date>
		<wp:post_date_gmt>2013-10-31 13:53:16</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>favicon</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/favicon.ico</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/favicon.ico]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>cropped-cropped-Les-news-IT.jpg</title>
		<link>http://www.it-news.fr/?attachment_id=1331</link>
		<pubDate>Thu, 31 Oct 2013 14:00:08 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/cropped-cropped-Les-news-IT.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[http://www.it-news.fr/wp-content/uploads/2013/10/cropped-cropped-Les-news-IT.jpg]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1331</wp:post_id>
		<wp:post_date>2013-10-31 15:00:08</wp:post_date>
		<wp:post_date_gmt>2013-10-31 14:00:08</wp:post_date_gmt>
		<wp:comment_status>closed</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cropped-cropped-les-news-it-jpg</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/cropped-cropped-Les-news-IT.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/cropped-cropped-Les-news-IT.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_context</wp:meta_key>
			<wp:meta_value><![CDATA[custom-header]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:940;s:6:"height";i:127;s:4:"file";s:39:"2013/10/cropped-cropped-Les-news-IT.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:39:"cropped-cropped-Les-news-IT-150x127.jpg";s:5:"width";i:150;s:6:"height";i:127;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:38:"cropped-cropped-Les-news-IT-300x40.jpg";s:5:"width";i:300;s:6:"height";i:40;s:9:"mime-type";s:10:"image/jpeg";}s:22:"wysija-newsletters-max";a:4:{s:4:"file";s:38:"cropped-cropped-Les-news-IT-600x81.jpg";s:5:"width";i:600;s:6:"height";i:81;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:39:"cropped-cropped-Les-news-IT-150x127.jpg";s:5:"width";i:150;s:6:"height";i:127;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_is_custom_header</wp:meta_key>
			<wp:meta_value><![CDATA[twentyten]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>muscular</title>
		<link>http://www.it-news.fr/espionnage-de-la-nsa-un-nouveau-programme-revele-muscular/muscular/</link>
		<pubDate>Tue, 05 Nov 2013 16:13:34 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/muscular.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1393</wp:post_id>
		<wp:post_date>2013-11-05 17:13:34</wp:post_date>
		<wp:post_date_gmt>2013-11-05 16:13:34</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>muscular</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1391</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/muscular.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/muscular.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:259;s:6:"height";i:194;s:4:"file";s:20:"2013/11/muscular.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:20:"muscular-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:20:"muscular-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Cloud suisse</title>
		<link>http://www.it-news.fr/la-suisse-investit-dans-le-cloud/cloud-suisse/</link>
		<pubDate>Tue, 05 Nov 2013 16:26:28 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/Cloud-suisse.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1399</wp:post_id>
		<wp:post_date>2013-11-05 17:26:28</wp:post_date>
		<wp:post_date_gmt>2013-11-05 16:26:28</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cloud-suisse</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1398</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/Cloud-suisse.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/Cloud-suisse.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:200;s:6:"height";i:151;s:4:"file";s:24:"2013/11/Cloud-suisse.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:24:"Cloud-suisse-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:24:"Cloud-suisse-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>cloud-suisse</title>
		<link>http://www.it-news.fr/la-suisse-investit-dans-le-cloud/cloud-suisse-2/</link>
		<pubDate>Tue, 05 Nov 2013 16:27:44 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/cloud-suisse.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1400</wp:post_id>
		<wp:post_date>2013-11-05 17:27:44</wp:post_date>
		<wp:post_date_gmt>2013-11-05 16:27:44</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cloud-suisse-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1398</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/cloud-suisse.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/cloud-suisse.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:150;s:4:"file";s:24:"2013/11/cloud-suisse.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>mobile et sécurité</title>
		<link>http://www.it-news.fr/les-mobiles-et-la-securite-la-preoccupation-premiere-des-entreprises/mobile-et-securite/</link>
		<pubDate>Fri, 08 Nov 2013 15:34:29 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/mobile-et-sécurité.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1420</wp:post_id>
		<wp:post_date>2013-11-08 16:34:29</wp:post_date>
		<wp:post_date_gmt>2013-11-08 15:34:29</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>mobile-et-securite</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1419</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/mobile-et-sécurité.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/mobile-et-sécurité.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:265;s:6:"height";i:190;s:4:"file";s:32:"2013/11/mobile-et-sécurité.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:32:"mobile-et-sécurité-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:32:"mobile-et-sécurité-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>les mobiles et la sécurité un enjeu majeur pour les entreprises</title>
		<link>http://www.it-news.fr/les-mobiles-et-la-securite-la-preoccupation-premiere-des-entreprises/les-mobiles-et-la-securite-un-enjeu-majeur-pour-les-entreprises/</link>
		<pubDate>Fri, 08 Nov 2013 15:36:02 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/les-mobiles-et-la-sécurité-un-enjeu-majeur-pour-les-entreprises.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1421</wp:post_id>
		<wp:post_date>2013-11-08 16:36:02</wp:post_date>
		<wp:post_date_gmt>2013-11-08 15:36:02</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>les-mobiles-et-la-securite-un-enjeu-majeur-pour-les-entreprises</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1419</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/les-mobiles-et-la-sécurité-un-enjeu-majeur-pour-les-entreprises.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/les-mobiles-et-la-sécurité-un-enjeu-majeur-pour-les-entreprises.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:150;s:6:"height";i:150;s:4:"file";s:77:"2013/11/les-mobiles-et-la-sécurité-un-enjeu-majeur-pour-les-entreprises.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 12.3% (1.7&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>la sécurité mobile n&#039;est toujours pas la grande priorité des entreprises.</title>
		<link>http://www.it-news.fr/les-mobiles-et-la-securite-la-preoccupation-premiere-des-entreprises/la-securite-mobile-nest-toujours-pas-la-grande-priorite-des-entreprises/</link>
		<pubDate>Fri, 08 Nov 2013 15:38:54 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/la-sécurité-mobile-nest-toujours-pas-la-grande-priorité-des-entreprises..jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1422</wp:post_id>
		<wp:post_date>2013-11-08 16:38:54</wp:post_date>
		<wp:post_date_gmt>2013-11-08 15:38:54</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>la-securite-mobile-nest-toujours-pas-la-grande-priorite-des-entreprises</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1419</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/la-sécurité-mobile-nest-toujours-pas-la-grande-priorité-des-entreprises..jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/la-sécurité-mobile-nest-toujours-pas-la-grande-priorité-des-entreprises..jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:504;s:6:"height";i:311;s:4:"file";s:87:"2013/11/la-sécurité-mobile-nest-toujours-pas-la-grande-priorité-des-entreprises..jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:87:"la-sécurité-mobile-nest-toujours-pas-la-grande-priorité-des-entreprises.-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:87:"la-sécurité-mobile-nest-toujours-pas-la-grande-priorité-des-entreprises.-300x185.jpg";s:5:"width";i:300;s:6:"height";i:185;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:87:"la-sécurité-mobile-nest-toujours-pas-la-grande-priorité-des-entreprises.-504x198.jpg";s:5:"width";i:504;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:87:"la-sécurité-mobile-nest-toujours-pas-la-grande-priorité-des-entreprises.-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>tableau explicatif de la problématique de la sécurité des mobiles en entreprise</title>
		<link>http://www.it-news.fr/les-mobiles-et-la-securite-la-preoccupation-premiere-des-entreprises/tableau-explicatif-de-la-problematique-de-la-securite-des-mobiles-en-entreprise/</link>
		<pubDate>Fri, 08 Nov 2013 15:38:58 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/tableau-explicatif-de-la-problématique-de-la-sécurité-des-mobiles-en-entreprise.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1423</wp:post_id>
		<wp:post_date>2013-11-08 16:38:58</wp:post_date>
		<wp:post_date_gmt>2013-11-08 15:38:58</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>tableau-explicatif-de-la-problematique-de-la-securite-des-mobiles-en-entreprise</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1419</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/tableau-explicatif-de-la-problématique-de-la-sécurité-des-mobiles-en-entreprise.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/tableau-explicatif-de-la-problématique-de-la-sécurité-des-mobiles-en-entreprise.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:418;s:6:"height";i:431;s:4:"file";s:94:"2013/11/tableau-explicatif-de-la-problématique-de-la-sécurité-des-mobiles-en-entreprise.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:4:{s:4:"file";s:94:"tableau-explicatif-de-la-problématique-de-la-sécurité-des-mobiles-en-entreprise-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:94:"tableau-explicatif-de-la-problématique-de-la-sécurité-des-mobiles-en-entreprise-290x300.jpg";s:5:"width";i:290;s:6:"height";i:300;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:94:"tableau-explicatif-de-la-problématique-de-la-sécurité-des-mobiles-en-entreprise-418x198.jpg";s:5:"width";i:418;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:94:"tableau-explicatif-de-la-problématique-de-la-sécurité-des-mobiles-en-entreprise-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Microsoft piraté</title>
		<link>http://www.it-news.fr/microsoft/microsoft-pirate/</link>
		<pubDate>Mon, 18 Nov 2013 09:08:56 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/Microsoft-piraté.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1435</wp:post_id>
		<wp:post_date>2013-11-18 10:08:56</wp:post_date>
		<wp:post_date_gmt>2013-11-18 09:08:56</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>microsoft-pirate</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1434</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/Microsoft-piraté.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/Microsoft-piraté.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:160;s:6:"height";i:160;s:4:"file";s:29:"2013/11/Microsoft-piraté.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:29:"Microsoft-piraté-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:29:"Microsoft-piraté-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>windows 8.2 une version controversée</title>
		<link>http://www.it-news.fr/windows-8-1-une-version-controversee/windows-8-2-une-version-controversee/</link>
		<pubDate>Mon, 18 Nov 2013 09:22:22 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/windows-8.2-une-version-controversée.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1440</wp:post_id>
		<wp:post_date>2013-11-18 10:22:22</wp:post_date>
		<wp:post_date_gmt>2013-11-18 09:22:22</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>windows-8-2-une-version-controversee</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1439</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/windows-8.2-une-version-controversée.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/windows-8.2-une-version-controversée.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:297;s:6:"height";i:170;s:4:"file";s:49:"2013/11/windows-8.2-une-version-controversée.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:49:"windows-8.2-une-version-controversée-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:49:"windows-8.2-une-version-controversée-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>windows 8.1 une version a peine sortie et déjà mal aimée</title>
		<link>http://www.it-news.fr/windows-8-1-une-version-controversee/windows-8-1-une-version-a-peine-sortie-et-deja-mal-aimee/</link>
		<pubDate>Mon, 18 Nov 2013 09:22:24 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/windows-8.1-une-version-a-peine-sortie-et-déjà-mal-aimée.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1441</wp:post_id>
		<wp:post_date>2013-11-18 10:22:24</wp:post_date>
		<wp:post_date_gmt>2013-11-18 09:22:24</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>windows-8-1-une-version-a-peine-sortie-et-deja-mal-aimee</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1439</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/windows-8.1-une-version-a-peine-sortie-et-déjà-mal-aimée.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/windows-8.1-une-version-a-peine-sortie-et-déjà-mal-aimée.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:240;s:6:"height";i:132;s:4:"file";s:71:"2013/11/windows-8.1-une-version-a-peine-sortie-et-déjà-mal-aimée.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:5:{s:4:"file";s:71:"windows-8.1-une-version-a-peine-sortie-et-déjà-mal-aimée-150x132.jpg";s:5:"width";i:150;s:6:"height";i:132;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 10.2% (386&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:71:"windows-8.1-une-version-a-peine-sortie-et-déjà-mal-aimée-150x132.jpg";s:5:"width";i:150;s:6:"height";i:132;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:11:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";s:11:"orientation";i:0;}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Les DSI victimes d’une mutinerie entrepreneuriale</title>
		<link>http://www.it-news.fr/partage-de-fichiers-les-regles-sont-de-plus-en-plus-contournees/les-dsi-victimes-dune-mutinerie-entrepreneuriale/</link>
		<pubDate>Mon, 18 Nov 2013 09:57:53 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/Les-DSI-victimes-d’une-mutinerie-entrepreneuriale.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1445</wp:post_id>
		<wp:post_date>2013-11-18 10:57:53</wp:post_date>
		<wp:post_date_gmt>2013-11-18 09:57:53</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>les-dsi-victimes-dune-mutinerie-entrepreneuriale</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1444</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/Les-DSI-victimes-d’une-mutinerie-entrepreneuriale.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/Les-DSI-victimes-d’une-mutinerie-entrepreneuriale.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:274;s:6:"height";i:184;s:4:"file";s:63:"2013/11/Les-DSI-victimes-d’une-mutinerie-entrepreneuriale.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:63:"Les-DSI-victimes-d’une-mutinerie-entrepreneuriale-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:63:"Les-DSI-victimes-d’une-mutinerie-entrepreneuriale-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>La problématique du Cloud Computing et du Big Data</title>
		<link>http://www.it-news.fr/big-data-et-cloud-computing/la-problematique-du-cloud-computing-et-du-big-data/</link>
		<pubDate>Mon, 18 Nov 2013 10:27:02 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/La-problématique-du-Cloud-Computing-et-du-Big-Data.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1449</wp:post_id>
		<wp:post_date>2013-11-18 11:27:02</wp:post_date>
		<wp:post_date_gmt>2013-11-18 10:27:02</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>la-problematique-du-cloud-computing-et-du-big-data</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1448</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/La-problématique-du-Cloud-Computing-et-du-Big-Data.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/La-problématique-du-Cloud-Computing-et-du-Big-Data.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:299;s:6:"height";i:168;s:4:"file";s:63:"2013/11/La-problématique-du-Cloud-Computing-et-du-Big-Data.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:4:{s:4:"file";s:63:"La-problématique-du-Cloud-Computing-et-du-Big-Data-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:63:"La-problématique-du-Cloud-Computing-et-du-Big-Data-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Big Data et cloud computing</title>
		<link>http://www.it-news.fr/big-data-et-cloud-computing/big-data-et-cloud-computing/</link>
		<pubDate>Mon, 18 Nov 2013 10:27:10 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/Big-Data-et-cloud-computing.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1450</wp:post_id>
		<wp:post_date>2013-11-18 11:27:10</wp:post_date>
		<wp:post_date_gmt>2013-11-18 10:27:10</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>big-data-et-cloud-computing</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1448</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/Big-Data-et-cloud-computing.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/Big-Data-et-cloud-computing.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:701;s:6:"height";i:1051;s:4:"file";s:39:"2013/11/Big-Data-et-cloud-computing.jpg";s:5:"sizes";a:6:{s:9:"thumbnail";a:4:{s:4:"file";s:39:"Big-Data-et-cloud-computing-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:39:"Big-Data-et-cloud-computing-200x300.jpg";s:5:"width";i:200;s:6:"height";i:300;s:9:"mime-type";s:10:"image/jpeg";}s:5:"large";a:4:{s:4:"file";s:40:"Big-Data-et-cloud-computing-682x1024.jpg";s:5:"width";i:682;s:6:"height";i:1024;s:9:"mime-type";s:10:"image/jpeg";}s:22:"wysija-newsletters-max";a:4:{s:4:"file";s:39:"Big-Data-et-cloud-computing-600x899.jpg";s:5:"width";i:600;s:6:"height";i:899;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:39:"Big-Data-et-cloud-computing-701x198.jpg";s:5:"width";i:701;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:39:"Big-Data-et-cloud-computing-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";d:4;s:6:"credit";s:0:"";s:6:"camera";s:13:"Canon EOS 30D";s:7:"caption";s:0:"";s:17:"created_timestamp";i:1225995369;s:9:"copyright";s:0:"";s:12:"focal_length";s:2:"20";s:3:"iso";s:4:"1000";s:13:"shutter_speed";s:3:"0.2";s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Big Data et cloud computing</title>
		<link>http://www.it-news.fr/big-data-et-cloud-computing/big-data-et-cloud-computing-2/</link>
		<pubDate>Mon, 18 Nov 2013 10:45:14 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/Big-Data-et-cloud-computing1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1451</wp:post_id>
		<wp:post_date>2013-11-18 11:45:14</wp:post_date>
		<wp:post_date_gmt>2013-11-18 10:45:14</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>big-data-et-cloud-computing-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1448</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/Big-Data-et-cloud-computing1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/Big-Data-et-cloud-computing1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:150;s:6:"height";i:225;s:4:"file";s:40:"2013/11/Big-Data-et-cloud-computing1.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:40:"Big-Data-et-cloud-computing1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:40:"Big-Data-et-cloud-computing1-150x198.jpg";s:5:"width";i:150;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}s:15:"wp_rp_thumbnail";a:4:{s:4:"file";s:40:"Big-Data-et-cloud-computing1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>CYOD c&#039;est du BYOD mais sans les inconvénients</title>
		<link>http://www.it-news.fr/le-cyod-cest-du-byod-mais-sans-les-inconvenients/cyod-cest-du-byod-mais-sans-les-inconvenients/</link>
		<pubDate>Wed, 20 Nov 2013 15:14:51 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/CYOD-cest-du-BYOD-mais-sans-les-inconvénients.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1455</wp:post_id>
		<wp:post_date>2013-11-20 16:14:51</wp:post_date>
		<wp:post_date_gmt>2013-11-20 15:14:51</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cyod-cest-du-byod-mais-sans-les-inconvenients</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1454</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/CYOD-cest-du-BYOD-mais-sans-les-inconvénients.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/CYOD-cest-du-BYOD-mais-sans-les-inconvénients.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:354;s:6:"height";i:142;s:4:"file";s:58:"2013/11/CYOD-cest-du-BYOD-mais-sans-les-inconvénients.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:58:"CYOD-cest-du-BYOD-mais-sans-les-inconvénients-150x142.jpg";s:5:"width";i:150;s:6:"height";i:142;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 10.9% (934&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:58:"CYOD-cest-du-BYOD-mais-sans-les-inconvénients-300x120.jpg";s:5:"width";i:300;s:6:"height";i:120;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 11.4% (1.4&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:58:"CYOD-cest-du-BYOD-mais-sans-les-inconvénients-150x142.jpg";s:5:"width";i:150;s:6:"height";i:142;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:11:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";s:11:"orientation";i:0;}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Vers une déclaration de TVA Unique</title>
		<link>http://www.it-news.fr/vers-une-declaration-unique-de-tva-en-union-europeenne/vers-une-declaration-de-tva-unique/</link>
		<pubDate>Wed, 20 Nov 2013 15:25:26 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/Vers-une-déclaration-de-TVA-Unique-.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1460</wp:post_id>
		<wp:post_date>2013-11-20 16:25:26</wp:post_date>
		<wp:post_date_gmt>2013-11-20 15:25:26</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>vers-une-declaration-de-tva-unique</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1459</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/Vers-une-déclaration-de-TVA-Unique-.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/Vers-une-déclaration-de-TVA-Unique-.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:250;s:6:"height";i:201;s:4:"file";s:48:"2013/11/Vers-une-déclaration-de-TVA-Unique-.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:48:"Vers-une-déclaration-de-TVA-Unique--150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 12.8% (1&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:48:"Vers-une-déclaration-de-TVA-Unique--250x198.jpg";s:5:"width";i:250;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 13.9% (1.9&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:48:"Vers-une-déclaration-de-TVA-Unique--150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 17.4% (3.3&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>yahoo va se mettre au chiffrement</title>
		<link>http://www.it-news.fr/yahoo-va-se-mettre-au-chiffrement/yahoo-va-se-mettre-au-chiffrement/</link>
		<pubDate>Wed, 20 Nov 2013 15:34:00 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/yahoo-va-se-mettre-au-chiffrement.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1466</wp:post_id>
		<wp:post_date>2013-11-20 16:34:00</wp:post_date>
		<wp:post_date_gmt>2013-11-20 15:34:00</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>yahoo-va-se-mettre-au-chiffrement</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1465</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/yahoo-va-se-mettre-au-chiffrement.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/yahoo-va-se-mettre-au-chiffrement.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:120;s:6:"height";i:120;s:4:"file";s:45:"2013/11/yahoo-va-se-mettre-au-chiffrement.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>yahoo va se mettre au chiffrement</title>
		<link>http://www.it-news.fr/yahoo-va-se-mettre-au-chiffrement/yahoo-va-se-mettre-au-chiffrement-2/</link>
		<pubDate>Wed, 20 Nov 2013 15:37:12 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/yahoo-va-se-mettre-au-chiffrement1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1467</wp:post_id>
		<wp:post_date>2013-11-20 16:37:12</wp:post_date>
		<wp:post_date_gmt>2013-11-20 15:37:12</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>yahoo-va-se-mettre-au-chiffrement-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1465</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/yahoo-va-se-mettre-au-chiffrement1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/yahoo-va-se-mettre-au-chiffrement1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:120;s:6:"height";i:120;s:4:"file";s:46:"2013/11/yahoo-va-se-mettre-au-chiffrement1.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 17.6% (1.9&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Anonymous vs FBI le combat est engagé</title>
		<link>http://www.it-news.fr/le-fbi-encore-victime-des-anonymous/anonymous-vs-fbi-le-combat-est-engage/</link>
		<pubDate>Thu, 21 Nov 2013 08:06:51 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/Anonymous-vs-FBI-le-combat-est-engagé.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1477</wp:post_id>
		<wp:post_date>2013-11-21 09:06:51</wp:post_date>
		<wp:post_date_gmt>2013-11-21 08:06:51</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>anonymous-vs-fbi-le-combat-est-engage</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1476</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/Anonymous-vs-FBI-le-combat-est-engagé.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/Anonymous-vs-FBI-le-combat-est-engagé.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:275;s:6:"height";i:183;s:4:"file";s:50:"2013/11/Anonymous-vs-FBI-le-combat-est-engagé.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:5:{s:4:"file";s:50:"Anonymous-vs-FBI-le-combat-est-engagé-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.6% (441&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:50:"Anonymous-vs-FBI-le-combat-est-engagé-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Internet plus prés du ciel</title>
		<link>http://www.it-news.fr/restez-connecte-bord-de-votre/internet-plus-pres-du-ciel/</link>
		<pubDate>Thu, 21 Nov 2013 08:35:38 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/Internet-plus-prés-du-ciel.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1482</wp:post_id>
		<wp:post_date>2013-11-21 09:35:38</wp:post_date>
		<wp:post_date_gmt>2013-11-21 08:35:38</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>internet-plus-pres-du-ciel</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1480</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/Internet-plus-prés-du-ciel.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/Internet-plus-prés-du-ciel.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:340;s:6:"height";i:148;s:4:"file";s:39:"2013/11/Internet-plus-prés-du-ciel.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:39:"Internet-plus-prés-du-ciel-150x148.jpg";s:5:"width";i:150;s:6:"height";i:148;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 12.9% (939&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:39:"Internet-plus-prés-du-ciel-300x130.jpg";s:5:"width";i:300;s:6:"height";i:130;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 13.6% (1.5&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:39:"Internet-plus-prés-du-ciel-150x148.jpg";s:5:"width";i:150;s:6:"height";i:148;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>cable fibre optique</title>
		<link>http://www.it-news.fr/consommation-energetique-dun-data-center/cable-fibre-optique/</link>
		<pubDate>Thu, 21 Nov 2013 15:57:19 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/cable-fibre-optique.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1496</wp:post_id>
		<wp:post_date>2013-11-21 16:57:19</wp:post_date>
		<wp:post_date_gmt>2013-11-21 15:57:19</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cable-fibre-optique</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1495</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/cable-fibre-optique.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/cable-fibre-optique.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:237;s:6:"height";i:148;s:4:"file";s:31:"2013/11/cable-fibre-optique.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:5:{s:4:"file";s:31:"cable-fibre-optique-150x148.jpg";s:5:"width";i:150;s:6:"height";i:148;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.1% (450&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:31:"cable-fibre-optique-150x148.jpg";s:5:"width";i:150;s:6:"height";i:148;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>open bath cooling</title>
		<link>http://www.it-news.fr/consommation-energetique-dun-data-center/open-bath-cooling/</link>
		<pubDate>Thu, 21 Nov 2013 15:57:24 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/open-bath-cooling.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1497</wp:post_id>
		<wp:post_date>2013-11-21 16:57:24</wp:post_date>
		<wp:post_date_gmt>2013-11-21 15:57:24</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>open-bath-cooling</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1495</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/open-bath-cooling.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/open-bath-cooling.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:237;s:6:"height";i:213;s:4:"file";s:29:"2013/11/open-bath-cooling.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:29:"open-bath-cooling-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.1% (483&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:29:"open-bath-cooling-237x198.jpg";s:5:"width";i:237;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.3% (761&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:29:"open-bath-cooling-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>watercooling</title>
		<link>http://www.it-news.fr/consommation-energetique-dun-data-center/watercooling/</link>
		<pubDate>Thu, 21 Nov 2013 15:57:28 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/watercooling.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1498</wp:post_id>
		<wp:post_date>2013-11-21 16:57:28</wp:post_date>
		<wp:post_date_gmt>2013-11-21 15:57:28</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>watercooling</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1495</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/watercooling.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/watercooling.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:300;s:6:"height";i:168;s:4:"file";s:24:"2013/11/watercooling.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:5:{s:4:"file";s:24:"watercooling-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.7% (860&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:24:"watercooling-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 1.3% (232&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Les data centers consomment beaucoup trop</title>
		<link>http://www.it-news.fr/consommation-energetique-dun-data-center/les-data-centers-consomment-beaucoup-trop/</link>
		<pubDate>Thu, 21 Nov 2013 15:57:33 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/Les-data-centers-consomment-beaucoup-trop.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1499</wp:post_id>
		<wp:post_date>2013-11-21 16:57:33</wp:post_date>
		<wp:post_date_gmt>2013-11-21 15:57:33</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>les-data-centers-consomment-beaucoup-trop</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1495</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/Les-data-centers-consomment-beaucoup-trop.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/Les-data-centers-consomment-beaucoup-trop.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:222;s:6:"height";i:227;s:4:"file";s:53:"2013/11/Les-data-centers-consomment-beaucoup-trop.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:53:"Les-data-centers-consomment-beaucoup-trop-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 9.2% (1.2&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:53:"Les-data-centers-consomment-beaucoup-trop-222x198.jpg";s:5:"width";i:222;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 8.8% (2.1&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:53:"Les-data-centers-consomment-beaucoup-trop-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 2.0% (286&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Consommation énergétique des data centers</title>
		<link>http://www.it-news.fr/consommation-energetique-dun-data-center/consommation-energetique-des-data-centers/</link>
		<pubDate>Thu, 21 Nov 2013 16:03:07 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/Consommation-énergétique-des-data-centers.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1500</wp:post_id>
		<wp:post_date>2013-11-21 17:03:07</wp:post_date>
		<wp:post_date_gmt>2013-11-21 16:03:07</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>consommation-energetique-des-data-centers</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1495</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/Consommation-énergétique-des-data-centers.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/Consommation-énergétique-des-data-centers.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:150;s:6:"height";i:150;s:4:"file";s:55:"2013/11/Consommation-énergétique-des-data-centers.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 11.5% (3.7&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Security concept: Lock on digital screen</title>
		<link>http://www.it-news.fr/la-securite-informatique-est-toujours-sous-estimee/security-concept-lock-on-digital-screen/</link>
		<pubDate>Thu, 21 Nov 2013 16:32:37 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/Fotolia_41906771_XS.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[Security concept: Lock on digital screen, contrast, 3d render]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1507</wp:post_id>
		<wp:post_date>2013-11-21 17:32:37</wp:post_date>
		<wp:post_date_gmt>2013-11-21 16:32:37</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>security-concept-lock-on-digital-screen</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1506</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/Fotolia_41906771_XS.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/Fotolia_41906771_XS.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:346;s:6:"height";i:346;s:4:"file";s:31:"2013/11/Fotolia_41906771_XS.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:31:"Fotolia_41906771_XS-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.3% (694&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:31:"Fotolia_41906771_XS-300x300.jpg";s:5:"width";i:300;s:6:"height";i:300;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 7.0% (2.2&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:31:"Fotolia_41906771_XS-346x198.jpg";s:5:"width";i:346;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 7.4% (2.3&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:31:"Fotolia_41906771_XS-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:20:"maxkabakov - Fotolia";s:6:"camera";s:0:"";s:7:"caption";s:61:"Security concept: Lock on digital screen, contrast, 3d render";s:17:"created_timestamp";i:1337692594;s:9:"copyright";s:20:"maxkabakov - Fotolia";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:40:"Security concept: Lock on digital screen";}s:10:"wp_smushit";s:29:"Reduced by 3.9% (4.2&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>la sécurité informatique est toujours sous-estimée</title>
		<link>http://www.it-news.fr/la-securite-informatique-est-toujours-sous-estimee/la-securite-informatique-est-toujours-sous-estimee/</link>
		<pubDate>Thu, 21 Nov 2013 16:34:27 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/la-sécurité-informatique-est-toujours-sous-estimée.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1508</wp:post_id>
		<wp:post_date>2013-11-21 17:34:27</wp:post_date>
		<wp:post_date_gmt>2013-11-21 16:34:27</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>la-securite-informatique-est-toujours-sous-estimee</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1506</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/la-sécurité-informatique-est-toujours-sous-estimée.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/la-sécurité-informatique-est-toujours-sous-estimée.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:150;s:6:"height";i:150;s:4:"file";s:65:"2013/11/la-sécurité-informatique-est-toujours-sous-estimée.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Les menaces viennent de l&#039;intérieur</title>
		<link>http://www.it-news.fr/la-securite-informatique-est-toujours-sous-estimee/les-menaces-viennent-de-linterieur/</link>
		<pubDate>Thu, 21 Nov 2013 16:34:32 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/Les-menaces-viennent-de-lintérieur.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1509</wp:post_id>
		<wp:post_date>2013-11-21 17:34:32</wp:post_date>
		<wp:post_date_gmt>2013-11-21 16:34:32</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>les-menaces-viennent-de-linterieur</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1506</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/Les-menaces-viennent-de-lintérieur.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/Les-menaces-viennent-de-lintérieur.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:434;s:6:"height";i:250;s:4:"file";s:47:"2013/11/Les-menaces-viennent-de-lintérieur.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:47:"Les-menaces-viennent-de-lintérieur-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.3% (291&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:47:"Les-menaces-viennent-de-lintérieur-300x172.jpg";s:5:"width";i:300;s:6:"height";i:172;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.2% (666&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:47:"Les-menaces-viennent-de-lintérieur-434x198.jpg";s:5:"width";i:434;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:27:"Reduced by 8.4% (1&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:47:"Les-menaces-viennent-de-lintérieur-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 10.7% (2.4&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>newsletter</title>
		<link>http://www.it-news.fr/?attachment_id=1514</link>
		<pubDate>Fri, 22 Nov 2013 10:58:20 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/newsletter.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1514</wp:post_id>
		<wp:post_date>2013-11-22 11:58:20</wp:post_date>
		<wp:post_date_gmt>2013-11-22 10:58:20</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>newsletter</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/newsletter.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/newsletter.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:160;s:6:"height";i:72;s:4:"file";s:22:"2013/11/newsletter.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:5:{s:4:"file";s:21:"newsletter-150x72.jpg";s:5:"width";i:150;s:6:"height";i:72;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 9.3% (502&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:21:"newsletter-150x72.jpg";s:5:"width";i:150;s:6:"height";i:72;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:27:"Reduced by 0.5% (64&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>icon-rss</title>
		<link>http://www.it-news.fr/?attachment_id=1515</link>
		<pubDate>Fri, 22 Nov 2013 11:01:39 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/icon-rss.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1515</wp:post_id>
		<wp:post_date>2013-11-22 12:01:39</wp:post_date>
		<wp:post_date_gmt>2013-11-22 11:01:39</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>icon-rss</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/icon-rss.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/icon-rss.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:36;s:6:"height";i:36;s:4:"file";s:20:"2013/11/icon-rss.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>bannière blog</title>
		<link>http://www.it-news.fr/?attachment_id=1521</link>
		<pubDate>Fri, 22 Nov 2013 13:20:19 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/bannière-blog.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1521</wp:post_id>
		<wp:post_date>2013-11-22 14:20:19</wp:post_date>
		<wp:post_date_gmt>2013-11-22 13:20:19</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>banniere-blog</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/bannière-blog.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/bannière-blog.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_context</wp:meta_key>
			<wp:meta_value><![CDATA[custom-background]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:940;s:6:"height";i:127;s:4:"file";s:26:"2013/11/bannière-blog.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:26:"bannière-blog-150x127.jpg";s:5:"width";i:150;s:6:"height";i:127;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 9.0% (388&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:25:"bannière-blog-300x40.jpg";s:5:"width";i:300;s:6:"height";i:40;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.2% (274&nbsp;B)";}s:22:"wysija-newsletters-max";a:5:{s:4:"file";s:25:"bannière-blog-600x81.jpg";s:5:"width";i:600;s:6:"height";i:81;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 10.3% (1001&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:26:"bannière-blog-150x127.jpg";s:5:"width";i:150;s:6:"height";i:127;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 12.1% (2.3&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_is_custom_background</wp:meta_key>
			<wp:meta_value><![CDATA[suits]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>favicon</title>
		<link>http://www.it-news.fr/?attachment_id=1522</link>
		<pubDate>Fri, 22 Nov 2013 13:37:36 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/favicon.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1522</wp:post_id>
		<wp:post_date>2013-11-22 14:37:36</wp:post_date>
		<wp:post_date_gmt>2013-11-22 13:37:36</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>favicon-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/favicon.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/favicon.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:36;s:6:"height";i:36;s:4:"file";s:19:"2013/11/favicon.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>changement-taux-de-tva</title>
		<link>http://www.it-news.fr/yahoo-va-se-mettre-au-chiffrement/changement-taux-de-tva/</link>
		<pubDate>Fri, 22 Nov 2013 13:54:05 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/changement-taux-de-tva.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1523</wp:post_id>
		<wp:post_date>2013-11-22 14:54:05</wp:post_date>
		<wp:post_date_gmt>2013-11-22 13:54:05</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>changement-taux-de-tva</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1465</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/changement-taux-de-tva.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/changement-taux-de-tva.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:250;s:6:"height";i:200;s:4:"file";s:34:"2013/11/changement-taux-de-tva.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:34:"changement-taux-de-tva-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 9.5% (708&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:34:"changement-taux-de-tva-250x198.jpg";s:5:"width";i:250;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 10.1% (1.2&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:34:"changement-taux-de-tva-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 3.0% (861&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>muscular-espionnage-nsa</title>
		<link>http://www.it-news.fr/yahoo-va-se-mettre-au-chiffrement/muscular-espionnage-nsa/</link>
		<pubDate>Fri, 22 Nov 2013 13:54:12 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/muscular-espionnage-nsa.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1524</wp:post_id>
		<wp:post_date>2013-11-22 14:54:12</wp:post_date>
		<wp:post_date_gmt>2013-11-22 13:54:12</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>muscular-espionnage-nsa</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1465</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/muscular-espionnage-nsa.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/muscular-espionnage-nsa.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:250;s:6:"height";i:200;s:4:"file";s:35:"2013/11/muscular-espionnage-nsa.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:35:"muscular-espionnage-nsa-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.7% (626&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:35:"muscular-espionnage-nsa-250x198.jpg";s:5:"width";i:250;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:27:"Reduced by 6.2% (1&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:35:"muscular-espionnage-nsa-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>cloud-suisse</title>
		<link>http://www.it-news.fr/yahoo-va-se-mettre-au-chiffrement/cloud-suisse-3/</link>
		<pubDate>Fri, 22 Nov 2013 13:54:19 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/cloud-suisse1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1525</wp:post_id>
		<wp:post_date>2013-11-22 14:54:19</wp:post_date>
		<wp:post_date_gmt>2013-11-22 13:54:19</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cloud-suisse-3</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1465</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/cloud-suisse1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/cloud-suisse1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:250;s:6:"height";i:200;s:4:"file";s:25:"2013/11/cloud-suisse1.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:25:"cloud-suisse1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.8% (290&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:25:"cloud-suisse1-250x198.jpg";s:5:"width";i:250;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 11.7% (587&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:25:"cloud-suisse1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>mobile-et-securite</title>
		<link>http://www.it-news.fr/yahoo-va-se-mettre-au-chiffrement/mobile-et-securite-2/</link>
		<pubDate>Fri, 22 Nov 2013 13:54:26 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/mobile-et-securite.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1526</wp:post_id>
		<wp:post_date>2013-11-22 14:54:26</wp:post_date>
		<wp:post_date_gmt>2013-11-22 13:54:26</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>mobile-et-securite-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1465</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/mobile-et-securite.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/mobile-et-securite.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:250;s:6:"height";i:200;s:4:"file";s:30:"2013/11/mobile-et-securite.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:30:"mobile-et-securite-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 9.8% (389&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:30:"mobile-et-securite-250x198.jpg";s:5:"width";i:250;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 11.9% (731&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:30:"mobile-et-securite-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 2.8% (323&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>microsoft-pirate</title>
		<link>http://www.it-news.fr/yahoo-va-se-mettre-au-chiffrement/microsoft-pirate-2/</link>
		<pubDate>Fri, 22 Nov 2013 13:54:31 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/microsoft-pirate.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1527</wp:post_id>
		<wp:post_date>2013-11-22 14:54:31</wp:post_date>
		<wp:post_date_gmt>2013-11-22 13:54:31</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>microsoft-pirate-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1465</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/microsoft-pirate.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/microsoft-pirate.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:250;s:6:"height";i:200;s:4:"file";s:28:"2013/11/microsoft-pirate.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:28:"microsoft-pirate-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.5% (397&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:28:"microsoft-pirate-250x198.jpg";s:5:"width";i:250;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.9% (768&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:28:"microsoft-pirate-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 4.6% (1.3&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>big-data-et-cloud</title>
		<link>http://www.it-news.fr/yahoo-va-se-mettre-au-chiffrement/big-data-et-cloud/</link>
		<pubDate>Fri, 22 Nov 2013 13:54:40 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/big-data-et-cloud.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1528</wp:post_id>
		<wp:post_date>2013-11-22 14:54:40</wp:post_date>
		<wp:post_date_gmt>2013-11-22 13:54:40</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>big-data-et-cloud</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1465</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/big-data-et-cloud.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/big-data-et-cloud.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:250;s:6:"height";i:200;s:4:"file";s:29:"2013/11/big-data-et-cloud.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:29:"big-data-et-cloud-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.4% (796&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:29:"big-data-et-cloud-250x198.jpg";s:5:"width";i:250;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 7.0% (1.4&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:29:"big-data-et-cloud-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 3.1% (1.7&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Doodle doctor Who</title>
		<link>http://www.it-news.fr/yahoo-va-se-mettre-au-chiffrement/doodle-doctor-who/</link>
		<pubDate>Fri, 22 Nov 2013 13:54:50 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/Doodle-doctor-Who.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1529</wp:post_id>
		<wp:post_date>2013-11-22 14:54:50</wp:post_date>
		<wp:post_date_gmt>2013-11-22 13:54:50</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>doodle-doctor-who</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1465</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/Doodle-doctor-Who.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/Doodle-doctor-Who.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:726;s:6:"height";i:238;s:4:"file";s:29:"2013/11/Doodle-doctor-Who.jpg";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:29:"Doodle-doctor-Who-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 11.6% (731&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:28:"Doodle-doctor-Who-300x98.jpg";s:5:"width";i:300;s:6:"height";i:98;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 12.5% (1.3&nbsp;KB)";}s:22:"wysija-newsletters-max";a:5:{s:4:"file";s:29:"Doodle-doctor-Who-600x196.jpg";s:5:"width";i:600;s:6:"height";i:196;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 13.4% (3.1&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:29:"Doodle-doctor-Who-726x198.jpg";s:5:"width";i:726;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 12.7% (3.2&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:29:"Doodle-doctor-Who-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 16.7% (5.6&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>bannière blog</title>
		<link>http://www.it-news.fr/yahoo-va-se-mettre-au-chiffrement/banniere-blog-2/</link>
		<pubDate>Fri, 22 Nov 2013 13:54:59 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/bannière-blog1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1530</wp:post_id>
		<wp:post_date>2013-11-22 14:54:59</wp:post_date>
		<wp:post_date_gmt>2013-11-22 13:54:59</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>banniere-blog-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1465</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/bannière-blog1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/bannière-blog1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:940;s:6:"height";i:127;s:4:"file";s:27:"2013/11/bannière-blog1.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:27:"bannière-blog1-150x127.jpg";s:5:"width";i:150;s:6:"height";i:127;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 9.0% (388&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:26:"bannière-blog1-300x40.jpg";s:5:"width";i:300;s:6:"height";i:40;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.2% (274&nbsp;B)";}s:22:"wysija-newsletters-max";a:5:{s:4:"file";s:26:"bannière-blog1-600x81.jpg";s:5:"width";i:600;s:6:"height";i:81;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 10.3% (1001&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:27:"bannière-blog1-150x127.jpg";s:5:"width";i:150;s:6:"height";i:127;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 12.1% (2.3&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>yahoo-va-se-mettre-au-chiffrement</title>
		<link>http://www.it-news.fr/yahoo-va-se-mettre-au-chiffrement/yahoo-va-se-mettre-au-chiffrement-3/</link>
		<pubDate>Fri, 22 Nov 2013 13:55:05 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/yahoo-va-se-mettre-au-chiffrement2.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1531</wp:post_id>
		<wp:post_date>2013-11-22 14:55:05</wp:post_date>
		<wp:post_date_gmt>2013-11-22 13:55:05</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>yahoo-va-se-mettre-au-chiffrement-3</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1465</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/yahoo-va-se-mettre-au-chiffrement2.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/yahoo-va-se-mettre-au-chiffrement2.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:250;s:6:"height";i:200;s:4:"file";s:46:"2013/11/yahoo-va-se-mettre-au-chiffrement2.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:46:"yahoo-va-se-mettre-au-chiffrement2-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.8% (301&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:46:"yahoo-va-se-mettre-au-chiffrement2-250x198.jpg";s:5:"width";i:250;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 9.0% (655&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:46:"yahoo-va-se-mettre-au-chiffrement2-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>dsi-victimes-de-mutineries</title>
		<link>http://www.it-news.fr/partage-de-fichiers-les-regles-sont-de-plus-en-plus-contournees/dsi-victimes-de-mutineries/</link>
		<pubDate>Mon, 25 Nov 2013 09:23:27 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/dsi-victimes-de-mutineries.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1547</wp:post_id>
		<wp:post_date>2013-11-25 10:23:27</wp:post_date>
		<wp:post_date_gmt>2013-11-25 09:23:27</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>dsi-victimes-de-mutineries</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1444</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/dsi-victimes-de-mutineries.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/dsi-victimes-de-mutineries.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:250;s:6:"height";i:200;s:4:"file";s:38:"2013/11/dsi-victimes-de-mutineries.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:38:"dsi-victimes-de-mutineries-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.5% (529&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:38:"dsi-victimes-de-mutineries-250x198.jpg";s:5:"width";i:250;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.2% (934&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:38:"dsi-victimes-de-mutineries-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 8.8% (3.4&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>windows-8.1</title>
		<link>http://www.it-news.fr/windows-8-1-une-version-controversee/windows-8-1/</link>
		<pubDate>Mon, 25 Nov 2013 09:27:12 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/windows-8.1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1549</wp:post_id>
		<wp:post_date>2013-11-25 10:27:12</wp:post_date>
		<wp:post_date_gmt>2013-11-25 09:27:12</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>windows-8-1</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1439</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/windows-8.1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/windows-8.1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:250;s:6:"height";i:200;s:4:"file";s:23:"2013/11/windows-8.1.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:23:"windows-8.1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 9.7% (348&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:23:"windows-8.1-250x198.jpg";s:5:"width";i:250;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 12.4% (733&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:23:"windows-8.1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 13.0% (2.4&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>cyod-cest-du-byod-mais-sans-les-inconvenients</title>
		<link>http://www.it-news.fr/le-cyod-cest-du-byod-mais-sans-les-inconvenients/cyod-cest-du-byod-mais-sans-les-inconvenients-2/</link>
		<pubDate>Mon, 25 Nov 2013 09:36:45 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/cyod-cest-du-byod-mais-sans-les-inconvenients.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1560</wp:post_id>
		<wp:post_date>2013-11-25 10:36:45</wp:post_date>
		<wp:post_date_gmt>2013-11-25 09:36:45</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cyod-cest-du-byod-mais-sans-les-inconvenients-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1454</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/cyod-cest-du-byod-mais-sans-les-inconvenients.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/cyod-cest-du-byod-mais-sans-les-inconvenients.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:250;s:6:"height";i:200;s:4:"file";s:57:"2013/11/cyod-cest-du-byod-mais-sans-les-inconvenients.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:57:"cyod-cest-du-byod-mais-sans-les-inconvenients-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 12.7% (875&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:57:"cyod-cest-du-byod-mais-sans-les-inconvenients-250x198.jpg";s:5:"width";i:250;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 12.9% (1.6&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:57:"cyod-cest-du-byod-mais-sans-les-inconvenients-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 17.1% (5.4&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>consommation-energitiqye-des-data-centers</title>
		<link>http://www.it-news.fr/consommation-energetique-dun-data-center/consommation-energitiqye-des-data-centers/</link>
		<pubDate>Mon, 25 Nov 2013 09:40:07 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/consommation-energitiqye-des-data-centers.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1562</wp:post_id>
		<wp:post_date>2013-11-25 10:40:07</wp:post_date>
		<wp:post_date_gmt>2013-11-25 09:40:07</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>consommation-energitiqye-des-data-centers</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1495</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/consommation-energitiqye-des-data-centers.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/consommation-energitiqye-des-data-centers.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:250;s:6:"height";i:200;s:4:"file";s:53:"2013/11/consommation-energitiqye-des-data-centers.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:53:"consommation-energitiqye-des-data-centers-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.5% (743&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:53:"consommation-energitiqye-des-data-centers-250x198.jpg";s:5:"width";i:250;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 8.4% (1.3&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:53:"consommation-energitiqye-des-data-centers-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 10.5% (3.6&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-peplink-100x80</title>
		<link>http://www.it-news.fr/?attachment_id=1568</link>
		<pubDate>Mon, 25 Nov 2013 15:17:00 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/logo-peplink-100x80.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1568</wp:post_id>
		<wp:post_date>2013-11-25 16:17:00</wp:post_date>
		<wp:post_date_gmt>2013-11-25 15:17:00</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-peplink-100x80</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/logo-peplink-100x80.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/logo-peplink-100x80.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:100;s:6:"height";i:80;s:4:"file";s:31:"2013/11/logo-peplink-100x80.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 13.6% (937&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>peplink</title>
		<link>http://www.it-news.fr/?attachment_id=1569</link>
		<pubDate>Mon, 25 Nov 2013 15:17:16 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/peplink.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1569</wp:post_id>
		<wp:post_date>2013-11-25 16:17:16</wp:post_date>
		<wp:post_date_gmt>2013-11-25 15:17:16</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>peplink</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/peplink.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/peplink.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:280;s:6:"height";i:149;s:4:"file";s:19:"2013/11/peplink.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:5:{s:4:"file";s:19:"peplink-150x149.jpg";s:5:"width";i:150;s:6:"height";i:149;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 9.1% (508&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:19:"peplink-150x149.jpg";s:5:"width";i:150;s:6:"height";i:149;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 11.3% (1.3&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>chocolat</title>
		<link>http://www.it-news.fr/?attachment_id=1570</link>
		<pubDate>Mon, 25 Nov 2013 15:20:54 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/chocolat.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1570</wp:post_id>
		<wp:post_date>2013-11-25 16:20:54</wp:post_date>
		<wp:post_date_gmt>2013-11-25 15:20:54</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>chocolat</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/chocolat.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/chocolat.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_context</wp:meta_key>
			<wp:meta_value><![CDATA[custom-background]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:300;s:6:"height";i:168;s:4:"file";s:20:"2013/11/chocolat.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:5:{s:4:"file";s:20:"chocolat-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.6% (577&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:20:"chocolat-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_is_custom_background</wp:meta_key>
			<wp:meta_value><![CDATA[the-newswire]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>deloitte-technology-fast-500-200x250</title>
		<link>http://www.it-news.fr/palo-alto-networks-nommee-dans-le-technology-fast-500-de-deloitte/deloitte-technology-fast-500-200x250/</link>
		<pubDate>Tue, 26 Nov 2013 08:45:39 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/deloitte-technology-fast-500-200x250.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1572</wp:post_id>
		<wp:post_date>2013-11-26 09:45:39</wp:post_date>
		<wp:post_date_gmt>2013-11-26 08:45:39</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>deloitte-technology-fast-500-200x250</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1571</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/deloitte-technology-fast-500-200x250.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/deloitte-technology-fast-500-200x250.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:200;s:6:"height";i:250;s:4:"file";s:48:"2013/11/deloitte-technology-fast-500-200x250.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:48:"deloitte-technology-fast-500-200x250-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 11.2% (804&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:48:"deloitte-technology-fast-500-200x250-200x198.jpg";s:5:"width";i:200;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 11.7% (1.2&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:48:"deloitte-technology-fast-500-200x250-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 15.1% (5.2&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>palo alto networks 150x90</title>
		<link>http://www.it-news.fr/palo-alto-networks-nommee-dans-le-technology-fast-500-de-deloitte/palo-alto-networks-150x90/</link>
		<pubDate>Tue, 26 Nov 2013 08:47:39 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/palo-alto-networks-150x90.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1573</wp:post_id>
		<wp:post_date>2013-11-26 09:47:39</wp:post_date>
		<wp:post_date_gmt>2013-11-26 08:47:39</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>palo-alto-networks-150x90</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1571</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/palo-alto-networks-150x90.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/palo-alto-networks-150x90.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:150;s:6:"height";i:90;s:4:"file";s:37:"2013/11/palo-alto-networks-150x90.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 13.6% (1.3&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Deloitte-technology-fast-50</title>
		<link>http://www.it-news.fr/palo-alto-networks-nommee-dans-le-technology-fast-500-de-deloitte/deloitte-technology-fast-50/</link>
		<pubDate>Tue, 26 Nov 2013 08:52:00 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/Deloitte-technology-fast-50.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1574</wp:post_id>
		<wp:post_date>2013-11-26 09:52:00</wp:post_date>
		<wp:post_date_gmt>2013-11-26 08:52:00</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>deloitte-technology-fast-50</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1571</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/Deloitte-technology-fast-50.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/Deloitte-technology-fast-50.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:200;s:6:"height";i:250;s:4:"file";s:39:"2013/11/Deloitte-technology-fast-50.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:39:"Deloitte-technology-fast-50-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.4% (625&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:39:"Deloitte-technology-fast-50-200x198.jpg";s:5:"width";i:200;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:27:"Reduced by 9.7% (1&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:39:"Deloitte-technology-fast-50-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 11.8% (5.2&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Deloitte Technology Fast 500</title>
		<link>http://www.it-news.fr/palo-alto-networks-nommee-dans-le-technology-fast-500-de-deloitte/deloitte-technology-fast-500/</link>
		<pubDate>Tue, 26 Nov 2013 08:52:32 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/Deloitte-Technology-Fast-500.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1575</wp:post_id>
		<wp:post_date>2013-11-26 09:52:32</wp:post_date>
		<wp:post_date_gmt>2013-11-26 08:52:32</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>deloitte-technology-fast-500</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1571</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/Deloitte-Technology-Fast-500.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/Deloitte-Technology-Fast-500.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:304;s:6:"height";i:166;s:4:"file";s:40:"2013/11/Deloitte-Technology-Fast-500.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:40:"Deloitte-Technology-Fast-500-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 10.3% (981&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:40:"Deloitte-Technology-Fast-500-300x163.jpg";s:5:"width";i:300;s:6:"height";i:163;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 10.1% (1.5&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:40:"Deloitte-Technology-Fast-500-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 1.8% (169&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo blog</title>
		<link>http://www.it-news.fr/?attachment_id=1579</link>
		<pubDate>Mon, 02 Dec 2013 08:48:32 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/logo-blog.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1579</wp:post_id>
		<wp:post_date>2013-12-02 09:48:32</wp:post_date>
		<wp:post_date_gmt>2013-12-02 08:48:32</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-blog</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/logo-blog.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/logo-blog.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_context</wp:meta_key>
			<wp:meta_value><![CDATA[custom-background]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:160;s:6:"height";i:144;s:4:"file";s:21:"2013/12/logo-blog.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:5:{s:4:"file";s:21:"logo-blog-150x144.jpg";s:5:"width";i:150;s:6:"height";i:144;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.1% (347&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:21:"logo-blog-150x144.jpg";s:5:"width";i:150;s:6:"height";i:144;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 8.2% (588&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_is_custom_background</wp:meta_key>
			<wp:meta_value><![CDATA[twentytwelve]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>bannière blog</title>
		<link>http://www.it-news.fr/?attachment_id=1580</link>
		<pubDate>Mon, 02 Dec 2013 08:51:37 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/bannière-blog.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1580</wp:post_id>
		<wp:post_date>2013-12-02 09:51:37</wp:post_date>
		<wp:post_date_gmt>2013-12-02 08:51:37</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>banniere-blog-3</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/bannière-blog.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/bannière-blog.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_context</wp:meta_key>
			<wp:meta_value><![CDATA[custom-background]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:940;s:6:"height";i:127;s:4:"file";s:26:"2013/12/bannière-blog.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:26:"bannière-blog-150x127.jpg";s:5:"width";i:150;s:6:"height";i:127;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 9.0% (388&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:25:"bannière-blog-300x40.jpg";s:5:"width";i:300;s:6:"height";i:40;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.2% (274&nbsp;B)";}s:22:"wysija-newsletters-max";a:5:{s:4:"file";s:25:"bannière-blog-600x81.jpg";s:5:"width";i:600;s:6:"height";i:81;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 10.3% (1001&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:26:"bannière-blog-150x127.jpg";s:5:"width";i:150;s:6:"height";i:127;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 12.1% (2.3&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_is_custom_background</wp:meta_key>
			<wp:meta_value><![CDATA[twentyeleven]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo blog</title>
		<link>http://www.it-news.fr/?attachment_id=1581</link>
		<pubDate>Mon, 02 Dec 2013 09:11:51 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/logo-blog1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1581</wp:post_id>
		<wp:post_date>2013-12-02 10:11:51</wp:post_date>
		<wp:post_date_gmt>2013-12-02 09:11:51</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-blog-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/logo-blog1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/logo-blog1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:160;s:6:"height";i:144;s:4:"file";s:22:"2013/12/logo-blog1.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:5:{s:4:"file";s:22:"logo-blog1-150x144.jpg";s:5:"width";i:150;s:6:"height";i:144;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.1% (347&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:22:"logo-blog1-150x144.jpg";s:5:"width";i:150;s:6:"height";i:144;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 8.2% (588&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>bannière blog</title>
		<link>http://www.it-news.fr/?attachment_id=1582</link>
		<pubDate>Mon, 02 Dec 2013 09:12:08 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/bannière-blog1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1582</wp:post_id>
		<wp:post_date>2013-12-02 10:12:08</wp:post_date>
		<wp:post_date_gmt>2013-12-02 09:12:08</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>banniere-blog-4</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/bannière-blog1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/bannière-blog1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:940;s:6:"height";i:127;s:4:"file";s:27:"2013/12/bannière-blog1.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:27:"bannière-blog1-150x127.jpg";s:5:"width";i:150;s:6:"height";i:127;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 9.0% (388&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:26:"bannière-blog1-300x40.jpg";s:5:"width";i:300;s:6:"height";i:40;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.2% (274&nbsp;B)";}s:22:"wysija-newsletters-max";a:5:{s:4:"file";s:26:"bannière-blog1-600x81.jpg";s:5:"width";i:600;s:6:"height";i:81;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 10.3% (1001&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:27:"bannière-blog1-150x127.jpg";s:5:"width";i:150;s:6:"height";i:127;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 12.1% (2.3&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo blog</title>
		<link>http://www.it-news.fr/?attachment_id=1584</link>
		<pubDate>Mon, 02 Dec 2013 10:36:33 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/logo-blog2.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1584</wp:post_id>
		<wp:post_date>2013-12-02 11:36:33</wp:post_date>
		<wp:post_date_gmt>2013-12-02 10:36:33</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>logo-blog-3</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/logo-blog2.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/logo-blog2.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_context</wp:meta_key>
			<wp:meta_value><![CDATA[custom-background]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:174;s:6:"height";i:203;s:4:"file";s:22:"2013/12/logo-blog2.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:22:"logo-blog2-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.4% (526&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:22:"logo-blog2-174x198.jpg";s:5:"width";i:174;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.2% (840&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:22:"logo-blog2-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:22:"logo-blog2-150x175.jpg";s:5:"width";i:150;s:6:"height";i:175;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.3% (651&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 10.2% (1.3&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_is_custom_background</wp:meta_key>
			<wp:meta_value><![CDATA[attitude]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo blog</title>
		<link>http://www.it-news.fr/?attachment_id=1585</link>
		<pubDate>Mon, 02 Dec 2013 10:49:44 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/logo-blog3.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1585</wp:post_id>
		<wp:post_date>2013-12-02 11:49:44</wp:post_date>
		<wp:post_date_gmt>2013-12-02 10:49:44</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>logo-blog-4</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/logo-blog3.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/logo-blog3.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:174;s:6:"height";i:203;s:4:"file";s:22:"2013/12/logo-blog3.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:22:"logo-blog3-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.4% (526&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:22:"logo-blog3-174x198.jpg";s:5:"width";i:174;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.2% (840&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:22:"logo-blog3-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:22:"logo-blog3-150x175.jpg";s:5:"width";i:150;s:6:"height";i:175;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.3% (651&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 10.2% (1.3&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo blog</title>
		<link>http://www.it-news.fr/?attachment_id=1586</link>
		<pubDate>Tue, 03 Dec 2013 08:48:26 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/logo-blog4.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1586</wp:post_id>
		<wp:post_date>2013-12-03 09:48:26</wp:post_date>
		<wp:post_date_gmt>2013-12-03 08:48:26</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>logo-blog-5</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/logo-blog4.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/logo-blog4.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:174;s:6:"height";i:203;s:4:"file";s:22:"2013/12/logo-blog4.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:22:"logo-blog4-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.4% (526&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:22:"logo-blog4-174x198.jpg";s:5:"width";i:174;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.2% (840&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:22:"logo-blog4-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:22:"logo-blog4-150x175.jpg";s:5:"width";i:150;s:6:"height";i:175;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.3% (651&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 10.2% (1.3&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>bannière blog</title>
		<link>http://www.it-news.fr/?attachment_id=1587</link>
		<pubDate>Tue, 03 Dec 2013 08:48:45 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/bannière-blog2.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1587</wp:post_id>
		<wp:post_date>2013-12-03 09:48:45</wp:post_date>
		<wp:post_date_gmt>2013-12-03 08:48:45</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>banniere-blog-5</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/bannière-blog2.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/bannière-blog2.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:940;s:6:"height";i:127;s:4:"file";s:27:"2013/12/bannière-blog2.jpg";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:27:"bannière-blog2-150x127.jpg";s:5:"width";i:150;s:6:"height";i:127;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 9.0% (388&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:26:"bannière-blog2-300x40.jpg";s:5:"width";i:300;s:6:"height";i:40;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.2% (274&nbsp;B)";}s:22:"wysija-newsletters-max";a:5:{s:4:"file";s:26:"bannière-blog2-600x81.jpg";s:5:"width";i:600;s:6:"height";i:81;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 10.3% (1001&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:27:"bannière-blog2-150x127.jpg";s:5:"width";i:150;s:6:"height";i:127;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:26:"bannière-blog2-150x20.jpg";s:5:"width";i:150;s:6:"height";i:20;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.4% (100&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 12.1% (2.3&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>gestionnaire-de-paie</title>
		<link>http://www.it-news.fr/impots-des-entreprises-le-fichier-des-ecritures-comptables-devient-obligatoire-partir-du-1er-janvier-2014/gestionnaire-de-paie/</link>
		<pubDate>Tue, 03 Dec 2013 11:07:48 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/gestionnaire-de-paie.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1589</wp:post_id>
		<wp:post_date>2013-12-03 12:07:48</wp:post_date>
		<wp:post_date_gmt>2013-12-03 11:07:48</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>gestionnaire-de-paie</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1588</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/gestionnaire-de-paie.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/gestionnaire-de-paie.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:276;s:6:"height";i:183;s:4:"file";s:32:"2013/12/gestionnaire-de-paie.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:32:"gestionnaire-de-paie-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.6% (465&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:32:"gestionnaire-de-paie-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:31:"gestionnaire-de-paie-150x99.jpg";s:5:"width";i:150;s:6:"height";i:99;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.4% (407&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>dématérialisation-des-factures</title>
		<link>http://www.it-news.fr/impots-des-entreprises-le-fichier-des-ecritures-comptables-devient-obligatoire-partir-du-1er-janvier-2014/dematerialisation-des-factures/</link>
		<pubDate>Tue, 03 Dec 2013 11:37:07 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/dématérialisation-des-factures.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1591</wp:post_id>
		<wp:post_date>2013-12-03 12:37:07</wp:post_date>
		<wp:post_date_gmt>2013-12-03 11:37:07</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>dematerialisation-des-factures</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1588</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/dématérialisation-des-factures.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/dématérialisation-des-factures.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:250;s:6:"height";i:200;s:4:"file";s:44:"2013/12/dématérialisation-des-factures.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:44:"dématérialisation-des-factures-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.5% (718&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:44:"dématérialisation-des-factures-250x198.jpg";s:5:"width";i:250;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 5.9% (1.1&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:44:"dématérialisation-des-factures-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:44:"dématérialisation-des-factures-150x120.jpg";s:5:"width";i:150;s:6:"height";i:120;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.5% (614&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 3.6% (577&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>gestiion de paie casse tête</title>
		<link>http://www.it-news.fr/la-gestion-de-la-paie-veritable-casse-tete-pour-les-entreprises/gestiion-de-paie-casse-tete/</link>
		<pubDate>Tue, 03 Dec 2013 14:10:46 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/gestiion-de-paie-casse-tête.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1596</wp:post_id>
		<wp:post_date>2013-12-03 15:10:46</wp:post_date>
		<wp:post_date_gmt>2013-12-03 14:10:46</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>gestiion-de-paie-casse-tete</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1595</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/gestiion-de-paie-casse-tête.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/gestiion-de-paie-casse-tête.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:250;s:6:"height";i:200;s:4:"file";s:40:"2013/12/gestiion-de-paie-casse-tête.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:40:"gestiion-de-paie-casse-tête-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.9% (436&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:40:"gestiion-de-paie-casse-tête-250x198.jpg";s:5:"width";i:250;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.8% (733&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:40:"gestiion-de-paie-casse-tête-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:40:"gestiion-de-paie-casse-tête-150x120.jpg";s:5:"width";i:150;s:6:"height";i:120;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.6% (305&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 9.7% (4.7&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>gestionnaire de paie</title>
		<link>http://www.it-news.fr/la-gestion-de-la-paie-veritable-casse-tete-pour-les-entreprises/gestionnaire-de-paie-2/</link>
		<pubDate>Tue, 03 Dec 2013 14:10:53 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/gestionnaire-de-paie1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1597</wp:post_id>
		<wp:post_date>2013-12-03 15:10:53</wp:post_date>
		<wp:post_date_gmt>2013-12-03 14:10:53</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>gestionnaire-de-paie-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1595</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/gestionnaire-de-paie1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/gestionnaire-de-paie1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:250;s:6:"height";i:200;s:4:"file";s:33:"2013/12/gestionnaire-de-paie1.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:33:"gestionnaire-de-paie1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.6% (441&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:33:"gestionnaire-de-paie1-250x198.jpg";s:5:"width";i:250;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.4% (851&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:33:"gestionnaire-de-paie1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:33:"gestionnaire-de-paie1-150x120.jpg";s:5:"width";i:150;s:6:"height";i:120;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.9% (406&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:27:"Reduced by 8.5% (4&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>une-nouvelle-disposition-sur-la-santé</title>
		<link>http://www.it-news.fr/la-gestion-de-la-paie-veritable-casse-tete-pour-les-entreprises/une-nouvelle-disposition-sur-la-sante/</link>
		<pubDate>Tue, 03 Dec 2013 14:15:59 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/une-nouvelle-disposition-sur-la-santé.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1601</wp:post_id>
		<wp:post_date>2013-12-03 15:15:59</wp:post_date>
		<wp:post_date_gmt>2013-12-03 14:15:59</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>une-nouvelle-disposition-sur-la-sante</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1595</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/une-nouvelle-disposition-sur-la-santé.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/une-nouvelle-disposition-sur-la-santé.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:263;s:6:"height";i:191;s:4:"file";s:50:"2013/12/une-nouvelle-disposition-sur-la-santé.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:50:"une-nouvelle-disposition-sur-la-santé-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 11.0% (897&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:50:"une-nouvelle-disposition-sur-la-santé-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:50:"une-nouvelle-disposition-sur-la-santé-150x108.jpg";s:5:"width";i:150;s:6:"height";i:108;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 11.7% (823&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 1.3% (108&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>une-nouvelle-disposition-le-cice</title>
		<link>http://www.it-news.fr/la-gestion-de-la-paie-veritable-casse-tete-pour-les-entreprises/une-nouvelle-disposition-le-cice/</link>
		<pubDate>Tue, 03 Dec 2013 14:16:05 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/une-nouvelle-disposition-le-cice.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1602</wp:post_id>
		<wp:post_date>2013-12-03 15:16:05</wp:post_date>
		<wp:post_date_gmt>2013-12-03 14:16:05</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>une-nouvelle-disposition-le-cice</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1595</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/une-nouvelle-disposition-le-cice.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/une-nouvelle-disposition-le-cice.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:140;s:6:"height";i:125;s:4:"file";s:44:"2013/12/une-nouvelle-disposition-le-cice.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 10.2% (584&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>une-nouvelle-disposition-sur-la-santé-2</title>
		<link>http://www.it-news.fr/la-gestion-de-la-paie-veritable-casse-tete-pour-les-entreprises/une-nouvelle-disposition-sur-la-sante-2/</link>
		<pubDate>Tue, 03 Dec 2013 14:18:12 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/une-nouvelle-disposition-sur-la-santé-2.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1603</wp:post_id>
		<wp:post_date>2013-12-03 15:18:12</wp:post_date>
		<wp:post_date_gmt>2013-12-03 14:18:12</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>une-nouvelle-disposition-sur-la-sante-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1595</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/une-nouvelle-disposition-sur-la-santé-2.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/une-nouvelle-disposition-sur-la-santé-2.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:188;s:6:"height";i:137;s:4:"file";s:52:"2013/12/une-nouvelle-disposition-sur-la-santé-2.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:52:"une-nouvelle-disposition-sur-la-santé-2-150x137.jpg";s:5:"width";i:150;s:6:"height";i:137;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 9.8% (779&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:52:"une-nouvelle-disposition-sur-la-santé-2-150x137.jpg";s:5:"width";i:150;s:6:"height";i:137;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:52:"une-nouvelle-disposition-sur-la-santé-2-150x109.jpg";s:5:"width";i:150;s:6:"height";i:109;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 9.5% (604&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 14.8% (4.1&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>écriture-comptable-change-en-2014</title>
		<link>http://www.it-news.fr/impots-des-entreprises-le-fichier-des-ecritures-comptables-devient-obligatoire-partir-du-1er-janvier-2014-2/ecriture-comptable-change-en-2014/</link>
		<pubDate>Tue, 03 Dec 2013 14:26:54 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/écriture-comptable-change-en-2014.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1606</wp:post_id>
		<wp:post_date>2013-12-03 15:26:54</wp:post_date>
		<wp:post_date_gmt>2013-12-03 14:26:54</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>ecriture-comptable-change-en-2014</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1605</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/écriture-comptable-change-en-2014.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/écriture-comptable-change-en-2014.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:250;s:6:"height";i:200;s:4:"file";s:46:"2013/12/écriture-comptable-change-en-2014.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:46:"écriture-comptable-change-en-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.4% (353&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:46:"écriture-comptable-change-en-2014-250x198.jpg";s:5:"width";i:250;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.7% (713&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:46:"écriture-comptable-change-en-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>fichier-decritures-comptables</title>
		<link>http://www.it-news.fr/impots-des-entreprises-le-fichier-des-ecritures-comptables-devient-obligatoire-partir-du-1er-janvier-2014-2/fichier-decritures-comptables/</link>
		<pubDate>Tue, 03 Dec 2013 14:38:42 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/fichier-decritures-comptables.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1611</wp:post_id>
		<wp:post_date>2013-12-03 15:38:42</wp:post_date>
		<wp:post_date_gmt>2013-12-03 14:38:42</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>fichier-decritures-comptables</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1605</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/fichier-decritures-comptables.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/fichier-decritures-comptables.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:259;s:6:"height";i:195;s:4:"file";s:41:"2013/12/fichier-decritures-comptables.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:41:"fichier-decritures-comptables-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.8% (394&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:41:"fichier-decritures-comptables-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:41:"fichier-decritures-comptables-150x112.jpg";s:5:"width";i:150;s:6:"height";i:112;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.5% (462&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>centre-des-impots</title>
		<link>http://www.it-news.fr/impots-des-entreprises-le-fichier-des-ecritures-comptables-devient-obligatoire-partir-du-1er-janvier-2014-2/centre-des-impots/</link>
		<pubDate>Tue, 03 Dec 2013 14:49:32 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/centre-des-impots.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1613</wp:post_id>
		<wp:post_date>2013-12-03 15:49:32</wp:post_date>
		<wp:post_date_gmt>2013-12-03 14:49:32</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>centre-des-impots</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1605</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/centre-des-impots.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/centre-des-impots.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:275;s:6:"height";i:183;s:4:"file";s:29:"2013/12/centre-des-impots.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:29:"centre-des-impots-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.4% (608&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:29:"centre-des-impots-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:28:"centre-des-impots-150x99.jpg";s:5:"width";i:150;s:6:"height";i:99;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.1% (491&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>centre-des-impots</title>
		<link>http://www.it-news.fr/impots-des-entreprises-le-fichier-des-ecritures-comptables-devient-obligatoire-partir-du-1er-janvier-2014-2/centre-des-impots-2/</link>
		<pubDate>Tue, 03 Dec 2013 14:51:16 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/centre-des-impots1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1614</wp:post_id>
		<wp:post_date>2013-12-03 15:51:16</wp:post_date>
		<wp:post_date_gmt>2013-12-03 14:51:16</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>centre-des-impots-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1605</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/centre-des-impots1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/centre-des-impots1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:216;s:6:"height";i:119;s:4:"file";s:30:"2013/12/centre-des-impots1.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:30:"centre-des-impots1-150x119.jpg";s:5:"width";i:150;s:6:"height";i:119;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.2% (656&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:30:"centre-des-impots1-150x119.jpg";s:5:"width";i:150;s:6:"height";i:119;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:29:"centre-des-impots1-150x82.jpg";s:5:"width";i:150;s:6:"height";i:82;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.0% (513&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 11.1% (2&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>deloitte-fast-500</title>
		<link>http://www.it-news.fr/palo-alto-networks-nommee-dans-le-technology-fast-500-de-deloitte/deloitte-fast-500/</link>
		<pubDate>Tue, 03 Dec 2013 15:24:53 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/deloitte-fast-500.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1618</wp:post_id>
		<wp:post_date>2013-12-03 16:24:53</wp:post_date>
		<wp:post_date_gmt>2013-12-03 15:24:53</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>deloitte-fast-500</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1571</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/deloitte-fast-500.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/deloitte-fast-500.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:250;s:6:"height";i:200;s:4:"file";s:29:"2013/12/deloitte-fast-500.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:29:"deloitte-fast-500-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 12.7% (893&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:29:"deloitte-fast-500-250x198.jpg";s:5:"width";i:250;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 13.5% (1.6&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:29:"deloitte-fast-500-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:29:"deloitte-fast-500-150x120.jpg";s:5:"width";i:150;s:6:"height";i:120;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 12.1% (736&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 3.5% (885&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>wi-fi-on-board</title>
		<link>http://www.it-news.fr/restez-connecte-bord-de-votre/wi-fi-on-board/</link>
		<pubDate>Tue, 03 Dec 2013 15:34:25 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/wi-fi-on-board.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1620</wp:post_id>
		<wp:post_date>2013-12-03 16:34:25</wp:post_date>
		<wp:post_date_gmt>2013-12-03 15:34:25</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>wi-fi-on-board</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1480</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/wi-fi-on-board.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/wi-fi-on-board.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:250;s:6:"height";i:200;s:4:"file";s:26:"2013/11/wi-fi-on-board.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:26:"wi-fi-on-board-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 9.7% (512&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:26:"wi-fi-on-board-250x198.jpg";s:5:"width";i:250;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 12.3% (989&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:26:"wi-fi-on-board-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:26:"wi-fi-on-board-150x120.jpg";s:5:"width";i:150;s:6:"height";i:120;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.8% (392&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:27:"Reduced by 5.1% (1&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Le-FBI-victime-des-Anonymous</title>
		<link>http://www.it-news.fr/le-fbi-encore-victime-des-anonymous/le-fbi-victime-des-anonymous/</link>
		<pubDate>Tue, 03 Dec 2013 16:11:27 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/Le-FBI-victime-des-Anonymous.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1623</wp:post_id>
		<wp:post_date>2013-12-03 17:11:27</wp:post_date>
		<wp:post_date_gmt>2013-12-03 16:11:27</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>le-fbi-victime-des-anonymous</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1476</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/Le-FBI-victime-des-Anonymous.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/Le-FBI-victime-des-Anonymous.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:250;s:6:"height";i:200;s:4:"file";s:40:"2013/11/Le-FBI-victime-des-Anonymous.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:40:"Le-FBI-victime-des-Anonymous-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.6% (374&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:40:"Le-FBI-victime-des-Anonymous-250x198.jpg";s:5:"width";i:250;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.7% (869&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:40:"Le-FBI-victime-des-Anonymous-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:40:"Le-FBI-victime-des-Anonymous-150x120.jpg";s:5:"width";i:150;s:6:"height";i:120;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.1% (239&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 3.1% (680&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>windows-xp-sa-fin-programmee</title>
		<link>http://www.it-news.fr/la-fin-de-windows-xp-se-rapproche/windows-xp-sa-fin-programmee/</link>
		<pubDate>Wed, 04 Dec 2013 13:56:01 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/windows-xp-sa-fin-programmee.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1627</wp:post_id>
		<wp:post_date>2013-12-04 14:56:01</wp:post_date>
		<wp:post_date_gmt>2013-12-04 13:56:01</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>windows-xp-sa-fin-programmee</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1626</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/windows-xp-sa-fin-programmee.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/windows-xp-sa-fin-programmee.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:250;s:6:"height";i:200;s:4:"file";s:40:"2013/12/windows-xp-sa-fin-programmee.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:40:"windows-xp-sa-fin-programmee-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.5% (425&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:40:"windows-xp-sa-fin-programmee-250x198.jpg";s:5:"width";i:250;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 9.9% (772&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:40:"windows-xp-sa-fin-programmee-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:40:"windows-xp-sa-fin-programmee-150x120.jpg";s:5:"width";i:150;s:6:"height";i:120;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.9% (316&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 13.1% (2.2&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo blog</title>
		<link>http://www.it-news.fr/?attachment_id=1634</link>
		<pubDate>Thu, 05 Dec 2013 09:25:04 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/logo-blog5.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1634</wp:post_id>
		<wp:post_date>2013-12-05 10:25:04</wp:post_date>
		<wp:post_date_gmt>2013-12-05 09:25:04</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>logo-blog-6</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/logo-blog5.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/logo-blog5.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_context</wp:meta_key>
			<wp:meta_value><![CDATA[custom-background]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:174;s:6:"height";i:203;s:4:"file";s:22:"2013/12/logo-blog5.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:22:"logo-blog5-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.4% (526&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:22:"logo-blog5-174x198.jpg";s:5:"width";i:174;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.2% (840&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:22:"logo-blog5-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:22:"logo-blog5-150x175.jpg";s:5:"width";i:150;s:6:"height";i:175;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.3% (651&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 10.2% (1.3&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_is_custom_background</wp:meta_key>
			<wp:meta_value><![CDATA[contango]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo blog</title>
		<link>http://www.it-news.fr/?attachment_id=1635</link>
		<pubDate>Thu, 05 Dec 2013 09:27:38 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/logo-blog6.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1635</wp:post_id>
		<wp:post_date>2013-12-05 10:27:38</wp:post_date>
		<wp:post_date_gmt>2013-12-05 09:27:38</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>logo-blog-7</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/logo-blog6.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/logo-blog6.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_context</wp:meta_key>
			<wp:meta_value><![CDATA[custom-background]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:174;s:6:"height";i:203;s:4:"file";s:22:"2013/12/logo-blog6.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:22:"logo-blog6-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.4% (526&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:22:"logo-blog6-174x198.jpg";s:5:"width";i:174;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.2% (840&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:22:"logo-blog6-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:22:"logo-blog6-150x175.jpg";s:5:"width";i:150;s:6:"height";i:175;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.3% (651&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 10.2% (1.3&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_is_custom_background</wp:meta_key>
			<wp:meta_value><![CDATA[boldr-lite]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>contact-blog</title>
		<link>http://www.it-news.fr/?attachment_id=1636</link>
		<pubDate>Thu, 05 Dec 2013 09:29:38 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/contact-blog.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1636</wp:post_id>
		<wp:post_date>2013-12-05 10:29:38</wp:post_date>
		<wp:post_date_gmt>2013-12-05 09:29:38</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>contact-blog</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/contact-blog.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/contact-blog.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:212;s:6:"height";i:229;s:4:"file";s:24:"2013/12/contact-blog.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:24:"contact-blog-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.2% (475&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:24:"contact-blog-212x198.jpg";s:5:"width";i:212;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.1% (862&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:24:"contact-blog-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:24:"contact-blog-150x162.jpg";s:5:"width";i:150;s:6:"height";i:162;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.2% (496&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 2.7% (936&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo blog</title>
		<link>http://www.it-news.fr/?attachment_id=1637</link>
		<pubDate>Thu, 05 Dec 2013 09:29:53 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/logo-blog7.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1637</wp:post_id>
		<wp:post_date>2013-12-05 10:29:53</wp:post_date>
		<wp:post_date_gmt>2013-12-05 09:29:53</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>logo-blog-8</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/logo-blog7.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/logo-blog7.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:174;s:6:"height";i:203;s:4:"file";s:22:"2013/12/logo-blog7.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:22:"logo-blog7-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.4% (526&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:22:"logo-blog7-174x198.jpg";s:5:"width";i:174;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.2% (840&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:22:"logo-blog7-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:22:"logo-blog7-150x175.jpg";s:5:"width";i:150;s:6:"height";i:175;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.3% (651&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 10.2% (1.3&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo blog</title>
		<link>http://www.it-news.fr/?attachment_id=1638</link>
		<pubDate>Thu, 05 Dec 2013 09:39:08 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/logo-blog8.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1638</wp:post_id>
		<wp:post_date>2013-12-05 10:39:08</wp:post_date>
		<wp:post_date_gmt>2013-12-05 09:39:08</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>logo-blog-9</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/logo-blog8.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/logo-blog8.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_context</wp:meta_key>
			<wp:meta_value><![CDATA[custom-background]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:174;s:6:"height";i:203;s:4:"file";s:22:"2013/12/logo-blog8.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:22:"logo-blog8-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.4% (526&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:22:"logo-blog8-174x198.jpg";s:5:"width";i:174;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.2% (840&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:22:"logo-blog8-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:22:"logo-blog8-150x175.jpg";s:5:"width";i:150;s:6:"height";i:175;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.3% (651&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 10.2% (1.3&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_is_custom_background</wp:meta_key>
			<wp:meta_value><![CDATA[the-bootstrap]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo blog</title>
		<link>http://www.it-news.fr/?attachment_id=1639</link>
		<pubDate>Thu, 05 Dec 2013 09:42:20 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/logo-blog9.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1639</wp:post_id>
		<wp:post_date>2013-12-05 10:42:20</wp:post_date>
		<wp:post_date_gmt>2013-12-05 09:42:20</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>logo-blog-10</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/logo-blog9.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/logo-blog9.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_context</wp:meta_key>
			<wp:meta_value><![CDATA[custom-background]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:174;s:6:"height";i:203;s:4:"file";s:22:"2013/12/logo-blog9.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:22:"logo-blog9-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.4% (526&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:22:"logo-blog9-174x198.jpg";s:5:"width";i:174;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.2% (840&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:22:"logo-blog9-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:22:"logo-blog9-150x175.jpg";s:5:"width";i:150;s:6:"height";i:175;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.3% (651&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 10.2% (1.3&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_is_custom_background</wp:meta_key>
			<wp:meta_value><![CDATA[farad]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>test</title>
		<link>http://www.it-news.fr/la-fin-de-windows-xp-se-rapproche/test-2/</link>
		<pubDate>Thu, 05 Dec 2013 09:58:02 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/test.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1640</wp:post_id>
		<wp:post_date>2013-12-05 10:58:02</wp:post_date>
		<wp:post_date_gmt>2013-12-05 09:58:02</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>test-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1626</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/test.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/test.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:320;s:6:"height";i:210;s:4:"file";s:16:"2013/12/test.jpg";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:16:"test-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.5% (606&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:16:"test-300x196.jpg";s:5:"width";i:300;s:6:"height";i:196;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.8% (869&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:16:"test-320x198.jpg";s:5:"width";i:320;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.5% (895&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:16:"test-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:15:"test-150x98.jpg";s:5:"width";i:150;s:6:"height";i:98;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.9% (424&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 2.9% (985&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>fin-du-support-Windows-XP</title>
		<link>http://www.it-news.fr/la-fin-de-windows-xp-se-rapproche/fin-du-support-windows-xp/</link>
		<pubDate>Thu, 05 Dec 2013 10:02:08 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/fin-du-support-Windows-XP.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1642</wp:post_id>
		<wp:post_date>2013-12-05 11:02:08</wp:post_date>
		<wp:post_date_gmt>2013-12-05 10:02:08</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>fin-du-support-windows-xp</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1626</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/fin-du-support-Windows-XP.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/fin-du-support-Windows-XP.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:320;s:6:"height";i:210;s:4:"file";s:37:"2013/12/fin-du-support-Windows-XP.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:37:"fin-du-support-Windows-XP-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.7% (457&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:37:"fin-du-support-Windows-XP-300x196.jpg";s:5:"width";i:300;s:6:"height";i:196;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.1% (800&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:37:"fin-du-support-Windows-XP-320x198.jpg";s:5:"width";i:320;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:27:"Reduced by 9.3% (1&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:37:"fin-du-support-Windows-XP-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>gestion-de-la-paie-2014</title>
		<link>http://www.it-news.fr/la-gestion-de-la-paie-veritable-casse-tete-pour-les-entreprises/gestion-de-la-paie-2014/</link>
		<pubDate>Thu, 05 Dec 2013 10:04:05 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/gestion-de-la-paie-2014.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1644</wp:post_id>
		<wp:post_date>2013-12-05 11:04:05</wp:post_date>
		<wp:post_date_gmt>2013-12-05 10:04:05</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>gestion-de-la-paie-2014</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1595</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/gestion-de-la-paie-2014.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/gestion-de-la-paie-2014.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:320;s:6:"height";i:210;s:4:"file";s:35:"2013/12/gestion-de-la-paie-2014.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:35:"gestion-de-la-paie-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.8% (427&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:35:"gestion-de-la-paie-2014-300x196.jpg";s:5:"width";i:300;s:6:"height";i:196;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.7% (535&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:35:"gestion-de-la-paie-2014-320x198.jpg";s:5:"width";i:320;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.6% (747&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:35:"gestion-de-la-paie-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>la-dematerialisation</title>
		<link>http://www.it-news.fr/impots-des-entreprises-le-fichier-des-ecritures-comptables-devient-obligatoire-partir-du-1er-janvier-2014/la-dematerialisation/</link>
		<pubDate>Thu, 05 Dec 2013 10:06:38 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/la-dematerialisation.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1646</wp:post_id>
		<wp:post_date>2013-12-05 11:06:38</wp:post_date>
		<wp:post_date_gmt>2013-12-05 10:06:38</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>la-dematerialisation</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1588</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/la-dematerialisation.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/la-dematerialisation.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:320;s:6:"height";i:210;s:4:"file";s:32:"2013/12/la-dematerialisation.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:32:"la-dematerialisation-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.9% (840&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:32:"la-dematerialisation-300x196.jpg";s:5:"width";i:300;s:6:"height";i:196;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.8% (1.4&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:32:"la-dematerialisation-320x198.jpg";s:5:"width";i:320;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 7.1% (1.7&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:32:"la-dematerialisation-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>deloitte-fast-500-v2</title>
		<link>http://www.it-news.fr/palo-alto-networks-nommee-dans-le-technology-fast-500-de-deloitte/deloitte-fast-500-v2/</link>
		<pubDate>Thu, 05 Dec 2013 10:09:23 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/deloitte-fast-500-v2.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1648</wp:post_id>
		<wp:post_date>2013-12-05 11:09:23</wp:post_date>
		<wp:post_date_gmt>2013-12-05 10:09:23</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>deloitte-fast-500-v2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1571</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/deloitte-fast-500-v2.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/deloitte-fast-500-v2.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:320;s:6:"height";i:210;s:4:"file";s:32:"2013/12/deloitte-fast-500-v2.jpg";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:32:"deloitte-fast-500-v2-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 10.6% (1002&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:32:"deloitte-fast-500-v2-300x196.jpg";s:5:"width";i:300;s:6:"height";i:196;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 10.5% (1.6&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:32:"deloitte-fast-500-v2-320x198.jpg";s:5:"width";i:320;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 11.7% (2.1&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:32:"deloitte-fast-500-v2-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:31:"deloitte-fast-500-v2-150x98.jpg";s:5:"width";i:150;s:6:"height";i:98;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 9.2% (600&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 3.8% (1.6&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>securite-informatique</title>
		<link>http://www.it-news.fr/la-securite-informatique-est-toujours-sous-estimee/securite-informatique/</link>
		<pubDate>Thu, 05 Dec 2013 10:12:55 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/securite-informatique.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1651</wp:post_id>
		<wp:post_date>2013-12-05 11:12:55</wp:post_date>
		<wp:post_date_gmt>2013-12-05 10:12:55</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>securite-informatique</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1506</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/securite-informatique.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/securite-informatique.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:320;s:6:"height";i:210;s:4:"file";s:33:"2013/11/securite-informatique.jpg";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:33:"securite-informatique-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.9% (819&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:33:"securite-informatique-300x196.jpg";s:5:"width";i:300;s:6:"height";i:196;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.9% (1.4&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:33:"securite-informatique-320x198.jpg";s:5:"width";i:320;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 7.2% (1.9&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:33:"securite-informatique-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:32:"securite-informatique-150x98.jpg";s:5:"width";i:150;s:6:"height";i:98;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.8% (478&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 3.2% (2.8&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>consommation-energie-datacenter</title>
		<link>http://www.it-news.fr/consommation-energetique-dun-data-center/consommation-energie-datacenter/</link>
		<pubDate>Thu, 05 Dec 2013 10:23:55 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/consommation-energie-datacenter.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1656</wp:post_id>
		<wp:post_date>2013-12-05 11:23:55</wp:post_date>
		<wp:post_date_gmt>2013-12-05 10:23:55</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>consommation-energie-datacenter</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1495</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/consommation-energie-datacenter.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/consommation-energie-datacenter.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:320;s:6:"height";i:210;s:4:"file";s:43:"2013/11/consommation-energie-datacenter.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:43:"consommation-energie-datacenter-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.0% (478&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:43:"consommation-energie-datacenter-300x196.jpg";s:5:"width";i:300;s:6:"height";i:196;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.7% (674&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:43:"consommation-energie-datacenter-320x198.jpg";s:5:"width";i:320;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.9% (794&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:43:"consommation-energie-datacenter-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>wifi-onboard-v2</title>
		<link>http://www.it-news.fr/restez-connecte-bord-de-votre/wifi-onboard-v2/</link>
		<pubDate>Thu, 05 Dec 2013 10:30:48 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/wifi-onboard-v2.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1658</wp:post_id>
		<wp:post_date>2013-12-05 11:30:48</wp:post_date>
		<wp:post_date_gmt>2013-12-05 10:30:48</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>wifi-onboard-v2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1480</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/wifi-onboard-v2.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/wifi-onboard-v2.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:320;s:6:"height";i:210;s:4:"file";s:27:"2013/11/wifi-onboard-v2.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:27:"wifi-onboard-v2-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 9.8% (497&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:27:"wifi-onboard-v2-300x196.jpg";s:5:"width";i:300;s:6:"height";i:196;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 11.5% (876&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:27:"wifi-onboard-v2-320x198.jpg";s:5:"width";i:320;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 13.2% (1.1&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:27:"wifi-onboard-v2-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Le-FBI-victime-des-Anonymous</title>
		<link>http://www.it-news.fr/le-fbi-encore-victime-des-anonymous/le-fbi-victime-des-anonymous-2/</link>
		<pubDate>Thu, 05 Dec 2013 10:32:45 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/Le-FBI-victime-des-Anonymous1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1661</wp:post_id>
		<wp:post_date>2013-12-05 11:32:45</wp:post_date>
		<wp:post_date_gmt>2013-12-05 10:32:45</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>le-fbi-victime-des-anonymous-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1476</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/Le-FBI-victime-des-Anonymous1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/Le-FBI-victime-des-Anonymous1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:320;s:6:"height";i:210;s:4:"file";s:41:"2013/11/Le-FBI-victime-des-Anonymous1.jpg";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:41:"Le-FBI-victime-des-Anonymous1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.0% (519&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:41:"Le-FBI-victime-des-Anonymous1-300x196.jpg";s:5:"width";i:300;s:6:"height";i:196;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.6% (903&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:41:"Le-FBI-victime-des-Anonymous1-320x198.jpg";s:5:"width";i:320;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:27:"Reduced by 7.9% (1&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:41:"Le-FBI-victime-des-Anonymous1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:40:"Le-FBI-victime-des-Anonymous1-150x98.jpg";s:5:"width";i:150;s:6:"height";i:98;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.0% (206&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 4.2% (1.1&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>qu-est-ce-que-le-cyod</title>
		<link>http://www.it-news.fr/le-cyod-cest-du-byod-mais-sans-les-inconvenients/qu-est-ce-que-le-cyod/</link>
		<pubDate>Thu, 05 Dec 2013 10:34:40 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/qu-est-ce-que-le-cyod.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1663</wp:post_id>
		<wp:post_date>2013-12-05 11:34:40</wp:post_date>
		<wp:post_date_gmt>2013-12-05 10:34:40</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>qu-est-ce-que-le-cyod</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1454</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/qu-est-ce-que-le-cyod.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/qu-est-ce-que-le-cyod.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:320;s:6:"height";i:210;s:4:"file";s:33:"2013/11/qu-est-ce-que-le-cyod.jpg";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:33:"qu-est-ce-que-le-cyod-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 12.7% (854&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:33:"qu-est-ce-que-le-cyod-300x196.jpg";s:5:"width";i:300;s:6:"height";i:196;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 12.5% (1.4&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:33:"qu-est-ce-que-le-cyod-320x198.jpg";s:5:"width";i:320;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 13.8% (1.8&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:33:"qu-est-ce-que-le-cyod-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:32:"qu-est-ce-que-le-cyod-150x98.jpg";s:5:"width";i:150;s:6:"height";i:98;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 9.5% (430&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 4.4% (1.1&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>tva-unique-2</title>
		<link>http://www.it-news.fr/vers-une-declaration-unique-de-tva-en-union-europeenne/tva-unique-2/</link>
		<pubDate>Thu, 05 Dec 2013 10:35:31 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/11/tva-unique-2.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1665</wp:post_id>
		<wp:post_date>2013-12-05 11:35:31</wp:post_date>
		<wp:post_date_gmt>2013-12-05 10:35:31</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>tva-unique-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1459</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/11/tva-unique-2.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/11/tva-unique-2.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:320;s:6:"height";i:210;s:4:"file";s:24:"2013/11/tva-unique-2.jpg";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:24:"tva-unique-2-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 9.9% (954&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:24:"tva-unique-2-300x196.jpg";s:5:"width";i:300;s:6:"height";i:196;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 10.2% (1.4&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:24:"tva-unique-2-320x198.jpg";s:5:"width";i:320;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 10.1% (1.5&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:24:"tva-unique-2-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:23:"tva-unique-2-150x98.jpg";s:5:"width";i:150;s:6:"height";i:98;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 9.7% (630&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:27:"Reduced by 4.7% (2&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>contact-blog</title>
		<link>http://www.it-news.fr/?attachment_id=1673</link>
		<pubDate>Thu, 05 Dec 2013 13:25:19 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/contact-blog1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1673</wp:post_id>
		<wp:post_date>2013-12-05 14:25:19</wp:post_date>
		<wp:post_date_gmt>2013-12-05 13:25:19</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>contact-blog-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/contact-blog1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/contact-blog1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:212;s:6:"height";i:229;s:4:"file";s:25:"2013/12/contact-blog1.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:25:"contact-blog1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.0% (582&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:25:"contact-blog1-212x198.jpg";s:5:"width";i:212;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 8.6% (1.2&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:25:"contact-blog1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:25:"contact-blog1-150x162.jpg";s:5:"width";i:150;s:6:"height";i:162;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.3% (609&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 2.2% (867&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>archives</title>
		<link>http://www.it-news.fr/?attachment_id=1674</link>
		<pubDate>Thu, 05 Dec 2013 13:28:48 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/archives.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1674</wp:post_id>
		<wp:post_date>2013-12-05 14:28:48</wp:post_date>
		<wp:post_date_gmt>2013-12-05 13:28:48</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>archives</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/archives.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/archives.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:205;s:6:"height";i:35;s:4:"file";s:20:"2013/12/archives.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:19:"archives-150x35.jpg";s:5:"width";i:150;s:6:"height";i:35;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 10.2% (190&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:19:"archives-150x35.jpg";s:5:"width";i:150;s:6:"height";i:35;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:19:"archives-150x25.jpg";s:5:"width";i:150;s:6:"height";i:25;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.4% (137&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>themes</title>
		<link>http://www.it-news.fr/?attachment_id=1675</link>
		<pubDate>Thu, 05 Dec 2013 13:28:55 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/themes.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1675</wp:post_id>
		<wp:post_date>2013-12-05 14:28:55</wp:post_date>
		<wp:post_date_gmt>2013-12-05 13:28:55</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>themes</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/themes.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/themes.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:205;s:6:"height";i:35;s:4:"file";s:18:"2013/12/themes.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:17:"themes-150x35.jpg";s:5:"width";i:150;s:6:"height";i:35;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 10.5% (247&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:17:"themes-150x35.jpg";s:5:"width";i:150;s:6:"height";i:35;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:17:"themes-150x25.jpg";s:5:"width";i:150;s:6:"height";i:25;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.5% (163&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>contact-blog3</title>
		<link>http://www.it-news.fr/?attachment_id=1676</link>
		<pubDate>Thu, 05 Dec 2013 13:32:22 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/contact-blog3.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1676</wp:post_id>
		<wp:post_date>2013-12-05 14:32:22</wp:post_date>
		<wp:post_date_gmt>2013-12-05 13:32:22</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>contact-blog3</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/contact-blog3.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/contact-blog3.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:212;s:6:"height";i:229;s:4:"file";s:25:"2013/12/contact-blog3.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:25:"contact-blog3-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.8% (566&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:25:"contact-blog3-212x198.jpg";s:5:"width";i:212;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 8.3% (1.1&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:25:"contact-blog3-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:25:"contact-blog3-150x162.jpg";s:5:"width";i:150;s:6:"height";i:162;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.3% (605&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 2.4% (950&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>header-blog</title>
		<link>http://www.it-news.fr/?attachment_id=1677</link>
		<pubDate>Thu, 05 Dec 2013 14:50:14 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/header-blog.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1677</wp:post_id>
		<wp:post_date>2013-12-05 15:50:14</wp:post_date>
		<wp:post_date_gmt>2013-12-05 14:50:14</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>header-blog</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/header-blog.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/header-blog.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:940;s:6:"height";i:127;s:4:"file";s:23:"2013/12/header-blog.jpg";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:23:"header-blog-150x127.jpg";s:5:"width";i:150;s:6:"height";i:127;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.2% (616&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:22:"header-blog-300x40.jpg";s:5:"width";i:300;s:6:"height";i:40;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.0% (338&nbsp;B)";}s:22:"wysija-newsletters-max";a:5:{s:4:"file";s:22:"header-blog-600x81.jpg";s:5:"width";i:600;s:6:"height";i:81;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:27:"Reduced by 8.8% (1&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:23:"header-blog-150x127.jpg";s:5:"width";i:150;s:6:"height";i:127;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:22:"header-blog-150x20.jpg";s:5:"width";i:150;s:6:"height";i:20;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.0% (125&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:27:"Reduced by 4.8% (3&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>cropped-header-blog.jpg</title>
		<link>http://www.it-news.fr/?attachment_id=1678</link>
		<pubDate>Thu, 05 Dec 2013 14:50:55 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/cropped-header-blog.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[http://www.it-news.fr/wp-content/uploads/2013/12/cropped-header-blog.jpg]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1678</wp:post_id>
		<wp:post_date>2013-12-05 15:50:55</wp:post_date>
		<wp:post_date_gmt>2013-12-05 14:50:55</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cropped-header-blog-jpg</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/cropped-header-blog.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/cropped-header-blog.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_context</wp:meta_key>
			<wp:meta_value><![CDATA[custom-header]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:940;s:6:"height";i:127;s:4:"file";s:31:"2013/12/cropped-header-blog.jpg";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:31:"cropped-header-blog-150x127.jpg";s:5:"width";i:150;s:6:"height";i:127;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.9% (574&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:30:"cropped-header-blog-300x40.jpg";s:5:"width";i:300;s:6:"height";i:40;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.1% (337&nbsp;B)";}s:22:"wysija-newsletters-max";a:5:{s:4:"file";s:30:"cropped-header-blog-600x81.jpg";s:5:"width";i:600;s:6:"height";i:81;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.4% (978&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:31:"cropped-header-blog-150x127.jpg";s:5:"width";i:150;s:6:"height";i:127;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:30:"cropped-header-blog-150x20.jpg";s:5:"width";i:150;s:6:"height";i:20;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.5% (115&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 9.9% (2.2&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_is_custom_header</wp:meta_key>
			<wp:meta_value><![CDATA[twentyten]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Palo-banniere1</title>
		<link>http://www.it-news.fr/?attachment_id=1680</link>
		<pubDate>Thu, 05 Dec 2013 15:12:42 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/Palo-banniere1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1680</wp:post_id>
		<wp:post_date>2013-12-05 16:12:42</wp:post_date>
		<wp:post_date_gmt>2013-12-05 15:12:42</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>palo-banniere1-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/Palo-banniere1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/Palo-banniere1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:122;s:6:"height";i:547;s:4:"file";s:26:"2013/12/Palo-banniere1.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:26:"Palo-banniere1-122x150.jpg";s:5:"width";i:122;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.8% (495&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:25:"Palo-banniere1-66x300.jpg";s:5:"width";i:66;s:6:"height";i:300;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.2% (793&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:26:"Palo-banniere1-122x198.jpg";s:5:"width";i:122;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.9% (669&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:26:"Palo-banniere1-122x150.jpg";s:5:"width";i:122;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 4.4% (2.9&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>expoprotection</title>
		<link>http://www.it-news.fr/event/expoprotection/expoprotection/</link>
		<pubDate>Thu, 05 Dec 2013 15:37:21 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/expoprotection.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1685</wp:post_id>
		<wp:post_date>2013-12-05 16:37:21</wp:post_date>
		<wp:post_date_gmt>2013-12-05 15:37:21</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>expoprotection</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1684</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/expoprotection.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/expoprotection.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:180;s:6:"height";i:70;s:4:"file";s:26:"2013/12/expoprotection.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:25:"expoprotection-150x70.jpg";s:5:"width";i:150;s:6:"height";i:70;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 9.5% (365&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:25:"expoprotection-150x70.jpg";s:5:"width";i:150;s:6:"height";i:70;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:25:"expoprotection-150x58.jpg";s:5:"width";i:150;s:6:"height";i:58;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.1% (289&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 11.8% (633&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>it-partners</title>
		<link>http://www.it-news.fr/event/partners/it-partners/</link>
		<pubDate>Thu, 05 Dec 2013 16:02:41 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/it-partners.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1687</wp:post_id>
		<wp:post_date>2013-12-05 17:02:41</wp:post_date>
		<wp:post_date_gmt>2013-12-05 16:02:41</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>it-partners</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1686</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/it-partners.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/it-partners.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:190;s:6:"height";i:69;s:4:"file";s:23:"2013/12/it-partners.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:22:"it-partners-150x69.jpg";s:5:"width";i:150;s:6:"height";i:69;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.7% (372&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:22:"it-partners-150x69.jpg";s:5:"width";i:150;s:6:"height";i:69;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:22:"it-partners-150x54.jpg";s:5:"width";i:150;s:6:"height";i:54;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.1% (292&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 10.1% (620&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>midest</title>
		<link>http://www.it-news.fr/event/midest/midest/</link>
		<pubDate>Thu, 05 Dec 2013 16:08:31 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/midest.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1690</wp:post_id>
		<wp:post_date>2013-12-05 17:08:31</wp:post_date>
		<wp:post_date_gmt>2013-12-05 16:08:31</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>midest</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1689</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/midest.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/midest.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:257;s:6:"height";i:71;s:4:"file";s:18:"2013/12/midest.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:17:"midest-150x71.jpg";s:5:"width";i:150;s:6:"height";i:71;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.2% (359&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:17:"midest-150x71.jpg";s:5:"width";i:150;s:6:"height";i:71;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:17:"midest-150x41.jpg";s:5:"width";i:150;s:6:"height";i:41;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.9% (225&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 12.6% (4.1&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>medpi</title>
		<link>http://www.it-news.fr/event/medpi/medpi/</link>
		<pubDate>Thu, 05 Dec 2013 16:21:14 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/medpi.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1694</wp:post_id>
		<wp:post_date>2013-12-05 17:21:14</wp:post_date>
		<wp:post_date_gmt>2013-12-05 16:21:14</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>medpi</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1693</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/medpi.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/medpi.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:183;s:6:"height";i:136;s:4:"file";s:17:"2013/12/medpi.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:17:"medpi-150x136.jpg";s:5:"width";i:150;s:6:"height";i:136;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.8% (361&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:17:"medpi-150x136.jpg";s:5:"width";i:150;s:6:"height";i:136;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:17:"medpi-150x111.jpg";s:5:"width";i:150;s:6:"height";i:111;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.0% (285&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 8.4% (668&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>sitl-europe</title>
		<link>http://www.it-news.fr/event/sitl-europe/sitl-europe/</link>
		<pubDate>Thu, 05 Dec 2013 16:29:44 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/sitl-europe.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1697</wp:post_id>
		<wp:post_date>2013-12-05 17:29:44</wp:post_date>
		<wp:post_date_gmt>2013-12-05 16:29:44</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>sitl-europe</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1696</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/sitl-europe.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/sitl-europe.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:179;s:6:"height";i:180;s:4:"file";s:23:"2013/12/sitl-europe.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:23:"sitl-europe-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 9.3% (596&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:23:"sitl-europe-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:23:"sitl-europe-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 11.7% (1.2&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>documentation</title>
		<link>http://www.it-news.fr/event/documation/documentation/</link>
		<pubDate>Thu, 05 Dec 2013 16:36:27 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/documentation.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1698</wp:post_id>
		<wp:post_date>2013-12-05 17:36:27</wp:post_date>
		<wp:post_date_gmt>2013-12-05 16:36:27</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>documentation</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1681</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/documentation.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/documentation.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:249;s:6:"height";i:58;s:4:"file";s:25:"2013/12/documentation.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:24:"documentation-150x58.jpg";s:5:"width";i:150;s:6:"height";i:58;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 10.8% (366&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:24:"documentation-150x58.jpg";s:5:"width";i:150;s:6:"height";i:58;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:24:"documentation-150x34.jpg";s:5:"width";i:150;s:6:"height";i:34;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 10.0% (293&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 13.5% (840&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>ecriture-comptable-change-en-2014</title>
		<link>http://www.it-news.fr/impots-des-entreprises-le-fichier-des-ecritures-comptables-devient-obligatoire-partir-du-1er-janvier-2014-2/ecriture-comptable-change-en-2014-2/</link>
		<pubDate>Fri, 06 Dec 2013 09:38:32 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/ecriture-comptable-change-en-2014.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1701</wp:post_id>
		<wp:post_date>2013-12-06 10:38:32</wp:post_date>
		<wp:post_date_gmt>2013-12-06 09:38:32</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>ecriture-comptable-change-en-2014-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1605</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/ecriture-comptable-change-en-2014.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/ecriture-comptable-change-en-2014.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:320;s:6:"height";i:210;s:4:"file";s:45:"2013/12/ecriture-comptable-change-en-2014.jpg";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:45:"ecriture-comptable-change-en-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.1% (358&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:45:"ecriture-comptable-change-en-2014-300x196.jpg";s:5:"width";i:300;s:6:"height";i:196;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.9% (587&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:45:"ecriture-comptable-change-en-2014-320x198.jpg";s:5:"width";i:320;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.3% (693&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:45:"ecriture-comptable-change-en-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:44:"ecriture-comptable-change-en-2014-150x98.jpg";s:5:"width";i:150;s:6:"height";i:98;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.9% (311&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 4.7% (844&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>2014-une-annee-riche-en-cyberattaque</title>
		<link>http://www.it-news.fr/2014-ou-une-annee-riche-en-cyberattaque/2014-une-annee-riche-en-cyberattaque/</link>
		<pubDate>Fri, 06 Dec 2013 13:50:39 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/2014-une-annee-riche-en-cyberattaque.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1720</wp:post_id>
		<wp:post_date>2013-12-06 14:50:39</wp:post_date>
		<wp:post_date_gmt>2013-12-06 13:50:39</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>2014-une-annee-riche-en-cyberattaque</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1719</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/2014-une-annee-riche-en-cyberattaque.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/2014-une-annee-riche-en-cyberattaque.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:320;s:6:"height";i:210;s:4:"file";s:48:"2013/12/2014-une-annee-riche-en-cyberattaque.jpg";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:48:"2014-une-annee-riche-en-cyberattaque-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.6% (328&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:48:"2014-une-annee-riche-en-cyberattaque-300x196.jpg";s:5:"width";i:300;s:6:"height";i:196;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 10.6% (671&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:48:"2014-une-annee-riche-en-cyberattaque-320x198.jpg";s:5:"width";i:320;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 12.5% (874&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:48:"2014-une-annee-riche-en-cyberattaque-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:47:"2014-une-annee-riche-en-cyberattaque-150x98.jpg";s:5:"width";i:150;s:6:"height";i:98;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.5% (219&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 16.5% (1.7&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>france-championne-en-matière-de-byod</title>
		<link>http://www.it-news.fr/la-france-championne-europeenne-du-byod/france-championne-en-matiere-de-byod/</link>
		<pubDate>Fri, 06 Dec 2013 13:59:17 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/france-championne-en-matière-de-byod.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1724</wp:post_id>
		<wp:post_date>2013-12-06 14:59:17</wp:post_date>
		<wp:post_date_gmt>2013-12-06 13:59:17</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>france-championne-en-matiere-de-byod</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1722</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/france-championne-en-matière-de-byod.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/france-championne-en-matière-de-byod.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:640;s:6:"height";i:2253;s:4:"file";s:49:"2013/12/france-championne-en-matière-de-byod.png";s:5:"sizes";a:7:{s:9:"thumbnail";a:5:{s:4:"file";s:49:"france-championne-en-matière-de-byod-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:29:"Reduced by 7.3% (1.6&nbsp;KB)";}s:6:"medium";a:5:{s:4:"file";s:48:"france-championne-en-matière-de-byod-85x300.png";s:5:"width";i:85;s:6:"height";i:300;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 10.0% (3.2&nbsp;KB)";}s:5:"large";a:5:{s:4:"file";s:50:"france-championne-en-matière-de-byod-290x1024.png";s:5:"width";i:290;s:6:"height";i:1024;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 9.9% (29.2&nbsp;KB)";}s:22:"wysija-newsletters-max";a:5:{s:4:"file";s:50:"france-championne-en-matière-de-byod-600x2112.png";s:5:"width";i:600;s:6:"height";i:2112;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 6.8% (68.3&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:49:"france-championne-en-matière-de-byod-640x198.png";s:5:"width";i:640;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:29:"Reduced by 6.0% (4.1&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:49:"france-championne-en-matière-de-byod-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:49:"france-championne-en-matière-de-byod-150x528.png";s:5:"width";i:150;s:6:"height";i:528;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:29:"Reduced by 9.7% (8.4&nbsp;KB)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 7.1% (67.8&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>drapeau-francais</title>
		<link>http://www.it-news.fr/la-france-championne-europeenne-du-byod/drapeau-francais/</link>
		<pubDate>Fri, 06 Dec 2013 14:07:58 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/drapeau-francais.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1726</wp:post_id>
		<wp:post_date>2013-12-06 15:07:58</wp:post_date>
		<wp:post_date_gmt>2013-12-06 14:07:58</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>drapeau-francais</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1722</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/drapeau-francais.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/drapeau-francais.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:320;s:6:"height";i:210;s:4:"file";s:28:"2013/12/drapeau-francais.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:28:"drapeau-francais-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:27:"Reduced by 2.1% (93&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:28:"drapeau-francais-300x196.jpg";s:5:"width";i:300;s:6:"height";i:196;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 1.5% (131&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:28:"drapeau-francais-320x198.jpg";s:5:"width";i:320;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 1.5% (142&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:28:"drapeau-francais-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>les-4-criteres-pour-choisir-sa-solution-de-dematerialisation</title>
		<link>http://www.it-news.fr/les-4-criteres-pour-choisir-sa-solution-de-dematerialisation/les-4-criteres-pour-choisir-sa-solution-de-dematerialisation/</link>
		<pubDate>Fri, 06 Dec 2013 14:13:10 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/les-4-criteres-pour-choisir-sa-solution-de-dematerialisation.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1729</wp:post_id>
		<wp:post_date>2013-12-06 15:13:10</wp:post_date>
		<wp:post_date_gmt>2013-12-06 14:13:10</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>les-4-criteres-pour-choisir-sa-solution-de-dematerialisation</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1728</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/les-4-criteres-pour-choisir-sa-solution-de-dematerialisation.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/les-4-criteres-pour-choisir-sa-solution-de-dematerialisation.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:320;s:6:"height";i:210;s:4:"file";s:72:"2013/12/les-4-criteres-pour-choisir-sa-solution-de-dematerialisation.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:72:"les-4-criteres-pour-choisir-sa-solution-de-dematerialisation-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.8% (282&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:72:"les-4-criteres-pour-choisir-sa-solution-de-dematerialisation-300x196.jpg";s:5:"width";i:300;s:6:"height";i:196;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 3.7% (395&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:72:"les-4-criteres-pour-choisir-sa-solution-de-dematerialisation-320x198.jpg";s:5:"width";i:320;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 3.9% (469&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:72:"les-4-criteres-pour-choisir-sa-solution-de-dematerialisation-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>cloud-et-virtualisation-se-battent-pour-plus-de-sécurité</title>
		<link>http://www.it-news.fr/cloud-et-virtualisation-se-battent-pour-plus-de-securite/cloud-et-virtualisation-se-battent-pour-plus-de-securite/</link>
		<pubDate>Fri, 06 Dec 2013 15:18:57 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/cloud-et-virtualisation-se-battent-pour-plus-de-sécurité.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1737</wp:post_id>
		<wp:post_date>2013-12-06 16:18:57</wp:post_date>
		<wp:post_date_gmt>2013-12-06 15:18:57</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cloud-et-virtualisation-se-battent-pour-plus-de-securite</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1731</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/cloud-et-virtualisation-se-battent-pour-plus-de-sécurité.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/cloud-et-virtualisation-se-battent-pour-plus-de-sécurité.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:320;s:6:"height";i:210;s:4:"file";s:70:"2013/12/cloud-et-virtualisation-se-battent-pour-plus-de-sécurité.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:70:"cloud-et-virtualisation-se-battent-pour-plus-de-sécurité-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.4% (790&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:70:"cloud-et-virtualisation-se-battent-pour-plus-de-sécurité-300x196.jpg";s:5:"width";i:300;s:6:"height";i:196;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.9% (1.5&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:70:"cloud-et-virtualisation-se-battent-pour-plus-de-sécurité-320x198.jpg";s:5:"width";i:320;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.5% (1.7&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:70:"cloud-et-virtualisation-se-battent-pour-plus-de-sécurité-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>vos-donnees-sont-elles-cryptees</title>
		<link>http://www.it-news.fr/vos-donnees-sont-elles-bien-cryptees/vos-donnees-sont-elles-cryptees/</link>
		<pubDate>Fri, 06 Dec 2013 15:33:26 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/vos-donnees-sont-elles-cryptees.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1742</wp:post_id>
		<wp:post_date>2013-12-06 16:33:26</wp:post_date>
		<wp:post_date_gmt>2013-12-06 15:33:26</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>vos-donnees-sont-elles-cryptees</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1741</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/vos-donnees-sont-elles-cryptees.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/vos-donnees-sont-elles-cryptees.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:320;s:6:"height";i:210;s:4:"file";s:43:"2013/12/vos-donnees-sont-elles-cryptees.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:43:"vos-donnees-sont-elles-cryptees-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 10.3% (1.3&nbsp;KB)";}s:6:"medium";a:5:{s:4:"file";s:43:"vos-donnees-sont-elles-cryptees-300x196.jpg";s:5:"width";i:300;s:6:"height";i:196;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 10.8% (2.7&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:43:"vos-donnees-sont-elles-cryptees-320x198.jpg";s:5:"width";i:320;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 11.4% (3.2&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:43:"vos-donnees-sont-elles-cryptees-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>infographie-cryptage-des-données-chez-les-geants-informatiques</title>
		<link>http://www.it-news.fr/vos-donnees-sont-elles-bien-cryptees/infographie-cryptage-des-donnees-chez-les-geants-informatiques/</link>
		<pubDate>Fri, 06 Dec 2013 15:35:40 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/infographie-cryptage-des-données-chez-les-geants-informatiques.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1743</wp:post_id>
		<wp:post_date>2013-12-06 16:35:40</wp:post_date>
		<wp:post_date_gmt>2013-12-06 15:35:40</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>infographie-cryptage-des-donnees-chez-les-geants-informatiques</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1741</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/infographie-cryptage-des-données-chez-les-geants-informatiques.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/infographie-cryptage-des-données-chez-les-geants-informatiques.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:640;s:6:"height";i:1263;s:4:"file";s:75:"2013/12/infographie-cryptage-des-données-chez-les-geants-informatiques.jpg";s:5:"sizes";a:7:{s:9:"thumbnail";a:5:{s:4:"file";s:75:"infographie-cryptage-des-données-chez-les-geants-informatiques-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:27:"Reduced by 8.5% (1&nbsp;KB)";}s:6:"medium";a:5:{s:4:"file";s:75:"infographie-cryptage-des-données-chez-les-geants-informatiques-152x300.jpg";s:5:"width";i:152;s:6:"height";i:300;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 7.8% (1.7&nbsp;KB)";}s:5:"large";a:5:{s:4:"file";s:76:"infographie-cryptage-des-données-chez-les-geants-informatiques-518x1024.jpg";s:5:"width";i:518;s:6:"height";i:1024;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 8.8% (12.6&nbsp;KB)";}s:22:"wysija-newsletters-max";a:5:{s:4:"file";s:76:"infographie-cryptage-des-données-chez-les-geants-informatiques-600x1184.jpg";s:5:"width";i:600;s:6:"height";i:1184;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 9.4% (17.2&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:75:"infographie-cryptage-des-données-chez-les-geants-informatiques-640x198.jpg";s:5:"width";i:640;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 11.3% (3.3&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:75:"infographie-cryptage-des-données-chez-les-geants-informatiques-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:75:"infographie-cryptage-des-données-chez-les-geants-informatiques-150x296.jpg";s:5:"width";i:150;s:6:"height";i:296;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 7.8% (1.7&nbsp;KB)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 12.4% (31&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>internet-des-objets</title>
		<link>http://www.it-news.fr/2014-ou-une-annee-riche-en-cyberattaque/internet-des-objets/</link>
		<pubDate>Mon, 09 Dec 2013 12:20:46 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/internet-des-objets.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1747</wp:post_id>
		<wp:post_date>2013-12-09 13:20:46</wp:post_date>
		<wp:post_date_gmt>2013-12-09 12:20:46</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>internet-des-objets</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1719</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/internet-des-objets.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/internet-des-objets.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:600;s:6:"height";i:360;s:4:"file";s:31:"2013/12/internet-des-objets.jpg";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:31:"internet-des-objets-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 10.6% (1.3&nbsp;KB)";}s:6:"medium";a:5:{s:4:"file";s:31:"internet-des-objets-300x180.jpg";s:5:"width";i:300;s:6:"height";i:180;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 9.5% (2.3&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:31:"internet-des-objets-600x198.jpg";s:5:"width";i:600;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 9.6% (3.6&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:31:"internet-des-objets-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:30:"internet-des-objets-150x90.jpg";s:5:"width";i:150;s:6:"height";i:90;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 10.5% (951&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 8.7% (5.5&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>deep-web</title>
		<link>http://www.it-news.fr/2014-ou-une-annee-riche-en-cyberattaque/deep-web/</link>
		<pubDate>Mon, 09 Dec 2013 12:23:49 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/deep-web.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1748</wp:post_id>
		<wp:post_date>2013-12-09 13:23:49</wp:post_date>
		<wp:post_date_gmt>2013-12-09 12:23:49</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>deep-web</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1719</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/deep-web.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/deep-web.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:566;s:6:"height";i:438;s:4:"file";s:20:"2013/12/deep-web.jpg";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:20:"deep-web-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.1% (893&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:20:"deep-web-300x232.jpg";s:5:"width";i:300;s:6:"height";i:232;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.8% (1.6&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:20:"deep-web-566x198.jpg";s:5:"width";i:566;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.4% (2.1&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:20:"deep-web-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:20:"deep-web-150x116.jpg";s:5:"width";i:150;s:6:"height";i:116;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.2% (695&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 6.8% (4.4&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>federal-trade-commission</title>
		<link>http://www.it-news.fr/2014-ou-une-annee-riche-en-cyberattaque/federal-trade-commission/</link>
		<pubDate>Mon, 09 Dec 2013 12:31:33 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/federal-trade-commission.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1749</wp:post_id>
		<wp:post_date>2013-12-09 13:31:33</wp:post_date>
		<wp:post_date_gmt>2013-12-09 12:31:33</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>federal-trade-commission</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1719</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/federal-trade-commission.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/federal-trade-commission.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:225;s:6:"height";i:225;s:4:"file";s:36:"2013/12/federal-trade-commission.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:36:"federal-trade-commission-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 7.9% (1.1&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:36:"federal-trade-commission-225x198.jpg";s:5:"width";i:225;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 8.5% (2.5&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:36:"federal-trade-commission-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:36:"federal-trade-commission-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 1.7% (423&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>rip</title>
		<link>http://www.it-news.fr/2014-ou-une-annee-riche-en-cyberattaque/rip/</link>
		<pubDate>Mon, 09 Dec 2013 12:32:09 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/rip.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1750</wp:post_id>
		<wp:post_date>2013-12-09 13:32:09</wp:post_date>
		<wp:post_date_gmt>2013-12-09 12:32:09</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>rip</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1719</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/rip.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/rip.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:256;s:6:"height";i:256;s:4:"file";s:15:"2013/12/rip.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:15:"rip-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 10.1% (746&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:15:"rip-256x198.jpg";s:5:"width";i:256;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 12.3% (1.5&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:15:"rip-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:15:"rip-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 2.3% (547&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>solution-biométrique</title>
		<link>http://www.it-news.fr/2014-ou-une-annee-riche-en-cyberattaque/solution-biometrique/</link>
		<pubDate>Mon, 09 Dec 2013 12:33:17 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/solution-biométrique.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1751</wp:post_id>
		<wp:post_date>2013-12-09 13:33:17</wp:post_date>
		<wp:post_date_gmt>2013-12-09 12:33:17</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>solution-biometrique</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1719</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/solution-biométrique.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/solution-biométrique.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:800;s:6:"height";i:495;s:4:"file";s:33:"2013/12/solution-biométrique.jpg";s:5:"sizes";a:6:{s:9:"thumbnail";a:5:{s:4:"file";s:33:"solution-biométrique-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.8% (893&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:33:"solution-biométrique-300x185.jpg";s:5:"width";i:300;s:6:"height";i:185;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 7.9% (1.9&nbsp;KB)";}s:22:"wysija-newsletters-max";a:5:{s:4:"file";s:33:"solution-biométrique-600x371.jpg";s:5:"width";i:600;s:6:"height";i:371;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 7.3% (5.1&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:33:"solution-biométrique-800x198.jpg";s:5:"width";i:800;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.6% (2.9&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:33:"solution-biométrique-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:32:"solution-biométrique-150x92.jpg";s:5:"width";i:150;s:6:"height";i:92;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.1% (681&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 4.0% (3.3&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>La-securite-informatique-en-2014</title>
		<link>http://www.it-news.fr/2014-ou-une-annee-riche-en-cyberattaque/la-securite-informatique-en-2014/</link>
		<pubDate>Mon, 09 Dec 2013 12:36:06 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/La-securite-informatique-en-2014.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1753</wp:post_id>
		<wp:post_date>2013-12-09 13:36:06</wp:post_date>
		<wp:post_date_gmt>2013-12-09 12:36:06</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>la-securite-informatique-en-2014</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1719</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/La-securite-informatique-en-2014.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/La-securite-informatique-en-2014.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:320;s:6:"height";i:210;s:4:"file";s:44:"2013/12/La-securite-informatique-en-2014.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:44:"La-securite-informatique-en-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.7% (533&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:44:"La-securite-informatique-en-2014-300x196.jpg";s:5:"width";i:300;s:6:"height";i:196;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.2% (941&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:44:"La-securite-informatique-en-2014-320x198.jpg";s:5:"width";i:320;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.6% (935&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:44:"La-securite-informatique-en-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>facture-electronique-dematerialisation</title>
		<link>http://www.it-news.fr/impots-des-entreprises-le-fichier-des-ecritures-comptables-devient-obligatoire-partir-du-1er-janvier-2014/facture-electronique-dematerialisation/</link>
		<pubDate>Thu, 12 Dec 2013 08:23:19 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/facture-electronique-dematerialisation.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1759</wp:post_id>
		<wp:post_date>2013-12-12 09:23:19</wp:post_date>
		<wp:post_date_gmt>2013-12-12 08:23:19</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>facture-electronique-dematerialisation</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1588</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/facture-electronique-dematerialisation.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/facture-electronique-dematerialisation.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:300;s:6:"height";i:316;s:4:"file";s:50:"2013/12/facture-electronique-dematerialisation.jpg";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:50:"facture-electronique-dematerialisation-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.7% (317&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:50:"facture-electronique-dematerialisation-284x300.jpg";s:5:"width";i:284;s:6:"height";i:300;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.2% (912&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:50:"facture-electronique-dematerialisation-300x198.jpg";s:5:"width";i:300;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.6% (694&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:50:"facture-electronique-dematerialisation-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:50:"facture-electronique-dematerialisation-150x158.jpg";s:5:"width";i:150;s:6:"height";i:158;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.3% (295&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-linkedin</title>
		<link>http://www.it-news.fr/?attachment_id=1762</link>
		<pubDate>Thu, 12 Dec 2013 08:31:41 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/logo-linkedin.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1762</wp:post_id>
		<wp:post_date>2013-12-12 09:31:41</wp:post_date>
		<wp:post_date_gmt>2013-12-12 08:31:41</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-linkedin</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/logo-linkedin.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/logo-linkedin.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:36;s:6:"height";i:36;s:4:"file";s:25:"2013/12/logo-linkedin.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>palo-alto-firewall</title>
		<link>http://www.it-news.fr/cloud-et-virtualisation-se-battent-pour-plus-de-securite/palo-alto-firewall/</link>
		<pubDate>Thu, 12 Dec 2013 10:23:15 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/palo-alto-firewall.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1767</wp:post_id>
		<wp:post_date>2013-12-12 11:23:15</wp:post_date>
		<wp:post_date_gmt>2013-12-12 10:23:15</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>palo-alto-firewall</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1731</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/palo-alto-firewall.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/palo-alto-firewall.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:351;s:6:"height";i:199;s:4:"file";s:30:"2013/12/palo-alto-firewall.png";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:30:"palo-alto-firewall-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:28:"Reduced by 2.5% (693&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:30:"palo-alto-firewall-300x170.png";s:5:"width";i:300;s:6:"height";i:170;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:29:"Reduced by 3.4% (1.8&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:30:"palo-alto-firewall-351x198.png";s:5:"width";i:351;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:29:"Reduced by 2.6% (1.6&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:30:"palo-alto-firewall-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:29:"palo-alto-firewall-150x85.png";s:5:"width";i:150;s:6:"height";i:85;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:28:"Reduced by 1.9% (304&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:31:"Reduced by 33.4% (26.6&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>banniere-blog</title>
		<link>http://www.it-news.fr/?attachment_id=1772</link>
		<pubDate>Mon, 16 Dec 2013 09:48:56 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/banniere-blog.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1772</wp:post_id>
		<wp:post_date>2013-12-16 10:48:56</wp:post_date>
		<wp:post_date_gmt>2013-12-16 09:48:56</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>banniere-blog-6</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/banniere-blog.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/banniere-blog.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_context</wp:meta_key>
			<wp:meta_value><![CDATA[custom-background]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:940;s:6:"height";i:127;s:4:"file";s:25:"2013/12/banniere-blog.jpg";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:25:"banniere-blog-150x127.jpg";s:5:"width";i:150;s:6:"height";i:127;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 9.4% (415&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:24:"banniere-blog-300x40.jpg";s:5:"width";i:300;s:6:"height";i:40;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.8% (301&nbsp;B)";}s:22:"wysija-newsletters-max";a:5:{s:4:"file";s:24:"banniere-blog-600x81.jpg";s:5:"width";i:600;s:6:"height";i:81;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 10.9% (1.1&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:25:"banniere-blog-150x127.jpg";s:5:"width";i:150;s:6:"height";i:127;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:24:"banniere-blog-150x20.jpg";s:5:"width";i:150;s:6:"height";i:20;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.5% (101&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 4.9% (2.4&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_is_custom_background</wp:meta_key>
			<wp:meta_value><![CDATA[twentyfourteen]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>pony-botnet</title>
		<link>http://www.it-news.fr/le-botnet-pony-compromet-2-millions-de-mots-de-passe/pony-botnet/</link>
		<pubDate>Tue, 17 Dec 2013 16:28:38 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/pony-botnet.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1774</wp:post_id>
		<wp:post_date>2013-12-17 17:28:38</wp:post_date>
		<wp:post_date_gmt>2013-12-17 16:28:38</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>pony-botnet</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1773</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/pony-botnet.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/pony-botnet.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:320;s:6:"height";i:210;s:4:"file";s:23:"2013/12/pony-botnet.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:23:"pony-botnet-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 11.9% (1.7&nbsp;KB)";}s:6:"medium";a:5:{s:4:"file";s:23:"pony-botnet-300x196.jpg";s:5:"width";i:300;s:6:"height";i:196;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 11.1% (3.2&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:23:"pony-botnet-320x198.jpg";s:5:"width";i:320;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 10.8% (3.6&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:23:"pony-botnet-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>la-nsa-recolte-massivement-des-donnees-par-les-ecoutes-telephoniques</title>
		<link>http://www.it-news.fr/la-nsa-recolte-massivement-des-donnees-par-les-ecoutes-telephoniques/la-nsa-recolte-massivement-des-donnees-par-les-ecoutes-telephoniques/</link>
		<pubDate>Tue, 17 Dec 2013 16:40:07 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/la-nsa-recolte-massivement-des-donnees-par-les-ecoutes-telephoniques.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1777</wp:post_id>
		<wp:post_date>2013-12-17 17:40:07</wp:post_date>
		<wp:post_date_gmt>2013-12-17 16:40:07</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>la-nsa-recolte-massivement-des-donnees-par-les-ecoutes-telephoniques</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1776</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/la-nsa-recolte-massivement-des-donnees-par-les-ecoutes-telephoniques.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/la-nsa-recolte-massivement-des-donnees-par-les-ecoutes-telephoniques.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:320;s:6:"height";i:210;s:4:"file";s:80:"2013/12/la-nsa-recolte-massivement-des-donnees-par-les-ecoutes-telephoniques.jpg";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:80:"la-nsa-recolte-massivement-des-donnees-par-les-ecoutes-telephoniques-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.9% (746&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:80:"la-nsa-recolte-massivement-des-donnees-par-les-ecoutes-telephoniques-300x196.jpg";s:5:"width";i:300;s:6:"height";i:196;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 9.6% (1.3&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:80:"la-nsa-recolte-massivement-des-donnees-par-les-ecoutes-telephoniques-320x198.jpg";s:5:"width";i:320;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 10.2% (1.6&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:80:"la-nsa-recolte-massivement-des-donnees-par-les-ecoutes-telephoniques-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:79:"la-nsa-recolte-massivement-des-donnees-par-les-ecoutes-telephoniques-150x98.jpg";s:5:"width";i:150;s:6:"height";i:98;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.8% (427&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 13.0% (3.4&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>cloud-et-virtualisation-se-battent-pour-plus-de-sécurité</title>
		<link>http://www.it-news.fr/le-simple-mot-de-passe-ne-suffit-plus-vous-proteger/cloud-et-virtualisation-se-battent-pour-plus-de-securite-2/</link>
		<pubDate>Tue, 17 Dec 2013 16:48:06 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/cloud-et-virtualisation-se-battent-pour-plus-de-sécurité1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1780</wp:post_id>
		<wp:post_date>2013-12-17 17:48:06</wp:post_date>
		<wp:post_date_gmt>2013-12-17 16:48:06</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cloud-et-virtualisation-se-battent-pour-plus-de-securite-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1779</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/cloud-et-virtualisation-se-battent-pour-plus-de-sécurité1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/cloud-et-virtualisation-se-battent-pour-plus-de-sécurité1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:320;s:6:"height";i:210;s:4:"file";s:71:"2013/12/cloud-et-virtualisation-se-battent-pour-plus-de-sécurité1.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:71:"cloud-et-virtualisation-se-battent-pour-plus-de-sécurité1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.4% (790&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:71:"cloud-et-virtualisation-se-battent-pour-plus-de-sécurité1-300x196.jpg";s:5:"width";i:300;s:6:"height";i:196;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.9% (1.5&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:71:"cloud-et-virtualisation-se-battent-pour-plus-de-sécurité1-320x198.jpg";s:5:"width";i:320;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.5% (1.7&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:71:"cloud-et-virtualisation-se-battent-pour-plus-de-sécurité1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>TOR-onion-router</title>
		<link>http://www.it-news.fr/tor-onion-router-en-passe-de-devenir-la-norme/tor-onion-router/</link>
		<pubDate>Thu, 19 Dec 2013 09:16:47 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/TOR-onion-router.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1787</wp:post_id>
		<wp:post_date>2013-12-19 10:16:47</wp:post_date>
		<wp:post_date_gmt>2013-12-19 09:16:47</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>tor-onion-router</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1786</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/TOR-onion-router.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/TOR-onion-router.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:320;s:6:"height";i:210;s:4:"file";s:28:"2013/12/TOR-onion-router.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:28:"TOR-onion-router-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.4% (447&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:28:"TOR-onion-router-300x196.jpg";s:5:"width";i:300;s:6:"height";i:196;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.3% (844&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:28:"TOR-onion-router-320x198.jpg";s:5:"width";i:320;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 8.9% (1005&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:28:"TOR-onion-router-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>programmation-militaite-2014</title>
		<link>http://www.it-news.fr/le-projet-de-loi-de-programmation-militaire-revient-au-senat/programmation-militaite-2014/</link>
		<pubDate>Thu, 19 Dec 2013 09:29:18 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/programmation-militaite-2014.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1791</wp:post_id>
		<wp:post_date>2013-12-19 10:29:18</wp:post_date>
		<wp:post_date_gmt>2013-12-19 09:29:18</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>programmation-militaite-2014</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1789</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/programmation-militaite-2014.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/programmation-militaite-2014.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:320;s:6:"height";i:210;s:4:"file";s:40:"2013/12/programmation-militaite-2014.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:40:"programmation-militaite-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.2% (550&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:40:"programmation-militaite-2014-300x196.jpg";s:5:"width";i:300;s:6:"height";i:196;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.3% (799&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:40:"programmation-militaite-2014-320x198.jpg";s:5:"width";i:320;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.5% (1.1&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:40:"programmation-militaite-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>inventeur-souris</title>
		<link>http://www.it-news.fr/la-souris-45-ans/inventeur-souris/</link>
		<pubDate>Thu, 19 Dec 2013 09:35:24 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/inventeur-souris.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1795</wp:post_id>
		<wp:post_date>2013-12-19 10:35:24</wp:post_date>
		<wp:post_date_gmt>2013-12-19 09:35:24</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>inventeur-souris</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1794</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/inventeur-souris.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/inventeur-souris.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:320;s:6:"height";i:210;s:4:"file";s:28:"2013/12/inventeur-souris.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:28:"inventeur-souris-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.6% (728&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:28:"inventeur-souris-300x196.jpg";s:5:"width";i:300;s:6:"height";i:196;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 7.2% (1.2&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:28:"inventeur-souris-320x198.jpg";s:5:"width";i:320;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 7.5% (1.5&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:28:"inventeur-souris-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>ordinateur xerox</title>
		<link>http://www.it-news.fr/la-souris-45-ans/ordinateur-xerox/</link>
		<pubDate>Thu, 19 Dec 2013 10:07:50 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/ordinateur-xerox.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1797</wp:post_id>
		<wp:post_date>2013-12-19 11:07:50</wp:post_date>
		<wp:post_date_gmt>2013-12-19 10:07:50</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>ordinateur-xerox</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1794</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/ordinateur-xerox.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/ordinateur-xerox.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:230;s:6:"height";i:288;s:4:"file";s:28:"2013/12/ordinateur-xerox.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:28:"ordinateur-xerox-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.9% (444&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:28:"ordinateur-xerox-230x198.jpg";s:5:"width";i:230;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.8% (827&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:28:"ordinateur-xerox-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:28:"ordinateur-xerox-150x187.jpg";s:5:"width";i:150;s:6:"height";i:187;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.8% (469&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 5.6% (1.3&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>voeu</title>
		<link>http://www.it-news.fr/?attachment_id=1812</link>
		<pubDate>Tue, 24 Dec 2013 09:01:17 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/voeu.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1812</wp:post_id>
		<wp:post_date>2013-12-24 10:01:17</wp:post_date>
		<wp:post_date_gmt>2013-12-24 09:01:17</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>voeu</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/voeu.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/voeu.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:156;s:6:"height";i:557;s:4:"file";s:16:"2013/12/voeu.png";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:16:"voeu-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:28:"Reduced by 2.4% (602&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:15:"voeu-84x300.png";s:5:"width";i:84;s:6:"height";i:300;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:28:"Reduced by 2.9% (819&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:16:"voeu-156x198.png";s:5:"width";i:156;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:28:"Reduced by 1.8% (518&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:16:"voeu-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:10:"No savings";}s:26:"WP_RP_THUMBNAILS_NAME_PROP";a:5:{s:4:"file";s:16:"voeu-150x535.png";s:5:"width";i:150;s:6:"height";i:535;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:29:"Reduced by 4.0% (2.9&nbsp;KB)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>2014-cap-vers-linnovation-en-milieu-hospitalier</title>
		<link>http://www.it-news.fr/2014-cap-sur-linnovation-pour-les-hopitaux-francais/2014-cap-vers-linnovation-en-milieu-hospitalier/</link>
		<pubDate>Thu, 26 Dec 2013 09:12:27 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/2014-cap-vers-linnovation-en-milieu-hospitalier.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1820</wp:post_id>
		<wp:post_date>2013-12-26 10:12:27</wp:post_date>
		<wp:post_date_gmt>2013-12-26 09:12:27</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>2014-cap-vers-linnovation-en-milieu-hospitalier</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1819</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/2014-cap-vers-linnovation-en-milieu-hospitalier.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/2014-cap-vers-linnovation-en-milieu-hospitalier.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:320;s:6:"height";i:210;s:4:"file";s:59:"2013/12/2014-cap-vers-linnovation-en-milieu-hospitalier.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:59:"2014-cap-vers-linnovation-en-milieu-hospitalier-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.0% (589&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:59:"2014-cap-vers-linnovation-en-milieu-hospitalier-300x196.jpg";s:5:"width";i:300;s:6:"height";i:196;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.8% (1.1&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:59:"2014-cap-vers-linnovation-en-milieu-hospitalier-320x198.jpg";s:5:"width";i:320;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.8% (1.2&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:59:"2014-cap-vers-linnovation-en-milieu-hospitalier-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>hopital-numerique</title>
		<link>http://www.it-news.fr/2014-cap-sur-linnovation-pour-les-hopitaux-francais/hopital-numerique/</link>
		<pubDate>Thu, 26 Dec 2013 09:12:35 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/hopital-numerique.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1821</wp:post_id>
		<wp:post_date>2013-12-26 10:12:35</wp:post_date>
		<wp:post_date_gmt>2013-12-26 09:12:35</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>hopital-numerique</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1819</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/hopital-numerique.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/hopital-numerique.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:108;s:6:"height";i:144;s:4:"file";s:29:"2013/12/hopital-numerique.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Zemanta Related Posts Thumbnail</title>
		<link>http://www.it-news.fr/adobe-les-veritables-consequences-de-la-cyberattaque/zemanta-related-posts-thumbnail-12/</link>
		<pubDate>Thu, 26 Dec 2013 13:36:35 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/10/adobe-a-ete-cyberattaque-150x150.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1830</wp:post_id>
		<wp:post_date>2013-12-26 14:36:35</wp:post_date>
		<wp:post_date_gmt>2013-12-26 13:36:35</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>zemanta-related-posts-thumbnail-12</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1305</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/10/adobe-a-ete-cyberattaque-150x1501.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/10/adobe-a-ete-cyberattaque-150x1501.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:150;s:6:"height";i:150;s:4:"file";s:45:"2013/10/adobe-a-ete-cyberattaque-150x1501.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Zemanta Related Posts Thumbnail</title>
		<link>http://www.it-news.fr/les-plus-gros-piratages-en-2013/zemanta-related-posts-thumbnail-13/</link>
		<pubDate>Thu, 26 Dec 2013 13:36:48 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/Les-plus-gros-piratages-150x150.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1831</wp:post_id>
		<wp:post_date>2013-12-26 14:36:48</wp:post_date>
		<wp:post_date_gmt>2013-12-26 13:36:48</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>zemanta-related-posts-thumbnail-13</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1043</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/Les-plus-gros-piratages-150x1501.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/Les-plus-gros-piratages-150x1501.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:150;s:6:"height";i:150;s:4:"file";s:44:"2013/09/Les-plus-gros-piratages-150x1501.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 12.5% (776&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Zemanta Related Posts Thumbnail</title>
		<link>http://www.it-news.fr/byod-letude-vmware-confirme-linteret-des-salaries-francais-a-cette-pratique/zemanta-related-posts-thumbnail-14/</link>
		<pubDate>Thu, 26 Dec 2013 13:38:49 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/07/byod-pic.png?w=150</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1832</wp:post_id>
		<wp:post_date>2013-12-26 14:38:49</wp:post_date>
		<wp:post_date_gmt>2013-12-26 13:38:49</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>zemanta-related-posts-thumbnail-14</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>789</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/07/byod-pic2.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/07/byod-pic2.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:254;s:6:"height";i:219;s:4:"file";s:21:"2013/07/byod-pic2.png";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:21:"byod-pic2-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:28:"Reduced by 2.8% (837&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:21:"byod-pic2-254x198.png";s:5:"width";i:254;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:28:"Reduced by 1.7% (867&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:21:"byod-pic2-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 0.5% (236&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-viadeo</title>
		<link>http://www.it-news.fr/?attachment_id=1835</link>
		<pubDate>Fri, 27 Dec 2013 08:18:53 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/logo-viadeo.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1835</wp:post_id>
		<wp:post_date>2013-12-27 09:18:53</wp:post_date>
		<wp:post_date_gmt>2013-12-27 08:18:53</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-viadeo</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/logo-viadeo.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/logo-viadeo.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:38;s:6:"height";i:38;s:4:"file";s:23:"2013/12/logo-viadeo.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-rss</title>
		<link>http://www.it-news.fr/?attachment_id=1836</link>
		<pubDate>Fri, 27 Dec 2013 08:18:56 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/logo-rss.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1836</wp:post_id>
		<wp:post_date>2013-12-27 09:18:56</wp:post_date>
		<wp:post_date_gmt>2013-12-27 08:18:56</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-rss</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/logo-rss.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/logo-rss.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:38;s:6:"height";i:38;s:4:"file";s:20:"2013/12/logo-rss.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-linkedin</title>
		<link>http://www.it-news.fr/?attachment_id=1837</link>
		<pubDate>Fri, 27 Dec 2013 08:19:00 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/logo-linkedin1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1837</wp:post_id>
		<wp:post_date>2013-12-27 09:19:00</wp:post_date>
		<wp:post_date_gmt>2013-12-27 08:19:00</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-linkedin-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/logo-linkedin1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/logo-linkedin1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:38;s:6:"height";i:38;s:4:"file";s:26:"2013/12/logo-linkedin1.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-youtube</title>
		<link>http://www.it-news.fr/?attachment_id=1838</link>
		<pubDate>Fri, 27 Dec 2013 08:19:03 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/logo-youtube.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1838</wp:post_id>
		<wp:post_date>2013-12-27 09:19:03</wp:post_date>
		<wp:post_date_gmt>2013-12-27 08:19:03</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-youtube</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/logo-youtube.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/logo-youtube.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:38;s:6:"height";i:38;s:4:"file";s:24:"2013/12/logo-youtube.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>logo-twitter</title>
		<link>http://www.it-news.fr/?attachment_id=1839</link>
		<pubDate>Fri, 27 Dec 2013 08:19:07 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/logo-twitter.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1839</wp:post_id>
		<wp:post_date>2013-12-27 09:19:07</wp:post_date>
		<wp:post_date_gmt>2013-12-27 08:19:07</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-twitter</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/logo-twitter.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/logo-twitter.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:38;s:6:"height";i:38;s:4:"file";s:24:"2013/12/logo-twitter.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>test-inscription</title>
		<link>http://www.it-news.fr/?attachment_id=1842</link>
		<pubDate>Fri, 27 Dec 2013 10:21:41 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/test-inscription.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1842</wp:post_id>
		<wp:post_date>2013-12-27 11:21:41</wp:post_date>
		<wp:post_date_gmt>2013-12-27 10:21:41</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>test-inscription</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/test-inscription.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/test-inscription.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:200;s:6:"height";i:381;s:4:"file";s:28:"2013/12/test-inscription.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:28:"test-inscription-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.4% (808&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:28:"test-inscription-157x300.jpg";s:5:"width";i:157;s:6:"height";i:300;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 8.4% (1.4&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:28:"test-inscription-200x198.jpg";s:5:"width";i:200;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 7.4% (1.1&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:28:"test-inscription-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:27:"Reduced by 3.2% (2&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>livre-blanc</title>
		<link>http://www.it-news.fr/?attachment_id=1866</link>
		<pubDate>Mon, 30 Dec 2013 09:51:40 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/livre-blanc.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1866</wp:post_id>
		<wp:post_date>2013-12-30 10:51:40</wp:post_date>
		<wp:post_date_gmt>2013-12-30 09:51:40</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>livre-blanc</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/livre-blanc.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/livre-blanc.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:200;s:6:"height";i:167;s:4:"file";s:23:"2013/12/livre-blanc.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:5:{s:4:"file";s:23:"livre-blanc-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 9.9% (961&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:23:"livre-blanc-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 2.1% (678&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>inscription3</title>
		<link>http://www.it-news.fr/?attachment_id=1867</link>
		<pubDate>Mon, 30 Dec 2013 09:55:46 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/inscription3.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1867</wp:post_id>
		<wp:post_date>2013-12-30 10:55:46</wp:post_date>
		<wp:post_date_gmt>2013-12-30 09:55:46</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>inscription3</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/inscription3.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/inscription3.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:198;s:6:"height";i:378;s:4:"file";s:24:"2013/12/inscription3.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:24:"inscription3-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.4% (802&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:24:"inscription3-157x300.jpg";s:5:"width";i:157;s:6:"height";i:300;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 8.6% (1.5&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:24:"inscription3-198x198.jpg";s:5:"width";i:198;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 7.8% (1.2&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:24:"inscription3-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 3.3% (2.1&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>5G-Infrastructure-PPP</title>
		<link>http://www.it-news.fr/lactivite-partielle-le-gouvernement-fait-le-point/5g-infrastructure-ppp/</link>
		<pubDate>Mon, 30 Dec 2013 15:46:36 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/5G-Infrastructure-PPP.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1869</wp:post_id>
		<wp:post_date>2013-12-30 16:46:36</wp:post_date>
		<wp:post_date_gmt>2013-12-30 15:46:36</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>5g-infrastructure-ppp</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1868</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/5G-Infrastructure-PPP.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/5G-Infrastructure-PPP.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:320;s:6:"height";i:210;s:4:"file";s:33:"2013/12/5G-Infrastructure-PPP.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:33:"5G-Infrastructure-PPP-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.0% (601&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:33:"5G-Infrastructure-PPP-300x196.jpg";s:5:"width";i:300;s:6:"height";i:196;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 5.9% (1.1&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:33:"5G-Infrastructure-PPP-320x198.jpg";s:5:"width";i:320;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.8% (1.4&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:33:"5G-Infrastructure-PPP-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 3.8% (2.4&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>cookies-cnil</title>
		<link>http://www.it-news.fr/lactivite-partielle-le-gouvernement-fait-le-point/cookies-cnil/</link>
		<pubDate>Mon, 30 Dec 2013 15:46:44 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/cookies-cnil.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1870</wp:post_id>
		<wp:post_date>2013-12-30 16:46:44</wp:post_date>
		<wp:post_date_gmt>2013-12-30 15:46:44</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cookies-cnil</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1868</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/cookies-cnil.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/cookies-cnil.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:320;s:6:"height";i:210;s:4:"file";s:24:"2013/12/cookies-cnil.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:24:"cookies-cnil-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.1% (616&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:24:"cookies-cnil-300x196.jpg";s:5:"width";i:300;s:6:"height";i:196;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 7.9% (1.4&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:24:"cookies-cnil-320x198.jpg";s:5:"width";i:320;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 8.0% (1.6&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:24:"cookies-cnil-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Temps-partiel</title>
		<link>http://www.it-news.fr/lactivite-partielle-le-gouvernement-fait-le-point/temps-partiel/</link>
		<pubDate>Mon, 30 Dec 2013 15:46:51 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/Temps-partiel.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1871</wp:post_id>
		<wp:post_date>2013-12-30 16:46:51</wp:post_date>
		<wp:post_date_gmt>2013-12-30 15:46:51</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>temps-partiel</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1868</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/Temps-partiel.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/Temps-partiel.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:320;s:6:"height";i:210;s:4:"file";s:25:"2013/12/Temps-partiel.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:25:"Temps-partiel-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.2% (351&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:25:"Temps-partiel-300x196.jpg";s:5:"width";i:300;s:6:"height";i:196;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.4% (758&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:25:"Temps-partiel-320x198.jpg";s:5:"width";i:320;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.7% (900&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:25:"Temps-partiel-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Logo FB</title>
		<link>http://www.it-news.fr/?attachment_id=1879</link>
		<pubDate>Tue, 31 Dec 2013 10:18:48 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/12/Logo-FB.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1879</wp:post_id>
		<wp:post_date>2013-12-31 11:18:48</wp:post_date>
		<wp:post_date_gmt>2013-12-31 10:18:48</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logo-fb</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/12/Logo-FB.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/12/Logo-FB.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:38;s:6:"height";i:38;s:4:"file";s:19:"2013/12/Logo-FB.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 17.2% (612&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>salaire-brut-au-1er-janvier-2014</title>
		<link>http://www.it-news.fr/smic-2014-revalorisation-de-11/salaire-brut-au-1er-janvier-2014/</link>
		<pubDate>Fri, 03 Jan 2014 14:05:44 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/01/salaire-brut-au-1er-janvier-2014.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1903</wp:post_id>
		<wp:post_date>2014-01-03 15:05:44</wp:post_date>
		<wp:post_date_gmt>2014-01-03 14:05:44</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>salaire-brut-au-1er-janvier-2014</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1902</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/01/salaire-brut-au-1er-janvier-2014.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/01/salaire-brut-au-1er-janvier-2014.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:367;s:6:"height";i:150;s:4:"file";s:44:"2014/01/salaire-brut-au-1er-janvier-2014.png";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:44:"salaire-brut-au-1er-janvier-2014-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:29:"Reduced by 34.4% (915&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:44:"salaire-brut-au-1er-janvier-2014-300x122.png";s:5:"width";i:300;s:6:"height";i:122;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 19.1% (5.2&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:44:"salaire-brut-au-1er-janvier-2014-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 32.1% (1.8&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>evolution-du-smic-horaire-brut</title>
		<link>http://www.it-news.fr/smic-2014-revalorisation-de-11/evolution-du-smic-horaire-brut/</link>
		<pubDate>Fri, 03 Jan 2014 14:08:00 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/01/evolution-du-smic-horaire-brut.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1904</wp:post_id>
		<wp:post_date>2014-01-03 15:08:00</wp:post_date>
		<wp:post_date_gmt>2014-01-03 14:08:00</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>evolution-du-smic-horaire-brut</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1902</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/01/evolution-du-smic-horaire-brut.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/01/evolution-du-smic-horaire-brut.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:479;s:6:"height";i:289;s:4:"file";s:42:"2014/01/evolution-du-smic-horaire-brut.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:42:"evolution-du-smic-horaire-brut-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 13.2% (1&nbsp;KB)";}s:6:"medium";a:5:{s:4:"file";s:42:"evolution-du-smic-horaire-brut-300x181.jpg";s:5:"width";i:300;s:6:"height";i:181;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 11.3% (1.7&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:42:"evolution-du-smic-horaire-brut-479x198.jpg";s:5:"width";i:479;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 18.5% (3.5&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:42:"evolution-du-smic-horaire-brut-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 18.2% (6.4&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>evolution-du-smic-horaire-brut</title>
		<link>http://www.it-news.fr/smic-2014-revalorisation-de-11/evolution-du-smic-horaire-brut-2/</link>
		<pubDate>Fri, 03 Jan 2014 14:09:46 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/01/evolution-du-smic-horaire-brut1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1905</wp:post_id>
		<wp:post_date>2014-01-03 15:09:46</wp:post_date>
		<wp:post_date_gmt>2014-01-03 14:09:46</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>evolution-du-smic-horaire-brut-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1902</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/01/evolution-du-smic-horaire-brut1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/01/evolution-du-smic-horaire-brut1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:479;s:6:"height";i:289;s:4:"file";s:43:"2014/01/evolution-du-smic-horaire-brut1.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:43:"evolution-du-smic-horaire-brut1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 12.0% (922&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:43:"evolution-du-smic-horaire-brut1-300x181.jpg";s:5:"width";i:300;s:6:"height";i:181;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 10.8% (1.5&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:43:"evolution-du-smic-horaire-brut1-479x198.jpg";s:5:"width";i:479;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 17.9% (3.3&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:43:"evolution-du-smic-horaire-brut1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 17.1% (5.8&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>smic-2014</title>
		<link>http://www.it-news.fr/smic-2014-revalorisation-de-11/smic-2014/</link>
		<pubDate>Fri, 03 Jan 2014 14:25:18 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/01/smic-2014.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1909</wp:post_id>
		<wp:post_date>2014-01-03 15:25:18</wp:post_date>
		<wp:post_date_gmt>2014-01-03 14:25:18</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>smic-2014</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1902</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/01/smic-2014.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/01/smic-2014.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:320;s:6:"height";i:210;s:4:"file";s:21:"2014/01/smic-2014.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:21:"smic-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.1% (974&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:21:"smic-2014-300x196.jpg";s:5:"width";i:300;s:6:"height";i:196;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 8.6% (1.6&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:21:"smic-2014-320x198.jpg";s:5:"width";i:320;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 9.3% (2.2&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:21:"smic-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 8.9% (2.1&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>emarketing-paris</title>
		<link>http://www.it-news.fr/event/e-marketing-paris-2014/emarketing-paris/</link>
		<pubDate>Mon, 13 Jan 2014 07:57:07 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/01/emarketing-paris.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1914</wp:post_id>
		<wp:post_date>2014-01-13 08:57:07</wp:post_date>
		<wp:post_date_gmt>2014-01-13 07:57:07</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>emarketing-paris</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1913</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/01/emarketing-paris.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/01/emarketing-paris.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:268;s:6:"height";i:66;s:4:"file";s:28:"2014/01/emarketing-paris.png";s:5:"sizes";a:2:{s:9:"thumbnail";a:5:{s:4:"file";s:27:"emarketing-paris-150x66.png";s:5:"width";i:150;s:6:"height";i:66;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 32.5% (1.9&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:27:"emarketing-paris-150x66.png";s:5:"width";i:150;s:6:"height";i:66;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 10.6% (688&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>cloud-et-it-expo</title>
		<link>http://www.it-news.fr/event/cloud-expo/cloud-et-it-expo/</link>
		<pubDate>Mon, 13 Jan 2014 09:19:17 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/01/cloud-et-it-expo.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1917</wp:post_id>
		<wp:post_date>2014-01-13 10:19:17</wp:post_date>
		<wp:post_date_gmt>2014-01-13 09:19:17</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cloud-et-it-expo</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1916</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/01/cloud-et-it-expo.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/01/cloud-et-it-expo.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:237;s:6:"height";i:86;s:4:"file";s:28:"2014/01/cloud-et-it-expo.png";s:5:"sizes";a:2:{s:9:"thumbnail";a:5:{s:4:"file";s:27:"cloud-et-it-expo-150x86.png";s:5:"width";i:150;s:6:"height";i:86;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:28:"Reduced by 9.2% (847&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:27:"cloud-et-it-expo-150x86.png";s:5:"width";i:150;s:6:"height";i:86;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 17.4% (2.4&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>microsoft-tech-days-2014</title>
		<link>http://www.it-news.fr/event/techdays/microsoft-tech-days-2014/</link>
		<pubDate>Tue, 14 Jan 2014 09:40:30 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/01/microsoft-tech-days-2014.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1920</wp:post_id>
		<wp:post_date>2014-01-14 10:40:30</wp:post_date>
		<wp:post_date_gmt>2014-01-14 09:40:30</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>microsoft-tech-days-2014</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1919</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/01/microsoft-tech-days-2014.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/01/microsoft-tech-days-2014.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:245;s:6:"height";i:115;s:4:"file";s:36:"2014/01/microsoft-tech-days-2014.png";s:5:"sizes";a:2:{s:9:"thumbnail";a:5:{s:4:"file";s:36:"microsoft-tech-days-2014-150x115.png";s:5:"width";i:150;s:6:"height";i:115;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 29.5% (5.4&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:36:"microsoft-tech-days-2014-150x115.png";s:5:"width";i:150;s:6:"height";i:115;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 7.7% (1.4&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>target-victime-cyberattaque</title>
		<link>http://www.it-news.fr/target-victime-dune-cyberattaque/target-victime-cyberattaque/</link>
		<pubDate>Tue, 14 Jan 2014 16:38:41 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/01/target-victime-cyberattaque.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1925</wp:post_id>
		<wp:post_date>2014-01-14 17:38:41</wp:post_date>
		<wp:post_date_gmt>2014-01-14 16:38:41</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>target-victime-cyberattaque</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1924</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/01/target-victime-cyberattaque.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/01/target-victime-cyberattaque.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:320;s:6:"height";i:210;s:4:"file";s:39:"2014/01/target-victime-cyberattaque.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:39:"target-victime-cyberattaque-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.9% (537&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:39:"target-victime-cyberattaque-300x196.jpg";s:5:"width";i:300;s:6:"height";i:196;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.1% (962&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:39:"target-victime-cyberattaque-320x198.jpg";s:5:"width";i:320;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:27:"Reduced by 6.1% (1&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:39:"target-victime-cyberattaque-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>un-mot-de-passse-securise-compose-dimage-et-didee</title>
		<link>http://www.it-news.fr/des-mots-de-passe-securises-composes-dimages-didees/un-mot-de-passse-securise-compose-dimage-et-didee/</link>
		<pubDate>Mon, 27 Jan 2014 10:10:31 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/01/un-mot-de-passse-securise-compose-dimage-et-didee.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1934</wp:post_id>
		<wp:post_date>2014-01-27 11:10:31</wp:post_date>
		<wp:post_date_gmt>2014-01-27 10:10:31</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>un-mot-de-passse-securise-compose-dimage-et-didee</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1933</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/01/un-mot-de-passse-securise-compose-dimage-et-didee.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/01/un-mot-de-passse-securise-compose-dimage-et-didee.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:320;s:6:"height";i:210;s:4:"file";s:61:"2014/01/un-mot-de-passse-securise-compose-dimage-et-didee.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:61:"un-mot-de-passse-securise-compose-dimage-et-didee-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 3.5% (143&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:61:"un-mot-de-passse-securise-compose-dimage-et-didee-300x196.jpg";s:5:"width";i:300;s:6:"height";i:196;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.0% (379&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:61:"un-mot-de-passse-securise-compose-dimage-et-didee-320x198.jpg";s:5:"width";i:320;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.5% (482&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:61:"un-mot-de-passse-securise-compose-dimage-et-didee-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>les-systemes-peripheriques-dans-les-datascenters-seront-de-plus-en-plus-vise</title>
		<link>http://www.it-news.fr/les-tendances-de-la-cybersecurite-en-2014/les-systemes-peripheriques-dans-les-datascenters-seront-de-plus-en-plus-vise/</link>
		<pubDate>Tue, 28 Jan 2014 08:14:42 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/01/les-systemes-peripheriques-dans-les-datascenters-seront-de-plus-en-plus-vise.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1941</wp:post_id>
		<wp:post_date>2014-01-28 09:14:42</wp:post_date>
		<wp:post_date_gmt>2014-01-28 08:14:42</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>les-systemes-peripheriques-dans-les-datascenters-seront-de-plus-en-plus-vise</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1940</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/01/les-systemes-peripheriques-dans-les-datascenters-seront-de-plus-en-plus-vise.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/01/les-systemes-peripheriques-dans-les-datascenters-seront-de-plus-en-plus-vise.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:150;s:6:"height";i:225;s:4:"file";s:88:"2014/01/les-systemes-peripheriques-dans-les-datascenters-seront-de-plus-en-plus-vise.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:88:"les-systemes-peripheriques-dans-les-datascenters-seront-de-plus-en-plus-vise-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.5% (691&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:88:"les-systemes-peripheriques-dans-les-datascenters-seront-de-plus-en-plus-vise-150x198.jpg";s:5:"width";i:150;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.2% (806&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:88:"les-systemes-peripheriques-dans-les-datascenters-seront-de-plus-en-plus-vise-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:27:"Reduced by 8.0% (2&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>tendance-de-la-cybersecurite-en-2014</title>
		<link>http://www.it-news.fr/les-tendances-de-la-cybersecurite-en-2014/tendance-de-la-cybersecurite-en-2014/</link>
		<pubDate>Tue, 28 Jan 2014 08:14:49 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/01/tendance-de-la-cybersecurite-en-2014.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1942</wp:post_id>
		<wp:post_date>2014-01-28 09:14:49</wp:post_date>
		<wp:post_date_gmt>2014-01-28 08:14:49</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>tendance-de-la-cybersecurite-en-2014</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1940</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/01/tendance-de-la-cybersecurite-en-2014.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/01/tendance-de-la-cybersecurite-en-2014.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:48:"2014/01/tendance-de-la-cybersecurite-en-2014.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:48:"tendance-de-la-cybersecurite-en-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.7% (759&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:48:"tendance-de-la-cybersecurite-en-2014-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.4% (1.2&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:48:"tendance-de-la-cybersecurite-en-2014-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.9% (1.8&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:48:"tendance-de-la-cybersecurite-en-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 4.0% (3.6&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>isabelle-dumont</title>
		<link>http://www.it-news.fr/les-tendances-de-la-cybersecurite-en-2014/isabelle-dumont/</link>
		<pubDate>Tue, 28 Jan 2014 08:14:56 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/01/isabelle-dumont.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1943</wp:post_id>
		<wp:post_date>2014-01-28 09:14:56</wp:post_date>
		<wp:post_date_gmt>2014-01-28 08:14:56</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>isabelle-dumont</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1940</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/01/isabelle-dumont.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/01/isabelle-dumont.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:190;s:6:"height";i:266;s:4:"file";s:27:"2014/01/isabelle-dumont.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:27:"isabelle-dumont-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.8% (415&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:27:"isabelle-dumont-190x198.jpg";s:5:"width";i:190;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.6% (479&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:27:"isabelle-dumont-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>orange-piratage-informatique</title>
		<link>http://www.it-news.fr/orange-victime-de-piratage-informatique-800-000-victimes-de-vols-de-donnees/orange-piratage-informatique/</link>
		<pubDate>Mon, 03 Feb 2014 09:04:26 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/orange-piratage-informatique.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1956</wp:post_id>
		<wp:post_date>2014-02-03 10:04:26</wp:post_date>
		<wp:post_date_gmt>2014-02-03 09:04:26</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>orange-piratage-informatique</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1955</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/orange-piratage-informatique.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/orange-piratage-informatique.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:40:"2014/02/orange-piratage-informatique.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:40:"orange-piratage-informatique-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.2% (434&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:40:"orange-piratage-informatique-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.8% (725&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:40:"orange-piratage-informatique-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.2% (917&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:40:"orange-piratage-informatique-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Palo-Alto-certifie-ANSSI</title>
		<link>http://www.it-news.fr/palo-alto-networks-certifiee-par-lanssi-en-france/palo-alto-certifie-anssi/</link>
		<pubDate>Mon, 03 Feb 2014 10:24:26 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/Palo-Alto-certifie-ANSSI.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1964</wp:post_id>
		<wp:post_date>2014-02-03 11:24:26</wp:post_date>
		<wp:post_date_gmt>2014-02-03 10:24:26</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>palo-alto-certifie-anssi</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1963</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/Palo-Alto-certifie-ANSSI.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/Palo-Alto-certifie-ANSSI.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:36:"2014/02/Palo-Alto-certifie-ANSSI.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:36:"Palo-Alto-certifie-ANSSI-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.3% (580&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:36:"Palo-Alto-certifie-ANSSI-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 7.2% (1.2&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:36:"Palo-Alto-certifie-ANSSI-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 7.1% (1.6&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:36:"Palo-Alto-certifie-ANSSI-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Palo-Alto-Technologie</title>
		<link>http://www.it-news.fr/palo-alto-networks-certifiee-par-lanssi-en-france/palo-alto-technologie/</link>
		<pubDate>Mon, 03 Feb 2014 10:24:34 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/Palo-Alto-Technologie.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1965</wp:post_id>
		<wp:post_date>2014-02-03 11:24:34</wp:post_date>
		<wp:post_date_gmt>2014-02-03 10:24:34</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>palo-alto-technologie</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1963</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/Palo-Alto-Technologie.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/Palo-Alto-Technologie.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:600;s:6:"height";i:329;s:4:"file";s:33:"2014/02/Palo-Alto-Technologie.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:33:"Palo-Alto-Technologie-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.7% (426&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:33:"Palo-Alto-Technologie-300x164.jpg";s:5:"width";i:300;s:6:"height";i:164;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.2% (934&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:33:"Palo-Alto-Technologie-600x198.jpg";s:5:"width";i:600;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 7.3% (2.3&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:33:"Palo-Alto-Technologie-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:27:"Reduced by 2.9% (1&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>division-des-depenses-it-en-2014</title>
		<link>http://www.it-news.fr/augmentation-des-depenses-en-2014/division-des-depenses-it-en-2014/</link>
		<pubDate>Tue, 04 Feb 2014 09:56:44 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/division-des-depenses-it-en-2014.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1980</wp:post_id>
		<wp:post_date>2014-02-04 10:56:44</wp:post_date>
		<wp:post_date_gmt>2014-02-04 09:56:44</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>division-des-depenses-it-en-2014</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1979</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/division-des-depenses-it-en-2014.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/division-des-depenses-it-en-2014.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:507;s:6:"height";i:300;s:4:"file";s:44:"2014/02/division-des-depenses-it-en-2014.png";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:44:"division-des-depenses-it-en-2014-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 34.4% (2.9&nbsp;KB)";}s:6:"medium";a:5:{s:4:"file";s:44:"division-des-depenses-it-en-2014-300x177.png";s:5:"width";i:300;s:6:"height";i:177;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:29:"Reduced by 31.2% (14&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:44:"division-des-depenses-it-en-2014-507x198.png";s:5:"width";i:507;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:28:"Reduced by 42.1% (6&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:44:"division-des-depenses-it-en-2014-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 19.3% (2.8&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Gartner-depenses-IT-2014</title>
		<link>http://www.it-news.fr/augmentation-des-depenses-en-2014/gartner-depenses-it-2014/</link>
		<pubDate>Tue, 04 Feb 2014 09:56:53 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/Gartner-depenses-IT-2014.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1981</wp:post_id>
		<wp:post_date>2014-02-04 10:56:53</wp:post_date>
		<wp:post_date_gmt>2014-02-04 09:56:53</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>gartner-depenses-it-2014</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1979</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/Gartner-depenses-IT-2014.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/Gartner-depenses-IT-2014.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:36:"2014/02/Gartner-depenses-IT-2014.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:36:"Gartner-depenses-IT-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 10.1% (455&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:36:"Gartner-depenses-IT-2014-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 11.7% (823&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:36:"Gartner-depenses-IT-2014-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 13.1% (1.1&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:36:"Gartner-depenses-IT-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 2.0% (183&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>CICE-2014</title>
		<link>http://www.it-news.fr/declaration-utilisation-du-cice-en-2014/cice-2014/</link>
		<pubDate>Wed, 05 Feb 2014 11:37:39 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/CICE-2014.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1991</wp:post_id>
		<wp:post_date>2014-02-05 12:37:39</wp:post_date>
		<wp:post_date_gmt>2014-02-05 11:37:39</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cice-2014</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1988</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/CICE-2014.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/CICE-2014.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:21:"2014/02/CICE-2014.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:21:"CICE-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.8% (721&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:21:"CICE-2014-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 8.8% (1.2&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:21:"CICE-2014-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 9.8% (1.8&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:21:"CICE-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 3.8% (718&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>declaration-utilisation-du-cice-en-2014</title>
		<link>http://www.it-news.fr/declaration-utilisation-du-cice-en-2014/declaration-utilisation-du-cice-en-2014-2/</link>
		<pubDate>Wed, 05 Feb 2014 11:37:47 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/declaration-utilisation-du-cice-en-2014.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1992</wp:post_id>
		<wp:post_date>2014-02-05 12:37:47</wp:post_date>
		<wp:post_date_gmt>2014-02-05 11:37:47</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>declaration-utilisation-du-cice-en-2014-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1988</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/declaration-utilisation-du-cice-en-2014.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/declaration-utilisation-du-cice-en-2014.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:288;s:6:"height";i:175;s:4:"file";s:51:"2014/02/declaration-utilisation-du-cice-en-2014.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:5:{s:4:"file";s:51:"declaration-utilisation-du-cice-en-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.8% (900&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:51:"declaration-utilisation-du-cice-en-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 2.2% (210&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>qui-est-eligible-a-la-restitution-de-lexcedent-du-credit-dimpot</title>
		<link>http://www.it-news.fr/declaration-utilisation-du-cice-en-2014/qui-est-eligible-a-la-restitution-de-lexcedent-du-credit-dimpot/</link>
		<pubDate>Wed, 05 Feb 2014 11:37:51 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/qui-est-eligible-a-la-restitution-de-lexcedent-du-credit-dimpot.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1993</wp:post_id>
		<wp:post_date>2014-02-05 12:37:51</wp:post_date>
		<wp:post_date_gmt>2014-02-05 11:37:51</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>qui-est-eligible-a-la-restitution-de-lexcedent-du-credit-dimpot</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1988</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/qui-est-eligible-a-la-restitution-de-lexcedent-du-credit-dimpot.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/qui-est-eligible-a-la-restitution-de-lexcedent-du-credit-dimpot.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:636;s:6:"height";i:376;s:4:"file";s:75:"2014/02/qui-est-eligible-a-la-restitution-de-lexcedent-du-credit-dimpot.png";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:75:"qui-est-eligible-a-la-restitution-de-lexcedent-du-credit-dimpot-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 10.4% (3.3&nbsp;KB)";}s:6:"medium";a:5:{s:4:"file";s:75:"qui-est-eligible-a-la-restitution-de-lexcedent-du-credit-dimpot-300x177.png";s:5:"width";i:300;s:6:"height";i:177;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:29:"Reduced by 9.1% (5.1&nbsp;KB)";}s:22:"wysija-newsletters-max";a:5:{s:4:"file";s:75:"qui-est-eligible-a-la-restitution-de-lexcedent-du-credit-dimpot-600x354.png";s:5:"width";i:600;s:6:"height";i:354;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:29:"Reduced by 15.9% (28&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:75:"qui-est-eligible-a-la-restitution-de-lexcedent-du-credit-dimpot-636x198.png";s:5:"width";i:636;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 36.2% (7.4&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:75:"qui-est-eligible-a-la-restitution-de-lexcedent-du-credit-dimpot-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 27.6% (5.9&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>les-principes-de-base-de-la-declaration-du-cice-en-2014</title>
		<link>http://www.it-news.fr/declaration-utilisation-du-cice-en-2014/les-principes-de-base-de-la-declaration-du-cice-en-2014/</link>
		<pubDate>Wed, 05 Feb 2014 11:38:03 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/les-principes-de-base-de-la-declaration-du-cice-en-2014.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1994</wp:post_id>
		<wp:post_date>2014-02-05 12:38:03</wp:post_date>
		<wp:post_date_gmt>2014-02-05 11:38:03</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>les-principes-de-base-de-la-declaration-du-cice-en-2014</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1988</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/les-principes-de-base-de-la-declaration-du-cice-en-2014.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/les-principes-de-base-de-la-declaration-du-cice-en-2014.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:638;s:6:"height";i:371;s:4:"file";s:67:"2014/02/les-principes-de-base-de-la-declaration-du-cice-en-2014.png";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:67:"les-principes-de-base-de-la-declaration-du-cice-en-2014-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 10.9% (3.5&nbsp;KB)";}s:6:"medium";a:5:{s:4:"file";s:67:"les-principes-de-base-de-la-declaration-du-cice-en-2014-300x174.png";s:5:"width";i:300;s:6:"height";i:174;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 14.2% (9.6&nbsp;KB)";}s:22:"wysija-newsletters-max";a:5:{s:4:"file";s:67:"les-principes-de-base-de-la-declaration-du-cice-en-2014-600x348.png";s:5:"width";i:600;s:6:"height";i:348;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:31:"Reduced by 19.0% (43.2&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:67:"les-principes-de-base-de-la-declaration-du-cice-en-2014-638x198.png";s:5:"width";i:638;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 36.2% (7.4&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:67:"les-principes-de-base-de-la-declaration-du-cice-en-2014-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 27.6% (5.9&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>extrait-de-la-publication-de-la-déclaration-du-CICE</title>
		<link>http://www.it-news.fr/declaration-utilisation-du-cice-en-2014/extrait-de-la-publication-de-la-declaration-du-cice/</link>
		<pubDate>Wed, 05 Feb 2014 11:38:17 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/extrait-de-la-publication-de-la-déclaration-du-CICE.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1995</wp:post_id>
		<wp:post_date>2014-02-05 12:38:17</wp:post_date>
		<wp:post_date_gmt>2014-02-05 11:38:17</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>extrait-de-la-publication-de-la-declaration-du-cice</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1988</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/extrait-de-la-publication-de-la-déclaration-du-CICE.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/extrait-de-la-publication-de-la-déclaration-du-CICE.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:637;s:6:"height";i:367;s:4:"file";s:64:"2014/02/extrait-de-la-publication-de-la-déclaration-du-CICE.png";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:64:"extrait-de-la-publication-de-la-déclaration-du-CICE-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 10.0% (3.4&nbsp;KB)";}s:6:"medium";a:5:{s:4:"file";s:64:"extrait-de-la-publication-de-la-déclaration-du-CICE-300x172.png";s:5:"width";i:300;s:6:"height";i:172;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 13.7% (9.9&nbsp;KB)";}s:22:"wysija-newsletters-max";a:5:{s:4:"file";s:64:"extrait-de-la-publication-de-la-déclaration-du-CICE-600x345.png";s:5:"width";i:600;s:6:"height";i:345;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:31:"Reduced by 19.9% (49.1&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:64:"extrait-de-la-publication-de-la-déclaration-du-CICE-637x198.png";s:5:"width";i:637;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:28:"Reduced by 39.8% (9&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:64:"extrait-de-la-publication-de-la-déclaration-du-CICE-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 27.8% (6.6&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>big-data-2014</title>
		<link>http://www.it-news.fr/le-big-data-principal-objectif-des-entreprises/big-data-2014/</link>
		<pubDate>Thu, 06 Feb 2014 10:40:03 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/big-data-2014.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2003</wp:post_id>
		<wp:post_date>2014-02-06 11:40:03</wp:post_date>
		<wp:post_date_gmt>2014-02-06 10:40:03</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>big-data-2014</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2001</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/big-data-2014.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/big-data-2014.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:25:"2014/02/big-data-2014.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:25:"big-data-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.5% (610&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:25:"big-data-2014-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 8.8% (1.2&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:25:"big-data-2014-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 8.8% (1.6&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:25:"big-data-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 3.6% (679&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Big-Data3-EMC-IDC-460</title>
		<link>http://www.it-news.fr/le-big-data-principal-objectif-des-entreprises/big-data3-emc-idc-460/</link>
		<pubDate>Thu, 06 Feb 2014 12:43:30 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/Big-Data3-EMC-IDC-460.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2008</wp:post_id>
		<wp:post_date>2014-02-06 13:43:30</wp:post_date>
		<wp:post_date_gmt>2014-02-06 12:43:30</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>big-data3-emc-idc-460</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2001</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/Big-Data3-EMC-IDC-460.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/Big-Data3-EMC-IDC-460.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:460;s:6:"height";i:260;s:4:"file";s:33:"2014/02/Big-Data3-EMC-IDC-460.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:33:"Big-Data3-EMC-IDC-460-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:27:"Reduced by 9.2% (1&nbsp;KB)";}s:6:"medium";a:5:{s:4:"file";s:33:"Big-Data3-EMC-IDC-460-300x169.jpg";s:5:"width";i:300;s:6:"height";i:169;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 9.2% (1.9&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:33:"Big-Data3-EMC-IDC-460-460x198.jpg";s:5:"width";i:460;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:27:"Reduced by 9.5% (3&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:33:"Big-Data3-EMC-IDC-460-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 3.9% (1.2&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>big-data_50291c3b16257</title>
		<link>http://www.it-news.fr/le-big-data-principal-objectif-des-entreprises/big-data_50291c3b16257/</link>
		<pubDate>Thu, 06 Feb 2014 12:43:58 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/big-data_50291c3b16257.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2009</wp:post_id>
		<wp:post_date>2014-02-06 13:43:58</wp:post_date>
		<wp:post_date_gmt>2014-02-06 12:43:58</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>big-data_50291c3b16257</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2001</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/big-data_50291c3b16257.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/big-data_50291c3b16257.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:1896;s:6:"height";i:1200;s:4:"file";s:34:"2014/02/big-data_50291c3b16257.jpg";s:5:"sizes";a:6:{s:9:"thumbnail";a:5:{s:4:"file";s:34:"big-data_50291c3b16257-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.4% (624&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:34:"big-data_50291c3b16257-300x189.jpg";s:5:"width";i:300;s:6:"height";i:189;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 7.0% (1.5&nbsp;KB)";}s:5:"large";a:5:{s:4:"file";s:35:"big-data_50291c3b16257-1024x648.jpg";s:5:"width";i:1024;s:6:"height";i:648;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 7.6% (14.3&nbsp;KB)";}s:22:"wysija-newsletters-max";a:5:{s:4:"file";s:34:"big-data_50291c3b16257-600x379.jpg";s:5:"width";i:600;s:6:"height";i:379;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 7.4% (5.4&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:34:"big-data_50291c3b16257-940x198.jpg";s:5:"width";i:940;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:27:"Reduced by 7.0% (4&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:34:"big-data_50291c3b16257-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:191:"ERROR: <span style="color:#FF0000;">Skipped (1.64 MB) Unable to Smush due to Yahoo 1mb size limits. See <a href="http://developer.yahoo.com/yslow/smushit/faq.html#faq_restrict">FAQ</a></span>";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>big-data-2014-small</title>
		<link>http://www.it-news.fr/le-big-data-principal-objectif-des-entreprises/big-data-2014-small/</link>
		<pubDate>Thu, 06 Feb 2014 12:48:44 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/big-data-2014-small.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2011</wp:post_id>
		<wp:post_date>2014-02-06 13:48:44</wp:post_date>
		<wp:post_date_gmt>2014-02-06 12:48:44</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>big-data-2014-small</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2001</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/big-data-2014-small.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/big-data-2014-small.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:400;s:6:"height";i:253;s:4:"file";s:31:"2014/02/big-data-2014-small.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:31:"big-data-2014-small-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.7% (662&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:31:"big-data-2014-small-300x189.jpg";s:5:"width";i:300;s:6:"height";i:189;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 7.2% (1.6&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:31:"big-data-2014-small-400x198.jpg";s:5:"width";i:400;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 8.0% (2.6&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:31:"big-data-2014-small-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 2.2% (798&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>big-data-2014-big</title>
		<link>http://www.it-news.fr/le-big-data-principal-objectif-des-entreprises/big-data-2014-big/</link>
		<pubDate>Thu, 06 Feb 2014 12:48:54 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/big-data-2014-big.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2012</wp:post_id>
		<wp:post_date>2014-02-06 13:48:54</wp:post_date>
		<wp:post_date_gmt>2014-02-06 12:48:54</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>big-data-2014-big</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2001</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/big-data-2014-big.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/big-data-2014-big.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:1200;s:6:"height";i:759;s:4:"file";s:29:"2014/02/big-data-2014-big.jpg";s:5:"sizes";a:6:{s:9:"thumbnail";a:5:{s:4:"file";s:29:"big-data-2014-big-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.5% (629&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:29:"big-data-2014-big-300x189.jpg";s:5:"width";i:300;s:6:"height";i:189;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 7.2% (1.6&nbsp;KB)";}s:5:"large";a:5:{s:4:"file";s:30:"big-data-2014-big-1024x647.jpg";s:5:"width";i:1024;s:6:"height";i:647;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 7.5% (14.2&nbsp;KB)";}s:22:"wysija-newsletters-max";a:5:{s:4:"file";s:29:"big-data-2014-big-600x379.jpg";s:5:"width";i:600;s:6:"height";i:379;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 7.3% (5.6&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:29:"big-data-2014-big-940x198.jpg";s:5:"width";i:940;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.6% (3.7&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:29:"big-data-2014-big-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 4.5% (10.8&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>nord-bat-2014</title>
		<link>http://www.it-news.fr/event/nordbat-2014/nord-bat-2014/</link>
		<pubDate>Thu, 06 Feb 2014 16:28:35 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/nord-bat-2014.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2023</wp:post_id>
		<wp:post_date>2014-02-06 17:28:35</wp:post_date>
		<wp:post_date_gmt>2014-02-06 16:28:35</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>nord-bat-2014</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2022</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/nord-bat-2014.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/nord-bat-2014.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:166;s:6:"height";i:165;s:4:"file";s:25:"2014/02/nord-bat-2014.png";s:5:"sizes";a:2:{s:9:"thumbnail";a:5:{s:4:"file";s:25:"nord-bat-2014-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:28:"Reduced by 3.0% (913&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:25:"nord-bat-2014-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 10.2% (3.1&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>atos-fournisseur-informatique-aux-jo-de-sochi</title>
		<link>http://www.it-news.fr/quelle-informatique-aux-jo-de-sochi-2014/atos-fournisseur-informatique-aux-jo-de-sochi/</link>
		<pubDate>Fri, 07 Feb 2014 13:52:46 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/atos-fournisseur-informatique-aux-jo-de-sochi.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2035</wp:post_id>
		<wp:post_date>2014-02-07 14:52:46</wp:post_date>
		<wp:post_date_gmt>2014-02-07 13:52:46</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>atos-fournisseur-informatique-aux-jo-de-sochi</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2033</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/atos-fournisseur-informatique-aux-jo-de-sochi.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/atos-fournisseur-informatique-aux-jo-de-sochi.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:150;s:6:"height";i:100;s:4:"file";s:57:"2014/02/atos-fournisseur-informatique-aux-jo-de-sochi.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 13.7% (1.3&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>samsunf-fournisseur-informatique-aux-jo-de-sochi</title>
		<link>http://www.it-news.fr/quelle-informatique-aux-jo-de-sochi-2014/samsunf-fournisseur-informatique-aux-jo-de-sochi/</link>
		<pubDate>Fri, 07 Feb 2014 13:52:51 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/samsunf-fournisseur-informatique-aux-jo-de-sochi.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2036</wp:post_id>
		<wp:post_date>2014-02-07 14:52:51</wp:post_date>
		<wp:post_date_gmt>2014-02-07 13:52:51</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>samsunf-fournisseur-informatique-aux-jo-de-sochi</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2033</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/samsunf-fournisseur-informatique-aux-jo-de-sochi.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/samsunf-fournisseur-informatique-aux-jo-de-sochi.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:150;s:6:"height";i:100;s:4:"file";s:60:"2014/02/samsunf-fournisseur-informatique-aux-jo-de-sochi.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 10.6% (519&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>avaya-fournisseur-it-aux-jo-de-sochi</title>
		<link>http://www.it-news.fr/quelle-informatique-aux-jo-de-sochi-2014/avaya-fournisseur-it-aux-jo-de-sochi/</link>
		<pubDate>Fri, 07 Feb 2014 13:52:54 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/avaya-fournisseur-it-aux-jo-de-sochi.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2037</wp:post_id>
		<wp:post_date>2014-02-07 14:52:54</wp:post_date>
		<wp:post_date_gmt>2014-02-07 13:52:54</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>avaya-fournisseur-it-aux-jo-de-sochi</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2033</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/avaya-fournisseur-it-aux-jo-de-sochi.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/avaya-fournisseur-it-aux-jo-de-sochi.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:150;s:6:"height";i:100;s:4:"file";s:48:"2014/02/avaya-fournisseur-it-aux-jo-de-sochi.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 17.4% (2.8&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>quelle-informatique-aux-ho-de-sochi</title>
		<link>http://www.it-news.fr/quelle-informatique-aux-jo-de-sochi-2014/quelle-informatique-aux-ho-de-sochi/</link>
		<pubDate>Fri, 07 Feb 2014 13:52:58 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/quelle-informatique-aux-ho-de-sochi.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2038</wp:post_id>
		<wp:post_date>2014-02-07 14:52:58</wp:post_date>
		<wp:post_date_gmt>2014-02-07 13:52:58</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>quelle-informatique-aux-ho-de-sochi</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2033</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/quelle-informatique-aux-ho-de-sochi.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/quelle-informatique-aux-ho-de-sochi.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:315;s:6:"height";i:160;s:4:"file";s:47:"2014/02/quelle-informatique-aux-ho-de-sochi.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:47:"quelle-informatique-aux-ho-de-sochi-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.4% (928&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:47:"quelle-informatique-aux-ho-de-sochi-300x152.jpg";s:5:"width";i:300;s:6:"height";i:152;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 7.5% (1.4&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:47:"quelle-informatique-aux-ho-de-sochi-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 1.5% (178&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>L-informatique-aux-JO-de-Sochi-2014</title>
		<link>http://www.it-news.fr/quelle-informatique-aux-jo-de-sochi-2014/l-informatique-aux-jo-de-sochi-2014/</link>
		<pubDate>Fri, 07 Feb 2014 13:53:15 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/L-informatique-aux-JO-de-Sochi-2014.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2039</wp:post_id>
		<wp:post_date>2014-02-07 14:53:15</wp:post_date>
		<wp:post_date_gmt>2014-02-07 13:53:15</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>l-informatique-aux-jo-de-sochi-2014</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2033</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/L-informatique-aux-JO-de-Sochi-2014.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/L-informatique-aux-JO-de-Sochi-2014.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:47:"2014/02/L-informatique-aux-JO-de-Sochi-2014.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:47:"L-informatique-aux-JO-de-Sochi-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.8% (500&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:47:"L-informatique-aux-JO-de-Sochi-2014-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 10.3% (1&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:47:"L-informatique-aux-JO-de-Sochi-2014-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 10.9% (1.3&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:47:"L-informatique-aux-JO-de-Sochi-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 5.5% (1.7&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>jo-sochi-droit-de-l-homme</title>
		<link>http://www.it-news.fr/quelle-informatique-aux-jo-de-sochi-2014/jo-sochi-droit-de-l-homme/</link>
		<pubDate>Fri, 07 Feb 2014 14:29:07 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/jo-sochi-droit-de-l-homme.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2046</wp:post_id>
		<wp:post_date>2014-02-07 15:29:07</wp:post_date>
		<wp:post_date_gmt>2014-02-07 14:29:07</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>jo-sochi-droit-de-l-homme</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2033</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/jo-sochi-droit-de-l-homme.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/jo-sochi-droit-de-l-homme.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:600;s:6:"height";i:439;s:4:"file";s:37:"2014/02/jo-sochi-droit-de-l-homme.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:37:"jo-sochi-droit-de-l-homme-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 9.7% (1.3&nbsp;KB)";}s:6:"medium";a:5:{s:4:"file";s:37:"jo-sochi-droit-de-l-homme-300x219.jpg";s:5:"width";i:300;s:6:"height";i:219;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:27:"Reduced by 9.2% (3&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:37:"jo-sochi-droit-de-l-homme-600x198.jpg";s:5:"width";i:600;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 8.7% (4.4&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:37:"jo-sochi-droit-de-l-homme-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:31:"Reduced by 16.9% (23.9&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>cybercriminalite-en-entreprise</title>
		<link>http://www.it-news.fr/la-cybercriminalite-en-entreprise-en-2013-coute-110-milliards-deuros-de-pertes-financieres/cybercriminalite-en-entreprise/</link>
		<pubDate>Fri, 07 Feb 2014 15:52:19 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/cybercriminalite-en-entreprise.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2050</wp:post_id>
		<wp:post_date>2014-02-07 16:52:19</wp:post_date>
		<wp:post_date_gmt>2014-02-07 15:52:19</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cybercriminalite-en-entreprise</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2049</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/cybercriminalite-en-entreprise.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/cybercriminalite-en-entreprise.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:329;s:6:"height";i:153;s:4:"file";s:42:"2014/02/cybercriminalite-en-entreprise.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:42:"cybercriminalite-en-entreprise-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 9.1% (1013&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:42:"cybercriminalite-en-entreprise-300x139.jpg";s:5:"width";i:300;s:6:"height";i:139;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 8.8% (1.5&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:42:"cybercriminalite-en-entreprise-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 3.1% (415&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>cyber-criminalite-entreprise</title>
		<link>http://www.it-news.fr/la-cybercriminalite-en-entreprise-en-2013-coute-110-milliards-deuros-de-pertes-financieres/cyber-criminalite-entreprise/</link>
		<pubDate>Fri, 07 Feb 2014 15:52:39 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/cyber-criminalite-entreprise.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2051</wp:post_id>
		<wp:post_date>2014-02-07 16:52:39</wp:post_date>
		<wp:post_date_gmt>2014-02-07 15:52:39</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cyber-criminalite-entreprise</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2049</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/cyber-criminalite-entreprise.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/cyber-criminalite-entreprise.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:40:"2014/02/cyber-criminalite-entreprise.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:40:"cyber-criminalite-entreprise-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.5% (737&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:40:"cyber-criminalite-entreprise-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 9.2% (1.5&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:40:"cyber-criminalite-entreprise-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 9.1% (2.1&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:40:"cyber-criminalite-entreprise-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Les entreprises ayant le projet de créer un COS dans les 3 ans</title>
		<link>http://www.it-news.fr/la-cybercriminalite-en-entreprise-en-2013-coute-110-milliards-deuros-de-pertes-financieres/entreprises-ayant-le-projet-de-creer-un-cos-dans-les-3-ans/</link>
		<pubDate>Mon, 10 Feb 2014 09:54:03 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/entreprises-ayant-le-projet-de-creer-un-cos-dans-les-3-ans.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2057</wp:post_id>
		<wp:post_date>2014-02-10 10:54:03</wp:post_date>
		<wp:post_date_gmt>2014-02-10 09:54:03</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>entreprises-ayant-le-projet-de-creer-un-cos-dans-les-3-ans</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2049</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/entreprises-ayant-le-projet-de-creer-un-cos-dans-les-3-ans.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/entreprises-ayant-le-projet-de-creer-un-cos-dans-les-3-ans.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:485;s:6:"height";i:272;s:4:"file";s:70:"2014/02/entreprises-ayant-le-projet-de-creer-un-cos-dans-les-3-ans.png";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:70:"entreprises-ayant-le-projet-de-creer-un-cos-dans-les-3-ans-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 30.4% (3.5&nbsp;KB)";}s:6:"medium";a:5:{s:4:"file";s:70:"entreprises-ayant-le-projet-de-creer-un-cos-dans-les-3-ans-300x168.png";s:5:"width";i:300;s:6:"height";i:168;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:31:"Reduced by 44.7% (11.6&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:70:"entreprises-ayant-le-projet-de-creer-un-cos-dans-les-3-ans-485x198.png";s:5:"width";i:485;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 42.1% (2.9&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:70:"entreprises-ayant-le-projet-de-creer-un-cos-dans-les-3-ans-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 28.2% (2.2&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>part-des-mobinautes-connectes-par-tranche-horaire</title>
		<link>http://www.it-news.fr/linternet-mobile-devient-plus-populaire-en-france/part-des-mobinautes-connectes-par-tranche-horaire/</link>
		<pubDate>Mon, 10 Feb 2014 11:23:29 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/part-des-mobinautes-connectes-par-tranche-horaire.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2060</wp:post_id>
		<wp:post_date>2014-02-10 12:23:29</wp:post_date>
		<wp:post_date_gmt>2014-02-10 11:23:29</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>part-des-mobinautes-connectes-par-tranche-horaire</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2059</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/part-des-mobinautes-connectes-par-tranche-horaire.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/part-des-mobinautes-connectes-par-tranche-horaire.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:565;s:6:"height";i:272;s:4:"file";s:61:"2014/02/part-des-mobinautes-connectes-par-tranche-horaire.png";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:61:"part-des-mobinautes-connectes-par-tranche-horaire-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:28:"Reduced by 14.7% (3&nbsp;KB)";}s:6:"medium";a:5:{s:4:"file";s:61:"part-des-mobinautes-connectes-par-tranche-horaire-300x144.png";s:5:"width";i:300;s:6:"height";i:144;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 21.5% (6.9&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:61:"part-des-mobinautes-connectes-par-tranche-horaire-565x198.png";s:5:"width";i:565;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:29:"Reduced by 9.1% (3.5&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:61:"part-des-mobinautes-connectes-par-tranche-horaire-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 5.8% (3.1&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>partage-de-l-audience-internet-mobile-en-france-en-decembre-2013</title>
		<link>http://www.it-news.fr/linternet-mobile-devient-plus-populaire-en-france/partage-de-l-audience-internet-mobile-en-france-en-decembre-2013/</link>
		<pubDate>Mon, 10 Feb 2014 11:23:38 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/partage-de-l-audience-internet-mobile-en-france-en-decembre-2013.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2061</wp:post_id>
		<wp:post_date>2014-02-10 12:23:38</wp:post_date>
		<wp:post_date_gmt>2014-02-10 11:23:38</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>partage-de-l-audience-internet-mobile-en-france-en-decembre-2013</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2059</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/partage-de-l-audience-internet-mobile-en-france-en-decembre-2013.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/partage-de-l-audience-internet-mobile-en-france-en-decembre-2013.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:535;s:6:"height";i:385;s:4:"file";s:76:"2014/02/partage-de-l-audience-internet-mobile-en-france-en-decembre-2013.png";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:76:"partage-de-l-audience-internet-mobile-en-france-en-decembre-2013-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 24.3% (4.5&nbsp;KB)";}s:6:"medium";a:5:{s:4:"file";s:76:"partage-de-l-audience-internet-mobile-en-france-en-decembre-2013-300x215.png";s:5:"width";i:300;s:6:"height";i:215;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:31:"Reduced by 26.0% (11.1&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:76:"partage-de-l-audience-internet-mobile-en-france-en-decembre-2013-535x198.png";s:5:"width";i:535;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 37.4% (6.8&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:76:"partage-de-l-audience-internet-mobile-en-france-en-decembre-2013-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 15.5% (2.7&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>%-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee</title>
		<link>http://www.it-news.fr/linternet-mobile-devient-plus-populaire-en-france/de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee/</link>
		<pubDate>Mon, 10 Feb 2014 11:23:47 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/%-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2062</wp:post_id>
		<wp:post_date>2014-02-10 12:23:47</wp:post_date>
		<wp:post_date_gmt>2014-02-10 11:23:47</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2059</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/%-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/%-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:450;s:6:"height";i:284;s:4:"file";s:91:"2014/02/%-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee.png";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:91:"%-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:26:"Bad response from Smush.it";}s:6:"medium";a:5:{s:4:"file";s:91:"%-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee-300x189.png";s:5:"width";i:300;s:6:"height";i:189;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:26:"Bad response from Smush.it";}s:14:"post-thumbnail";a:5:{s:4:"file";s:91:"%-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee-450x198.png";s:5:"width";i:450;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:26:"Bad response from Smush.it";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:91:"%-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:26:"Bad response from Smush.it";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:26:"Bad response from Smush.it";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>internet-mobile</title>
		<link>http://www.it-news.fr/linternet-mobile-devient-plus-populaire-en-france/internet-mobile/</link>
		<pubDate>Mon, 10 Feb 2014 11:23:50 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/internet-mobile.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2063</wp:post_id>
		<wp:post_date>2014-02-10 12:23:50</wp:post_date>
		<wp:post_date_gmt>2014-02-10 11:23:50</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>internet-mobile</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2059</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/internet-mobile.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/internet-mobile.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:27:"2014/02/internet-mobile.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:27:"internet-mobile-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 9.3% (1020&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:27:"internet-mobile-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 9.5% (1.7&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:27:"internet-mobile-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:27:"Reduced by 9.3% (2&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:27:"internet-mobile-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 4.3% (2.5&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>%-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee</title>
		<link>http://www.it-news.fr/linternet-mobile-devient-plus-populaire-en-france/de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee-2/</link>
		<pubDate>Mon, 10 Feb 2014 11:26:34 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/%-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee1.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2064</wp:post_id>
		<wp:post_date>2014-02-10 12:26:34</wp:post_date>
		<wp:post_date_gmt>2014-02-10 11:26:34</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2059</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/%-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee1.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/%-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee1.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:450;s:6:"height";i:284;s:4:"file";s:92:"2014/02/%-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee1.png";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:92:"%-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee1-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:26:"Bad response from Smush.it";}s:6:"medium";a:5:{s:4:"file";s:92:"%-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee1-300x189.png";s:5:"width";i:300;s:6:"height";i:189;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:26:"Bad response from Smush.it";}s:14:"post-thumbnail";a:5:{s:4:"file";s:92:"%-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee1-450x198.png";s:5:"width";i:450;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:26:"Bad response from Smush.it";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:92:"%-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee1-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:26:"Bad response from Smush.it";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:26:"Bad response from Smush.it";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>%-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee</title>
		<link>http://www.it-news.fr/linternet-mobile-devient-plus-populaire-en-france/de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee-3/</link>
		<pubDate>Mon, 10 Feb 2014 11:29:10 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/%-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2065</wp:post_id>
		<wp:post_date>2014-02-10 12:29:10</wp:post_date>
		<wp:post_date_gmt>2014-02-10 11:29:10</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee-3</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2059</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/%-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/%-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:474;s:6:"height";i:275;s:4:"file";s:91:"2014/02/%-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:91:"%-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:26:"Bad response from Smush.it";}s:6:"medium";a:5:{s:4:"file";s:91:"%-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee-300x174.jpg";s:5:"width";i:300;s:6:"height";i:174;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:26:"Bad response from Smush.it";}s:14:"post-thumbnail";a:5:{s:4:"file";s:91:"%-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee-474x198.jpg";s:5:"width";i:474;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:26:"Bad response from Smush.it";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:91:"%-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:26:"Bad response from Smush.it";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:26:"Bad response from Smush.it";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>pourcentage-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee</title>
		<link>http://www.it-news.fr/linternet-mobile-devient-plus-populaire-en-france/pourcentage-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee/</link>
		<pubDate>Mon, 10 Feb 2014 11:30:28 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/pourcentage-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2066</wp:post_id>
		<wp:post_date>2014-02-10 12:30:28</wp:post_date>
		<wp:post_date_gmt>2014-02-10 11:30:28</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>pourcentage-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2059</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/pourcentage-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/pourcentage-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:474;s:6:"height";i:275;s:4:"file";s:101:"2014/02/pourcentage-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee.png";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:101:"pourcentage-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 28.1% (2.8&nbsp;KB)";}s:6:"medium";a:5:{s:4:"file";s:101:"pourcentage-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee-300x174.png";s:5:"width";i:300;s:6:"height";i:174;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 27.8% (8.8&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:101:"pourcentage-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee-474x198.png";s:5:"width";i:474;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 24.5% (5.2&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:101:"pourcentage-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 10.1% (2.7&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>shadow-it</title>
		<link>http://www.it-news.fr/le-cloud-en-2014-trouve-enfin-sa-place-en-france/shadow-it/</link>
		<pubDate>Mon, 10 Feb 2014 13:04:59 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/shadow-it.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2073</wp:post_id>
		<wp:post_date>2014-02-10 14:04:59</wp:post_date>
		<wp:post_date_gmt>2014-02-10 13:04:59</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>shadow-it</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2071</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/shadow-it.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/shadow-it.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:400;s:6:"height";i:223;s:4:"file";s:21:"2014/02/shadow-it.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:21:"shadow-it-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 9.8% (626&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:21:"shadow-it-300x167.jpg";s:5:"width";i:300;s:6:"height";i:167;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:27:"Reduced by 9.2% (1&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:21:"shadow-it-400x198.jpg";s:5:"width";i:400;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 8.7% (1.3&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:21:"shadow-it-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:27:"Reduced by 5.9% (2&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>cloud-computing-2014</title>
		<link>http://www.it-news.fr/le-cloud-en-2014-trouve-enfin-sa-place-en-france/cloud-computing-2014/</link>
		<pubDate>Mon, 10 Feb 2014 13:05:06 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/cloud-computing-2014.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2074</wp:post_id>
		<wp:post_date>2014-02-10 14:05:06</wp:post_date>
		<wp:post_date_gmt>2014-02-10 13:05:06</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cloud-computing-2014</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2071</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/cloud-computing-2014.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/cloud-computing-2014.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:32:"2014/02/cloud-computing-2014.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:32:"cloud-computing-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.5% (538&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:32:"cloud-computing-2014-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.7% (861&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:32:"cloud-computing-2014-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 8.2% (1.3&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:32:"cloud-computing-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>idc-etude-cloud-index</title>
		<link>http://www.it-news.fr/le-cloud-en-2014-trouve-enfin-sa-place-en-france/idc-etude-cloud-index/</link>
		<pubDate>Mon, 10 Feb 2014 13:05:16 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/idc-etude-cloud-index.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2075</wp:post_id>
		<wp:post_date>2014-02-10 14:05:16</wp:post_date>
		<wp:post_date_gmt>2014-02-10 13:05:16</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>idc-etude-cloud-index</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2071</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/idc-etude-cloud-index.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/idc-etude-cloud-index.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:900;s:6:"height";i:520;s:4:"file";s:33:"2014/02/idc-etude-cloud-index.png";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:33:"idc-etude-cloud-index-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 15.9% (3.1&nbsp;KB)";}s:6:"medium";a:5:{s:4:"file";s:33:"idc-etude-cloud-index-300x173.png";s:5:"width";i:300;s:6:"height";i:173;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 13.0% (3.9&nbsp;KB)";}s:22:"wysija-newsletters-max";a:5:{s:4:"file";s:33:"idc-etude-cloud-index-600x346.png";s:5:"width";i:600;s:6:"height";i:346;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:29:"Reduced by 8.8% (8.7&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:33:"idc-etude-cloud-index-900x198.png";s:5:"width";i:900;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:31:"Reduced by 13.5% (10.7&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:33:"idc-etude-cloud-index-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 20.5% (39&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>journee-internet-securite</title>
		<link>http://www.it-news.fr/journee-de-la-securite-sur-internet/journee-internet-securite/</link>
		<pubDate>Tue, 11 Feb 2014 12:54:42 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/journee-internet-securite.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2085</wp:post_id>
		<wp:post_date>2014-02-11 13:54:42</wp:post_date>
		<wp:post_date_gmt>2014-02-11 12:54:42</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>journee-internet-securite</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2084</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/journee-internet-securite.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/journee-internet-securite.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:37:"2014/02/journee-internet-securite.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:37:"journee-internet-securite-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.5% (603&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:37:"journee-internet-securite-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:27:"Reduced by 8.2% (1&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:37:"journee-internet-securite-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 9.0% (1.5&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:37:"journee-internet-securite-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 4.9% (2.4&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>etude-securite-internet</title>
		<link>http://www.it-news.fr/seulement-%c2%bc-des-entreprises-possede-securite-informatique-247/etude-securite-internet/</link>
		<pubDate>Tue, 11 Feb 2014 13:09:57 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/etude-securite-internet.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2088</wp:post_id>
		<wp:post_date>2014-02-11 14:09:57</wp:post_date>
		<wp:post_date_gmt>2014-02-11 13:09:57</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>etude-securite-internet</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2087</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/etude-securite-internet.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/etude-securite-internet.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:35:"2014/02/etude-securite-internet.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:35:"etude-securite-internet-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.0% (833&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:35:"etude-securite-internet-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 7.3% (1.6&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:35:"etude-securite-internet-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 7.0% (1.9&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:35:"etude-securite-internet-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 4.0% (3.9&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>declaration-dun-projet-cos-dans-les-3-ans</title>
		<link>http://www.it-news.fr/seulement-%c2%bc-des-entreprises-possede-securite-informatique-247/declaration-dun-projet-cos-dans-les-3-ans/</link>
		<pubDate>Tue, 11 Feb 2014 13:10:10 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/declaration-dun-projet-cos-dans-les-3-ans.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2089</wp:post_id>
		<wp:post_date>2014-02-11 14:10:10</wp:post_date>
		<wp:post_date_gmt>2014-02-11 13:10:10</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>declaration-dun-projet-cos-dans-les-3-ans</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2087</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/declaration-dun-projet-cos-dans-les-3-ans.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/declaration-dun-projet-cos-dans-les-3-ans.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:898;s:6:"height";i:520;s:4:"file";s:53:"2014/02/declaration-dun-projet-cos-dans-les-3-ans.png";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:53:"declaration-dun-projet-cos-dans-les-3-ans-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 27.7% (2.6&nbsp;KB)";}s:6:"medium";a:5:{s:4:"file";s:53:"declaration-dun-projet-cos-dans-les-3-ans-300x173.png";s:5:"width";i:300;s:6:"height";i:173;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 27.3% (7.3&nbsp;KB)";}s:22:"wysija-newsletters-max";a:5:{s:4:"file";s:53:"declaration-dun-projet-cos-dans-les-3-ans-600x347.png";s:5:"width";i:600;s:6:"height";i:347;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:31:"Reduced by 30.6% (29.9&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:53:"declaration-dun-projet-cos-dans-les-3-ans-898x198.png";s:5:"width";i:898;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 33.1% (2.6&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:53:"declaration-dun-projet-cos-dans-les-3-ans-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 28.9% (4.4&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>infographie-cybersecurtie-entreprises-francaises</title>
		<link>http://www.it-news.fr/seulement-%c2%bc-des-entreprises-possede-securite-informatique-247/infographie-cybersecurtie-entreprises-francaises/</link>
		<pubDate>Tue, 11 Feb 2014 13:11:36 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/infographie-cybersecurtie-entreprises-francaises.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2090</wp:post_id>
		<wp:post_date>2014-02-11 14:11:36</wp:post_date>
		<wp:post_date_gmt>2014-02-11 13:11:36</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>infographie-cybersecurtie-entreprises-francaises</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2087</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/infographie-cybersecurtie-entreprises-francaises.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/infographie-cybersecurtie-entreprises-francaises.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:736;s:6:"height";i:511;s:4:"file";s:60:"2014/02/infographie-cybersecurtie-entreprises-francaises.png";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:60:"infographie-cybersecurtie-entreprises-francaises-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:29:"Reduced by 5.2% (1.5&nbsp;KB)";}s:6:"medium";a:5:{s:4:"file";s:60:"infographie-cybersecurtie-entreprises-francaises-300x208.png";s:5:"width";i:300;s:6:"height";i:208;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:29:"Reduced by 4.8% (3.1&nbsp;KB)";}s:22:"wysija-newsletters-max";a:5:{s:4:"file";s:60:"infographie-cybersecurtie-entreprises-francaises-600x416.png";s:5:"width";i:600;s:6:"height";i:416;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:29:"Reduced by 3.6% (8.8&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:60:"infographie-cybersecurtie-entreprises-francaises-736x198.png";s:5:"width";i:736;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:31:"Reduced by 10.7% (12.2&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:60:"infographie-cybersecurtie-entreprises-francaises-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:31:"Reduced by 16.8% (65.3&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>mot-de-passe-complexe-et-original</title>
		<link>http://www.it-news.fr/seulement-%c2%bc-des-entreprises-possede-securite-informatique-247/mot-de-passe-complexe-et-original/</link>
		<pubDate>Tue, 11 Feb 2014 15:11:33 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/mot-de-passe-complexe-et-original.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2100</wp:post_id>
		<wp:post_date>2014-02-11 16:11:33</wp:post_date>
		<wp:post_date_gmt>2014-02-11 15:11:33</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>mot-de-passe-complexe-et-original</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2087</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/mot-de-passe-complexe-et-original.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/mot-de-passe-complexe-et-original.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:189;s:6:"height";i:267;s:4:"file";s:45:"2014/02/mot-de-passe-complexe-et-original.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:45:"mot-de-passe-complexe-et-original-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.8% (610&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:45:"mot-de-passe-complexe-et-original-189x198.jpg";s:5:"width";i:189;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:27:"Reduced by 9.0% (1&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:45:"mot-de-passe-complexe-et-original-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:27:"Reduced by 0.3% (25&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>attention-au-p^hishing</title>
		<link>http://www.it-news.fr/journee-de-la-securite-sur-internet/attention-au-phishing/</link>
		<pubDate>Tue, 11 Feb 2014 15:15:45 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/attention-au-phishing.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2103</wp:post_id>
		<wp:post_date>2014-02-11 16:15:45</wp:post_date>
		<wp:post_date_gmt>2014-02-11 15:15:45</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>attention-au-phishing</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2084</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/attention-au-p^hishing.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/attention-au-p^hishing.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:378;s:6:"height";i:262;s:4:"file";s:34:"2014/02/attention-au-p^hishing.png";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:34:"attention-au-p^hishing-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:27:"Reduced by 3.4% (1&nbsp;KB)";}s:6:"medium";a:5:{s:4:"file";s:34:"attention-au-p^hishing-300x207.png";s:5:"width";i:300;s:6:"height";i:207;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:29:"Reduced by 4.5% (3.4&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:34:"attention-au-p^hishing-378x198.png";s:5:"width";i:378;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:29:"Reduced by 2.4% (1.8&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:34:"attention-au-p^hishing-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:31:"Reduced by 14.9% (14.7&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>phishin</title>
		<link>http://www.it-news.fr/journee-de-la-securite-sur-internet/phishin/</link>
		<pubDate>Tue, 11 Feb 2014 15:18:18 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/phishin.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2104</wp:post_id>
		<wp:post_date>2014-02-11 16:18:18</wp:post_date>
		<wp:post_date_gmt>2014-02-11 15:18:18</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>phishin</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2084</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/phishin.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/phishin.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:264;s:6:"height";i:191;s:4:"file";s:19:"2014/02/phishin.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:5:{s:4:"file";s:19:"phishin-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.0% (819&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:19:"phishin-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>réseaux-sociaux-danger</title>
		<link>http://www.it-news.fr/journee-de-la-securite-sur-internet/reseaux-sociaux-danger/</link>
		<pubDate>Tue, 11 Feb 2014 15:22:26 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/réseaux-sociaux-danger.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2106</wp:post_id>
		<wp:post_date>2014-02-11 16:22:26</wp:post_date>
		<wp:post_date_gmt>2014-02-11 15:22:26</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>reseaux-sociaux-danger</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2084</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/réseaux-sociaux-danger.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/réseaux-sociaux-danger.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:275;s:6:"height";i:183;s:4:"file";s:35:"2014/02/réseaux-sociaux-danger.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:5:{s:4:"file";s:35:"réseaux-sociaux-danger-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.8% (338&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:35:"réseaux-sociaux-danger-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>evenement-cybermenaces-2014</title>
		<link>http://www.it-news.fr/event/les-cybermenaces-comment-protegez-votre-entreprise/evenement-cybermenaces-2014/</link>
		<pubDate>Sat, 15 Feb 2014 08:09:24 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/evenement-cybermenaces-2014.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2111</wp:post_id>
		<wp:post_date>2014-02-15 09:09:24</wp:post_date>
		<wp:post_date_gmt>2014-02-15 08:09:24</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>evenement-cybermenaces-2014</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2132</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/evenement-cybermenaces-2014.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/evenement-cybermenaces-2014.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:198;s:6:"height";i:249;s:4:"file";s:39:"2014/02/evenement-cybermenaces-2014.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:39:"evenement-cybermenaces-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.6% (708&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:39:"evenement-cybermenaces-2014-198x198.jpg";s:5:"width";i:198;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 8.2% (1.2&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:39:"evenement-cybermenaces-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 9.7% (2.1&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>bouton-livre-blanc</title>
		<link>http://www.it-news.fr/livre-blanc-de-sophos-sur-la-cybersecurite-en-2014/bouton-livre-blanc/</link>
		<pubDate>Mon, 17 Feb 2014 10:37:06 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/bouton-livre-blanc.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2115</wp:post_id>
		<wp:post_date>2014-02-17 11:37:06</wp:post_date>
		<wp:post_date_gmt>2014-02-17 10:37:06</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>bouton-livre-blanc</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2113</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/bouton-livre-blanc.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/bouton-livre-blanc.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:300;s:6:"height";i:65;s:4:"file";s:30:"2014/02/bouton-livre-blanc.png";s:5:"sizes";a:2:{s:9:"thumbnail";a:5:{s:4:"file";s:29:"bouton-livre-blanc-150x65.png";s:5:"width";i:150;s:6:"height";i:65;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 45.9% (1023&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:29:"bouton-livre-blanc-150x65.png";s:5:"width";i:150;s:6:"height";i:65;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 41.1% (1.4&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>sophos-securite-2014</title>
		<link>http://www.it-news.fr/livre-blanc-de-sophos-sur-la-cybersecurite-en-2014/sophos-securite-2014/</link>
		<pubDate>Mon, 17 Feb 2014 10:37:11 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/sophos-securite-2014.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2116</wp:post_id>
		<wp:post_date>2014-02-17 11:37:11</wp:post_date>
		<wp:post_date_gmt>2014-02-17 10:37:11</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>sophos-securite-2014</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2113</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/sophos-securite-2014.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/sophos-securite-2014.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:32:"2014/02/sophos-securite-2014.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:32:"sophos-securite-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.5% (252&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:32:"sophos-securite-2014-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.0% (474&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:32:"sophos-securite-2014-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 3.8% (540&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:32:"sophos-securite-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>bouton-inscription</title>
		<link>http://www.it-news.fr/les-cybermenaces-comment-proteger-votre-entreprise/bouton-inscription/</link>
		<pubDate>Mon, 17 Feb 2014 15:09:41 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/bouton-inscription.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2126</wp:post_id>
		<wp:post_date>2014-02-17 16:09:41</wp:post_date>
		<wp:post_date_gmt>2014-02-17 15:09:41</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>bouton-inscription</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2125</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/bouton-inscription.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/bouton-inscription.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:200;s:6:"height";i:75;s:4:"file";s:30:"2014/02/bouton-inscription.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:5:{s:4:"file";s:29:"bouton-inscription-150x75.jpg";s:5:"width";i:150;s:6:"height";i:75;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 11.8% (550&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:29:"bouton-inscription-150x75.jpg";s:5:"width";i:150;s:6:"height";i:75;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:25:"Web Buttons Inc - Fotolia";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 0.8% (110&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>colonel</title>
		<link>http://www.it-news.fr/les-cybermenaces-comment-proteger-votre-entreprise/colonel/</link>
		<pubDate>Mon, 17 Feb 2014 15:09:45 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/colonel.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2127</wp:post_id>
		<wp:post_date>2014-02-17 16:09:45</wp:post_date>
		<wp:post_date_gmt>2014-02-17 15:09:45</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>colonel</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2125</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/colonel.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/colonel.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:109;s:6:"height";i:73;s:4:"file";s:19:"2014/02/colonel.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>gendaremerie</title>
		<link>http://www.it-news.fr/les-cybermenaces-comment-proteger-votre-entreprise/gendaremerie/</link>
		<pubDate>Mon, 17 Feb 2014 15:09:47 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/gendaremerie.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2128</wp:post_id>
		<wp:post_date>2014-02-17 16:09:47</wp:post_date>
		<wp:post_date_gmt>2014-02-17 15:09:47</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>gendaremerie</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2125</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/gendaremerie.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/gendaremerie.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:109;s:6:"height";i:150;s:4:"file";s:24:"2014/02/gendaremerie.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:27:"Reduced by 0.3% (64&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>petit-dejeuner-cybermenace</title>
		<link>http://www.it-news.fr/les-cybermenaces-comment-proteger-votre-entreprise/petit-dejeuner-cybermenace/</link>
		<pubDate>Mon, 17 Feb 2014 15:09:50 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/petit-dejeuner-cybermenace.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2129</wp:post_id>
		<wp:post_date>2014-02-17 16:09:50</wp:post_date>
		<wp:post_date_gmt>2014-02-17 15:09:50</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>petit-dejeuner-cybermenace</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2125</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/petit-dejeuner-cybermenace.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/petit-dejeuner-cybermenace.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:38:"2014/02/petit-dejeuner-cybermenace.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:38:"petit-dejeuner-cybermenace-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.7% (695&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:38:"petit-dejeuner-cybermenace-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:27:"Reduced by 7.8% (1&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:38:"petit-dejeuner-cybermenace-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 8.0% (1.2&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:38:"petit-dejeuner-cybermenace-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 4.2% (1.8&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>tableau-explicatif-fin-de-vente-windows</title>
		<link>http://www.it-news.fr/microsoft-offre-sursis-windows-7-pro/tableau-explicatif-fin-de-vente-windows/</link>
		<pubDate>Tue, 18 Feb 2014 09:32:33 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/tableau-explicatif-fin-de-vente-windows.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2143</wp:post_id>
		<wp:post_date>2014-02-18 10:32:33</wp:post_date>
		<wp:post_date_gmt>2014-02-18 09:32:33</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>tableau-explicatif-fin-de-vente-windows</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2142</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/tableau-explicatif-fin-de-vente-windows.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/tableau-explicatif-fin-de-vente-windows.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:773;s:6:"height";i:474;s:4:"file";s:51:"2014/02/tableau-explicatif-fin-de-vente-windows.png";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:51:"tableau-explicatif-fin-de-vente-windows-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 21.5% (2.4&nbsp;KB)";}s:6:"medium";a:5:{s:4:"file";s:51:"tableau-explicatif-fin-de-vente-windows-300x183.png";s:5:"width";i:300;s:6:"height";i:183;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 19.0% (6.5&nbsp;KB)";}s:22:"wysija-newsletters-max";a:5:{s:4:"file";s:51:"tableau-explicatif-fin-de-vente-windows-600x367.png";s:5:"width";i:600;s:6:"height";i:367;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:31:"Reduced by 23.2% (28.9&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:51:"tableau-explicatif-fin-de-vente-windows-773x198.png";s:5:"width";i:773;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 39.3% (4.9&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:51:"tableau-explicatif-fin-de-vente-windows-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 17.1% (3.6&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>windows7</title>
		<link>http://www.it-news.fr/microsoft-offre-sursis-windows-7-pro/windows7/</link>
		<pubDate>Tue, 18 Feb 2014 09:33:13 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/windows7.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2144</wp:post_id>
		<wp:post_date>2014-02-18 10:33:13</wp:post_date>
		<wp:post_date_gmt>2014-02-18 09:33:13</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>windows7</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2142</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/windows7.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/windows7.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:20:"2014/02/windows7.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:20:"windows7-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.6% (337&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:20:"windows7-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.0% (665&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:20:"windows7-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.6% (887&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:20:"windows7-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>estimation-du-volume-de-ventes-selon-le-terminal-choisi</title>
		<link>http://www.it-news.fr/en-2014-pc-tablettes-se-partageront-le-marche/estimation-du-volume-de-ventes-selon-le-terminal-choisi/</link>
		<pubDate>Tue, 18 Feb 2014 13:01:10 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/estimation-du-volume-de-ventes-selon-le-terminal-choisi.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2150</wp:post_id>
		<wp:post_date>2014-02-18 14:01:10</wp:post_date>
		<wp:post_date_gmt>2014-02-18 13:01:10</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>estimation-du-volume-de-ventes-selon-le-terminal-choisi</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2149</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/estimation-du-volume-de-ventes-selon-le-terminal-choisi.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/estimation-du-volume-de-ventes-selon-le-terminal-choisi.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:481;s:6:"height";i:289;s:4:"file";s:67:"2014/02/estimation-du-volume-de-ventes-selon-le-terminal-choisi.png";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:67:"estimation-du-volume-de-ventes-selon-le-terminal-choisi-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 22.6% (3.3&nbsp;KB)";}s:6:"medium";a:5:{s:4:"file";s:67:"estimation-du-volume-de-ventes-selon-le-terminal-choisi-300x180.png";s:5:"width";i:300;s:6:"height";i:180;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 26.6% (9.5&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:67:"estimation-du-volume-de-ventes-selon-le-terminal-choisi-481x198.png";s:5:"width";i:481;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:28:"Reduced by 5.5% (223&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:67:"estimation-du-volume-de-ventes-selon-le-terminal-choisi-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 26.4% (2&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>marche-des-pc-tablettes-2014</title>
		<link>http://www.it-news.fr/en-2014-pc-tablettes-se-partageront-le-marche/marche-des-pc-tablettes-2014/</link>
		<pubDate>Tue, 18 Feb 2014 13:04:01 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/marche-des-pc-tablettes-2014.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2152</wp:post_id>
		<wp:post_date>2014-02-18 14:04:01</wp:post_date>
		<wp:post_date_gmt>2014-02-18 13:04:01</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>marche-des-pc-tablettes-2014</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2149</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/marche-des-pc-tablettes-2014.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/marche-des-pc-tablettes-2014.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:40:"2014/02/marche-des-pc-tablettes-2014.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:40:"marche-des-pc-tablettes-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.6% (404&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:40:"marche-des-pc-tablettes-2014-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.2% (837&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:40:"marche-des-pc-tablettes-2014-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 7.8% (1.1&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:40:"marche-des-pc-tablettes-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 1.1% (164&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>tablet-pc</title>
		<link>http://www.it-news.fr/en-2014-pc-tablettes-se-partageront-le-marche/tablet-pc/</link>
		<pubDate>Tue, 18 Feb 2014 13:04:37 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/tablet-pc.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2153</wp:post_id>
		<wp:post_date>2014-02-18 14:04:37</wp:post_date>
		<wp:post_date_gmt>2014-02-18 13:04:37</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>tablet-pc</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2149</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/tablet-pc.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/tablet-pc.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:364;s:6:"height";i:379;s:4:"file";s:21:"2014/02/tablet-pc.png";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:21:"tablet-pc-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:28:"Reduced by 2.6% (802&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:21:"tablet-pc-288x300.png";s:5:"width";i:288;s:6:"height";i:300;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:29:"Reduced by 3.8% (3.6&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:21:"tablet-pc-364x198.png";s:5:"width";i:364;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:29:"Reduced by 2.0% (1.4&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:21:"tablet-pc-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:31:"Reduced by 26.2% (38.2&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>sophos-rachete-cyberoam</title>
		<link>http://www.it-news.fr/sophos-rachete-cyberoam/sophos-rachete-cyberoam/</link>
		<pubDate>Wed, 19 Feb 2014 08:28:34 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/sophos-rachete-cyberoam.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2162</wp:post_id>
		<wp:post_date>2014-02-19 09:28:34</wp:post_date>
		<wp:post_date_gmt>2014-02-19 08:28:34</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>sophos-rachete-cyberoam</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2161</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/sophos-rachete-cyberoam.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/sophos-rachete-cyberoam.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:320;s:6:"height";i:183;s:4:"file";s:35:"2014/02/sophos-rachete-cyberoam.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:35:"sophos-rachete-cyberoam-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 9.5% (701&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:35:"sophos-rachete-cyberoam-300x171.jpg";s:5:"width";i:300;s:6:"height";i:171;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 9.7% (1.2&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:35:"sophos-rachete-cyberoam-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 9.9% (1.2&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>sophos-rachete-cyberoam</title>
		<link>http://www.it-news.fr/sophos-rachete-cyberoam/sophos-rachete-cyberoam-2/</link>
		<pubDate>Wed, 19 Feb 2014 08:32:21 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/sophos-rachete-cyberoam1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2163</wp:post_id>
		<wp:post_date>2014-02-19 09:32:21</wp:post_date>
		<wp:post_date_gmt>2014-02-19 08:32:21</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>sophos-rachete-cyberoam-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2161</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/sophos-rachete-cyberoam1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/sophos-rachete-cyberoam1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:36:"2014/02/sophos-rachete-cyberoam1.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:36:"sophos-rachete-cyberoam1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 9.5% (667&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:36:"sophos-rachete-cyberoam1-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.1% (999&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:36:"sophos-rachete-cyberoam1-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 9.4% (1.4&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:36:"sophos-rachete-cyberoam1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 10.3% (1.4&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>it-news-fr</title>
		<link>http://www.it-news.fr/?attachment_id=2170</link>
		<pubDate>Wed, 19 Feb 2014 09:14:50 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/it-news-fr.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2170</wp:post_id>
		<wp:post_date>2014-02-19 10:14:50</wp:post_date>
		<wp:post_date_gmt>2014-02-19 09:14:50</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>it-news-fr</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/it-news-fr.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/it-news-fr.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_context</wp:meta_key>
			<wp:meta_value><![CDATA[custom-background]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:285;s:6:"height";i:185;s:4:"file";s:22:"2014/02/it-news-fr.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:5:{s:4:"file";s:22:"it-news-fr-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.2% (382&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:22:"it-news-fr-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 4.6% (1.1&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_is_custom_background</wp:meta_key>
			<wp:meta_value><![CDATA[arcade-basic]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>didier-krainc-idc</title>
		<link>http://www.it-news.fr/augmentation-des-depenses-pour-2014/didier-krainc-idc/</link>
		<pubDate>Wed, 19 Feb 2014 13:18:51 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/didier-krainc-idc.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2175</wp:post_id>
		<wp:post_date>2014-02-19 14:18:51</wp:post_date>
		<wp:post_date_gmt>2014-02-19 13:18:51</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>didier-krainc-idc</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2172</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/didier-krainc-idc.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/didier-krainc-idc.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:211;s:6:"height";i:239;s:4:"file";s:29:"2014/02/didier-krainc-idc.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:29:"didier-krainc-idc-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.5% (491&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:29:"didier-krainc-idc-211x198.jpg";s:5:"width";i:211;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.0% (754&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:29:"didier-krainc-idc-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>idc-prevoit-une-augmentation-du-budget-it</title>
		<link>http://www.it-news.fr/augmentation-des-depenses-pour-2014/idc-prevoit-une-augmentation-du-budget-it/</link>
		<pubDate>Wed, 19 Feb 2014 13:18:57 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/idc-prevoit-une-augmentation-du-budget-it.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2176</wp:post_id>
		<wp:post_date>2014-02-19 14:18:57</wp:post_date>
		<wp:post_date_gmt>2014-02-19 13:18:57</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>idc-prevoit-une-augmentation-du-budget-it</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2172</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/idc-prevoit-une-augmentation-du-budget-it.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/idc-prevoit-une-augmentation-du-budget-it.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:53:"2014/02/idc-prevoit-une-augmentation-du-budget-it.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:53:"idc-prevoit-une-augmentation-du-budget-it-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.8% (472&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:53:"idc-prevoit-une-augmentation-du-budget-it-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.8% (821&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:53:"idc-prevoit-une-augmentation-du-budget-it-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.3% (847&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:53:"idc-prevoit-une-augmentation-du-budget-it-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 5.0% (736&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>fec</title>
		<link>http://www.it-news.fr/le-fec-contrainte-ou-opportunite/fec/</link>
		<pubDate>Fri, 21 Feb 2014 13:12:42 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/fec.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2183</wp:post_id>
		<wp:post_date>2014-02-21 14:12:42</wp:post_date>
		<wp:post_date_gmt>2014-02-21 13:12:42</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>fec</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2181</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/fec.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/fec.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:15:"2014/02/fec.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:15:"fec-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.9% (442&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:15:"fec-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.7% (877&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:15:"fec-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.5% (955&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:15:"fec-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>crm-cloud</title>
		<link>http://www.it-news.fr/en-2015-la-crm-sera-virtualisee/crm-cloud/</link>
		<pubDate>Mon, 24 Feb 2014 09:33:21 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/crm-cloud.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2188</wp:post_id>
		<wp:post_date>2014-02-24 10:33:21</wp:post_date>
		<wp:post_date_gmt>2014-02-24 09:33:21</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>crm-cloud</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2186</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/crm-cloud.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/crm-cloud.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:21:"2014/02/crm-cloud.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:21:"crm-cloud-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.7% (451&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:21:"crm-cloud-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.2% (775&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:21:"crm-cloud-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.1% (839&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:21:"crm-cloud-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>sage-report-extra-applications</title>
		<link>http://www.it-news.fr/sage-lance-2-applications-pour-la-mobilite-le-pilotage/sage-report-extra-applications/</link>
		<pubDate>Wed, 26 Feb 2014 07:54:33 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/sage-report-extra-applications.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2194</wp:post_id>
		<wp:post_date>2014-02-26 08:54:33</wp:post_date>
		<wp:post_date_gmt>2014-02-26 07:54:33</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>sage-report-extra-applications</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2191</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/sage-report-extra-applications.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/sage-report-extra-applications.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:960;s:6:"height";i:377;s:4:"file";s:42:"2014/02/sage-report-extra-applications.png";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:42:"sage-report-extra-applications-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 26.1% (3.4&nbsp;KB)";}s:6:"medium";a:5:{s:4:"file";s:42:"sage-report-extra-applications-300x117.png";s:5:"width";i:300;s:6:"height";i:117;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 25.2% (5.4&nbsp;KB)";}s:22:"wysija-newsletters-max";a:5:{s:4:"file";s:42:"sage-report-extra-applications-600x235.png";s:5:"width";i:600;s:6:"height";i:235;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:29:"Reduced by 21.1% (14&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:42:"sage-report-extra-applications-940x198.png";s:5:"width";i:940;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:31:"Reduced by 15.1% (10.8&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:42:"sage-report-extra-applications-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 8.3% (7.6&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>sage-lance-deux-applications</title>
		<link>http://www.it-news.fr/sage-lance-2-applications-pour-la-mobilite-le-pilotage/sage-lance-deux-applications/</link>
		<pubDate>Wed, 26 Feb 2014 08:02:39 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/sage-lance-deux-applications.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2195</wp:post_id>
		<wp:post_date>2014-02-26 09:02:39</wp:post_date>
		<wp:post_date_gmt>2014-02-26 08:02:39</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>sage-lance-deux-applications</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2191</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/sage-lance-deux-applications.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/sage-lance-deux-applications.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:40:"2014/02/sage-lance-deux-applications.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:40:"sage-lance-deux-applications-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.8% (437&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:40:"sage-lance-deux-applications-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.4% (768&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:40:"sage-lance-deux-applications-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 8.9% (1.1&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:40:"sage-lance-deux-applications-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 10.6% (1.3&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>sage-microsoft-partenaires</title>
		<link>http://www.it-news.fr/sage-microsoft-partenaires-sur-le-cloud/sage-microsoft-partenaires/</link>
		<pubDate>Wed, 26 Feb 2014 08:29:02 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/sage-microsoft-partenaires.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2199</wp:post_id>
		<wp:post_date>2014-02-26 09:29:02</wp:post_date>
		<wp:post_date_gmt>2014-02-26 08:29:02</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>sage-microsoft-partenaires</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2197</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/sage-microsoft-partenaires.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/sage-microsoft-partenaires.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:38:"2014/02/sage-microsoft-partenaires.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:38:"sage-microsoft-partenaires-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.6% (535&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:38:"sage-microsoft-partenaires-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 9.1% (1002&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:38:"sage-microsoft-partenaires-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 9.5% (1.2&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:38:"sage-microsoft-partenaires-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 11.1% (1.4&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>sage-customer-view</title>
		<link>http://www.it-news.fr/sage-lance-2-applications-pour-la-mobilite-le-pilotage/sage-customer-view/</link>
		<pubDate>Wed, 26 Feb 2014 09:15:45 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/sage-customer-view.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2205</wp:post_id>
		<wp:post_date>2014-02-26 10:15:45</wp:post_date>
		<wp:post_date_gmt>2014-02-26 09:15:45</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>sage-customer-view</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2191</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/sage-customer-view.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/sage-customer-view.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:500;s:6:"height";i:281;s:4:"file";s:30:"2014/02/sage-customer-view.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:30:"sage-customer-view-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.8% (531&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:30:"sage-customer-view-300x168.jpg";s:5:"width";i:300;s:6:"height";i:168;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:27:"Reduced by 7.6% (1&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:30:"sage-customer-view-500x198.jpg";s:5:"width";i:500;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 8.8% (2.5&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:30:"sage-customer-view-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 0.5% (350&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>sage-reports</title>
		<link>http://www.it-news.fr/sage-lance-2-applications-pour-la-mobilite-le-pilotage/sage-reports/</link>
		<pubDate>Wed, 26 Feb 2014 09:17:54 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/sage-reports.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2206</wp:post_id>
		<wp:post_date>2014-02-26 10:17:54</wp:post_date>
		<wp:post_date_gmt>2014-02-26 09:17:54</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>sage-reports</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2191</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/sage-reports.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/sage-reports.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:500;s:6:"height";i:281;s:4:"file";s:24:"2014/02/sage-reports.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:24:"sage-reports-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.4% (493&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:24:"sage-reports-300x168.jpg";s:5:"width";i:300;s:6:"height";i:168;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:27:"Reduced by 9.4% (1&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:24:"sage-reports-500x198.jpg";s:5:"width";i:500;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:27:"Reduced by 9.9% (2&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:24:"sage-reports-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:27:"Reduced by 0.1% (62&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>imprimante-3d</title>
		<link>http://www.it-news.fr/les-tendances-pour-2014/imprimante-3d/</link>
		<pubDate>Mon, 03 Mar 2014 08:36:23 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/03/imprimante-3d.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2217</wp:post_id>
		<wp:post_date>2014-03-03 09:36:23</wp:post_date>
		<wp:post_date_gmt>2014-03-03 08:36:23</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>imprimante-3d</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2216</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/03/imprimante-3d.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/03/imprimante-3d.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:290;s:6:"height";i:174;s:4:"file";s:25:"2014/03/imprimante-3d.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:5:{s:4:"file";s:25:"imprimante-3d-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.3% (299&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:25:"imprimante-3d-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>objet-connecte</title>
		<link>http://www.it-news.fr/les-tendances-pour-2014/objet-connecte/</link>
		<pubDate>Mon, 03 Mar 2014 08:36:27 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/03/objet-connecte.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2218</wp:post_id>
		<wp:post_date>2014-03-03 09:36:27</wp:post_date>
		<wp:post_date_gmt>2014-03-03 08:36:27</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>objet-connecte</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2216</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/03/objet-connecte.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/03/objet-connecte.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:288;s:6:"height";i:175;s:4:"file";s:26:"2014/03/objet-connecte.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:5:{s:4:"file";s:26:"objet-connecte-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.3% (130&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:26:"objet-connecte-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>tendances-it-2014</title>
		<link>http://www.it-news.fr/les-tendances-pour-2014/tendances-it-2014/</link>
		<pubDate>Mon, 03 Mar 2014 08:36:30 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/03/tendances-it-2014.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2219</wp:post_id>
		<wp:post_date>2014-03-03 09:36:30</wp:post_date>
		<wp:post_date_gmt>2014-03-03 08:36:30</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>tendances-it-2014</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2216</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/03/tendances-it-2014.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/03/tendances-it-2014.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:29:"2014/03/tendances-it-2014.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:29:"tendances-it-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.2% (355&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:29:"tendances-it-2014-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.0% (526&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:29:"tendances-it-2014-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.5% (659&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:29:"tendances-it-2014-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 1.0% (158&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>serveurs-amd</title>
		<link>http://www.it-news.fr/les-tendances-pour-2014/serveurs-amd/</link>
		<pubDate>Mon, 03 Mar 2014 08:41:52 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/03/serveurs-amd.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2220</wp:post_id>
		<wp:post_date>2014-03-03 09:41:52</wp:post_date>
		<wp:post_date_gmt>2014-03-03 08:41:52</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>serveurs-amd</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2216</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/03/serveurs-amd.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/03/serveurs-amd.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:238;s:6:"height";i:212;s:4:"file";s:24:"2014/03/serveurs-amd.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:24:"serveurs-amd-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.4% (386&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:24:"serveurs-amd-238x198.jpg";s:5:"width";i:238;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.8% (793&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:24:"serveurs-amd-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>serveurs-intel</title>
		<link>http://www.it-news.fr/les-tendances-pour-2014/serveurs-intel/</link>
		<pubDate>Mon, 03 Mar 2014 08:41:57 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/03/serveurs-intel.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2221</wp:post_id>
		<wp:post_date>2014-03-03 09:41:57</wp:post_date>
		<wp:post_date_gmt>2014-03-03 08:41:57</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>serveurs-intel</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2216</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/03/serveurs-intel.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/03/serveurs-intel.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:234;s:6:"height";i:215;s:4:"file";s:26:"2014/03/serveurs-intel.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:26:"serveurs-intel-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.1% (562&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:26:"serveurs-intel-234x198.jpg";s:5:"width";i:234;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 18.9% (3.5&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:26:"serveurs-intel-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>serveurs-intel-amd</title>
		<link>http://www.it-news.fr/les-tendances-pour-2014/serveurs-intel-amd/</link>
		<pubDate>Mon, 03 Mar 2014 08:52:53 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/03/serveurs-intel-amd.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2222</wp:post_id>
		<wp:post_date>2014-03-03 09:52:53</wp:post_date>
		<wp:post_date_gmt>2014-03-03 08:52:53</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>serveurs-intel-amd</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2216</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/03/serveurs-intel-amd.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/03/serveurs-intel-amd.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:482;s:6:"height";i:231;s:4:"file";s:30:"2014/03/serveurs-intel-amd.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:30:"serveurs-intel-amd-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.7% (439&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:30:"serveurs-intel-amd-300x143.jpg";s:5:"width";i:300;s:6:"height";i:143;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.0% (828&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:30:"serveurs-intel-amd-482x198.jpg";s:5:"width";i:482;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 15.6% (4.9&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:30:"serveurs-intel-amd-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 6.8% (2.2&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>fin-xp</title>
		<link>http://www.it-news.fr/microsoft-prepare-la-fin-du-support-de-windows-xp/fin-xp/</link>
		<pubDate>Tue, 04 Mar 2014 14:16:38 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/03/fin-xp.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2235</wp:post_id>
		<wp:post_date>2014-03-04 15:16:38</wp:post_date>
		<wp:post_date_gmt>2014-03-04 14:16:38</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>fin-xp</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2234</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/03/fin-xp.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/03/fin-xp.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:18:"2014/03/fin-xp.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:18:"fin-xp-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.8% (510&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:18:"fin-xp-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 5.8% (1.1&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:18:"fin-xp-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 5.6% (1.2&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:18:"fin-xp-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 3.5% (2.5&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>controle-fiscal</title>
		<link>http://www.it-news.fr/le-controle-fiscal-obligation-conformite/controle-fiscal/</link>
		<pubDate>Fri, 07 Mar 2014 07:32:13 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/03/controle-fiscal.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2240</wp:post_id>
		<wp:post_date>2014-03-07 08:32:13</wp:post_date>
		<wp:post_date_gmt>2014-03-07 07:32:13</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>controle-fiscal</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2239</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/03/controle-fiscal.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/03/controle-fiscal.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:27:"2014/03/controle-fiscal.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:27:"controle-fiscal-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.7% (538&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:27:"controle-fiscal-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.5% (807&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:27:"controle-fiscal-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.9% (975&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:27:"controle-fiscal-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>facture-edi</title>
		<link>http://www.it-news.fr/securite-informatique-les-entreprises-estiment-leurs-employes/facture-edi/</link>
		<pubDate>Tue, 25 Mar 2014 16:38:51 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/03/facture-edi.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2254</wp:post_id>
		<wp:post_date>2014-03-25 17:38:51</wp:post_date>
		<wp:post_date_gmt>2014-03-25 16:38:51</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>facture-edi</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2253</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/03/facture-edi.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/03/facture-edi.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:23:"2014/03/facture-edi.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:23:"facture-edi-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.2% (383&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:23:"facture-edi-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.8% (793&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:23:"facture-edi-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.9% (944&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:23:"facture-edi-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>securite-et-employes</title>
		<link>http://www.it-news.fr/securite-informatique-les-entreprises-estiment-leurs-employes/securite-et-employes/</link>
		<pubDate>Tue, 25 Mar 2014 16:38:59 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/03/securite-et-employes.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2255</wp:post_id>
		<wp:post_date>2014-03-25 17:38:59</wp:post_date>
		<wp:post_date_gmt>2014-03-25 16:38:59</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>securite-et-employes</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2253</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/03/securite-et-employes.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/03/securite-et-employes.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:32:"2014/03/securite-et-employes.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:32:"securite-et-employes-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:27:"Reduced by 7.7% (1&nbsp;KB)";}s:6:"medium";a:5:{s:4:"file";s:32:"securite-et-employes-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 8.7% (2.7&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:32:"securite-et-employes-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:27:"Reduced by 8.3% (3&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:32:"securite-et-employes-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 1.9% (495&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>word-0day</title>
		<link>http://www.it-news.fr/logiciel-word-faille-zero-day-toujours-active-decouverte-microsoft/word-0day/</link>
		<pubDate>Wed, 26 Mar 2014 07:51:49 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/03/word-0day.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2262</wp:post_id>
		<wp:post_date>2014-03-26 08:51:49</wp:post_date>
		<wp:post_date_gmt>2014-03-26 07:51:49</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>word-0day</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2261</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/03/word-0day.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/03/word-0day.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:21:"2014/03/word-0day.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:21:"word-0day-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.3% (631&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:21:"word-0day-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.1% (891&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:21:"word-0day-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 9.3% (1.3&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:21:"word-0day-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>genmobile</title>
		<link>http://www.it-news.fr/livre-blanc-mobilite-byod-impacts-enjeux/genmobile/</link>
		<pubDate>Thu, 27 Mar 2014 09:56:45 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/03/genmobile.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2267</wp:post_id>
		<wp:post_date>2014-03-27 10:56:45</wp:post_date>
		<wp:post_date_gmt>2014-03-27 09:56:45</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>genmobile</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2266</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/03/genmobile.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/03/genmobile.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:560;s:6:"height";i:271;s:4:"file";s:21:"2014/03/genmobile.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:21:"genmobile-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 9.2% (1.1&nbsp;KB)";}s:6:"medium";a:5:{s:4:"file";s:21:"genmobile-300x145.jpg";s:5:"width";i:300;s:6:"height";i:145;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 9.5% (2.1&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:21:"genmobile-560x198.jpg";s:5:"width";i:560;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 10.5% (4.8&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:21:"genmobile-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>lequipe-aquastar-au-petit-dej</title>
		<link>http://www.it-news.fr/retour-petit-dejeuner-les-cybermenaces/lequipe-aquastar-au-petit-dej/</link>
		<pubDate>Tue, 01 Apr 2014 07:52:49 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/04/lequipe-aquastar-au-petit-dej.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2279</wp:post_id>
		<wp:post_date>2014-04-01 08:52:49</wp:post_date>
		<wp:post_date_gmt>2014-04-01 07:52:49</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>lequipe-aquastar-au-petit-dej</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2278</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/04/lequipe-aquastar-au-petit-dej.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/04/lequipe-aquastar-au-petit-dej.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:500;s:6:"height";i:300;s:4:"file";s:41:"2014/04/lequipe-aquastar-au-petit-dej.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:41:"lequipe-aquastar-au-petit-dej-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.6% (625&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:41:"lequipe-aquastar-au-petit-dej-300x180.jpg";s:5:"width";i:300;s:6:"height";i:180;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.7% (949&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:41:"lequipe-aquastar-au-petit-dej-500x198.jpg";s:5:"width";i:500;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 4.7% (1.2&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:41:"lequipe-aquastar-au-petit-dej-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 3.5% (795&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>ludovi-deschamps</title>
		<link>http://www.it-news.fr/retour-petit-dejeuner-les-cybermenaces/ludovi-deschamps/</link>
		<pubDate>Tue, 01 Apr 2014 07:53:06 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/04/ludovi-deschamps.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2280</wp:post_id>
		<wp:post_date>2014-04-01 08:53:06</wp:post_date>
		<wp:post_date_gmt>2014-04-01 07:53:06</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>ludovi-deschamps</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2278</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/04/ludovi-deschamps.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/04/ludovi-deschamps.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:500;s:6:"height";i:300;s:4:"file";s:28:"2014/04/ludovi-deschamps.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:28:"ludovi-deschamps-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.0% (332&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:28:"ludovi-deschamps-300x180.jpg";s:5:"width";i:300;s:6:"height";i:180;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.2% (692&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:28:"ludovi-deschamps-500x198.jpg";s:5:"width";i:500;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 4.3% (1010&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:28:"ludovi-deschamps-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:27:"Reduced by 3.8% (1&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>principal-orateur-du-petit-dej</title>
		<link>http://www.it-news.fr/retour-petit-dejeuner-les-cybermenaces/principal-orateur-du-petit-dej/</link>
		<pubDate>Tue, 01 Apr 2014 07:53:25 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/04/principal-orateur-du-petit-dej.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2281</wp:post_id>
		<wp:post_date>2014-04-01 08:53:25</wp:post_date>
		<wp:post_date_gmt>2014-04-01 07:53:25</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>principal-orateur-du-petit-dej</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2278</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/04/principal-orateur-du-petit-dej.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/04/principal-orateur-du-petit-dej.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:500;s:6:"height";i:300;s:4:"file";s:42:"2014/04/principal-orateur-du-petit-dej.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:42:"principal-orateur-du-petit-dej-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.7% (292&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:42:"principal-orateur-du-petit-dej-300x180.jpg";s:5:"width";i:300;s:6:"height";i:180;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.6% (559&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:42:"principal-orateur-du-petit-dej-500x198.jpg";s:5:"width";i:500;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 3.8% (807&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:42:"principal-orateur-du-petit-dej-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 5.8% (1.1&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>bande photo</title>
		<link>http://www.it-news.fr/retour-petit-dejeuner-les-cybermenaces/bande-photo/</link>
		<pubDate>Tue, 01 Apr 2014 08:24:37 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/04/bande-photo.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2283</wp:post_id>
		<wp:post_date>2014-04-01 09:24:37</wp:post_date>
		<wp:post_date_gmt>2014-04-01 08:24:37</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>bande-photo</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2278</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/04/bande-photo.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/04/bande-photo.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:1000;s:6:"height";i:300;s:4:"file";s:23:"2014/04/bande-photo.jpg";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:23:"bande-photo-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.1% (364&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:22:"bande-photo-300x90.jpg";s:5:"width";i:300;s:6:"height";i:90;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.0% (661&nbsp;B)";}s:22:"wysija-newsletters-max";a:5:{s:4:"file";s:23:"bande-photo-600x180.jpg";s:5:"width";i:600;s:6:"height";i:180;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.7% (1.7&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:23:"bande-photo-940x198.jpg";s:5:"width";i:940;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 4.5% (1.6&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:23:"bande-photo-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 9.3% (3.1&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>bande photo</title>
		<link>http://www.it-news.fr/retour-petit-dejeuner-les-cybermenaces/bande-photo-2/</link>
		<pubDate>Tue, 01 Apr 2014 08:30:35 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/04/bande-photo1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2286</wp:post_id>
		<wp:post_date>2014-04-01 09:30:35</wp:post_date>
		<wp:post_date_gmt>2014-04-01 08:30:35</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>bande-photo-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2278</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/04/bande-photo1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/04/bande-photo1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:1000;s:6:"height";i:300;s:4:"file";s:24:"2014/04/bande-photo1.jpg";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:24:"bande-photo1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.7% (324&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:23:"bande-photo1-300x90.jpg";s:5:"width";i:300;s:6:"height";i:90;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.5% (659&nbsp;B)";}s:22:"wysija-newsletters-max";a:5:{s:4:"file";s:24:"bande-photo1-600x180.jpg";s:5:"width";i:600;s:6:"height";i:180;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 5.3% (1.5&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:24:"bande-photo1-940x198.jpg";s:5:"width";i:940;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 4.3% (1.7&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:24:"bande-photo1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 2.2% (1.2&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>header_blog</title>
		<link>http://www.it-news.fr/?attachment_id=2295</link>
		<pubDate>Fri, 04 Apr 2014 07:55:53 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/04/header_blog.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2295</wp:post_id>
		<wp:post_date>2014-04-04 08:55:53</wp:post_date>
		<wp:post_date_gmt>2014-04-04 07:55:53</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>header_blog</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/04/header_blog.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/04/header_blog.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:940;s:6:"height";i:260;s:4:"file";s:23:"2014/04/header_blog.jpg";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:23:"header_blog-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.4% (333&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:22:"header_blog-300x82.jpg";s:5:"width";i:300;s:6:"height";i:82;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.0% (645&nbsp;B)";}s:22:"wysija-newsletters-max";a:5:{s:4:"file";s:23:"header_blog-600x165.jpg";s:5:"width";i:600;s:6:"height";i:165;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 5.6% (1.8&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:23:"header_blog-940x198.jpg";s:5:"width";i:940;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 5.0% (2.7&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:23:"header_blog-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 1.2% (848&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>copy-header_blog.jpg</title>
		<link>http://www.it-news.fr/?attachment_id=2296</link>
		<pubDate>Fri, 04 Apr 2014 07:58:00 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/04/copy-header_blog.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[http://www.it-news.fr/wp-content/uploads/2014/04/copy-header_blog.jpg]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2296</wp:post_id>
		<wp:post_date>2014-04-04 08:58:00</wp:post_date>
		<wp:post_date_gmt>2014-04-04 07:58:00</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>copy-header_blog-jpg</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/04/copy-header_blog.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/04/copy-header_blog.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_context</wp:meta_key>
			<wp:meta_value><![CDATA[custom-header]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:940;s:6:"height";i:260;s:4:"file";s:28:"2014/04/copy-header_blog.jpg";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:28:"copy-header_blog-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.4% (333&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:27:"copy-header_blog-300x82.jpg";s:5:"width";i:300;s:6:"height";i:82;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.0% (645&nbsp;B)";}s:22:"wysija-newsletters-max";a:5:{s:4:"file";s:28:"copy-header_blog-600x165.jpg";s:5:"width";i:600;s:6:"height";i:165;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 5.6% (1.8&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:28:"copy-header_blog-940x198.jpg";s:5:"width";i:940;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 5.0% (2.7&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:28:"copy-header_blog-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_is_custom_header</wp:meta_key>
			<wp:meta_value><![CDATA[twentyten]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>header_blog1.jpg</title>
		<link>http://www.it-news.fr/?attachment_id=2297</link>
		<pubDate>Fri, 04 Apr 2014 08:00:23 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/04/header_blog1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[http://www.it-news.fr/wp-content/uploads/2014/04/header_blog1.jpg]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2297</wp:post_id>
		<wp:post_date>2014-04-04 09:00:23</wp:post_date>
		<wp:post_date_gmt>2014-04-04 08:00:23</wp:post_date_gmt>
		<wp:comment_status>closed</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>header_blog1-jpg</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/04/header_blog1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/04/header_blog1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_context</wp:meta_key>
			<wp:meta_value><![CDATA[custom-header]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:940;s:6:"height";i:260;s:4:"file";s:24:"2014/04/header_blog1.jpg";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:24:"header_blog1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.4% (333&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:23:"header_blog1-300x82.jpg";s:5:"width";i:300;s:6:"height";i:82;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.0% (645&nbsp;B)";}s:22:"wysija-newsletters-max";a:5:{s:4:"file";s:24:"header_blog1-600x165.jpg";s:5:"width";i:600;s:6:"height";i:165;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 5.6% (1.8&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:24:"header_blog1-940x198.jpg";s:5:"width";i:940;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 5.0% (2.7&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:24:"header_blog1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 1.2% (848&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_is_custom_header</wp:meta_key>
			<wp:meta_value><![CDATA[twentyten]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>un-grand-nbre-de-pme-utilisent-encore-des-logiciels-depasses</title>
		<link>http://www.it-news.fr/grand-nombre-pme-utilisent-encore-logiciels-depasses/un-grand-nbre-de-pme-utilisent-encore-des-logiciels-depasses/</link>
		<pubDate>Fri, 04 Apr 2014 13:53:18 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/04/un-grand-nbre-de-pme-utilisent-encore-des-logiciels-depasses.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2301</wp:post_id>
		<wp:post_date>2014-04-04 14:53:18</wp:post_date>
		<wp:post_date_gmt>2014-04-04 13:53:18</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>un-grand-nbre-de-pme-utilisent-encore-des-logiciels-depasses</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2300</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/04/un-grand-nbre-de-pme-utilisent-encore-des-logiciels-depasses.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/04/un-grand-nbre-de-pme-utilisent-encore-des-logiciels-depasses.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:72:"2014/04/un-grand-nbre-de-pme-utilisent-encore-des-logiciels-depasses.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:72:"un-grand-nbre-de-pme-utilisent-encore-des-logiciels-depasses-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.0% (678&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:72:"un-grand-nbre-de-pme-utilisent-encore-des-logiciels-depasses-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.8% (1.1&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:72:"un-grand-nbre-de-pme-utilisent-encore-des-logiciels-depasses-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.5% (1.1&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:72:"un-grand-nbre-de-pme-utilisent-encore-des-logiciels-depasses-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 5.1% (987&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>une-majorite-de-drh-préfèrent-la-solution-en-saas</title>
		<link>http://www.it-news.fr/lorsque-metier-rh-se-met-au-saas/une-majorite-de-drh-preferent-la-solution-en-saas/</link>
		<pubDate>Mon, 07 Apr 2014 07:47:38 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/04/une-majorite-de-drh-préfèrent-la-solution-en-saas.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2306</wp:post_id>
		<wp:post_date>2014-04-07 08:47:38</wp:post_date>
		<wp:post_date_gmt>2014-04-07 07:47:38</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>une-majorite-de-drh-preferent-la-solution-en-saas</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2305</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/04/une-majorite-de-drh-préfèrent-la-solution-en-saas.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/04/une-majorite-de-drh-préfèrent-la-solution-en-saas.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:534;s:6:"height";i:338;s:4:"file";s:63:"2014/04/une-majorite-de-drh-préfèrent-la-solution-en-saas.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:63:"une-majorite-de-drh-préfèrent-la-solution-en-saas-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 9.4% (987&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:63:"une-majorite-de-drh-préfèrent-la-solution-en-saas-300x189.jpg";s:5:"width";i:300;s:6:"height";i:189;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 9.5% (1.9&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:63:"une-majorite-de-drh-préfèrent-la-solution-en-saas-534x198.jpg";s:5:"width";i:534;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 12.8% (3.9&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:63:"une-majorite-de-drh-préfèrent-la-solution-en-saas-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 12.3% (5.2&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>la-rh-se-met-au-saas</title>
		<link>http://www.it-news.fr/lorsque-metier-rh-se-met-au-saas/la-rh-se-met-au-saas/</link>
		<pubDate>Mon, 07 Apr 2014 07:47:53 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/04/la-rh-se-met-au-saas.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2307</wp:post_id>
		<wp:post_date>2014-04-07 08:47:53</wp:post_date>
		<wp:post_date_gmt>2014-04-07 07:47:53</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>la-rh-se-met-au-saas</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2305</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/04/la-rh-se-met-au-saas.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/04/la-rh-se-met-au-saas.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:32:"2014/04/la-rh-se-met-au-saas.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:32:"la-rh-se-met-au-saas-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.8% (991&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:32:"la-rh-se-met-au-saas-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 9.5% (1.7&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:32:"la-rh-se-met-au-saas-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 10.2% (2.3&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:32:"la-rh-se-met-au-saas-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 3.2% (771&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>avec-le-saas-ne-une-relation-entre-drh-et-dsi</title>
		<link>http://www.it-news.fr/lorsque-metier-rh-se-met-au-saas/avec-le-saas-ne-une-relation-entre-drh-et-dsi/</link>
		<pubDate>Mon, 07 Apr 2014 07:48:01 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/04/avec-le-saas-ne-une-relation-entre-drh-et-dsi.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2308</wp:post_id>
		<wp:post_date>2014-04-07 08:48:01</wp:post_date>
		<wp:post_date_gmt>2014-04-07 07:48:01</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>avec-le-saas-ne-une-relation-entre-drh-et-dsi</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2305</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/04/avec-le-saas-ne-une-relation-entre-drh-et-dsi.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/04/avec-le-saas-ne-une-relation-entre-drh-et-dsi.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:542;s:6:"height";i:361;s:4:"file";s:57:"2014/04/avec-le-saas-ne-une-relation-entre-drh-et-dsi.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:57:"avec-le-saas-ne-une-relation-entre-drh-et-dsi-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.2% (881&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:57:"avec-le-saas-ne-une-relation-entre-drh-et-dsi-300x199.jpg";s:5:"width";i:300;s:6:"height";i:199;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 8.4% (1.7&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:57:"avec-le-saas-ne-une-relation-entre-drh-et-dsi-542x198.jpg";s:5:"width";i:542;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 11.6% (2.9&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:57:"avec-le-saas-ne-une-relation-entre-drh-et-dsi-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 11.6% (5.2&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>sage-octime</title>
		<link>http://www.it-news.fr/sage-octime-sassocie-mieux-repondre-aux-demandes-pme/sage-octime/</link>
		<pubDate>Mon, 14 Apr 2014 08:30:00 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/04/sage-octime.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2320</wp:post_id>
		<wp:post_date>2014-04-14 09:30:00</wp:post_date>
		<wp:post_date_gmt>2014-04-14 08:30:00</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>sage-octime</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2319</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/04/sage-octime.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/04/sage-octime.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:23:"2014/04/sage-octime.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:23:"sage-octime-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 9.7% (639&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:23:"sage-octime-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 10.9% (1.1&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:23:"sage-octime-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 11.6% (1.5&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:23:"sage-octime-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 2.3% (334&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>rp_sage-microsoft-partenaires-300x200.jpg</title>
		<link>http://www.it-news.fr/sage-microsoft-partenaires-sur-le-cloud/rp_sage-microsoft-partenaires-300x200-jpg/</link>
		<pubDate>Mon, 14 Apr 2014 08:39:56 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/sage-microsoft-partenaires-300x200.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2323</wp:post_id>
		<wp:post_date>2014-04-14 09:39:56</wp:post_date>
		<wp:post_date_gmt>2014-04-14 08:39:56</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>rp_sage-microsoft-partenaires-300x200-jpg</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2197</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/sage-microsoft-partenaires-300x2001.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/sage-microsoft-partenaires-300x2001.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:300;s:6:"height";i:200;s:4:"file";s:47:"2014/02/sage-microsoft-partenaires-300x2001.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:47:"sage-microsoft-partenaires-300x2001-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.8% (523&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:47:"sage-microsoft-partenaires-300x2001-300x198.jpg";s:5:"width";i:300;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:27:"Reduced by 9.2% (1&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:47:"sage-microsoft-partenaires-300x2001-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>rp_sage-lance-deux-applications-300x200.jpg</title>
		<link>http://www.it-news.fr/sage-lance-2-applications-pour-la-mobilite-le-pilotage/rp_sage-lance-deux-applications-300x200-jpg/</link>
		<pubDate>Mon, 14 Apr 2014 08:40:00 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/02/sage-lance-deux-applications-300x200.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2324</wp:post_id>
		<wp:post_date>2014-04-14 09:40:00</wp:post_date>
		<wp:post_date_gmt>2014-04-14 08:40:00</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>rp_sage-lance-deux-applications-300x200-jpg</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2191</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/02/sage-lance-deux-applications-300x2001.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/02/sage-lance-deux-applications-300x2001.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:300;s:6:"height";i:200;s:4:"file";s:49:"2014/02/sage-lance-deux-applications-300x2001.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:49:"sage-lance-deux-applications-300x2001-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.7% (424&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:49:"sage-lance-deux-applications-300x2001-300x198.jpg";s:5:"width";i:300;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.9% (844&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:49:"sage-lance-deux-applications-300x2001-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>tableaux-de-bord-sage-paie-et-rh</title>
		<link>http://www.it-news.fr/sage-octime-sassocie-mieux-repondre-aux-demandes-pme/tableaux-de-bord-sage-paie-et-rh/</link>
		<pubDate>Mon, 14 Apr 2014 12:54:16 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/04/tableaux-de-bord-sage-paie-et-rh.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2327</wp:post_id>
		<wp:post_date>2014-04-14 13:54:16</wp:post_date>
		<wp:post_date_gmt>2014-04-14 12:54:16</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>tableaux-de-bord-sage-paie-et-rh</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2319</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/04/tableaux-de-bord-sage-paie-et-rh.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/04/tableaux-de-bord-sage-paie-et-rh.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:247;s:6:"height";i:187;s:4:"file";s:44:"2014/04/tableaux-de-bord-sage-paie-et-rh.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:5:{s:4:"file";s:44:"tableaux-de-bord-sage-paie-et-rh-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.6% (440&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:44:"tableaux-de-bord-sage-paie-et-rh-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>heartbleed</title>
		<link>http://www.it-news.fr/heartbleed-faille-securite-affecte-demi-million-sites-monde/heartbleed/</link>
		<pubDate>Mon, 14 Apr 2014 15:18:28 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/04/heartbleed.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2331</wp:post_id>
		<wp:post_date>2014-04-14 16:18:28</wp:post_date>
		<wp:post_date_gmt>2014-04-14 15:18:28</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>heartbleed</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2330</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/04/heartbleed.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/04/heartbleed.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:22:"2014/04/heartbleed.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:22:"heartbleed-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:26:"ERROR: posting to Smush.it";}s:6:"medium";a:5:{s:4:"file";s:22:"heartbleed-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 10.5% (1.1&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:22:"heartbleed-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:26:"ERROR: posting to Smush.it";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:22:"heartbleed-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:26:"ERROR: posting to Smush.it";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 1.2% (172&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>rp_question-blue.jpg</title>
		<link>http://www.it-news.fr/prendre-les-bonnes-decisions-grace-a-nos-outils/rp_question-blue-jpg/</link>
		<pubDate>Wed, 16 Apr 2014 17:20:39 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/question-blue.jpg?w=120</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2337</wp:post_id>
		<wp:post_date>2014-04-16 18:20:39</wp:post_date>
		<wp:post_date_gmt>2014-04-16 17:20:39</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>rp_question-blue-jpg</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>342</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/question-blue2.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/question-blue2.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:300;s:6:"height";i:375;s:4:"file";s:26:"2013/06/question-blue2.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:26:"question-blue2-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.4% (370&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:26:"question-blue2-240x300.jpg";s:5:"width";i:240;s:6:"height";i:300;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.1% (521&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:26:"question-blue2-300x198.jpg";s:5:"width";i:300;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 14.6% (1.1&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:26:"question-blue2-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>rp_aruba.png</title>
		<link>http://www.it-news.fr/les-nouveaux-points-dacces-wifi-aruba-networks/rp_aruba-png/</link>
		<pubDate>Wed, 16 Apr 2014 18:15:33 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/07/aruba.png?w=136</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2338</wp:post_id>
		<wp:post_date>2014-04-16 19:15:33</wp:post_date>
		<wp:post_date_gmt>2014-04-16 18:15:33</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>rp_aruba-png</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>760</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/07/aruba2.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/07/aruba2.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:372;s:6:"height";i:410;s:4:"file";s:18:"2013/07/aruba2.png";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:18:"aruba2-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:10:"No savings";}s:6:"medium";a:5:{s:4:"file";s:18:"aruba2-272x300.png";s:5:"width";i:272;s:6:"height";i:300;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:29:"Reduced by 5.5% (4.1&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:18:"aruba2-372x198.png";s:5:"width";i:372;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:29:"Reduced by 5.5% (3.5&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:18:"aruba2-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>rp_Protection-des-données-personnelles-emails-300x238.png</title>
		<link>http://www.it-news.fr/protectiondesdonneespersonnelles-on-manque-dinformation/rp_protection-des-donnees-personnelles-emails-300x238-png/</link>
		<pubDate>Thu, 17 Apr 2014 02:00:44 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/08/Protection-des-données-personnelles-emails-300x238.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2341</wp:post_id>
		<wp:post_date>2014-04-17 03:00:44</wp:post_date>
		<wp:post_date_gmt>2014-04-17 02:00:44</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>rp_protection-des-donnees-personnelles-emails-300x238-png</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>880</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/08/Protection-des-données-personnelles-emails-300x2381.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/08/Protection-des-données-personnelles-emails-300x2381.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:300;s:6:"height";i:238;s:4:"file";s:64:"2013/08/Protection-des-données-personnelles-emails-300x2381.png";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:64:"Protection-des-données-personnelles-emails-300x2381-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:28:"Reduced by 1.2% (248&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:64:"Protection-des-données-personnelles-emails-300x2381-300x198.png";s:5:"width";i:300;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:28:"Reduced by 1.3% (676&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:64:"Protection-des-données-personnelles-emails-300x2381-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 2.8% (1.5&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>rp_sage-100_-trc3a9sorerie-i7.png</title>
		<link>http://www.it-news.fr/visualisez-en-temps-reel-votre-tresorerie/rp_sage-100_-trc3a9sorerie-i7-png/</link>
		<pubDate>Thu, 17 Apr 2014 09:40:52 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/sage-100_-trc3a9sorerie-i7.png?w=137</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2342</wp:post_id>
		<wp:post_date>2014-04-17 10:40:52</wp:post_date>
		<wp:post_date_gmt>2014-04-17 09:40:52</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>rp_sage-100_-trc3a9sorerie-i7-png</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>332</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/sage-100_-trc3a9sorerie-i72.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/sage-100_-trc3a9sorerie-i72.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:308;s:6:"height";i:335;s:4:"file";s:39:"2013/06/sage-100_-trc3a9sorerie-i72.png";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:39:"sage-100_-trc3a9sorerie-i72-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 22.1% (5.2&nbsp;KB)";}s:6:"medium";a:5:{s:4:"file";s:39:"sage-100_-trc3a9sorerie-i72-275x300.png";s:5:"width";i:275;s:6:"height";i:300;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:31:"Reduced by 20.9% (12.7&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:39:"sage-100_-trc3a9sorerie-i72-308x198.png";s:5:"width";i:308;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 31.3% (5.4&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:39:"sage-100_-trc3a9sorerie-i72-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 3.4% (828&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>rp_gdi-circle-network-downline.jpg</title>
		<link>http://www.it-news.fr/dematerialiser-ses-documents-et-automatiser-ses-processus/rp_gdi-circle-network-downline-jpg/</link>
		<pubDate>Thu, 17 Apr 2014 10:32:12 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/gdi-circle-network-downline.jpg?w=150</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2343</wp:post_id>
		<wp:post_date>2014-04-17 11:32:12</wp:post_date>
		<wp:post_date_gmt>2014-04-17 10:32:12</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>rp_gdi-circle-network-downline-jpg</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>336</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/gdi-circle-network-downline2.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/gdi-circle-network-downline2.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:461;s:6:"height";i:307;s:4:"file";s:40:"2013/06/gdi-circle-network-downline2.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:40:"gdi-circle-network-downline2-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.2% (736&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:40:"gdi-circle-network-downline2-300x199.jpg";s:5:"width";i:300;s:6:"height";i:199;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 8.1% (1.1&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:40:"gdi-circle-network-downline2-461x198.jpg";s:5:"width";i:461;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 8.5% (1.9&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:40:"gdi-circle-network-downline2-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 2.8% (445&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>outil-de-test</title>
		<link>http://www.it-news.fr/heartbleed-faille-securite-affecte-demi-million-sites-monde/outil-de-test/</link>
		<pubDate>Fri, 18 Apr 2014 07:04:11 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/04/outil-de-test.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2345</wp:post_id>
		<wp:post_date>2014-04-18 08:04:11</wp:post_date>
		<wp:post_date_gmt>2014-04-18 07:04:11</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>outil-de-test</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2330</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/04/outil-de-test.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/04/outil-de-test.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:500;s:6:"height";i:266;s:4:"file";s:25:"2014/04/outil-de-test.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:25:"outil-de-test-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 9.0% (666&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:25:"outil-de-test-300x159.jpg";s:5:"width";i:300;s:6:"height";i:159;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 8.9% (1.3&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:25:"outil-de-test-500x198.jpg";s:5:"width";i:500;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 10.0% (2.2&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:25:"outil-de-test-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 2.1% (445&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>rp_anonymus-6744.jpg</title>
		<link>http://www.it-news.fr/ovh-apple-pirates-quelle-solutions-pour-se-sortir-du-piratage/rp_anonymus-6744-jpg/</link>
		<pubDate>Fri, 18 Apr 2014 12:40:16 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/07/anonymus-6744.jpg?w=150</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2347</wp:post_id>
		<wp:post_date>2014-04-18 13:40:16</wp:post_date>
		<wp:post_date_gmt>2014-04-18 12:40:16</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>rp_anonymus-6744-jpg</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>736</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/07/anonymus-67442.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/07/anonymus-67442.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:800;s:6:"height";i:531;s:4:"file";s:26:"2013/07/anonymus-67442.jpg";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:26:"anonymus-67442-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 10.2% (474&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:26:"anonymus-67442-300x199.jpg";s:5:"width";i:300;s:6:"height";i:199;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 12.7% (912&nbsp;B)";}s:22:"wysija-newsletters-max";a:5:{s:4:"file";s:26:"anonymus-67442-600x398.jpg";s:5:"width";i:600;s:6:"height";i:398;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 14.8% (2.7&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:26:"anonymus-67442-800x198.jpg";s:5:"width";i:800;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 11.5% (2&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:26:"anonymus-67442-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 4.6% (1.7&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>rp_edf-gdf-gabegie-cice-296x300.jpg</title>
		<link>http://www.it-news.fr/parametrage-du-cice-dans-votre-logiciel-de-paie/rp_edf-gdf-gabegie-cice-296x300-jpg/</link>
		<pubDate>Fri, 18 Apr 2014 12:40:22 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/edf-gdf-gabegie-cice-296x300.jpg?w=148</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2348</wp:post_id>
		<wp:post_date>2014-04-18 13:40:22</wp:post_date>
		<wp:post_date_gmt>2014-04-18 12:40:22</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>rp_edf-gdf-gabegie-cice-296x300-jpg</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>578</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/edf-gdf-gabegie-cice-296x3002.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/edf-gdf-gabegie-cice-296x3002.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:296;s:6:"height";i:300;s:4:"file";s:41:"2013/06/edf-gdf-gabegie-cice-296x3002.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:41:"edf-gdf-gabegie-cice-296x3002-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.1% (765&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:41:"edf-gdf-gabegie-cice-296x3002-296x198.jpg";s:5:"width";i:296;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 7.8% (1.4&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:41:"edf-gdf-gabegie-cice-296x3002-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 3.1% (738&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>rp_boite6_gestionco_opt.jpg</title>
		<link>http://www.it-news.fr/gestion-commerciale-maitriser-tous-les-domaines-de-votre-pme/rp_boite6_gestionco_opt-jpg/</link>
		<pubDate>Fri, 18 Apr 2014 21:10:42 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/06/boite6_gestionco_opt.jpg?w=150</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2349</wp:post_id>
		<wp:post_date>2014-04-18 22:10:42</wp:post_date>
		<wp:post_date_gmt>2014-04-18 21:10:42</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>rp_boite6_gestionco_opt-jpg</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>334</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/boite6_gestionco_opt2.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/boite6_gestionco_opt2.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:170;s:6:"height";i:150;s:4:"file";s:33:"2013/06/boite6_gestionco_opt2.jpg";s:5:"sizes";a:2:{s:9:"thumbnail";a:5:{s:4:"file";s:33:"boite6_gestionco_opt2-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.1% (434&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:33:"boite6_gestionco_opt2-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>rp_telemedecine-150x150.jpg</title>
		<link>http://www.it-news.fr/la-telemedecine/rp_telemedecine-150x150-jpg/</link>
		<pubDate>Sat, 19 Apr 2014 03:39:54 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/telemedecine-150x150.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2350</wp:post_id>
		<wp:post_date>2014-04-19 04:39:54</wp:post_date>
		<wp:post_date_gmt>2014-04-19 03:39:54</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>rp_telemedecine-150x150-jpg</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>980</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/telemedecine-150x1501.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/telemedecine-150x1501.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:150;s:6:"height";i:150;s:4:"file";s:33:"2013/09/telemedecine-150x1501.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 6.4% (308&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>rp_tablettes-tactiles-150x150.jpg</title>
		<link>http://www.it-news.fr/les-tablettes-tactiles-pc-portables/rp_tablettes-tactiles-150x150-jpg/</link>
		<pubDate>Wed, 23 Apr 2014 07:22:52 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/tablettes-tactiles-150x150.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2353</wp:post_id>
		<wp:post_date>2014-04-23 08:22:52</wp:post_date>
		<wp:post_date_gmt>2014-04-23 07:22:52</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>rp_tablettes-tactiles-150x150-jpg</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>1000</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/tablettes-tactiles-150x1501.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/tablettes-tactiles-150x1501.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:150;s:6:"height";i:150;s:4:"file";s:39:"2013/09/tablettes-tactiles-150x1501.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 7.2% (713&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>mobilite-entreprise-facteur-productivite</title>
		<link>http://www.it-news.fr/mobilite-en-entreprise-reel-facteur-productivite/mobilite-entreprise-facteur-productivite/</link>
		<pubDate>Wed, 23 Apr 2014 14:17:10 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/04/mobilite-entreprise-facteur-productivite.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2355</wp:post_id>
		<wp:post_date>2014-04-23 15:17:10</wp:post_date>
		<wp:post_date_gmt>2014-04-23 14:17:10</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>mobilite-entreprise-facteur-productivite</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2354</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/04/mobilite-entreprise-facteur-productivite.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/04/mobilite-entreprise-facteur-productivite.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:52:"2014/04/mobilite-entreprise-facteur-productivite.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:52:"mobilite-entreprise-facteur-productivite-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.7% (765&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:52:"mobilite-entreprise-facteur-productivite-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.3% (1.2&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:52:"mobilite-entreprise-facteur-productivite-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 5.7% (1.3&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:52:"mobilite-entreprise-facteur-productivite-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 3.7% (804&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>tablettes -entreprises</title>
		<link>http://www.it-news.fr/mobilite-en-entreprise-reel-facteur-productivite/tablettes-entreprises/</link>
		<pubDate>Thu, 24 Apr 2014 15:52:58 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/04/tablettes-entreprises.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2367</wp:post_id>
		<wp:post_date>2014-04-24 16:52:58</wp:post_date>
		<wp:post_date_gmt>2014-04-24 15:52:58</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>tablettes-entreprises</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2354</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/04/tablettes-entreprises.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/04/tablettes-entreprises.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:377;s:6:"height";i:134;s:4:"file";s:33:"2014/04/tablettes-entreprises.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:33:"tablettes-entreprises-150x134.jpg";s:5:"width";i:150;s:6:"height";i:134;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.4% (292&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:33:"tablettes-entreprises-300x106.jpg";s:5:"width";i:300;s:6:"height";i:106;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.5% (499&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:33:"tablettes-entreprises-150x134.jpg";s:5:"width";i:150;s:6:"height";i:134;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>mobilté-quest-ce-que-cest</title>
		<link>http://www.it-news.fr/mobilite-en-entreprise-reel-facteur-productivite/mobilte-quest-ce-que-cest/</link>
		<pubDate>Thu, 24 Apr 2014 16:03:02 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/04/mobilté-quest-ce-que-cest.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2368</wp:post_id>
		<wp:post_date>2014-04-24 17:03:02</wp:post_date>
		<wp:post_date_gmt>2014-04-24 16:03:02</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>mobilte-quest-ce-que-cest</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2354</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/04/mobilté-quest-ce-que-cest.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/04/mobilté-quest-ce-que-cest.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:350;s:6:"height";i:144;s:4:"file";s:38:"2014/04/mobilté-quest-ce-que-cest.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:38:"mobilté-quest-ce-que-cest-150x144.jpg";s:5:"width";i:150;s:6:"height";i:144;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 9.3% (681&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:38:"mobilté-quest-ce-que-cest-300x123.jpg";s:5:"width";i:300;s:6:"height";i:123;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 9.4% (1.3&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:38:"mobilté-quest-ce-que-cest-150x144.jpg";s:5:"width";i:150;s:6:"height";i:144;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>rp_CRM-dusage-150x150.jpg</title>
		<link>http://www.it-news.fr/crm-dusage-met-crm-classique-porte/rp_crm-dusage-150x150-jpg/</link>
		<pubDate>Fri, 25 Apr 2014 01:25:45 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/09/CRM-dusage-150x150.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2370</wp:post_id>
		<wp:post_date>2014-04-25 02:25:45</wp:post_date>
		<wp:post_date_gmt>2014-04-25 01:25:45</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>rp_crm-dusage-150x150-jpg</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>967</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/09/CRM-dusage-150x1501.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/09/CRM-dusage-150x1501.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:150;s:6:"height";i:150;s:4:"file";s:31:"2013/09/CRM-dusage-150x1501.jpg";s:5:"sizes";a:0:{}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 7.5% (707&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>dns-declaration-sociale-nominative</title>
		<link>http://www.it-news.fr/dsn-obligatoire-partir-2016/dns-declaration-sociale-nominative/</link>
		<pubDate>Fri, 25 Apr 2014 14:29:18 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/04/dns-declaration-sociale-nominative.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2372</wp:post_id>
		<wp:post_date>2014-04-25 15:29:18</wp:post_date>
		<wp:post_date_gmt>2014-04-25 14:29:18</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>dns-declaration-sociale-nominative</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2371</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/04/dns-declaration-sociale-nominative.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/04/dns-declaration-sociale-nominative.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:46:"2014/04/dns-declaration-sociale-nominative.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:46:"dns-declaration-sociale-nominative-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.3% (235&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:46:"dns-declaration-sociale-nominative-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.8% (541&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:46:"dns-declaration-sociale-nominative-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.8% (929&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:46:"dns-declaration-sociale-nominative-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Clandestine-Fox</title>
		<link>http://www.it-news.fr/faille-securite-internet-explorer-appelee-clandestine-fox/clandestine-fox/</link>
		<pubDate>Mon, 28 Apr 2014 08:12:58 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/04/Clandestine-Fox.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2377</wp:post_id>
		<wp:post_date>2014-04-28 09:12:58</wp:post_date>
		<wp:post_date_gmt>2014-04-28 08:12:58</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>clandestine-fox</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2376</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/04/Clandestine-Fox.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/04/Clandestine-Fox.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:27:"2014/04/Clandestine-Fox.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:27:"Clandestine-Fox-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 12.6% (2.2&nbsp;KB)";}s:6:"medium";a:5:{s:4:"file";s:27:"Clandestine-Fox-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 14.3% (5.7&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:27:"Clandestine-Fox-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 14.1% (6.6&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:27:"Clandestine-Fox-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>microsoft-faille-securite-internet-explorer</title>
		<link>http://www.it-news.fr/faille-securite-internet-explorer-appelee-clandestine-fox/microsoft-faille-securite-internet-explorer/</link>
		<pubDate>Mon, 28 Apr 2014 08:41:11 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/04/microsoft-faille-securite-internet-explorer.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2387</wp:post_id>
		<wp:post_date>2014-04-28 09:41:11</wp:post_date>
		<wp:post_date_gmt>2014-04-28 08:41:11</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>microsoft-faille-securite-internet-explorer</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2376</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/04/microsoft-faille-securite-internet-explorer.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/04/microsoft-faille-securite-internet-explorer.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:534;s:6:"height";i:267;s:4:"file";s:55:"2014/04/microsoft-faille-securite-internet-explorer.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:55:"microsoft-faille-securite-internet-explorer-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.8% (478&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:55:"microsoft-faille-securite-internet-explorer-300x150.jpg";s:5:"width";i:300;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.1% (898&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:55:"microsoft-faille-securite-internet-explorer-534x198.jpg";s:5:"width";i:534;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 5.9% (1.6&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:55:"microsoft-faille-securite-internet-explorer-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 3.5% (814&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>emet-faille-zero-day-ie</title>
		<link>http://www.it-news.fr/faille-securite-internet-explorer-appelee-clandestine-fox/emet-faille-zero-day-ie/</link>
		<pubDate>Mon, 05 May 2014 13:47:36 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/04/emet-faille-zero-day-ie.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2398</wp:post_id>
		<wp:post_date>2014-05-05 14:47:36</wp:post_date>
		<wp:post_date_gmt>2014-05-05 13:47:36</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>emet-faille-zero-day-ie</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2376</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/04/emet-faille-zero-day-ie.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/04/emet-faille-zero-day-ie.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:587;s:6:"height";i:599;s:4:"file";s:35:"2014/04/emet-faille-zero-day-ie.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:35:"emet-faille-zero-day-ie-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.3% (691&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:35:"emet-faille-zero-day-ie-293x300.jpg";s:5:"width";i:293;s:6:"height";i:300;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 9.9% (2.6&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:35:"emet-faille-zero-day-ie-587x198.jpg";s:5:"width";i:587;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 19.1% (4.1&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:35:"emet-faille-zero-day-ie-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:10:"JUNG Marie";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:1398789345;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:26:"ERROR: posting to Smush.it";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>vpn-solution-securite-donnees</title>
		<link>http://www.it-news.fr/vpn-solution-securite-donnees/vpn-solution-securite-donnees/</link>
		<pubDate>Tue, 06 May 2014 10:26:04 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/05/vpn-solution-securite-donnees.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2401</wp:post_id>
		<wp:post_date>2014-05-06 11:26:04</wp:post_date>
		<wp:post_date_gmt>2014-05-06 10:26:04</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>vpn-solution-securite-donnees</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2400</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/05/vpn-solution-securite-donnees.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/05/vpn-solution-securite-donnees.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:41:"2014/05/vpn-solution-securite-donnees.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:41:"vpn-solution-securite-donnees-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.4% (527&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:41:"vpn-solution-securite-donnees-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.0% (876&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:41:"vpn-solution-securite-donnees-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:27:"Reduced by 5.7% (1&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:41:"vpn-solution-securite-donnees-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 5.9% (1.1&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>dematerialisation-gestion-documents-avantages-et-inconvenients</title>
		<link>http://www.it-news.fr/dematerialisation-documents-avantages-inconvenients/dematerialisation-gestion-documents-avantages-et-inconvenients/</link>
		<pubDate>Tue, 06 May 2014 15:27:13 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/05/dematerialisation-gestion-documents-avantages-et-inconvenients.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2407</wp:post_id>
		<wp:post_date>2014-05-06 16:27:13</wp:post_date>
		<wp:post_date_gmt>2014-05-06 15:27:13</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>dematerialisation-gestion-documents-avantages-et-inconvenients</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2406</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/05/dematerialisation-gestion-documents-avantages-et-inconvenients.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/05/dematerialisation-gestion-documents-avantages-et-inconvenients.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:74:"2014/05/dematerialisation-gestion-documents-avantages-et-inconvenients.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:74:"dematerialisation-gestion-documents-avantages-et-inconvenients-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:26:"ERROR: posting to Smush.it";}s:6:"medium";a:5:{s:4:"file";s:74:"dematerialisation-gestion-documents-avantages-et-inconvenients-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.0% (564&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:74:"dematerialisation-gestion-documents-avantages-et-inconvenients-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:26:"ERROR: posting to Smush.it";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:74:"dematerialisation-gestion-documents-avantages-et-inconvenients-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.2% (230&nbsp;B)";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 6.4% (833&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>solution-gestion-cloud</title>
		<link>http://www.it-news.fr/solutions-gestion-en-mode-saas-enjeux-defis/solution-gestion-cloud/</link>
		<pubDate>Wed, 07 May 2014 14:26:09 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/05/solution-gestion-cloud.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2412</wp:post_id>
		<wp:post_date>2014-05-07 15:26:09</wp:post_date>
		<wp:post_date_gmt>2014-05-07 14:26:09</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>solution-gestion-cloud</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2411</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/05/solution-gestion-cloud.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/05/solution-gestion-cloud.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:34:"2014/05/solution-gestion-cloud.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:34:"solution-gestion-cloud-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.2% (365&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:34:"solution-gestion-cloud-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.3% (595&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:34:"solution-gestion-cloud-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 3.8% (603&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:34:"solution-gestion-cloud-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>solution-de-gestion-en-mode-saas-resultats-sondage</title>
		<link>http://www.it-news.fr/solutions-gestion-en-mode-saas-enjeux-defis/solution-de-gestion-en-mode-saas-resultats-sondage/</link>
		<pubDate>Mon, 12 May 2014 08:03:10 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/05/solution-de-gestion-en-mode-saas-resultats-sondage.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2418</wp:post_id>
		<wp:post_date>2014-05-12 09:03:10</wp:post_date>
		<wp:post_date_gmt>2014-05-12 08:03:10</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>solution-de-gestion-en-mode-saas-resultats-sondage</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2411</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/05/solution-de-gestion-en-mode-saas-resultats-sondage.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/05/solution-de-gestion-en-mode-saas-resultats-sondage.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:663;s:6:"height";i:397;s:4:"file";s:62:"2014/05/solution-de-gestion-en-mode-saas-resultats-sondage.png";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:62:"solution-de-gestion-en-mode-saas-resultats-sondage-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 34.9% (5.2&nbsp;KB)";}s:6:"medium";a:5:{s:4:"file";s:62:"solution-de-gestion-en-mode-saas-resultats-sondage-300x179.png";s:5:"width";i:300;s:6:"height";i:179;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:31:"Reduced by 36.4% (12.2&nbsp;KB)";}s:22:"wysija-newsletters-max";a:5:{s:4:"file";s:62:"solution-de-gestion-en-mode-saas-resultats-sondage-600x359.png";s:5:"width";i:600;s:6:"height";i:359;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:31:"Reduced by 37.9% (40.5&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:62:"solution-de-gestion-en-mode-saas-resultats-sondage-663x198.png";s:5:"width";i:663;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:29:"Reduced by 11.2% (278&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:62:"solution-de-gestion-en-mode-saas-resultats-sondage-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 21.7% (2.9&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>solution-de-gestion-en-mode-saas-resultats-sondage</title>
		<link>http://www.it-news.fr/solutions-gestion-en-mode-saas-enjeux-defis/solution-de-gestion-en-mode-saas-resultats-sondage-2/</link>
		<pubDate>Mon, 12 May 2014 08:10:48 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/05/solution-de-gestion-en-mode-saas-resultats-sondage.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2419</wp:post_id>
		<wp:post_date>2014-05-12 09:10:48</wp:post_date>
		<wp:post_date_gmt>2014-05-12 08:10:48</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>solution-de-gestion-en-mode-saas-resultats-sondage-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2411</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/05/solution-de-gestion-en-mode-saas-resultats-sondage.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/05/solution-de-gestion-en-mode-saas-resultats-sondage.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:691;s:6:"height";i:479;s:4:"file";s:62:"2014/05/solution-de-gestion-en-mode-saas-resultats-sondage.jpg";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:62:"solution-de-gestion-en-mode-saas-resultats-sondage-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.5% (448&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:62:"solution-de-gestion-en-mode-saas-resultats-sondage-300x207.jpg";s:5:"width";i:300;s:6:"height";i:207;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 7.9% (1.1&nbsp;KB)";}s:22:"wysija-newsletters-max";a:5:{s:4:"file";s:62:"solution-de-gestion-en-mode-saas-resultats-sondage-600x415.jpg";s:5:"width";i:600;s:6:"height";i:415;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 11.3% (4.2&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:62:"solution-de-gestion-en-mode-saas-resultats-sondage-691x198.jpg";s:5:"width";i:691;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 10.1% (2.1&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:62:"solution-de-gestion-en-mode-saas-resultats-sondage-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:31:"Reduced by 15.4% (10.2&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>erp-social-reseaux-sociaux</title>
		<link>http://www.it-news.fr/evolution-lerp-traditionnel-vers-erp-social/erp-social-reseaux-sociaux/</link>
		<pubDate>Wed, 14 May 2014 10:01:09 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/05/erp-social-reseaux-sociaux.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2425</wp:post_id>
		<wp:post_date>2014-05-14 11:01:09</wp:post_date>
		<wp:post_date_gmt>2014-05-14 10:01:09</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>erp-social-reseaux-sociaux</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2424</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/05/erp-social-reseaux-sociaux.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/05/erp-social-reseaux-sociaux.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:300;s:6:"height";i:200;s:4:"file";s:38:"2014/05/erp-social-reseaux-sociaux.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:38:"erp-social-reseaux-sociaux-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.5% (648&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:38:"erp-social-reseaux-sociaux-300x198.jpg";s:5:"width";i:300;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.8% (1.4&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:38:"erp-social-reseaux-sociaux-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 2.6% (1.3&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>nouveau-role-DSI</title>
		<link>http://www.it-news.fr/?attachment_id=2431</link>
		<pubDate>Thu, 15 May 2014 15:54:53 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/05/nouveau-role-DSI.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2431</wp:post_id>
		<wp:post_date>2014-05-15 16:54:53</wp:post_date>
		<wp:post_date_gmt>2014-05-15 15:54:53</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>nouveau-role-dsi</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/05/nouveau-role-DSI.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/05/nouveau-role-DSI.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:300;s:6:"height";i:200;s:4:"file";s:28:"2014/05/nouveau-role-DSI.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:28:"nouveau-role-DSI-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.9% (712&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:28:"nouveau-role-DSI-300x198.jpg";s:5:"width";i:300;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 7.7% (1.3&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:28:"nouveau-role-DSI-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 3.3% (1.5&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>priorite-daf-2014-2015</title>
		<link>http://www.it-news.fr/quelles-devraient-etre-les-priorites-20142015-daf/priorite-daf-2014-2015/</link>
		<pubDate>Fri, 16 May 2014 13:32:55 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/05/priorite-daf-2014-2015.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2441</wp:post_id>
		<wp:post_date>2014-05-16 14:32:55</wp:post_date>
		<wp:post_date_gmt>2014-05-16 13:32:55</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>priorite-daf-2014-2015</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2438</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/05/priorite-daf-2014-2015.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/05/priorite-daf-2014-2015.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:34:"2014/05/priorite-daf-2014-2015.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:34:"priorite-daf-2014-2015-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.0% (555&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:34:"priorite-daf-2014-2015-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.1% (885&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:34:"priorite-daf-2014-2015-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.8% (1.2&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:34:"priorite-daf-2014-2015-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:27:"Reduced by 8.4% (2&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>rp_progres_carriere.jpg</title>
		<link>http://www.it-news.fr/les-ressources-humaines-gestion-des-carrieres/rp_progres_carriere-jpg/</link>
		<pubDate>Mon, 19 May 2014 07:00:51 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2013/07/progres_carriere.jpg?w=150</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2443</wp:post_id>
		<wp:post_date>2014-05-19 08:00:51</wp:post_date>
		<wp:post_date_gmt>2014-05-19 07:00:51</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>rp_progres_carriere-jpg</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>563</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2013/06/progres_carriere1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2013/06/progres_carriere1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:250;s:6:"height";i:205;s:4:"file";s:29:"2013/06/progres_carriere1.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:29:"progres_carriere1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.4% (472&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:29:"progres_carriere1-250x198.jpg";s:5:"width";i:250;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.5% (870&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:29:"progres_carriere1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 1.3% (208&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>ERP-hybride</title>
		<link>http://www.it-news.fr/vers-fin-l-erp-classique/erp-hybride/</link>
		<pubDate>Mon, 19 May 2014 14:08:31 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/05/ERP-hybride.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2445</wp:post_id>
		<wp:post_date>2014-05-19 15:08:31</wp:post_date>
		<wp:post_date_gmt>2014-05-19 14:08:31</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>erp-hybride</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2444</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/05/ERP-hybride.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/05/ERP-hybride.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:300;s:6:"height";i:200;s:4:"file";s:23:"2014/05/ERP-hybride.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:23:"ERP-hybride-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.7% (441&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:23:"ERP-hybride-300x198.jpg";s:5:"width";i:300;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.9% (714&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:23:"ERP-hybride-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 3.7% (1.6&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>rp_priorite-daf-2014-2015-300x200.jpg</title>
		<link>http://www.it-news.fr/quelles-devraient-etre-les-priorites-20142015-daf/rp_priorite-daf-2014-2015-300x200-jpg/</link>
		<pubDate>Mon, 19 May 2014 17:18:28 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/05/priorite-daf-2014-2015-300x200.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2449</wp:post_id>
		<wp:post_date>2014-05-19 18:18:28</wp:post_date>
		<wp:post_date_gmt>2014-05-19 17:18:28</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>rp_priorite-daf-2014-2015-300x200-jpg</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2438</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/05/priorite-daf-2014-2015-300x2001.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/05/priorite-daf-2014-2015-300x2001.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:300;s:6:"height";i:200;s:4:"file";s:43:"2014/05/priorite-daf-2014-2015-300x2001.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:43:"priorite-daf-2014-2015-300x2001-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.5% (564&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:43:"priorite-daf-2014-2015-300x2001-300x198.jpg";s:5:"width";i:300;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.0% (872&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:43:"priorite-daf-2014-2015-300x2001-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>petit-dejeuner-industrie</title>
		<link>http://www.it-news.fr/event/petit-dejeuner-industrie/petit-dejeuner-industrie/</link>
		<pubDate>Tue, 20 May 2014 07:56:55 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/05/petit-dejeuner-industrie.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2451</wp:post_id>
		<wp:post_date>2014-05-20 08:56:55</wp:post_date>
		<wp:post_date_gmt>2014-05-20 07:56:55</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>petit-dejeuner-industrie</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2450</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/05/petit-dejeuner-industrie.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/05/petit-dejeuner-industrie.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:36:"2014/05/petit-dejeuner-industrie.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:36:"petit-dejeuner-industrie-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.7% (582&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:36:"petit-dejeuner-industrie-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.3% (1.2&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:36:"petit-dejeuner-industrie-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.6% (1.4&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:36:"petit-dejeuner-industrie-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 3.3% (792&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>rp_petit-dejeuner-industrie-300x200.jpg</title>
		<link>http://www.it-news.fr/event/petit-dejeuner-industrie/rp_petit-dejeuner-industrie-300x200-jpg/</link>
		<pubDate>Tue, 20 May 2014 08:00:54 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/05/petit-dejeuner-industrie-300x200.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2454</wp:post_id>
		<wp:post_date>2014-05-20 09:00:54</wp:post_date>
		<wp:post_date_gmt>2014-05-20 08:00:54</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>rp_petit-dejeuner-industrie-300x200-jpg</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2450</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/05/petit-dejeuner-industrie-300x2001.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/05/petit-dejeuner-industrie-300x2001.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:300;s:6:"height";i:200;s:4:"file";s:45:"2014/05/petit-dejeuner-industrie-300x2001.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:45:"petit-dejeuner-industrie-300x2001-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.2% (507&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:45:"petit-dejeuner-industrie-300x2001-300x198.jpg";s:5:"width";i:300;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.5% (1.2&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:45:"petit-dejeuner-industrie-300x2001-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>petit-dejeuner-industrie</title>
		<link>http://www.it-news.fr/event/petit-dejeuner-industrie/petit-dejeuner-industrie-2/</link>
		<pubDate>Tue, 20 May 2014 08:02:54 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/05/petit-dejeuner-industrie1.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2455</wp:post_id>
		<wp:post_date>2014-05-20 09:02:54</wp:post_date>
		<wp:post_date_gmt>2014-05-20 08:02:54</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>petit-dejeuner-industrie-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2450</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/05/petit-dejeuner-industrie1.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/05/petit-dejeuner-industrie1.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:37:"2014/05/petit-dejeuner-industrie1.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:37:"petit-dejeuner-industrie1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.8% (603&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:37:"petit-dejeuner-industrie1-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.3% (1.2&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:37:"petit-dejeuner-industrie1-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.5% (1.5&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:37:"petit-dejeuner-industrie1-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 3.4% (863&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>petit-dejeuner-industrie</title>
		<link>http://www.it-news.fr/event/petit-dejeuner-industrie/petit-dejeuner-industrie-3/</link>
		<pubDate>Tue, 20 May 2014 08:03:55 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/05/petit-dejeuner-industrie2.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2456</wp:post_id>
		<wp:post_date>2014-05-20 09:03:55</wp:post_date>
		<wp:post_date_gmt>2014-05-20 08:03:55</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>petit-dejeuner-industrie-3</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2450</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/05/petit-dejeuner-industrie2.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/05/petit-dejeuner-industrie2.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:37:"2014/05/petit-dejeuner-industrie2.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:37:"petit-dejeuner-industrie2-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.3% (562&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:37:"petit-dejeuner-industrie2-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.4% (1.2&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:37:"petit-dejeuner-industrie2-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.8% (1.5&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:37:"petit-dejeuner-industrie2-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 9.6% (10&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>rp_petit-dejeuner-industrie2-300x200.jpg</title>
		<link>http://www.it-news.fr/event/petit-dejeuner-industrie/rp_petit-dejeuner-industrie2-300x200-jpg/</link>
		<pubDate>Tue, 20 May 2014 08:04:31 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/05/petit-dejeuner-industrie2-300x200.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2457</wp:post_id>
		<wp:post_date>2014-05-20 09:04:31</wp:post_date>
		<wp:post_date_gmt>2014-05-20 08:04:31</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>rp_petit-dejeuner-industrie2-300x200-jpg</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2450</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/05/petit-dejeuner-industrie2-300x2001.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/05/petit-dejeuner-industrie2-300x2001.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:300;s:6:"height";i:200;s:4:"file";s:46:"2014/05/petit-dejeuner-industrie2-300x2001.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:46:"petit-dejeuner-industrie2-300x2001-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.4% (537&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:46:"petit-dejeuner-industrie2-300x2001-300x198.jpg";s:5:"width";i:300;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.6% (1.3&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:46:"petit-dejeuner-industrie2-300x2001-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>petit-dejeuner-crm</title>
		<link>http://www.it-news.fr/event/petit-dejeuner-crm/petit-dejeuner-crm/</link>
		<pubDate>Tue, 20 May 2014 08:18:05 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/05/petit-dejeuner-crm.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2460</wp:post_id>
		<wp:post_date>2014-05-20 09:18:05</wp:post_date>
		<wp:post_date_gmt>2014-05-20 08:18:05</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>petit-dejeuner-crm</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2459</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/05/petit-dejeuner-crm.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/05/petit-dejeuner-crm.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:30:"2014/05/petit-dejeuner-crm.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:30:"petit-dejeuner-crm-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.5% (565&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:30:"petit-dejeuner-crm-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.4% (1.2&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:30:"petit-dejeuner-crm-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.8% (1.5&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:30:"petit-dejeuner-crm-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 9.3% (7.9&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>rp_petit-dejeuner-crm-300x200.jpg</title>
		<link>http://www.it-news.fr/event/petit-dejeuner-crm/rp_petit-dejeuner-crm-300x200-jpg/</link>
		<pubDate>Tue, 20 May 2014 08:18:29 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/05/petit-dejeuner-crm-300x200.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2461</wp:post_id>
		<wp:post_date>2014-05-20 09:18:29</wp:post_date>
		<wp:post_date_gmt>2014-05-20 08:18:29</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>rp_petit-dejeuner-crm-300x200-jpg</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2459</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/05/petit-dejeuner-crm-300x2001.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/05/petit-dejeuner-crm-300x2001.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:300;s:6:"height";i:200;s:4:"file";s:39:"2014/05/petit-dejeuner-crm-300x2001.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:39:"petit-dejeuner-crm-300x2001-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.3% (525&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:39:"petit-dejeuner-crm-300x2001-300x198.jpg";s:5:"width";i:300;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.6% (1.2&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:39:"petit-dejeuner-crm-300x2001-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>synthese-loi-securisation-de-l-emploi</title>
		<link>http://www.it-news.fr/1er-juin-2014-les-entreprises-visees-portabilite-frais-sante/synthese-loi-securisation-de-l-emploi/</link>
		<pubDate>Tue, 10 Jun 2014 10:12:25 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/06/synthese-loi-securisation-de-l-emploi.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2466</wp:post_id>
		<wp:post_date>2014-06-10 11:12:25</wp:post_date>
		<wp:post_date_gmt>2014-06-10 10:12:25</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>synthese-loi-securisation-de-l-emploi</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2465</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/06/synthese-loi-securisation-de-l-emploi.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/06/synthese-loi-securisation-de-l-emploi.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:728;s:6:"height";i:423;s:4:"file";s:49:"2014/06/synthese-loi-securisation-de-l-emploi.jpg";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:49:"synthese-loi-securisation-de-l-emploi-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 12.7% (1.4&nbsp;KB)";}s:6:"medium";a:5:{s:4:"file";s:49:"synthese-loi-securisation-de-l-emploi-300x174.jpg";s:5:"width";i:300;s:6:"height";i:174;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 13.1% (2.7&nbsp;KB)";}s:22:"wysija-newsletters-max";a:5:{s:4:"file";s:49:"synthese-loi-securisation-de-l-emploi-600x348.jpg";s:5:"width";i:600;s:6:"height";i:348;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 15.7% (9.6&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:49:"synthese-loi-securisation-de-l-emploi-728x198.jpg";s:5:"width";i:728;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 16.2% (7.5&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:49:"synthese-loi-securisation-de-l-emploi-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:31:"Reduced by 18.6% (19.7&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>1-juin-2014-loi-securisation-sante</title>
		<link>http://www.it-news.fr/1er-juin-2014-les-entreprises-visees-portabilite-frais-sante/1-juin-2014-loi-securisation-sante/</link>
		<pubDate>Tue, 10 Jun 2014 10:16:33 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/06/1-juin-2014-loi-securisation-sante.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2467</wp:post_id>
		<wp:post_date>2014-06-10 11:16:33</wp:post_date>
		<wp:post_date_gmt>2014-06-10 10:16:33</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>1-juin-2014-loi-securisation-sante</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2465</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/06/1-juin-2014-loi-securisation-sante.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/06/1-juin-2014-loi-securisation-sante.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:46:"2014/06/1-juin-2014-loi-securisation-sante.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:46:"1-juin-2014-loi-securisation-sante-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.9% (308&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:46:"1-juin-2014-loi-securisation-sante-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 3.7% (403&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:46:"1-juin-2014-loi-securisation-sante-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 3.4% (414&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:46:"1-juin-2014-loi-securisation-sante-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 7.9% (3.4&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>rp_1-juin-2014-loi-securisation-sante-300x200.jpg</title>
		<link>http://www.it-news.fr/1er-juin-2014-les-entreprises-visees-portabilite-frais-sante/rp_1-juin-2014-loi-securisation-sante-300x200-jpg/</link>
		<pubDate>Tue, 10 Jun 2014 12:30:52 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/06/1-juin-2014-loi-securisation-sante-300x200.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2470</wp:post_id>
		<wp:post_date>2014-06-10 13:30:52</wp:post_date>
		<wp:post_date_gmt>2014-06-10 12:30:52</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>rp_1-juin-2014-loi-securisation-sante-300x200-jpg</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2465</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/06/1-juin-2014-loi-securisation-sante-300x2001.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/06/1-juin-2014-loi-securisation-sante-300x2001.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:300;s:6:"height";i:200;s:4:"file";s:55:"2014/06/1-juin-2014-loi-securisation-sante-300x2001.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:55:"1-juin-2014-loi-securisation-sante-300x2001-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.2% (315&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:55:"1-juin-2014-loi-securisation-sante-300x2001-300x198.jpg";s:5:"width";i:300;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 3.7% (405&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:55:"1-juin-2014-loi-securisation-sante-300x2001-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>le-entreprises-sousestiment-office</title>
		<link>http://www.it-news.fr/les-entreprises-utilisent-les-produits-office/le-entreprises-sousestiment-office/</link>
		<pubDate>Tue, 17 Jun 2014 16:00:17 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/06/le-entreprises-sousestiment-office.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2476</wp:post_id>
		<wp:post_date>2014-06-17 17:00:17</wp:post_date>
		<wp:post_date_gmt>2014-06-17 16:00:17</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>le-entreprises-sousestiment-office</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2475</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/06/le-entreprises-sousestiment-office.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/06/le-entreprises-sousestiment-office.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:46:"2014/06/le-entreprises-sousestiment-office.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:46:"le-entreprises-sousestiment-office-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 8.0% (720&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:46:"le-entreprises-sousestiment-office-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.9% (1.1&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:46:"le-entreprises-sousestiment-office-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 7.5% (1.5&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:46:"le-entreprises-sousestiment-office-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:29:"Reduced by 6.4% (1.3&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>utilisation-intensive-des-applications-offices</title>
		<link>http://www.it-news.fr/les-entreprises-utilisent-les-produits-office/utilisation-intensive-des-applications-offices/</link>
		<pubDate>Wed, 18 Jun 2014 06:34:26 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/06/utilisation-intensive-des-applications-offices.png</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2479</wp:post_id>
		<wp:post_date>2014-06-18 07:34:26</wp:post_date>
		<wp:post_date_gmt>2014-06-18 06:34:26</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>utilisation-intensive-des-applications-offices</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2475</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/06/utilisation-intensive-des-applications-offices.png</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/06/utilisation-intensive-des-applications-offices.png]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:470;s:6:"height";i:254;s:4:"file";s:58:"2014/06/utilisation-intensive-des-applications-offices.png";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:58:"utilisation-intensive-des-applications-offices-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 23.6% (3.3&nbsp;KB)";}s:6:"medium";a:5:{s:4:"file";s:58:"utilisation-intensive-des-applications-offices-300x162.png";s:5:"width";i:300;s:6:"height";i:162;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 20.2% (5.1&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:58:"utilisation-intensive-des-applications-offices-470x198.png";s:5:"width";i:470;s:6:"height";i:198;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:30:"Reduced by 30.6% (1.4&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:58:"utilisation-intensive-des-applications-offices-150x150.png";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:9:"image/png";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 19.0% (1.2&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>utilisation-produits-office</title>
		<link>http://www.it-news.fr/les-entreprises-utilisent-les-produits-office/utilisation-produits-office/</link>
		<pubDate>Wed, 18 Jun 2014 06:34:34 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/06/utilisation-produits-office.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2480</wp:post_id>
		<wp:post_date>2014-06-18 07:34:34</wp:post_date>
		<wp:post_date_gmt>2014-06-18 06:34:34</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>utilisation-produits-office</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2475</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/06/utilisation-produits-office.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/06/utilisation-produits-office.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:481;s:6:"height";i:284;s:4:"file";s:39:"2014/06/utilisation-produits-office.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:39:"utilisation-produits-office-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.7% (232&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:39:"utilisation-produits-office-300x177.jpg";s:5:"width";i:300;s:6:"height";i:177;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 7.0% (548&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:39:"utilisation-produits-office-481x198.jpg";s:5:"width";i:481;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 9.9% (933&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:39:"utilisation-produits-office-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 12.7% (2.6&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>ERP-hybride</title>
		<link>http://www.it-news.fr/reussir-projet-erp-en-10-etapes/erp-hybride-2/</link>
		<pubDate>Mon, 23 Jun 2014 12:10:29 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/06/ERP-hybride.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2494</wp:post_id>
		<wp:post_date>2014-06-23 13:10:29</wp:post_date>
		<wp:post_date_gmt>2014-06-23 12:10:29</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>erp-hybride-2</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2491</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/06/ERP-hybride.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/06/ERP-hybride.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:300;s:6:"height";i:200;s:4:"file";s:23:"2014/06/ERP-hybride.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:23:"ERP-hybride-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 5.7% (441&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:23:"ERP-hybride-300x198.jpg";s:5:"width";i:300;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.9% (714&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:23:"ERP-hybride-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>danger_smartphone_entreprise_securite</title>
		<link>http://www.it-news.fr/lorsque-danger-se-trouve-portee-main/danger_smartphone_entreprise_securite/</link>
		<pubDate>Wed, 25 Jun 2014 12:42:00 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/06/danger_smartphone_entreprise_securite.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2502</wp:post_id>
		<wp:post_date>2014-06-25 13:42:00</wp:post_date>
		<wp:post_date_gmt>2014-06-25 12:42:00</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>danger_smartphone_entreprise_securite</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2501</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/06/danger_smartphone_entreprise_securite.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/06/danger_smartphone_entreprise_securite.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:49:"2014/06/danger_smartphone_entreprise_securite.jpg";s:5:"sizes";a:4:{s:9:"thumbnail";a:5:{s:4:"file";s:49:"danger_smartphone_entreprise_securite-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.2% (253&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:49:"danger_smartphone_entreprise_securite-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.0% (521&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:49:"danger_smartphone_entreprise_securite-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 4.7% (704&nbsp;B)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:49:"danger_smartphone_entreprise_securite-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:28:"Reduced by 2.4% (351&nbsp;B)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>sepa_cxp</title>
		<link>http://www.it-news.fr/les-pme-pretes-au-passage-au-sepa/sepa_cxp/</link>
		<pubDate>Fri, 25 Jul 2014 08:21:56 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/07/sepa_cxp.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2510</wp:post_id>
		<wp:post_date>2014-07-25 09:21:56</wp:post_date>
		<wp:post_date_gmt>2014-07-25 08:21:56</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>sepa_cxp</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2509</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/07/sepa_cxp.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/07/sepa_cxp.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:1000;s:6:"height";i:860;s:4:"file";s:20:"2014/07/sepa_cxp.jpg";s:5:"sizes";a:5:{s:9:"thumbnail";a:5:{s:4:"file";s:20:"sepa_cxp-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 9.7% (1001&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:20:"sepa_cxp-300x258.jpg";s:5:"width";i:300;s:6:"height";i:258;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 10.2% (2.2&nbsp;KB)";}s:22:"wysija-newsletters-max";a:5:{s:4:"file";s:20:"sepa_cxp-600x516.jpg";s:5:"width";i:600;s:6:"height";i:516;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 10.5% (5.5&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:20:"sepa_cxp-940x198.jpg";s:5:"width";i:940;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:27:"Reduced by 9.5% (3&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:20:"sepa_cxp-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 6.1% (14.1&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Infographie_SEPA</title>
		<link>http://www.it-news.fr/les-pme-pretes-au-passage-au-sepa/infographie_sepa/</link>
		<pubDate>Fri, 25 Jul 2014 08:23:25 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/07/Infographie_SEPA.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2511</wp:post_id>
		<wp:post_date>2014-07-25 09:23:25</wp:post_date>
		<wp:post_date_gmt>2014-07-25 08:23:25</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>infographie_sepa</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2509</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/07/Infographie_SEPA.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/07/Infographie_SEPA.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:950;s:6:"height";i:2138;s:4:"file";s:28:"2014/07/Infographie_SEPA.jpg";s:5:"sizes";a:6:{s:9:"thumbnail";a:5:{s:4:"file";s:28:"Infographie_SEPA-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:28:"Reduced by 6.8% (686&nbsp;B)";}s:6:"medium";a:5:{s:4:"file";s:28:"Infographie_SEPA-133x300.jpg";s:5:"width";i:133;s:6:"height";i:300;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 6.7% (1.1&nbsp;KB)";}s:5:"large";a:5:{s:4:"file";s:29:"Infographie_SEPA-455x1024.jpg";s:5:"width";i:455;s:6:"height";i:1024;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 9.8% (12.5&nbsp;KB)";}s:22:"wysija-newsletters-max";a:5:{s:4:"file";s:29:"Infographie_SEPA-600x1350.jpg";s:5:"width";i:600;s:6:"height";i:1350;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:31:"Reduced by 10.4% (20.3&nbsp;KB)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:28:"Infographie_SEPA-940x198.jpg";s:5:"width";i:940;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 10.5% (4.2&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:28:"Infographie_SEPA-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:30:"Reduced by 5.0% (18.4&nbsp;KB)";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Références clients</title>
		<link>http://www.it-news.fr/temoignages-clients/</link>
		<pubDate>Tue, 21 May 2013 13:29:18 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?page_id=36</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align:justify;">Vous retrouverez ici l'ensemble de nos clients triés par secteur d'activité. En partant du secteur commercial jusqu'au secteur de la santé, nos possibilités s'adaptent à un grand nombre de domaines :</p>

<ul>
<ul>
<ul>
	<li><strong>Les société commerciales</strong></li>
</ul>
</ul>
</ul>
<a href="http://www.it-news.fr/wp-content/uploads/2013/06/logo-tresnois-descamps.jpg"><img class="alignleft size-full wp-image-388" alt="tresnois descamps" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-tresnois-descamps.jpg" width="150" height="98" /></a><a href="http://www.it-news.fr/wp-content/uploads/2013/06/logo-top-carrelage.jpg"><img class="alignleft size-full wp-image-387" alt="top-carrelage" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-top-carrelage.jpg" width="150" height="98" /></a><a href="http://www.it-news.fr/wp-content/uploads/2013/06/logo-tape-a-l-oeil.jpg"><img class="alignleft size-full wp-image-386" alt="tape-a-l-oeil" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-tape-a-l-oeil.jpg" width="150" height="98" /></a><a href="http://www.it-news.fr/wp-content/uploads/2013/06/logo-nicols.jpg"><img class="alignleft size-full wp-image-385" alt="logo-nicols" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-nicols.jpg" width="150" height="98" /></a><a href="http://www.it-news.fr/wp-content/uploads/2013/06/logo-cora.jpg"><img class="alignleft size-full wp-image-384" alt="logo-cora" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-cora.jpg" width="150" height="98" /></a><a href="http://www.it-news.fr/wp-content/uploads/2013/06/logo-codic.jpg"><img class="alignleft size-full wp-image-383" alt="logo-codic" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-codic.jpg" width="150" height="98" /></a><a href="http://www.it-news.fr/wp-content/uploads/2013/06/logo-cevinor.jpg"><img class="alignleft size-full wp-image-382" alt="logo-cevinor" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-cevinor.jpg" width="150" height="98" /></a><a href="http://www.it-news.fr/wp-content/uploads/2013/06/logo-bureau-services.jpg"><img class="alignleft size-full wp-image-381" alt="logo-bureau-services" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-bureau-services.jpg" width="150" height="98" /></a><a href="http://www.it-news.fr/wp-content/uploads/2013/06/logo-big-bazar-bethunois.jpg"><img class="alignleft size-full wp-image-380" alt="logo-big-bazar-bethunois" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-big-bazar-bethunois.jpg" width="150" height="98" /></a><a href="http://www.it-news.fr/wp-content/uploads/2013/06/logo-audio-video-nord.jpg"><img class="alignleft size-full wp-image-379" alt="logo-audio-video-nord" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-audio-video-nord.jpg" width="150" height="98" /></a>

&nbsp;

&nbsp;

&nbsp;

&nbsp;

&nbsp;

&nbsp;

&nbsp;

&nbsp;

&nbsp;

&nbsp;

&nbsp;

&nbsp;

&nbsp;
<ul>
<ul>
<ul>
	<li>Le secteur de l'éducation</li>
</ul>
</ul>
</ul>
&nbsp;]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>36</wp:post_id>
		<wp:post_date>2013-05-21 14:29:18</wp:post_date>
		<wp:post_date_gmt>2013-05-21 13:29:18</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>temoignages-clients</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>page</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_wp_page_template</wp:meta_key>
			<wp:meta_value><![CDATA[default]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_publicize_pending</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Partenaires</title>
		<link>http://www.it-news.fr/partenaires/</link>
		<pubDate>Tue, 21 May 2013 13:30:10 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?page_id=41</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align:justify;">Découvrez ici même <strong>les partenaires</strong> avec lesquels nous avons décidé de travailler. Chaque partenaire a été choisi de par ces compétences sur le marché dans le but de vous assurer des produits à la point de la technologie.</p>
<p style="text-align:center;">________________________________________________________________</p>

<h2 style="text-align:justify;"><span style="text-decoration:underline;">Nos partenaires Gestion - Métier :</span></h2>
[caption id="attachment_81" align="alignleft" width="245"]<a href="http://new.aquastar-consulting.com/index.php/societe/partenaires/gestion-metier"><img class="size-full wp-image-81   " alt="" src="http://www.it-news.fr/wp-content/uploads/2013/05/logo-sage.jpg" width="245" height="110" /></a> En France, Sage représente 2 millions d'utilisateurs et une entreprise sur deux.[/caption]
<p style="text-align:justify;"><strong>Premier éditeur</strong> de logiciels de gestion en France de par son nombre de clients (troisième au niveau mondial), <strong>Sage</strong> offre des solutions vous permettant d'optimiser et de faciliter votre gestion et vos processus métier. De la CRM à la gestion de la Paie, cet éditeur démontre sur chaque domaine d'activité ses compétences de jour en jour.</p>
<p style="text-align:justify;"><a href="http://new.aquastar-consulting.com/index.php/societe/partenaires/gestion-metier" target="_blank">Plus d'informations sur Sage</a></p>

<h2 style="text-align:justify;"><span style="text-decoration:underline;">Nos partenaires infrastructure :</span></h2>
[caption id="attachment_95" align="alignleft" width="245"]<a href="http://new.aquastar-consulting.com/index.php/societe/partenaires/75-infrastructure/72-aruba-networks"><img class="size-full wp-image-95 " alt="Le spécialiste du réseau WIFI. " src="http://www.it-news.fr/wp-content/uploads/2013/05/logo-aruba.jpg" width="245" height="110" /></a> Le spécialiste du réseau WIFI.[/caption]
<p style="text-align:justify;"><strong>La technologie Wifi</strong> et le nombre de ses bornes ne cessent d'augmenter de façon exponentielle. Atteindrons-t-elles le milliard en 2014 selon certains spécialistes ? Quoi qu'il en soit, ARUBA est le spécialiste dans ce domaine et vous propose des solutions ultra <strong>sécurisée et performantes</strong>. Aquastar Consulting dispose d’ingénieurs certifiés CSP Aruba, le plus haut niveau de certification actuel. Nous vous assurons donc notre totale compétence dans l'intégration de ces solutions.</p>
<p style="text-align:justify;"><a href="http://new.aquastar-consulting.com/index.php/societe/partenaires/75-infrastructure/72-aruba-networks" target="_blank">Plus d'informations sur Aruba Networks</a></p>


[caption id="attachment_99" align="alignleft" width="245"]<a href="http://new.aquastar-consulting.com/index.php/societe/partenaires/75-infrastructure/87-vmware"><img class="size-full wp-image-99 " alt="Leader dans le domaine de la mobilité et de la sécurité des accès réseau. " src="http://www.it-news.fr/wp-content/uploads/2013/05/logo-vmware.jpg" width="245" height="110" /></a> Précurseur et leader de la virtualisation.[/caption]
<p style="text-align:justify;"><strong>La virtualisation</strong>, voilà son cœur de métier. Permettant de dissocier les logiciels du matériel, ou bien d'attribuer plusieurs systèmes d'exploitations sur une machine, l'efficacité de vos outils vont être conforter à leur maximum. Qualifiés par des <strong>formations et certifications VMware</strong>, nos équipes disposent d'un gage de reconnaissance technique et sauront vous guider dans vos choix.</p>
<p style="text-align:justify;"><a href="http://new.aquastar-consulting.com/index.php/societe/partenaires/75-infrastructure/87-vmware" target="_blank">Plus d'informations sur VMware</a></p>


[caption id="attachment_100" align="alignleft" width="245"]<a href="http://new.aquastar-consulting.com/index.php/societe/partenaires/75-infrastructure/84-securactive"><img class="size-full wp-image-100 " alt="La performance de vos infrastructures et réseaux. " src="http://www.it-news.fr/wp-content/uploads/2013/05/logo_securactive.jpg" width="245" height="110" /></a> La performance de vos infrastructures et réseaux.[/caption]
<p style="text-align:justify;">Le métier de SecurActive est de fournir aux structures des outils permettant <strong>d'obtenir une visibilité générale</strong> de la performance des infrastructures et des applications. Plus de 500 clients en Europe utilisent leurs solutions afin d'analyser la performance de leurs outils. Aquastar Consulting entretien un partenariat de longue date avec cette société, ce qui témoigne notre capacité à répondre à toutes vos question techniques.</p>
<p style="text-align:justify;"><a href="http://new.aquastar-consulting.com/index.php/societe/partenaires/75-infrastructure/84-securactive" target="_blank">Plus d'informations sur SecurActive</a></p>


[caption id="attachment_101" align="alignleft" width="245"]<a href="http://new.aquastar-consulting.com/index.php/societe/partenaires/75-infrastructure/81-mobotix"><img class="size-full wp-image-101 " alt="La vidéo surveillance haute résolution. " src="http://www.it-news.fr/wp-content/uploads/2013/05/logo-mobotix.jpg" width="245" height="110" /></a> La vidéo surveillance haute résolution.[/caption]
<p style="text-align:justify;">Mobotix a réinventé <strong>la vidéo surveillance</strong>. En effet, dans l'autre temps où il fallait configurer de lourds logiciels liée aux caméras surveillance, ce partenaire propose de les connecter aux réseaux !
Accessible sur tous ordinateurs sans l'aide de logiciel, connectée telle une imprimante, et résistant à des températures entre -30° et +60°...  Mobotix frappe un grand coup.</p>
<p style="text-align:justify;"><a href="http://new.aquastar-consulting.com/index.php/societe/partenaires/75-infrastructure/81-mobotix" target="_blank">Plus d'informations sur Mobotix</a></p>


[caption id="attachment_112" align="alignleft" width="245"]<a href="http://new.aquastar-consulting.com/index.php/societe/partenaires/75-infrastructure/82-netasq"><img class="size-full wp-image-112 " alt="Fondée en 1998, Netasq est un des leaders dans la sécurité informatique. " src="http://www.it-news.fr/wp-content/uploads/2013/05/logo-netasq.jpg" width="245" height="110" /></a> Fondée en 1998, Netasq est un des leaders dans la sécurité informatique.[/caption]
<p style="text-align:justify;">Pour ne citer que quelques chiffres, Netasq c'est <strong>75 000 appliances vendues</strong> par le biais d'un réseau de distribution de 750 partenaires dans 40 pays. Sa mission est de fournir, quelque soit la structure, une solution de sécurité adaptée avec les technologies les plus performantes du marché. Leurs solutions mettent un terme aux différents risques et menaces informatiques. Aquastar Consulting fait parti du <strong>programme Gold de Netasq</strong> ce qui certifie nos compétences techniques sur ces produits.</p>
<p style="text-align:justify;"><a href="http://new.aquastar-consulting.com/index.php/societe/partenaires/75-infrastructure/82-netasq" target="_blank">Plus d'informations sur Netasq</a></p>


[caption id="attachment_115" align="alignleft" width="245"]<a href="http://new.aquastar-consulting.com/index.php/societe/partenaires/75-infrastructure/86-ucopia-communications"><img class="size-full wp-image-115  " alt="Optimisez votre communication." src="http://www.it-news.fr/wp-content/uploads/2013/05/logo-ucopia.jpg" width="245" height="110" /></a> Optimisez votre communication.[/caption]
<p style="text-align:justify;"><strong>Ucopia</strong> est une société qui met le doigt sur des problèmes de sécurité souvent négligés. Toute structure qui utilise du matériel informatique se protège contre les menaces extérieurs avec des pare feu et antivirus. Toute fois, Ucopia souhaite démontrer qu'il est indispensable de protéger son <strong>environnement interne</strong>. Cela passe par la prise en charge de la confidentialité, par la protection des connexions pirates, mais également par la mise en place des systèmes permettant de rendre votre réseau mobile.</p>
<p style="text-align:justify;"><a href="http://new.aquastar-consulting.com/index.php/societe/partenaires/75-infrastructure/86-ucopia-communications" target="_blank">Plus d'informations sur Ucopia</a></p>
<p style="text-align:justify;">________________________________________________________________</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>41</wp:post_id>
		<wp:post_date>2013-05-21 14:30:10</wp:post_date>
		<wp:post_date_gmt>2013-05-21 13:30:10</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>partenaires</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>page</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_wp_page_template</wp:meta_key>
			<wp:meta_value><![CDATA[default]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_publicize_pending</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_post_restored_from</wp:meta_key>
			<wp:meta_value><![CDATA[a:3:{s:20:"restored_revision_id";i:79;s:16:"restored_by_user";i:50412252;s:13:"restored_time";i:1369734352;}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_format_video_embed</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_format_quote_source_name</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_format_image</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_format_gallery</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_format_audio_embed</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_format_url</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_format_link_url</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_format_quote_source_url</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1389424400]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:86:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:3:"135";s:5:"score";s:18:"21.391573609372866";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"180";s:5:"score";s:18:"16.096722450733132";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"334";s:5:"score";s:18:"12.325382314309039";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"967";s:5:"score";s:18:"11.799992518179385";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"323";s:5:"score";s:18:"11.496892721924983";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"332";s:5:"score";s:18:"11.442281821567175";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"644";s:5:"score";s:18:"11.354366681495637";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"723";s:5:"score";s:18:"11.261326651407671";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"1024";s:5:"score";s:18:"11.012731216961607";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:3:"760";s:5:"score";s:18:"10.142095074491369";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:4:"1465";s:5:"score";s:18:"10.091459459795518";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"1283";s:5:"score";s:18:"10.018520100300917";}i:12;O:8:"stdClass":2:{s:7:"post_id";s:4:"1156";s:5:"score";s:17:"9.934738215564415";}i:13;O:8:"stdClass":2:{s:7:"post_id";s:3:"344";s:5:"score";s:17:"9.875032289333234";}i:14;O:8:"stdClass":2:{s:7:"post_id";s:4:"1236";s:5:"score";s:17:"9.664311258176673";}i:15;O:8:"stdClass":2:{s:7:"post_id";s:3:"980";s:5:"score";s:17:"9.218024155548253";}i:16;O:8:"stdClass":2:{s:7:"post_id";s:4:"1719";s:5:"score";s:17:"9.120443826982118";}i:17;O:8:"stdClass":2:{s:7:"post_id";s:4:"1495";s:5:"score";s:17:"8.514544739066977";}i:18;O:8:"stdClass":2:{s:7:"post_id";s:4:"1320";s:5:"score";s:17:"8.514544739066977";}i:19;O:8:"stdClass":2:{s:7:"post_id";s:4:"1273";s:5:"score";s:17:"8.371056928099295";}i:20;O:8:"stdClass":2:{s:7:"post_id";s:3:"563";s:5:"score";s:17:"7.944870497018788";}i:21;O:8:"stdClass":2:{s:7:"post_id";s:3:"342";s:5:"score";s:17:"7.944870497018787";}i:22;O:8:"stdClass":2:{s:7:"post_id";s:3:"126";s:5:"score";s:17:"7.944870497018787";}i:23;O:8:"stdClass":2:{s:7:"post_id";s:3:"133";s:5:"score";s:17:"7.571738318912114";}i:24;O:8:"stdClass":2:{s:7:"post_id";s:4:"1059";s:5:"score";s:17:"7.543529106253575";}i:25;O:8:"stdClass":2:{s:7:"post_id";s:3:"789";s:5:"score";s:17:"7.543529106253575";}i:26;O:8:"stdClass":2:{s:7:"post_id";s:3:"820";s:5:"score";s:17:"6.951428462168072";}i:27;O:8:"stdClass":2:{s:7:"post_id";s:3:"927";s:5:"score";s:17:"6.794142207370754";}i:28;O:8:"stdClass":2:{s:7:"post_id";s:4:"1439";s:5:"score";s:17:"6.550087071402861";}i:29;O:8:"stdClass":2:{s:7:"post_id";s:3:"907";s:5:"score";s:16:"6.55008707140286";}i:30;O:8:"stdClass":2:{s:7:"post_id";s:4:"1626";s:5:"score";s:17:"6.465536104856384";}i:31;O:8:"stdClass":2:{s:7:"post_id";s:4:"1722";s:5:"score";s:17:"5.846607654921584";}i:32;O:8:"stdClass":2:{s:7:"post_id";s:3:"880";s:5:"score";s:17:"5.800700172520038";}i:33;O:8:"stdClass":2:{s:7:"post_id";s:2:"68";s:5:"score";s:17:"5.800700172520038";}i:34;O:8:"stdClass":2:{s:7:"post_id";s:4:"1016";s:5:"score";s:18:"5.7031198439539015";}i:35;O:8:"stdClass":2:{s:7:"post_id";s:4:"1000";s:5:"score";s:17:"5.314807815208351";}i:36;O:8:"stdClass":2:{s:7:"post_id";s:3:"223";s:5:"score";s:17:"5.314807815208351";}i:37;O:8:"stdClass":2:{s:7:"post_id";s:4:"1595";s:5:"score";s:17:"4.961560743622444";}i:38;O:8:"stdClass":2:{s:7:"post_id";s:4:"1571";s:5:"score";s:17:"4.961560743622444";}i:39;O:8:"stdClass":2:{s:7:"post_id";s:4:"1207";s:5:"score";s:17:"4.961560743622444";}i:40;O:8:"stdClass":2:{s:7:"post_id";s:3:"940";s:5:"score";s:17:"4.961560743622444";}i:41;O:8:"stdClass":2:{s:7:"post_id";s:3:"578";s:5:"score";s:17:"4.961560743622444";}i:42;O:8:"stdClass":2:{s:7:"post_id";s:2:"44";s:5:"score";s:17:"4.958201691365034";}i:43;O:8:"stdClass":2:{s:7:"post_id";s:3:"963";s:5:"score";s:17:"4.367273262759181";}i:44;O:8:"stdClass":2:{s:7:"post_id";s:4:"1454";s:5:"score";s:17:"4.355661655707305";}i:45;O:8:"stdClass":2:{s:7:"post_id";s:4:"1037";s:5:"score";s:17:"4.355661655707305";}i:46;O:8:"stdClass":2:{s:7:"post_id";s:4:"1728";s:5:"score";s:18:"3.8705383802055917";}i:47;O:8:"stdClass":2:{s:7:"post_id";s:4:"1180";s:5:"score";s:18:"3.8705383802055917";}i:48;O:8:"stdClass":2:{s:7:"post_id";s:4:"1006";s:5:"score";s:18:"3.8705383802055917";}i:49;O:8:"stdClass":2:{s:7:"post_id";s:3:"953";s:5:"score";s:18:"3.8705383802055917";}i:50;O:8:"stdClass":2:{s:7:"post_id";s:3:"900";s:5:"score";s:18:"3.8705383802055917";}i:51;O:8:"stdClass":2:{s:7:"post_id";s:3:"736";s:5:"score";s:18:"3.8705383802055917";}i:52;O:8:"stdClass":2:{s:7:"post_id";s:4:"1605";s:5:"score";s:17:"3.482226351460041";}i:53;O:8:"stdClass":2:{s:7:"post_id";s:4:"1588";s:5:"score";s:17:"3.482226351460041";}i:54;O:8:"stdClass":2:{s:7:"post_id";s:3:"947";s:5:"score";s:17:"3.482226351460041";}i:55;O:8:"stdClass":2:{s:7:"post_id";s:4:"1506";s:5:"score";s:18:"3.3846460228939037";}i:56;O:8:"stdClass":2:{s:7:"post_id";s:4:"1444";s:5:"score";s:18:"3.3846460228939037";}i:57;O:8:"stdClass":2:{s:7:"post_id";s:4:"1391";s:5:"score";s:18:"3.3846460228939037";}i:58;O:8:"stdClass":2:{s:7:"post_id";s:4:"1076";s:5:"score";s:18:"3.3846460228939037";}i:59;O:8:"stdClass":2:{s:7:"post_id";s:3:"774";s:5:"score";s:18:"3.3846460228939037";}i:60;O:8:"stdClass":2:{s:7:"post_id";s:4:"1476";s:5:"score";s:17:"3.264639292290453";}i:61;O:8:"stdClass":2:{s:7:"post_id";s:4:"1257";s:5:"score";s:17:"3.264639292290453";}i:62;O:8:"stdClass":2:{s:7:"post_id";s:4:"1434";s:5:"score";s:18:"2.8763272635449018";}i:63;O:8:"stdClass":2:{s:7:"post_id";s:4:"1262";s:5:"score";s:18:"2.8763272635449018";}i:64;O:8:"stdClass":2:{s:7:"post_id";s:4:"1108";s:5:"score";s:17:"2.391203988043188";}i:65;O:8:"stdClass":2:{s:7:"post_id";s:4:"1066";s:5:"score";s:17:"2.391203988043188";}i:66;O:8:"stdClass":2:{s:7:"post_id";s:3:"713";s:5:"score";s:17:"2.391203988043188";}i:67;O:8:"stdClass":2:{s:7:"post_id";s:3:"653";s:5:"score";s:17:"2.391203988043188";}i:68;O:8:"stdClass":2:{s:7:"post_id";s:4:"1459";s:5:"score";s:18:"1.9053116307315001";}i:69;O:8:"stdClass":2:{s:7:"post_id";s:4:"1448";s:5:"score";s:18:"1.9053116307315001";}i:70;O:8:"stdClass":2:{s:7:"post_id";s:4:"1398";s:5:"score";s:18:"1.9053116307315001";}i:71;O:8:"stdClass":2:{s:7:"post_id";s:4:"1043";s:5:"score";s:18:"1.9053116307315001";}i:72;O:8:"stdClass":2:{s:7:"post_id";s:4:"1030";s:5:"score";s:18:"1.9053116307315001";}i:73;O:8:"stdClass":2:{s:7:"post_id";s:3:"849";s:5:"score";s:18:"1.9053116307315001";}i:74;O:8:"stdClass":2:{s:7:"post_id";s:3:"336";s:5:"score";s:18:"1.9053116307315001";}i:75;O:8:"stdClass":2:{s:7:"post_id";s:3:"110";s:5:"score";s:18:"1.9053116307315001";}i:76;O:8:"stdClass":2:{s:7:"post_id";s:4:"1240";s:5:"score";s:18:"1.7853049001280494";}i:77;O:8:"stdClass":2:{s:7:"post_id";s:4:"1127";s:5:"score";s:18:"1.7853049001280494";}i:78;O:8:"stdClass":2:{s:7:"post_id";s:3:"827";s:5:"score";s:18:"1.7853049001280494";}i:79;O:8:"stdClass":2:{s:7:"post_id";s:4:"1305";s:5:"score";s:18:"1.6877245715619125";}i:80;O:8:"stdClass":2:{s:7:"post_id";s:3:"313";s:5:"score";s:18:"1.6183534568361322";}i:81;O:8:"stdClass":2:{s:7:"post_id";s:4:"1419";s:5:"score";s:18:"0.8142892673146477";}i:82;O:8:"stdClass":2:{s:7:"post_id";s:4:"1172";s:5:"score";s:18:"0.8142892673146477";}i:83;O:8:"stdClass":2:{s:7:"post_id";s:4:"1480";s:5:"score";s:18:"0.2083901793995088";}i:84;O:8:"stdClass":2:{s:7:"post_id";s:4:"1099";s:5:"score";s:18:"0.2083901793995088";}i:85;O:8:"stdClass":2:{s:7:"post_id";s:3:"319";s:5:"score";s:18:"0.1153501493115413";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Contact</title>
		<link>http://www.it-news.fr/nous-contacter/</link>
		<pubDate>Tue, 21 May 2013 13:31:24 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?page_id=44</guid>
		<description></description>
		<content:encoded><![CDATA[<strong>Adresse postale :</strong>

<span style="line-height: 1.5;">Aquastar Consulting
</span><span style="line-height: 1.5;">126 rue Pasteur
</span><span style="line-height: 1.5;">59370 Mons-en-Baroeul
Tél : 03.20.34.93.40</span>

<a href="https://maps.google.com/maps?ie=UTF-8&amp;q=aquastar+consulting+mons-en-baroeul&amp;fb=1&amp;hq=aquastar+consulting&amp;hnear=0x47c329e40d796205:0x490d1ea2f8eaf15e,Mons-en-Bar%C5%93ul,+France&amp;cid=0,0,8997557176520170592&amp;ei=qYi5UfuJMO-Z0AW29ICIDA&amp;ved=0CJEBEPwSMAA" target="_blank"><img class="alignnone size-medium wp-image-46" src="http://www.it-news.fr/wp-content/uploads/2013/05/sans-titre.jpg?w=300" alt="Sans titre" width="300" height="168" /></a>

Cliquez sur l'image pour visualiser le plan.]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>44</wp:post_id>
		<wp:post_date>2013-05-21 14:31:24</wp:post_date>
		<wp:post_date_gmt>2013-05-21 13:31:24</wp:post_date_gmt>
		<wp:comment_status>closed</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>nous-contacter</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>page</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_wp_page_template</wp:meta_key>
			<wp:meta_value><![CDATA[default]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_publicize_pending</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Livres blancs</title>
		<link>http://www.it-news.fr/livres-blancs/</link>
		<pubDate>Wed, 29 May 2013 13:47:52 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?page_id=135</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;">Dans le but de vous apporter des détails techniques, nous vous mettons à disposition tout un ensemble de livre blanc qui vous permettrons d’accroître vos connaissances dans différents domaines :</p>

<h2><span style="text-decoration: underline;">Gestion et métier :</span></h2>
<p style="text-align: justify; padding-left: 60px;"><a href="http://www.it-news.fr/wp-content/uploads/2013/05/le-crm-et-les-pme-en-france.pdf" target="_blank">La CRM et les PME en France</a> (628 Ko)</p>
<p style="text-align: justify; padding-left: 60px;"><a href="http://www.it-news.fr/wp-content/uploads/2013/05/les-bonnes-pratiques-de-la-relation-clients.pdf" target="_blank">Les bonnes pratiques de la relation client</a> (4 385 Ko)</p>
<p style="text-align: justify; padding-left: 60px;"><a href="http://www.it-news.fr/wp-content/uploads/2013/05/mobilite-et-efficacite-des-forces-commerciales.pdf" target="_blank">Mobilité et efficacité des forces commerciales</a> (687 Ko)</p>
<p style="text-align: justify; padding-left: 60px;"><a href="http://www.it-news.fr/wp-content/uploads/2013/05/mobilite-et-la-relation-client.pdf" target="_blank">Mobilite et la relation client</a> (460 Ko)</p>
<p style="text-align: justify; padding-left: 60px;"><a href="http://www.it-news.fr/wp-content/uploads/2013/05/normes-ias-ifrs.pdf" target="_blank">Normes IAS/IFRS</a> (1 045 Ko)</p>
<p style="text-align: justify; padding-left: 60px;"><a href="http://www.it-news.fr/wp-content/uploads/2013/05/fr_wp_7bonnes_raisons_dautomatiser_le_traitement_des_commandes_tout-erp.pdf" target="_blank">7 bonnes raisons d'automatiser le traitement des commandes ERP</a> (631 Ko)</p>
<p style="text-align: justify; padding-left: 60px;"><a href="http://www.it-news.fr/wp-content/uploads/2013/05/les-avantages-metier-des-solutions-erp-hebergees.pdf" target="_blank">Les avantages métiers des solutions ERP hébergées</a> (475 ko)</p>

<h2><span style="text-decoration: underline;">Systèmes informatiques :</span></h2>
<p style="padding-left: 60px;"><a href="http://www.it-news.fr/wp-content/uploads/2013/06/21196714_ga_wp_takingtheleaptovirtualization_fr.pdf" target="_blank">Faire le grand saut de la virtualisation</a> (197 ko)</p>
<p style="padding-left: 60px;"><a href="http://www.it-news.fr/wp-content/uploads/2013/06/symantec_reduire_cout_stockage.pdf" target="_blank">Réduire les coûts de stockage</a> (534 Ko)</p>
<p style="padding-left: 60px;"><a href="http://www.it-news.fr/wp-content/uploads/2013/06/tendancescloud2013_v2-0.pdf" target="_blank">Les tendances du Cloud en 2013</a> (5 668 Ko)</p>

<h2><span style="text-decoration: underline;">Réseau et mobilité :</span></h2>
<p style="padding-left: 60px;"><a href="http://www.it-news.fr/wp-content/uploads/2013/06/microsoft-france-bring-your-own-device-byod-vision-sc3a9curitc3a9-et-approche-de-solutions-leslivresblancs-fr.pdf" target="_blank">Microsoft France : Bring Your Own Device (BYOD)</a> (680 Ko)</p>
<p style="padding-left: 60px;"><a href="http://www.it-news.fr/wp-content/uploads/2013/07/le-byod-dans-l-entreprise.pdf" target="_blank">Le BYOD dans l'entreprise avec les systèmes DELL KACE K</a>  (1 624 Ko)</p>
<p style="padding-left: 60px;"><a href="http://www.it-news.fr/wp-content/uploads/2013/06/osiatis-byod-menace-ou-opportunitc3a9-pour-la-dsi-leslivresblancs-fr.pdf" target="_blank">BYOD : Menace ou opportunité pour la DSI</a> (593 Ko)</p>
<p style="padding-left: 60px;"><a href="http://emailing.aquastar-consulting.com/2014/livre-blanc/Livre-Blanc-Cloud.pdf" target="_blank">Le Cloud: nouvelle source de performance pour votre entreprise</a> (5 433 Ko)</p>

<h2><span style="text-decoration: underline;">Sécurité :</span></h2>
<p style="padding-left: 60px;"><a href="http://www.it-news.fr/wp-content/uploads/2013/06/10_defis_politique_securite_gdata_2012.pdf" target="_blank">10 défis pour votre politique de sécurité</a> (5 762 Ko)</p>
<p style="padding-left: 60px;"><a href="http://www.it-news.fr/wp-content/uploads/2013/06/lexsi-sensibilisation-c3a0-la-sc3a9curitc3a9-de-linformation-2-0-leslivresblancs-fr.pdf" target="_blank">Sensibilisation à la sécurité de l'information 2.0</a> (505 Ko)</p>
<p style="padding-left: 60px;"><a href="http://images.itnewsinfo.com/commun/genform/recompense/D12+-+HowBB10SecurityWorks_Summary_FR_Final+D-12.pdf" target="_blank">Les mobiles et la sécurité: une problématique à résoudre en urgence</a> (547Ko)</p>
<p style="padding-left: 60px;"><a href="http://emailing.aquastar-consulting.com/2014/Infra/Sophos-livre-blanc/Livre-blanc-sophos-securite-2014.pdf" target="_blank">Rapport Sophos 2014 sur les menaces à la sécurité: Des malwares plus dangereux, plus discrets et plus efficaces</a> (3.51Mo)</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>135</wp:post_id>
		<wp:post_date>2013-05-29 14:47:52</wp:post_date>
		<wp:post_date_gmt>2013-05-29 13:47:52</wp:post_date_gmt>
		<wp:comment_status>closed</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>livres-blancs</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>page</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_wp_page_template</wp:meta_key>
			<wp:meta_value><![CDATA[default]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_publicize_pending</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:79:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:3:"789";s:5:"score";s:18:"14.792746638120983";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"967";s:5:"score";s:18:"12.359955989471997";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"323";s:5:"score";s:18:"11.913668886843576";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1320";s:5:"score";s:17:"11.15076842439302";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"180";s:5:"score";s:18:"10.249701636385623";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1059";s:5:"score";s:18:"10.162731412135775";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"223";s:5:"score";s:17:"9.952010380820123";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1076";s:5:"score";s:17:"9.351801195919448";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:3:"820";s:5:"score";s:17:"9.309694377894154";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1257";s:5:"score";s:16:"8.67587095771874";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:4:"1236";s:5:"score";s:17:"8.540870979703119";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"1030";s:5:"score";s:17:"6.579212473679665";}i:12;O:8:"stdClass":2:{s:7:"post_id";s:3:"760";s:5:"score";s:17:"6.579212473679665";}i:13;O:8:"stdClass":2:{s:7:"post_id";s:4:"1454";s:5:"score";s:17:"5.945389053504251";}i:14;O:8:"stdClass":2:{s:7:"post_id";s:4:"1448";s:5:"score";s:17:"5.768282257463336";}i:15;O:8:"stdClass":2:{s:7:"post_id";s:4:"1398";s:5:"score";s:17:"5.768282257463336";}i:16;O:8:"stdClass":2:{s:7:"post_id";s:4:"1391";s:5:"score";s:17:"5.768282257463336";}i:17;O:8:"stdClass":2:{s:7:"post_id";s:4:"1207";s:5:"score";s:17:"5.768282257463336";}i:18;O:8:"stdClass":2:{s:7:"post_id";s:4:"1495";s:5:"score";s:18:"5.7098229821914845";}i:19;O:8:"stdClass":2:{s:7:"post_id";s:4:"1283";s:5:"score";s:18:"5.7098229821914845";}i:20;O:8:"stdClass":2:{s:7:"post_id";s:4:"1273";s:5:"score";s:17:"5.321995154834918";}i:21;O:8:"stdClass":2:{s:7:"post_id";s:4:"1000";s:5:"score";s:17:"5.321995154834918";}i:22;O:8:"stdClass":2:{s:7:"post_id";s:3:"927";s:5:"score";s:17:"5.321995154834918";}i:23;O:8:"stdClass":2:{s:7:"post_id";s:3:"644";s:5:"score";s:17:"5.321995154834918";}i:24;O:8:"stdClass":2:{s:7:"post_id";s:3:"344";s:5:"score";s:17:"5.321995154834918";}i:25;O:8:"stdClass":2:{s:7:"post_id";s:4:"1024";s:5:"score";s:18:"5.2550432968125085";}i:26;O:8:"stdClass":2:{s:7:"post_id";s:3:"907";s:5:"score";s:18:"5.2550432968125085";}i:27;O:8:"stdClass":2:{s:7:"post_id";s:3:"723";s:5:"score";s:17:"5.220707690999877";}i:28;O:8:"stdClass":2:{s:7:"post_id";s:4:"1262";s:5:"score";s:17:"5.134458837287922";}i:29;O:8:"stdClass":2:{s:7:"post_id";s:3:"334";s:5:"score";s:18:"4.6881717346595035";}i:30;O:8:"stdClass":2:{s:7:"post_id";s:3:"963";s:5:"score";s:17:"4.621219876637094";}i:31;O:8:"stdClass":2:{s:7:"post_id";s:4:"1016";s:5:"score";s:18:"4.2333920492805275";}i:32;O:8:"stdClass":2:{s:7:"post_id";s:3:"880";s:5:"score";s:18:"4.2333920492805275";}i:33;O:8:"stdClass":2:{s:7:"post_id";s:2:"68";s:5:"score";s:18:"4.2333920492805275";}i:34;O:8:"stdClass":2:{s:7:"post_id";s:4:"1127";s:5:"score";s:17:"4.045855731733533";}i:35;O:8:"stdClass":2:{s:7:"post_id";s:2:"44";s:5:"score";s:18:"3.4482785622172627";}i:36;O:8:"stdClass":2:{s:7:"post_id";s:4:"1595";s:5:"score";s:18:"1.9491972476944597";}i:37;O:8:"stdClass":2:{s:7:"post_id";s:4:"1588";s:5:"score";s:18:"1.9491972476944597";}i:38;O:8:"stdClass":2:{s:7:"post_id";s:4:"1506";s:5:"score";s:18:"1.9491972476944597";}i:39;O:8:"stdClass":2:{s:7:"post_id";s:4:"1459";s:5:"score";s:18:"1.9491972476944597";}i:40;O:8:"stdClass":2:{s:7:"post_id";s:4:"1444";s:5:"score";s:18:"1.9491972476944597";}i:41;O:8:"stdClass":2:{s:7:"post_id";s:4:"1043";s:5:"score";s:18:"1.9491972476944597";}i:42;O:8:"stdClass":2:{s:7:"post_id";s:3:"980";s:5:"score";s:18:"1.9491972476944597";}i:43;O:8:"stdClass":2:{s:7:"post_id";s:3:"947";s:5:"score";s:18:"1.9491972476944597";}i:44;O:8:"stdClass":2:{s:7:"post_id";s:3:"940";s:5:"score";s:18:"1.9491972476944597";}i:45;O:8:"stdClass":2:{s:7:"post_id";s:3:"849";s:5:"score";s:18:"1.9491972476944597";}i:46;O:8:"stdClass":2:{s:7:"post_id";s:3:"774";s:5:"score";s:18:"1.9491972476944597";}i:47;O:8:"stdClass":2:{s:7:"post_id";s:3:"578";s:5:"score";s:18:"1.9491972476944597";}i:48;O:8:"stdClass":2:{s:7:"post_id";s:3:"563";s:5:"score";s:18:"1.9491972476944597";}i:49;O:8:"stdClass":2:{s:7:"post_id";s:3:"342";s:5:"score";s:18:"1.9491972476944597";}i:50;O:8:"stdClass":2:{s:7:"post_id";s:3:"336";s:5:"score";s:18:"1.9491972476944597";}i:51;O:8:"stdClass":2:{s:7:"post_id";s:3:"126";s:5:"score";s:18:"1.9491972476944597";}i:52;O:8:"stdClass":2:{s:7:"post_id";s:3:"110";s:5:"score";s:18:"1.9491972476944597";}i:53;O:8:"stdClass":2:{s:7:"post_id";s:4:"1571";s:5:"score";s:18:"1.3153738275190456";}i:54;O:8:"stdClass":2:{s:7:"post_id";s:4:"1465";s:5:"score";s:18:"1.3153738275190456";}i:55;O:8:"stdClass":2:{s:7:"post_id";s:4:"1434";s:5:"score";s:18:"1.3153738275190456";}i:56;O:8:"stdClass":2:{s:7:"post_id";s:4:"1037";s:5:"score";s:18:"1.3153738275190456";}i:57;O:8:"stdClass":2:{s:7:"post_id";s:4:"1439";s:5:"score";s:18:"0.8605941421400699";}i:58;O:8:"stdClass":2:{s:7:"post_id";s:4:"1419";s:5:"score";s:18:"0.8605941421400699";}i:59;O:8:"stdClass":2:{s:7:"post_id";s:4:"1180";s:5:"score";s:18:"0.8605941421400699";}i:60;O:8:"stdClass":2:{s:7:"post_id";s:4:"1172";s:5:"score";s:18:"0.8605941421400699";}i:61;O:8:"stdClass":2:{s:7:"post_id";s:4:"1156";s:5:"score";s:18:"0.8605941421400699";}i:62;O:8:"stdClass":2:{s:7:"post_id";s:4:"1108";s:5:"score";s:18:"0.8605941421400699";}i:63;O:8:"stdClass":2:{s:7:"post_id";s:4:"1066";s:5:"score";s:18:"0.8605941421400699";}i:64;O:8:"stdClass":2:{s:7:"post_id";s:4:"1006";s:5:"score";s:18:"0.8605941421400699";}i:65;O:8:"stdClass":2:{s:7:"post_id";s:3:"953";s:5:"score";s:18:"0.8605941421400699";}i:66;O:8:"stdClass":2:{s:7:"post_id";s:3:"900";s:5:"score";s:18:"0.8605941421400699";}i:67;O:8:"stdClass":2:{s:7:"post_id";s:3:"736";s:5:"score";s:18:"0.8605941421400699";}i:68;O:8:"stdClass":2:{s:7:"post_id";s:3:"713";s:5:"score";s:18:"0.8605941421400699";}i:69;O:8:"stdClass":2:{s:7:"post_id";s:3:"653";s:5:"score";s:18:"0.8605941421400699";}i:70;O:8:"stdClass":2:{s:7:"post_id";s:3:"133";s:5:"score";s:18:"0.8605941421400699";}i:71;O:8:"stdClass":2:{s:7:"post_id";s:3:"332";s:5:"score";s:18:"0.7851134870632648";}i:72;O:8:"stdClass":2:{s:7:"post_id";s:4:"1480";s:5:"score";s:19:"0.22677072196465586";}i:73;O:8:"stdClass":2:{s:7:"post_id";s:4:"1476";s:5:"score";s:19:"0.22677072196465586";}i:74;O:8:"stdClass":2:{s:7:"post_id";s:4:"1305";s:5:"score";s:19:"0.22677072196465586";}i:75;O:8:"stdClass":2:{s:7:"post_id";s:4:"1099";s:5:"score";s:19:"0.22677072196465586";}i:76;O:8:"stdClass":2:{s:7:"post_id";s:3:"827";s:5:"score";s:19:"0.22677072196465586";}i:77;O:8:"stdClass":2:{s:7:"post_id";s:3:"313";s:5:"score";s:19:"0.15129006688785077";}i:78;O:8:"stdClass":2:{s:7:"post_id";s:3:"319";s:5:"score";s:19:"0.12548325812961497";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Articles</title>
		<link>http://www.it-news.fr/articles/</link>
		<pubDate>Mon, 17 Jun 2013 07:13:10 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?page_id=361</guid>
		<description></description>
		<content:encoded><![CDATA[<meta name="google-site-verification" content="LzC4C8WyRskkMURpLhp0nmJoRlI6znz4c6d_wyHGX34" />
]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>361</wp:post_id>
		<wp:post_date>2013-06-17 08:13:10</wp:post_date>
		<wp:post_date_gmt>2013-06-17 07:13:10</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>articles</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>page</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_wp_page_template</wp:meta_key>
			<wp:meta_value><![CDATA[default]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_publicize_pending</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Références clients - Commerce / Distribution</title>
		<link>http://www.it-news.fr/temoignages-clients/commerce-distribution/</link>
		<pubDate>Mon, 17 Jun 2013 08:47:25 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?page_id=391</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align:justify;">Veuillez trouver ci-dessous une liste non exhaustive de nos références clients dans le domaine du Commerce et de la Distribution. Vous souhaitez en savoir plus, cliquez sur l'un des logos.</p>
<a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=commerce" target="_blank"><img alt="tresnois descamps" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-tresnois-descamps.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=commerce"><img alt="top-carrelage" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-top-carrelage.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=commerce"><img alt="tape-a-l-oeil" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-tape-a-l-oeil.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=commerce"><img alt="logo-nicols" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-nicols.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=commerce"><img alt="logo-cora" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-cora.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=commerce"><img alt="logo-codic" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-codic.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=commerce"><img alt="logo-cevinor" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-cevinor.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=commerce"><img alt="logo-bureau-services" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-bureau-services.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=commerce"><img alt="logo-big-bazar-bethunois" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-big-bazar-bethunois.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=commerce"><img alt="logo-audio-video-nord" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-audio-video-nord.jpg" width="150" height="98" /></a>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>391</wp:post_id>
		<wp:post_date>2013-06-17 09:47:25</wp:post_date>
		<wp:post_date_gmt>2013-06-17 08:47:25</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>commerce-distribution</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>36</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>page</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_wp_page_template</wp:meta_key>
			<wp:meta_value><![CDATA[default]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_publicize_pending</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Education</title>
		<link>http://www.it-news.fr/temoignages-clients/education/</link>
		<pubDate>Mon, 17 Jun 2013 08:55:33 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?page_id=398</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align:justify;">Veuillez trouver ci-dessous une liste non exhaustive de nos références clients dans le domaine de l'éducation. Vous souhaitez en savoir plus, cliquez sur l’un des logos.</p>
<a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=education"><img class="alignleft size-full wp-image-405" alt="ecole-mine-douai" src="http://www.it-news.fr/wp-content/uploads/2013/06/ecole-mine-douai.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=education"><img class="alignleft size-full wp-image-406" alt="logo-dnrfp-douane" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-dnrfp-douane.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=education"><img class="alignleft size-full wp-image-407" alt="logo-siadep" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-siadep.jpg" width="150" height="98" /></a>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>398</wp:post_id>
		<wp:post_date>2013-06-17 09:55:33</wp:post_date>
		<wp:post_date_gmt>2013-06-17 08:55:33</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>education</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>36</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>page</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_publicize_pending</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_page_template</wp:meta_key>
			<wp:meta_value><![CDATA[default]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>ACCUEIL    </title>
		<link>http://www.it-news.fr/accueil/</link>
		<pubDate>Wed, 31 Jul 2013 12:25:38 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=798</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>798</wp:post_id>
		<wp:post_date>2013-07-31 13:25:38</wp:post_date>
		<wp:post_date_gmt>2013-07-31 12:25:38</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>accueil</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>1</wp:menu_order>
		<wp:post_type>nav_menu_item</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="nav_menu" nicename="menu-it-news"><![CDATA[Menu IT-news]]></category>
		<wp:postmeta>
			<wp:meta_key>_menu_item_type</wp:meta_key>
			<wp:meta_value><![CDATA[custom]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_menu_item_parent</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_object_id</wp:meta_key>
			<wp:meta_value><![CDATA[798]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_object</wp:meta_key>
			<wp:meta_value><![CDATA[custom]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_target</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_classes</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{i:0;s:0:"";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_xfn</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_url</wp:meta_key>
			<wp:meta_value><![CDATA[http://www.it-news.fr/]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>INFRASTRUCTURES    </title>
		<link>http://www.it-news.fr/799/</link>
		<pubDate>Wed, 31 Jul 2013 12:25:38 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=799</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>799</wp:post_id>
		<wp:post_date>2013-07-31 13:25:38</wp:post_date>
		<wp:post_date_gmt>2013-07-31 12:25:38</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>799</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>3</wp:menu_order>
		<wp:post_type>nav_menu_item</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="nav_menu" nicename="menu-it-news"><![CDATA[Menu IT-news]]></category>
		<wp:postmeta>
			<wp:meta_key>_menu_item_type</wp:meta_key>
			<wp:meta_value><![CDATA[taxonomy]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_menu_item_parent</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_object_id</wp:meta_key>
			<wp:meta_value><![CDATA[10]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_object</wp:meta_key>
			<wp:meta_value><![CDATA[category]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_target</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_classes</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{i:0;s:0:"";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_xfn</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_url</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>GESTION    </title>
		<link>http://www.it-news.fr/800/</link>
		<pubDate>Wed, 31 Jul 2013 12:25:38 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=800</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>800</wp:post_id>
		<wp:post_date>2013-07-31 13:25:38</wp:post_date>
		<wp:post_date_gmt>2013-07-31 12:25:38</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>800</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>2</wp:menu_order>
		<wp:post_type>nav_menu_item</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="nav_menu" nicename="menu-it-news"><![CDATA[Menu IT-news]]></category>
		<wp:postmeta>
			<wp:meta_key>_menu_item_type</wp:meta_key>
			<wp:meta_value><![CDATA[taxonomy]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_menu_item_parent</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_object_id</wp:meta_key>
			<wp:meta_value><![CDATA[21]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_object</wp:meta_key>
			<wp:meta_value><![CDATA[category]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_target</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_classes</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{i:0;s:0:"";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_xfn</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_url</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>CONTACT</title>
		<link>http://www.it-news.fr/802/</link>
		<pubDate>Wed, 31 Jul 2013 12:25:38 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=802</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>802</wp:post_id>
		<wp:post_date>2013-07-31 13:25:38</wp:post_date>
		<wp:post_date_gmt>2013-07-31 12:25:38</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>802</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>9</wp:menu_order>
		<wp:post_type>nav_menu_item</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="nav_menu" nicename="menu-it-news"><![CDATA[Menu IT-news]]></category>
		<wp:postmeta>
			<wp:meta_key>_menu_item_type</wp:meta_key>
			<wp:meta_value><![CDATA[post_type]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_menu_item_parent</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_object_id</wp:meta_key>
			<wp:meta_value><![CDATA[44]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_object</wp:meta_key>
			<wp:meta_value><![CDATA[page]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_target</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_classes</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{i:0;s:0:"";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_xfn</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_url</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>LIVRES BLANCS    </title>
		<link>http://www.it-news.fr/803/</link>
		<pubDate>Wed, 31 Jul 2013 12:25:38 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=803</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>803</wp:post_id>
		<wp:post_date>2013-07-31 13:25:38</wp:post_date>
		<wp:post_date_gmt>2013-07-31 12:25:38</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>803</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>7</wp:menu_order>
		<wp:post_type>nav_menu_item</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="nav_menu" nicename="menu-it-news"><![CDATA[Menu IT-news]]></category>
		<wp:postmeta>
			<wp:meta_key>_menu_item_type</wp:meta_key>
			<wp:meta_value><![CDATA[post_type]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_menu_item_parent</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_object_id</wp:meta_key>
			<wp:meta_value><![CDATA[135]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_object</wp:meta_key>
			<wp:meta_value><![CDATA[page]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_target</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_classes</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{i:0;s:0:"";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_xfn</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_url</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title></title>
		<link>http://www.it-news.fr/813/</link>
		<pubDate>Wed, 31 Jul 2013 12:32:05 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=813</guid>
		<description></description>
		<content:encoded><![CDATA[ ]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>813</wp:post_id>
		<wp:post_date>2013-07-31 13:32:05</wp:post_date>
		<wp:post_date_gmt>2013-07-31 12:32:05</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>813</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>4</wp:menu_order>
		<wp:post_type>nav_menu_item</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="nav_menu" nicename="menu-it-news"><![CDATA[Menu IT-news]]></category>
		<wp:postmeta>
			<wp:meta_key>_menu_item_type</wp:meta_key>
			<wp:meta_value><![CDATA[taxonomy]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_menu_item_parent</wp:meta_key>
			<wp:meta_value><![CDATA[799]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_object_id</wp:meta_key>
			<wp:meta_value><![CDATA[29]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_object</wp:meta_key>
			<wp:meta_value><![CDATA[category]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_target</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_classes</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{i:0;s:0:"";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_xfn</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_url</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title></title>
		<link>http://www.it-news.fr/814/</link>
		<pubDate>Wed, 31 Jul 2013 12:32:05 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=814</guid>
		<description></description>
		<content:encoded><![CDATA[ ]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>814</wp:post_id>
		<wp:post_date>2013-07-31 13:32:05</wp:post_date>
		<wp:post_date_gmt>2013-07-31 12:32:05</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>814</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>6</wp:menu_order>
		<wp:post_type>nav_menu_item</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="nav_menu" nicename="menu-it-news"><![CDATA[Menu IT-news]]></category>
		<wp:postmeta>
			<wp:meta_key>_menu_item_type</wp:meta_key>
			<wp:meta_value><![CDATA[taxonomy]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_menu_item_parent</wp:meta_key>
			<wp:meta_value><![CDATA[799]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_object_id</wp:meta_key>
			<wp:meta_value><![CDATA[12]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_object</wp:meta_key>
			<wp:meta_value><![CDATA[category]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_target</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_classes</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{i:0;s:0:"";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_xfn</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_url</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title></title>
		<link>http://www.it-news.fr/815/</link>
		<pubDate>Wed, 31 Jul 2013 12:32:05 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=815</guid>
		<description></description>
		<content:encoded><![CDATA[ ]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>815</wp:post_id>
		<wp:post_date>2013-07-31 13:32:05</wp:post_date>
		<wp:post_date_gmt>2013-07-31 12:32:05</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>815</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>5</wp:menu_order>
		<wp:post_type>nav_menu_item</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="nav_menu" nicename="menu-it-news"><![CDATA[Menu IT-news]]></category>
		<wp:postmeta>
			<wp:meta_key>_menu_item_type</wp:meta_key>
			<wp:meta_value><![CDATA[taxonomy]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_menu_item_parent</wp:meta_key>
			<wp:meta_value><![CDATA[799]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_object_id</wp:meta_key>
			<wp:meta_value><![CDATA[45]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_object</wp:meta_key>
			<wp:meta_value><![CDATA[category]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_target</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_classes</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{i:0;s:0:"";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_xfn</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_url</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>VIDEOS</title>
		<link>http://www.it-news.fr/videos-2/</link>
		<pubDate>Fri, 07 Feb 2014 08:48:45 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2032</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2032</wp:post_id>
		<wp:post_date>2014-02-07 09:48:45</wp:post_date>
		<wp:post_date_gmt>2014-02-07 08:48:45</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>videos-2</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>8</wp:menu_order>
		<wp:post_type>nav_menu_item</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="nav_menu" nicename="menu-it-news"><![CDATA[Menu IT-news]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_type</wp:meta_key>
			<wp:meta_value><![CDATA[taxonomy]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_menu_item_parent</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_object_id</wp:meta_key>
			<wp:meta_value><![CDATA[283]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_object</wp:meta_key>
			<wp:meta_value><![CDATA[category]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_target</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_classes</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{i:0;s:0:"";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_xfn</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_menu_item_url</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>rp_sepa_cxp-300x258.jpg</title>
		<link>http://www.it-news.fr/les-pme-pretes-au-passage-au-sepa/rp_sepa_cxp-300x258-jpg/</link>
		<pubDate>Fri, 25 Jul 2014 08:24:56 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/07/sepa_cxp-300x258.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2513</wp:post_id>
		<wp:post_date>2014-07-25 09:24:56</wp:post_date>
		<wp:post_date_gmt>2014-07-25 08:24:56</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>rp_sepa_cxp-300x258-jpg</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2509</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/07/sepa_cxp-300x2581.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/07/sepa_cxp-300x2581.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{s:5:"width";i:300;s:6:"height";i:258;s:4:"file";s:29:"2014/07/sepa_cxp-300x2581.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:5:{s:4:"file";s:29:"sepa_cxp-300x2581-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:29:"Reduced by 10.0% (972&nbsp;B)";}s:14:"post-thumbnail";a:5:{s:4:"file";s:29:"sepa_cxp-300x2581-300x198.jpg";s:5:"width";i:300;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:30:"Reduced by 10.1% (2.1&nbsp;KB)";}s:15:"wp_rp_thumbnail";a:5:{s:4:"file";s:29:"sepa_cxp-300x2581-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";s:10:"wp_smushit";s:10:"No savings";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}s:10:"wp_smushit";s:10:"No savings";}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>stormshield-firewalls-nextegen</title>
		<link>http://www.it-news.fr/stormshield-network-security-nouvelle-generation-de-solutions-de-protection-des-reseaux/stormshield-firewalls-nextegen/</link>
		<pubDate>Fri, 01 Aug 2014 08:58:20 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/08/stormshield-firewalls-nextegen.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2515</wp:post_id>
		<wp:post_date>2014-08-01 09:58:20</wp:post_date>
		<wp:post_date_gmt>2014-08-01 08:58:20</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>stormshield-firewalls-nextegen</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2514</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/08/stormshield-firewalls-nextegen.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/08/stormshield-firewalls-nextegen.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:400;s:6:"height";i:292;s:4:"file";s:42:"2014/08/stormshield-firewalls-nextegen.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:42:"stormshield-firewalls-nextegen-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:42:"stormshield-firewalls-nextegen-300x219.jpg";s:5:"width";i:300;s:6:"height";i:219;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:42:"stormshield-firewalls-nextegen-400x198.jpg";s:5:"width";i:400;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>stormshield</title>
		<link>http://www.it-news.fr/stormshield-network-security-nouvelle-generation-de-solutions-de-protection-des-reseaux/stormshield/</link>
		<pubDate>Fri, 01 Aug 2014 09:00:47 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/08/stormshield.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2516</wp:post_id>
		<wp:post_date>2014-08-01 10:00:47</wp:post_date>
		<wp:post_date_gmt>2014-08-01 09:00:47</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>stormshield</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2514</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/08/stormshield.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/08/stormshield.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:23:"2014/08/stormshield.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:23:"stormshield-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:23:"stormshield-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:23:"stormshield-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>SEPA</title>
		<link>http://www.it-news.fr/les-pme-pretes-au-passage-au-sepa/sepa/</link>
		<pubDate>Fri, 01 Aug 2014 09:06:38 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/wp-content/uploads/2014/07/SEPA.jpg</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2519</wp:post_id>
		<wp:post_date>2014-08-01 10:06:38</wp:post_date>
		<wp:post_date_gmt>2014-08-01 09:06:38</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>sepa</wp:post_name>
		<wp:status>inherit</wp:status>
		<wp:post_parent>2509</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>attachment</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:attachment_url>http://www.it-news.fr/wp-content/uploads/2014/07/SEPA.jpg</wp:attachment_url>
		<wp:postmeta>
			<wp:meta_key>_wp_attached_file</wp:meta_key>
			<wp:meta_value><![CDATA[2014/07/SEPA.jpg]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_attachment_metadata</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{s:5:"width";i:341;s:6:"height";i:228;s:4:"file";s:16:"2014/07/SEPA.jpg";s:5:"sizes";a:3:{s:9:"thumbnail";a:4:{s:4:"file";s:16:"SEPA-150x150.jpg";s:5:"width";i:150;s:6:"height";i:150;s:9:"mime-type";s:10:"image/jpeg";}s:6:"medium";a:4:{s:4:"file";s:16:"SEPA-300x200.jpg";s:5:"width";i:300;s:6:"height";i:200;s:9:"mime-type";s:10:"image/jpeg";}s:14:"post-thumbnail";a:4:{s:4:"file";s:16:"SEPA-341x198.jpg";s:5:"width";i:341;s:6:"height";i:198;s:9:"mime-type";s:10:"image/jpeg";}}s:10:"image_meta";a:10:{s:8:"aperture";i:0;s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";i:0;s:9:"copyright";s:0:"";s:12:"focal_length";i:0;s:3:"iso";i:0;s:13:"shutter_speed";i:0;s:5:"title";s:0:"";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Forum VMware : 6 Juin 2013</title>
		<link>http://www.it-news.fr/forum-vmware-6-juin-2013/</link>
		<pubDate>Wed, 22 May 2013 07:17:31 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?p=68</guid>
		<description></description>
		<content:encoded><![CDATA[<h2 style="text-align: justify;"><span style="text-decoration: underline;"><span style="font-size: 80%; line-height: 2em;">L'actualité VMware :</span></span></h2>
<p style="text-align: justify;">C'est au Carrousel du Louvre à Paris qu'aura lieu ce forum organisé par VMware, un de nos partenaires. L'objectif est de vous faire découvrir les dernières nouveautés en matière de virtualisationen ce qui concerne les applications critiques, de mobilité, de réduction des coût de gestion, ...</p>
<!--more Lire la suite-->
<p style="text-align: justify;">Vous pourrez assister à des démonstrations, rencontrer des témoignages clients et ainsi vous faire une idée de ce que peux vous apporter VMware. A voir notamment des outils qui vont vous permettre de réduire vos coûts et simplifier votre informatique.</p>
<a href="http://www.julienmousqueton.fr/2013/03/23/vmware-forum-le-6-juin-2013-a-paris/" target="_blank" rel="dofollow">Source</a>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>68</wp:post_id>
		<wp:post_date>2013-05-22 08:17:31</wp:post_date>
		<wp:post_date_gmt>2013-05-22 07:17:31</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>forum-vmware-6-juin-2013</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="2013"><![CDATA[2013]]></category>
		<category domain="category" nicename="evenements"><![CDATA[Evénements]]></category>
		<category domain="post_tag" nicename="forum"><![CDATA[Forum]]></category>
		<category domain="post_tag" nicename="nouveaute"><![CDATA[nouveauté]]></category>
		<category domain="post_tag" nicename="paris"><![CDATA[Paris]]></category>
		<category domain="post_tag" nicename="vmware"><![CDATA[vmware]]></category>
		<wp:postmeta>
			<wp:meta_key>_wpas_skip_3898347</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>publicize_twitter_user</wp:meta_key>
			<wp:meta_value><![CDATA[Aquastar_IT]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>publicize_reach</wp:meta_key>
			<wp:meta_value><![CDATA[a:2:{s:7:"twitter";a:1:{i:3659558;i:21;}s:2:"wp";a:1:{i:0;i:0;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wpas_done_3659558</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_publicize_done_external</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{s:7:"twitter";a:1:{i:821138382;b:1;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wpas_skip_3659558</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[46]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[VMware]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426436529]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:16:"145.984993439581";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2125";s:5:"score";s:17:"72.98977281361361";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"323";s:5:"score";s:16:"54.7546189561165";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"827";s:5:"score";s:17:"51.82194481727648";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"653";s:5:"score";s:18:"32.593059670517604";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"578";s:5:"score";s:18:"31.366349643440522";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1043";s:5:"score";s:18:"31.166848839526658";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"644";s:5:"score";s:18:"23.377341919858125";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"22.878082735918824";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:16:"22.1156012971298";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:17:"41.93170979812756";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2125";s:5:"score";s:18:"22.868670152585466";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:17:"9.534830910483542";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"9.088543807855123";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1955";s:5:"score";s:17:"8.458922328175056";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:17:"7.981138512165105";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[empty]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:17:"79.38570518860826";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"323";s:5:"score";s:18:"54.636503428918004";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"827";s:5:"score";s:17:"51.95499874710539";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2125";s:5:"score";s:17:"41.37605401585124";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"578";s:5:"score";s:17:"35.02210276175006";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"653";s:5:"score";s:17:"34.37446052361475";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1043";s:5:"score";s:18:"34.066031160864064";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"644";s:5:"score";s:18:"25.358776840479692";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Mobotix : Trois modèles à haute résolution</title>
		<link>http://www.it-news.fr/mobotix-augmente-une-nouvelle-fois-la-resolution-de-ses-modeles-mais-pourquoi/</link>
		<pubDate>Tue, 28 May 2013 14:30:43 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?p=110</guid>
		<description></description>
		<content:encoded><![CDATA[<h2 style="text-align: justify;"><span style="text-decoration: underline;"><span style="font-size: 80%; line-height: 2em;"><a href="http://aquastarconsultingblog.wordpress.com/2013/05/28/mobotix-augmente-une-nouvelle-fois-la-resolution-de-ses-modeles-mais-pourquoi/"><img class="alignleft size-full wp-image-304" alt="Solution Mobotix haute résolution" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-mobotix-e1370872279184.jpg" width="190" height="190" /></a>Trois modèles de caméras vidéosurveillance revue à la hausse :</span></span></h2>
<p style="text-align: justify;">Connu pour ses caméras à haute résolution, Mobotix augmente une nouvelle fois la qualité de ses appareils (les modèles  S15, D15 et V15).</p>
<!--more Lire la suite-->
<p style="text-align: justify;">Supérieur aux modèles précédents, les capteurs s'élèvent désormais à 5 mégapixels. Les avantages liés à cette augmentation garantissent une image de qualité même lors de mauvaises conditions météorologiques. De plus, la sensibilité à la lumière est 4 fois supérieur aux modèles précédents.  Ainsi, et même dans l'obscurité, les enregistrements pourrons présenter des images de qualité avec beaucoup de précision.</p>
<p style="text-align: justify;">Autres caractéristiques intéressantes, le Zoom maximal a été augmenté ce qui permet de couvrir une plus grande surface avec une seule caméra. Il faut rappeler que Mobotix s’appuie sur l'argument que plus une caméra présentera une précision d'image importante, moins leurs clients auront besoin d'en avoir en nombre. Ainsi, une caméra de qualité supérieur remplacera 3 autres caméras de qualité inférieur.</p>
<p style="text-align: justify;"><a title="un titre explicatif" href="http://www.mobotix.com/fre_CH/Soci%C3%A9t%C3%A9/Nouvelles/Nouvelles-2013/Capteur-MOBOTIX-5%C2%A0m%C3%A9gapixels%C2%A0-plus-lumineux%2C-plus-rapide%2C-plus-pr%C3%A9cis" target="_blank" rel="dofollow">Source</a></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>110</wp:post_id>
		<wp:post_date>2013-05-28 15:30:43</wp:post_date>
		<wp:post_date_gmt>2013-05-28 14:30:43</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>mobotix-augmente-une-nouvelle-fois-la-resolution-de-ses-modeles-mais-pourquoi</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="camera"><![CDATA[caméra]]></category>
		<category domain="post_tag" nicename="haute-resolution"><![CDATA[haute résolution]]></category>
		<category domain="category" nicename="infrastructures"><![CDATA[Infrastructures]]></category>
		<category domain="post_tag" nicename="mobotix"><![CDATA[Mobotix]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<category domain="post_tag" nicename="video"><![CDATA[Vidéo]]></category>
		<category domain="post_tag" nicename="videosurveillance"><![CDATA[vidéosurveillance]]></category>
		<wp:postmeta>
			<wp:meta_key>_wpas_skip_3898347</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>publicize_reach</wp:meta_key>
			<wp:meta_value><![CDATA[a:2:{s:7:"twitter";a:1:{i:3659558;i:22;}s:2:"wp";a:1:{i:0;i:0;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>publicize_twitter_user</wp:meta_key>
			<wp:meta_value><![CDATA[Aquastar_IT]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wpas_done_3659558</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_publicize_done_external</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{s:7:"twitter";a:1:{i:821138382;b:1;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wpas_skip_3659558</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[69]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[mobotix]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438936]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"63.628103138633904";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:17:"46.84550917247448";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:17:"39.87167794753016";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:17:"39.28981630063375";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:17:"35.16072226322515";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"28.91764568364386";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1776";s:5:"score";s:17:"28.51988131229105";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:18:"27.139299746405847";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2436";s:5:"score";s:18:"18.893051971358627";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"17.835053511715373";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"23.83117474141067";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"19.166713023125897";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:17:"18.43422423474898";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:17:"17.26004901622127";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"13.407720360169337";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:18:"12.956180014523285";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"39.40706686769222";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1776";s:5:"score";s:17:"36.57375600691292";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"31.336915575791686";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:17:"30.94941147526299";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"27.969733485054096";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:18:"26.706811391918357";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:18:"21.561120442892435";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"19.92490547412162";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:12:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"63.44393754787491";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:17:"46.55612499103857";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:18:"39.616120452016176";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:17:"39.00043212031176";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:17:"34.95689785056297";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"28.67999458639697";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1776";s:5:"score";s:18:"28.453276569212598";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:18:"27.073083492506775";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2436";s:5:"score";s:17:"18.93374883704036";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:17:"17.73314130534144";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:17:"16.94929803666494";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:17:"16.94929803666494";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Sage : l&#039;e-facture  </title>
		<link>http://www.it-news.fr/trois-logiciels-sage-pour-pme-dematerialisent-les-factures-en-ligne/</link>
		<pubDate>Wed, 29 May 2013 08:22:41 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?p=126</guid>
		<description></description>
		<content:encoded><![CDATA[<h2 style="text-align: justify;"><span style="text-decoration: underline;"><span style="font-size: 80%; line-height: 2em;"><a href="http://aquastarconsultingblog.wordpress.com/2013/05/29/trois-logiciels-sage-pour-pme-dematerialisent-les-factures-en-ligne/"><img class="alignleft size-full wp-image-302" alt="Solution e-facture SAGE" src="http://www.it-news.fr/wp-content/uploads/2013/06/images1-e1370872051544.jpg" width="170" height="277" /></a>L'e-facture, un outil simple et efficace :</span></span></h2>
<p style="text-align: justify;">Sage propose un nouveau service en ligne compatible sur trois de leurs logiciels de gestion qui <strong>dématérialise les factures</strong>. Qu'elles proviennent des fournisseurs ou qu'elles soient à destination des clients, cette nouvelle fonction affiche des avantages certains.</p>
<p style="text-align: justify;"></p>
<p style="text-align: justify;"><!--more Lire la suite--></p>
<p style="text-align: justify;"></p>
<p style="text-align: justify;"><span style="text-decoration: underline;"><strong>Auteur :</strong></span> SAGE</p>
<p style="text-align: justify;"><strong><span style="text-decoration: underline;">Objectifs :</span></strong> Face au développement des factures en ligne, Sage souhaite donc aller dans ce sens et proposer une solution plus facile à mettre en place et moins onéreuse que les procédures EDI déjà existantes.</p>
<p style="text-align: justify;"><span style="text-decoration: underline;"><strong>Moyens :</strong></span> C'est un service qui est proposé en ligne par abonnement annuel. Compatible avec trois de leurs logiciels.</p>
<p style="text-align: justify;"><span style="text-decoration: underline;"><strong>Coûts :</strong></span> L'abonnement en ligne est de 200€ HT par an. Toute fois, il est offert pendant un an à condition que l'inscription se fasse avant le 30 Septembre 2013.</p>
<a title="un titre explicatif" href="http://www.lemondeinformatique.fr/actualites/lire-sage-dematerialise-les-factures-en-ligne-sur-trois-logiciels-pour-pme-53429.html" target="_blank" rel="dofollow">Source</a>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>126</wp:post_id>
		<wp:post_date>2013-05-29 09:22:41</wp:post_date>
		<wp:post_date_gmt>2013-05-29 08:22:41</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>trois-logiciels-sage-pour-pme-dematerialisent-les-factures-en-ligne</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="dematerialisation"><![CDATA[dématérialisation]]></category>
		<category domain="post_tag" nicename="efacture"><![CDATA[efacture]]></category>
		<category domain="post_tag" nicename="facture"><![CDATA[Facture]]></category>
		<category domain="category" nicename="gestion-commerciale"><![CDATA[Gestion commerciale]]></category>
		<category domain="post_tag" nicename="logiciel"><![CDATA[logiciel]]></category>
		<category domain="post_tag" nicename="sage"><![CDATA[sage]]></category>
		<category domain="category" nicename="solutions-de-gestion"><![CDATA[Solutions de gestion]]></category>
		<wp:postmeta>
			<wp:meta_key>_wpas_skip_3898347</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>publicize_reach</wp:meta_key>
			<wp:meta_value><![CDATA[a:2:{s:7:"twitter";a:1:{i:3659558;i:22;}s:2:"wp";a:1:{i:0;i:0;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>publicize_twitter_user</wp:meta_key>
			<wp:meta_value><![CDATA[Aquastar_IT]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wpas_done_3659558</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_publicize_done_external</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{s:7:"twitter";a:1:{i:821138382;b:1;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wpas_skip_3659558</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[66]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[facture]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438849]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:18:"162.81219723069364";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"144.2065740065783";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2319";s:5:"score";s:17:"96.16962290624296";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:17:"80.86187645863765";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1588";s:5:"score";s:17:"75.60539873819297";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1728";s:5:"score";s:17:"74.41477397756388";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"334";s:5:"score";s:17:"61.65612003144279";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"59.38324736525417";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:3:"336";s:5:"score";s:18:"49.348409110924145";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2406";s:5:"score";s:18:"43.457026455110224";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"54.93848656216046";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:17:"27.40246634870534";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"23.648265681061453";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1924";s:5:"score";s:17:"17.12817231515275";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:17:"17.12027316076411";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"15.982574233264081";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[302]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:18:"101.62770217585644";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:15:"90.431726365838";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1588";s:5:"score";s:17:"75.98211967459385";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1728";s:5:"score";s:17:"74.94086042828584";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"334";s:5:"score";s:17:"66.19490057623148";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"336";s:5:"score";s:18:"52.022073408415494";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:16:"47.6382506531306";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2406";s:5:"score";s:17:"47.02000134512542";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>ARUBA Networks améliore ses contrôleurs Wifi</title>
		<link>http://www.it-news.fr/aruba-networks-ameliore-ses-controleurs-wifi/</link>
		<pubDate>Wed, 29 May 2013 09:37:28 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?p=133</guid>
		<description></description>
		<content:encoded><![CDATA[<h2><span style="text-decoration: underline;"><span style="font-size: 80%; line-height: 2em;"><a href="http://aquastarconsultingblog.wordpress.com/2013/05/29/aruba-networks-ameliore-ses-controleurs-wifi/"><img class="alignleft size-full wp-image-299" title="Aruba Networks améliore ses contrôleurs Wifi" alt="Aruba solution Wifi" src="http://www.it-news.fr/wp-content/uploads/2013/06/mdl-telecom-aruba-networks-logo-e1370871602287.jpg" width="190" height="75" /></a>La gamme 7200 des contrôleurs WIFI améliore son DPI (Deep Pack Inspection) :</span></span></h2>
<p style="text-align: justify;">Souhaitant constamment améliorer la performance de ses réseaux Wifi et leur sécurité, Aruba Networks estime qu'un de ses contrôleurs Wifi est désormais 11 fois plus rapide qu'uncontrôleur Cisco. Ayant télécharger un fichier en 12 secondes depuis Box.com, le contrôleur Cisco 5508 devrait à contrario en mettre 129.</p>
<!--more Lire la suite-->
<p style="text-align: justify;">L'amélioration de l'analyse et le contrôle des paquets réseaux en n'aurait donc jamais été aussi rapide. La performance ne s'arrêterait pas là et permettrait aussi de supporter plus de 32 000 connexions en simultanées. Ils revendiquent ainsi améliorer considérablement leurs services et le débit de leurs réseaux. L'ensemble de ces outils seront compatibles avec les futurs point d'accès standard WiFi, 802.11ac.</p>
<p style="text-align: justify;">Le coût d'un contrôleur de ce type s'élèverait à 15 900€.</p>
<a title="un titre explicatif" href="http://www.lemondeinformatique.fr/actualites/lire-aruba-ameliore-la-delivrance-d-applications-avec-des-controleurs-wifi-51923.html" target="_blank" rel="dofollow">Source</a>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>133</wp:post_id>
		<wp:post_date>2013-05-29 10:37:28</wp:post_date>
		<wp:post_date_gmt>2013-05-29 09:37:28</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>aruba-networks-ameliore-ses-controleurs-wifi</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="aruba-networks"><![CDATA[Aruba networks]]></category>
		<category domain="post_tag" nicename="connexion"><![CDATA[connexion]]></category>
		<category domain="post_tag" nicename="controleurs-wifi"><![CDATA[contrôleurs wifi]]></category>
		<category domain="post_tag" nicename="data-communications"><![CDATA[Data Communications]]></category>
		<category domain="post_tag" nicename="debit"><![CDATA[débit]]></category>
		<category domain="post_tag" nicename="gamme-7200"><![CDATA[gamme 7200]]></category>
		<category domain="category" nicename="infrastructures"><![CDATA[Infrastructures]]></category>
		<category domain="post_tag" nicename="performance-reseau"><![CDATA[performance réseau]]></category>
		<category domain="category" nicename="reseaux-et-mobilite"><![CDATA[Réseaux et mobilité]]></category>
		<category domain="post_tag" nicename="wi-fi"><![CDATA[Wi-Fi]]></category>
		<wp:postmeta>
			<wp:meta_key>_wpas_skip_3898347</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wpas_skip_3659558</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>publicize_reach</wp:meta_key>
			<wp:meta_value><![CDATA[a:2:{s:7:"twitter";a:1:{i:3659558;i:22;}s:2:"wp";a:1:{i:0;i:0;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>publicize_twitter_user</wp:meta_key>
			<wp:meta_value><![CDATA[Aquastar_IT]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wpas_done_3659558</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_publicize_done_external</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{s:7:"twitter";a:1:{i:821138382;b:1;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[59]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[contrôleurs Wifi]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437885]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2232";s:5:"score";s:16:"276.383783216495";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2030";s:5:"score";s:17:"145.5503606650448";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2251";s:5:"score";s:18:"104.25159717960398";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"760";s:5:"score";s:17:"78.32057236006995";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2362";s:5:"score";s:17:"78.18869788470298";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"68.83658240170254";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"323";s:5:"score";s:16:"50.7867358882841";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"849";s:5:"score";s:17:"38.42787632281693";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2400";s:5:"score";s:17:"29.49395868258091";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"27.145865958265198";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2232";s:5:"score";s:17:"89.83648563918612";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2030";s:5:"score";s:17:"51.62279926773195";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2251";s:5:"score";s:17:"39.05357168744207";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"20.28284094446252";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:17:"9.631920938381915";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:17:"9.631920938381915";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2232";s:5:"score";s:18:"162.39583640851708";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2030";s:5:"score";s:17:"89.77612689461643";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"760";s:5:"score";s:17:"86.40622889088478";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2251";s:5:"score";s:17:"66.21042710592806";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"323";s:5:"score";s:18:"50.800170089185286";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"849";s:5:"score";s:17:"43.33845372468947";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"37.564598198095275";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2362";s:5:"score";s:18:"33.105213552964024";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[299]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Administration publique</title>
		<link>http://www.it-news.fr/temoignages-clients/administration-publique/</link>
		<pubDate>Mon, 17 Jun 2013 09:15:00 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?page_id=411</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align:justify;">Veuillez trouver ci-dessous une liste non exhaustive de nos références clients dans le domaine public. Vous souhaitez en savoir plus, cliquez sur l'un des logos.</p>
<p style="text-align:justify;"><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=public"><img class="alignleft size-full wp-image-415" alt="cci-lille" src="http://www.it-news.fr/wp-content/uploads/2013/06/cci-lille.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=public"><img class="alignleft size-full wp-image-416" alt="communaute-agglomeration-du-douaisis" src="http://www.it-news.fr/wp-content/uploads/2013/06/communaute-agglomeration-du-douaisis.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=public"><img class="alignleft size-full wp-image-417" alt="consuel" src="http://www.it-news.fr/wp-content/uploads/2013/06/consuel.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=public"><img class="alignleft size-full wp-image-418" alt="CUDL-dunkerque" src="http://www.it-news.fr/wp-content/uploads/2013/06/cudl-dunkerque.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=public"><img class="alignleft size-full wp-image-419" alt="LMH" src="http://www.it-news.fr/wp-content/uploads/2013/06/lmh.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=public"><img class="alignleft size-full wp-image-420" alt="logo-CENTRE-GESTION-FONCTION-PUBLIQUE-59" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-centre-gestion-fonction-publique-59.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=public"><img class="alignleft size-full wp-image-421" alt="logo-leers" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-leers.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=public"><img class="alignleft size-full wp-image-422" alt="logo-mairie-anzin" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-mairie-anzin.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=public"><img class="alignleft size-full wp-image-423" alt="logo-mairie-de-divion" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-mairie-de-divion.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=public"><img class="alignleft size-full wp-image-424" alt="logo-mairie-de-lomme" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-mairie-de-lomme.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=public"><img class="alignleft size-full wp-image-425" alt="logo-sivom" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-sivom.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=public"><img class="alignleft size-full wp-image-426" alt="ville-de-lille" src="http://www.it-news.fr/wp-content/uploads/2013/06/ville-de-lille.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=public"><img class="alignleft size-full wp-image-427" alt="villedk" src="http://www.it-news.fr/wp-content/uploads/2013/06/villedk.jpg" width="150" height="98" /></a></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>411</wp:post_id>
		<wp:post_date>2013-06-17 10:15:00</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:15:00</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>administration-publique</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>36</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>page</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_wp_page_template</wp:meta_key>
			<wp:meta_value><![CDATA[default]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_publicize_pending</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Industrie</title>
		<link>http://www.it-news.fr/temoignages-clients/industrie/</link>
		<pubDate>Mon, 17 Jun 2013 09:27:41 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?page_id=431</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align:justify;">Veuillez trouver ci-dessous une liste non exhaustive de nos références clients dans le domaine de l'industrie. Vous souhaitez en savoir plus, cliquez sur l’un des logos.</p>
<p style="text-align:justify;"><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=industrie"><img class="alignleft size-full wp-image-434" alt="SMP" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-smp.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=industrie"><img class="alignleft size-full wp-image-435" alt="sep-industrie" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-sep-industrie.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=industrie"><img class="alignleft size-full wp-image-436" alt="micropross" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-micropross.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=industrie"><img class="alignleft size-full wp-image-437" alt="logo-mayr-france" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-mayr-france.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=industrie"><img class="alignleft size-full wp-image-438" alt="logo-howden" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-howden.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=industrie"><img class="alignleft size-full wp-image-439" alt="logo-grain-dor-gel" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-grain-dor-gel.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=industrie"><img class="alignleft size-full wp-image-440" alt="logo-eurovanille" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-eurovanille.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=industrie"><img class="alignleft size-full wp-image-441" alt="logo-euroben" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-euroben.jpg" width="150" height="98" /></a></p>
<p style="text-align:justify;"><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=industrie"><img class="alignleft size-full wp-image-442" alt="logo-duflot-industrie" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-duflot-industrie.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=industrie"><img class="alignleft size-full wp-image-443" alt="logo-castanet" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-castanet.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=industrie"><img class="alignleft size-full wp-image-444" alt="logo-carlier-plastique" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-carlier-plastique.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=industrie"><img class="alignleft size-full wp-image-445" alt="logo-cadence-industrie" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-cadence-industrie.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=industrie"><img class="alignleft size-full wp-image-446" alt="logo-adconcept" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-adconcept.jpg" width="150" height="98" /></a></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>431</wp:post_id>
		<wp:post_date>2013-06-17 10:27:41</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:27:41</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>industrie</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>36</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>page</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_wp_page_template</wp:meta_key>
			<wp:meta_value><![CDATA[default]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_publicize_pending</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Santé</title>
		<link>http://www.it-news.fr/temoignages-clients/sante/</link>
		<pubDate>Mon, 17 Jun 2013 09:41:51 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?page_id=450</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align:justify;">Veuillez trouver ci-dessous une liste non exhaustive de nos références clients dans le domaine de la santé. Vous souhaitez en savoir plus, cliquez sur l’un des logos.</p>
<p style="text-align:justify;"><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=sante"><img class="alignleft size-full wp-image-453" alt="CH-armentieres" src="http://www.it-news.fr/wp-content/uploads/2013/06/ch-armentieres.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=sante"><img class="alignleft size-full wp-image-454" alt="CH-bailleul" src="http://www.it-news.fr/wp-content/uploads/2013/06/ch-bailleul.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=sante"><img class="alignleft size-full wp-image-455" alt="CH-Bethune" src="http://www.it-news.fr/wp-content/uploads/2013/06/ch-bethune.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=sante"><img class="alignleft size-full wp-image-456" alt="CH-calais" src="http://www.it-news.fr/wp-content/uploads/2013/06/ch-calais.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=sante"><img class="alignleft size-full wp-image-457" alt="CH-cambrai" src="http://www.it-news.fr/wp-content/uploads/2013/06/ch-cambrai.jpg" width="150" height="98" /></a><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=sante"><img class="alignleft size-full wp-image-458" alt="CH-Carvin" src="http://www.it-news.fr/wp-content/uploads/2013/06/ch-carvin.jpg" width="150" height="98" /></a> <a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=sante"><img class="alignleft size-full wp-image-459" alt="CH-lequenoy" src="http://www.it-news.fr/wp-content/uploads/2013/06/ch-lequenoy.jpg" width="150" height="98" /></a> <a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=sante"><img class="alignleft size-full wp-image-460" alt="CH-Sambre-Avesnois" src="http://www.it-news.fr/wp-content/uploads/2013/06/ch-sambre-avesnois.jpg" width="150" height="98" /></a> <a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=sante"><img class="alignleft size-full wp-image-461" alt="CH-seclin" src="http://www.it-news.fr/wp-content/uploads/2013/06/ch-seclin.jpg" width="150" height="98" /></a> <a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=sante"><img class="alignleft size-full wp-image-462" alt="CH-St-amand" src="http://www.it-news.fr/wp-content/uploads/2013/06/ch-st-amand.jpg" width="150" height="98" /></a> <a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=sante"><img class="alignleft size-full wp-image-463" alt="clinique-acacia-touquet" src="http://www.it-news.fr/wp-content/uploads/2013/06/clinique-acacia-touquet.jpg" width="150" height="98" /></a> <a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=sante"><img class="alignleft size-full wp-image-464" alt="clinique-anne-artois" src="http://www.it-news.fr/wp-content/uploads/2013/06/clinique-anne-artois.jpg" width="150" height="98" /></a> <a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=sante"><img class="alignleft size-full wp-image-465" alt="clinique-cote-dopale" src="http://www.it-news.fr/wp-content/uploads/2013/06/clinique-cote-dopale.jpg" width="150" height="98" /></a> <a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=sante"><img class="alignleft size-full wp-image-466" alt="clinique-courlancy" src="http://www.it-news.fr/wp-content/uploads/2013/06/clinique-courlancy.jpg" width="150" height="98" /></a> <a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=sante"><img class="alignleft size-full wp-image-467" alt="clinique-des-2-caps" src="http://www.it-news.fr/wp-content/uploads/2013/06/clinique-des-2-caps.jpg" width="150" height="98" /></a> <a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=sante"><img class="alignleft size-full wp-image-468" alt="clinique-villeneuve-dascq" src="http://www.it-news.fr/wp-content/uploads/2013/06/clinique-villeneuve-dascq.jpg" width="150" height="98" /></a> <a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=sante"><img class="alignleft size-full wp-image-469" alt="epsm-agglomeration-lilloise" src="http://www.it-news.fr/wp-content/uploads/2013/06/epsm-agglomeration-lilloise.jpg" width="150" height="98" /></a> <a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=sante"><img class="alignleft size-full wp-image-470" alt="EPSM-Flandres" src="http://www.it-news.fr/wp-content/uploads/2013/06/epsm-flandres.jpg" width="150" height="98" /></a> <a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=sante"><img class="alignleft size-full wp-image-471" alt="EPSM-Lille" src="http://www.it-news.fr/wp-content/uploads/2013/06/epsm-lille.jpg" width="150" height="98" /></a> <a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=sante"><img class="alignleft size-full wp-image-472" alt="hopital-de-comines" src="http://www.it-news.fr/wp-content/uploads/2013/06/hopital-de-comines.jpg" width="150" height="98" /></a> <a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=sante"><img class="alignleft size-full wp-image-473" alt="HOPITAL-DE-FELLERIES-LIESSIES" src="http://www.it-news.fr/wp-content/uploads/2013/06/hopital-de-felleries-liessies.jpg" width="150" height="98" /></a> <a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=sante"><img class="alignleft size-full wp-image-474" alt="logo-ch-tourcoing" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-ch-tourcoing.jpg" width="150" height="98" /></a> <a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=sante"><img class="alignleft size-full wp-image-475" alt="logo-clinique-lomme" src="http://aquastarcon
sultingblog.files.wordpress.com/2013/06/logo-clinique-lomme.jpg" width="150" height="98" /></a> <a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=sante"><img class="alignleft size-full wp-image-476" alt="logo-FAM-LA-VIE-DEVANT-SOI" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-fam-la-vie-devant-soi.jpg" width="150" height="98" /></a> <a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=sante"><img class="alignleft size-full wp-image-477" alt="logo-fongecif-npdc" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-fongecif-npdc.jpg" width="150" height="98" /></a> <a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=sante"><img class="alignleft size-full wp-image-478" alt="logo-samps-asso" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-samps-asso.jpg" width="150" height="98" /></a></p>
<p style="text-align:justify;"></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>450</wp:post_id>
		<wp:post_date>2013-06-17 10:41:51</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:41:51</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>sante</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>36</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>page</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_wp_page_template</wp:meta_key>
			<wp:meta_value><![CDATA[default]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_publicize_pending</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Services</title>
		<link>http://www.it-news.fr/temoignages-clients/services/</link>
		<pubDate>Mon, 17 Jun 2013 09:56:06 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?page_id=493</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align:justify;">Veuillez trouver ci-dessous une liste non exhaustive de nos références clients dans le domaine du Service. Vous souhaitez en savoir plus, cliquez sur l’un des logos.</p>
<p style="text-align:justify;"><a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=services"><img class="alignleft size-full wp-image-482" alt="logo-unis" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-unis.jpg" width="150" height="98" /></a> <a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=services"><img class="alignleft size-full wp-image-483" alt="Logo-teinturerie-lenfant" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-teinturerie-lenfant.jpg" width="150" height="98" /></a> <a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=services"><img class="alignleft size-full wp-image-492" alt="logo-acean-sacel" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-acean-sacel.jpg" width="150" height="98" /></a> <a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=services"><img class="alignleft size-full wp-image-491" alt="logo-crepim" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-crepim.jpg" width="150" height="98" /></a> <a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=services"><img class="alignleft size-full wp-image-490" alt="logo-critm2a" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-critm2a.jpg" width="150" height="98" /></a> <a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=services"><img class="alignleft size-full wp-image-489" alt="Logo-Dimelco" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-dimelco.jpg" width="150" height="98" /></a> <a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=services"><img class="alignleft size-full wp-image-488" alt="logo-domoveil" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-domoveil.jpg" width="150" height="98" /></a> <a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=services"><img class="alignleft size-full wp-image-487" alt="logo-eurasante-gie" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-eurasante-gie.jpg" width="150" height="98" /></a> <a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=services"><img class="alignleft size-full wp-image-486" alt="logo-mediama" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-mediama.jpg" width="150" height="98" /></a> <a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=services"><img class="alignleft size-full wp-image-485" alt="logo-office-de-la-jeunesse-bruay-la-brussiere" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-office-de-la-jeunesse-bruay-la-brussiere.jpg" width="150" height="98" /></a> <a href="http://new.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=services"><img class="alignleft size-full wp-image-484" alt="logo-sacree-prod-cesam-international" src="http://www.it-news.fr/wp-content/uploads/2013/06/logo-sacree-prod-cesam-international.jpg" width="150" height="98" /></a></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>493</wp:post_id>
		<wp:post_date>2013-06-17 10:56:06</wp:post_date>
		<wp:post_date_gmt>2013-06-17 09:56:06</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>services</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>36</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>page</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_wp_page_template</wp:meta_key>
			<wp:meta_value><![CDATA[default]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_publicize_pending</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Témoignages clients</title>
		<link>http://www.it-news.fr/temoignages-clients-2/</link>
		<pubDate>Wed, 17 Jul 2013 06:56:29 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?page_id=662</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>662</wp:post_id>
		<wp:post_date>2013-07-17 07:56:29</wp:post_date>
		<wp:post_date_gmt>2013-07-17 06:56:29</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>temoignages-clients-2</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>page</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_publicize_pending</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_page_template</wp:meta_key>
			<wp:meta_value><![CDATA[default]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Gestion - Métier</title>
		<link>http://www.it-news.fr/temoignages-clients-2/gestion-metier/</link>
		<pubDate>Wed, 17 Jul 2013 07:01:16 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?page_id=667</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>667</wp:post_id>
		<wp:post_date>2013-07-17 08:01:16</wp:post_date>
		<wp:post_date_gmt>2013-07-17 07:01:16</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>gestion-metier</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>662</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>page</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_publicize_pending</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_page_template</wp:meta_key>
			<wp:meta_value><![CDATA[default]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Sécurité</title>
		<link>http://www.it-news.fr/temoignages-clients-2/securite/</link>
		<pubDate>Wed, 17 Jul 2013 07:01:46 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?page_id=669</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>669</wp:post_id>
		<wp:post_date>2013-07-17 08:01:46</wp:post_date>
		<wp:post_date_gmt>2013-07-17 07:01:46</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>securite</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>662</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>page</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_publicize_pending</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_page_template</wp:meta_key>
			<wp:meta_value><![CDATA[default]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Système &amp; Réseau</title>
		<link>http://www.it-news.fr/temoignages-clients-2/systeme-reseau/</link>
		<pubDate>Wed, 17 Jul 2013 07:03:03 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?page_id=673</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>673</wp:post_id>
		<wp:post_date>2013-07-17 08:03:03</wp:post_date>
		<wp:post_date_gmt>2013-07-17 07:03:03</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>systeme-reseau</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>662</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>page</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_publicize_pending</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_page_template</wp:meta_key>
			<wp:meta_value><![CDATA[default]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Mobilité</title>
		<link>http://www.it-news.fr/temoignages-clients-2/mobilite/</link>
		<pubDate>Wed, 17 Jul 2013 07:03:45 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?page_id=675</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="padding-left:30px;text-align:justify;">- <span style="text-decoration:underline;"><strong><span style="font-size:125%;line-height:2em;">L'EPSM (Etablissement Public de Santé Mentale) des Flandres</span></strong></span></p>
<p style="text-align:justify;"><a style="line-height:1.5;" href="http://new.aquastar-consulting.com/images/plaquettes/Etude-de-cas-EPSM-Flandres.pdf"><img class="alignleft size-full wp-image-678" alt="PDF" src="http://www.it-news.fr/wp-content/uploads/2013/07/iconepdf.jpg" width="40" height="40" /></a>Possédant plus d'une trentaine de structures, le siège de cette organisation se trouvant à Bailleul, souhaitait développer et rendre disponible les accès réseau dans chacun de ses bâtiments. Dans le même temps, l'établissement a demander à mettre en place un PRA (Plan de Reprise d'Activité).</p>
<p style="text-align:justify;">Technologies utilisées : <a href="http://new.aquastar-consulting.com/index.php/societe/partenaires/infrastructures/aruba-networks" target="_blank">ARUBA Networks</a> &amp; <a href="http://new.aquastar-consulting.com/index.php/societe/partenaires/infrastructures/ucopia" target="_blank">Ucopia</a>.</p>
<p style="text-align:justify;"><a href="http://new.aquastar-consulting.com/images/plaquettes/Etude-de-cas-EPSM-Flandres.pdf" target="_blank">Découvrez le témoignage de ce client.</a></p>
<p style="text-align:justify;padding-left:30px;">- <span style="text-decoration:underline;"><strong><span style="font-size:125%;line-height:2em;">La mairie de LEERS</span></strong></span></p>
<p style="text-align:justify;"><a href="http://new.aquastar-consulting.com/images/plaquettes/Etude-de-cas-Mairie-de-Leers.pdf"><img class="alignleft size-full wp-image-678" alt="PDF" src="http://www.it-news.fr/wp-content/uploads/2013/07/iconepdf.jpg" width="40" height="40" /></a>Avec environ 10 000 habitants, proche de Lille, et 14 sites annexes, la mairie souhaitait raccorder l'ensemble de ses sites à son site principal.</p>
<p style="text-align:justify;">Technologie utilisée : <a href="http://new.aquastar-consulting.com/index.php/societe/partenaires/infrastructures/aruba-networks" target="_blank">ARUBA Networks</a>.</p>
<p style="text-align:justify;"><a href="http://new.aquastar-consulting.com/images/plaquettes/Etude-de-cas-Mairie-de-Leers.pdf" target="_blank">Découvrez le témoignage de ce client.</a></p>
<p style="text-align:justify;padding-left:30px;"><strong>-<span style="text-decoration:underline;"><strong><span style="font-size:125%;line-height:2em;"> Les magasins "Tape à l’œil" : </span></strong></span></strong></p>
<p style="text-align:justify;"><a href="http://new.aquastar-consulting.com/images/plaquettes/Etude-de-cas-Tape-a-l-oeil.pdf"><img class="alignleft size-full wp-image-678" alt="PDF" src="http://www.it-news.fr/wp-content/uploads/2013/07/iconepdf.jpg" width="40" height="40" /></a>Enseigne du groupe "Mulliez", plus de 200 enseignes en France et 80 dans le reste du monde, cette entreprise ne cesse de se développer. L'objectif du DSI était de réduire les coûts liés au MPLS (MultiProtocol Label Switching).</p>
<p style="text-align:justify;">technologie utilisée : <a href="http://new.aquastar-consulting.com/index.php/societe/partenaires/infrastructures/aruba-networks" target="_blank">ARUBA Networks</a>.</p>
<p style="text-align:justify;"><a href="http://new.aquastar-consulting.com/images/plaquettes/Etude-de-cas-Tape-a-l-oeil.pdf" target="_blank">Découvrez le témoignage de ce client. </a></p>
<p style="text-align:justify;"></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>675</wp:post_id>
		<wp:post_date>2013-07-17 08:03:45</wp:post_date>
		<wp:post_date_gmt>2013-07-17 07:03:45</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>mobilite</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>662</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>page</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_publicize_pending</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_page_template</wp:meta_key>
			<wp:meta_value><![CDATA[default]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Merci pour votre inscription !</title>
		<link>http://www.it-news.fr/merci-pour-votre-inscription/</link>
		<pubDate>Wed, 21 Aug 2013 10:23:58 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?page_id=916</guid>
		<description></description>
		<content:encoded><![CDATA[N'oubliez pas de confirmer en cliquant sur le lien que vous venez de recevoir par e-mail.

A bientôt sur notre blog !

&nbsp;]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>916</wp:post_id>
		<wp:post_date>2013-08-21 11:23:58</wp:post_date>
		<wp:post_date_gmt>2013-08-21 10:23:58</wp:post_date_gmt>
		<wp:comment_status>closed</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>merci-pour-votre-inscription</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>page</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_page_template</wp:meta_key>
			<wp:meta_value><![CDATA[default]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Inscription Newsletter</title>
		<link>http://www.it-news.fr/inscription-newsletter/</link>
		<pubDate>Thu, 19 Sep 2013 14:02:34 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?page_id=1049</guid>
		<description></description>
		<content:encoded><![CDATA[Vous souhaitez recevoir les actualités informatiques et plus d'informations sur Aquastar consulting, merci de remplir les champs ci-dessous.]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1049</wp:post_id>
		<wp:post_date>2013-09-19 15:02:34</wp:post_date>
		<wp:post_date_gmt>2013-09-19 14:02:34</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>inscription-newsletter</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>page</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_page_template</wp:meta_key>
			<wp:meta_value><![CDATA[default]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Partenaire Web </title>
		<link>http://www.it-news.fr/partenaire-web/</link>
		<pubDate>Thu, 10 Oct 2013 13:23:30 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?page_id=1116</guid>
		<description></description>
		<content:encoded><![CDATA[Nos Partenaires:

<address><a href="http://www.sage.fr/fr">www.sage.fr</a></address><address><a href="http://www.aeroscout.com/">www.aeroscout.com</a></address><address><a href="http://www.alvarion.com/">www.alvarion.com</a></address><address><a href="http://www.arubanetworks.com/">www.arubanetworks.com</a></address><address><a href="https://www.barracuda.com/">www.barracuda.com</a></address><address><cite><a href="http://www.ca.com/fr/default.aspx">www.ca.com</a></cite></address><address><a href="http://www.citrix.fr/">www.citrix.fr</a></address><address><a href="http://www.imperva.com/index.html">www.imperva.com</a></address><address><a href="http://www.juniper.net/us/en/">www.juniper.net</a></address><address><cite><a href="http://www.kwartz.com/">www.kwartz.com</a></cite></address><address><a href="http://www.microsoft.com/fr-fr/default.aspx">www.microsoft.com</a></address><address><a href="http://www.mobotix.com/fre_FR/">www.mobotix.com</a></address><address><a href="http://www.netasq.com/fr/">www.netasq.com</a></address><address><a href="https://www.paloaltonetworks.com/">www.paloalton</a><a href="https://www.paloaltonetworks.com/">etworks.com</a></address><address><a href="http://www.securactive.net/">www.securactive.net</a></address><address><a href="http://www.sophos.com/fr-fr/">www.sophos.com</a></address><address><a href="http://www.ucopia.com/">www.ucopia.com</a></address><address><a href="http://www.vade-retro.com/fr/">www.vade-retro.com</a></address><address><a href="http://www.vmware.com/fr/">www.vmware.com</a></address><address><a href="http://www.coservit.fr/">www.coservit.fr</a></address><address><a href="http://www.sirrus.fr/">www.sirrus.fr</a></address><address><a href="http://www.payevsp.com/">www.payevsp.com</a></address><address><a href="http://www.agbconseil.fr/">www.agbconseil.fr</a></address><address><a href="http://www.nrc.fr/">www.nrc.fr</a></address><address><a href="http://www.documation.fr">www.documation.fr</a></address><address><a title="Annuaire" href="http://annuaire.secous.com/">annuaire secous</a></address><address><a href="http://www.netexplorer.fr/" target="_blank">www.netexplorer.fr </a></address><address> </address>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1116</wp:post_id>
		<wp:post_date>2013-10-10 14:23:30</wp:post_date>
		<wp:post_date_gmt>2013-10-10 13:23:30</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>partenaire-web</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>page</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_page_template</wp:meta_key>
			<wp:meta_value><![CDATA[default]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Événements</title>
		<link>http://www.it-news.fr/evenements/</link>
		<pubDate>Wed, 23 Oct 2013 08:00:01 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?page_id=1230</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1230</wp:post_id>
		<wp:post_date>2013-10-23 09:00:01</wp:post_date>
		<wp:post_date_gmt>2013-10-23 08:00:01</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>evenements</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>page</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_page_template</wp:meta_key>
			<wp:meta_value><![CDATA[default]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>test</title>
		<link>http://www.it-news.fr/test/</link>
		<pubDate>Fri, 08 Nov 2013 13:25:51 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?page_id=1417</guid>
		<description></description>
		<content:encoded><![CDATA[[contact-form-7 id="1430" title="Test"]]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1417</wp:post_id>
		<wp:post_date>2013-11-08 14:25:51</wp:post_date>
		<wp:post_date_gmt>2013-11-08 13:25:51</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>test</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>page</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_page_template</wp:meta_key>
			<wp:meta_value><![CDATA[default]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Vidéos </title>
		<link>http://www.it-news.fr/videos/</link>
		<pubDate>Fri, 07 Feb 2014 08:40:36 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?page_id=2027</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2027</wp:post_id>
		<wp:post_date>2014-02-07 09:40:36</wp:post_date>
		<wp:post_date_gmt>2014-02-07 08:40:36</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>videos</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>page</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_page_template</wp:meta_key>
			<wp:meta_value><![CDATA[default]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Les entreprises sous-utilisent les produits Office</title>
		<link>http://www.it-news.fr/?p=2474</link>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2474</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;">En entreprise, 2/3 des utilisateurs n’utilisent Office que pour visualiser ou éditer un document. Ces utilisateurs, infidèles, pourraient se tourner vers des solutions alternatives plus économiques.</p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;">Une étude relative à l’usage réelle d’Office dans les entreprises et produite par Softwatch, un éditeur spécialisé dans les solutions d’optimisation des dépenses de licences, explique que les entreprises n’utilisent en moyenne Office que 48 minutes par jour.</p>
<p style="text-align: justify;">Basée sur une observation de trois mois des comportements de 148.500 salariés de 51 entreprises de plus de 500 employés, cette étude révèle qu’Outlook représente 68% de l’usage quotidien d’Office (avec 33 minutes en moyenne par jour).</p>
<p style="text-align: justify;"></p>
<p style="text-align: justify;">Un point de l’étude surprend : la moitié des utilisateurs d’Office n’utilisent pas du tout PowerPoint ! En ce qui concerne Excel, un tiers des salariés ne l’utilisent pas ou ne l’emploient que pour visualiser le document sans pour autant le modifier.</p>
<p style="text-align: justify;">Softwatch observe que l’utilisation intensive d’une application d’Office ne concerne qu’un tiers des 32% des utilisateurs, c’est-à-dire environ 2% ! L’étude définit une utilisation intensive comme un emploi des applications</p>
<p style="text-align: justify;">Cette utilisation se divise de la façon suivante :</p>
<p style="text-align: justify;">Le Bilan de l’étude montre qu’au moins 80% des entreprises devraient migrer vers des solutions alternatives (sans aucune période d’adaptation pour les utilisateurs) qui seraient moins coûteuses pour les organisations. De plus, l’éditeur conseille aux entreprises de négocier leurs licences avec Microsoft pour qu’elles soient représentatives de l’utilisation réelle des applications d’Office.</p>
<p style="text-align: justify;"><strong>Comment Aquastar Consulting peut vous aider ? </strong></p>
<p style="text-align: justify;">Aquastar Consulting est partenaire de Microsoft et peut répondre à vos questions.</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2474</wp:post_id>
		<wp:post_date>2014-06-17 16:16:33</wp:post_date>
		<wp:post_date_gmt>0000-00-00 00:00:00</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name></wp:post_name>
		<wp:status>draft</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="non-classe"><![CDATA[Non classé]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Sage : La CRM en pleine révolution !</title>
		<link>http://www.it-news.fr/sage-la-crm-en-pleine-revolution/</link>
		<pubDate>Thu, 30 May 2013 08:57:12 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?p=180</guid>
		<description></description>
		<content:encoded><![CDATA[<h2 style="text-align: justify;"><span style="text-decoration: underline;"><span style="font-size: 80%; line-height: 2em;"><a href="http://aquastarconsultingblog.wordpress.com/2013/05/30/sage-la-crm-en-pleine-revolution/"><img class="alignleft size-full wp-image-295" alt="Sage CRM" src="http://www.it-news.fr/wp-content/uploads/2013/06/l_ressource_sagecrm-2-e1370871444733.jpg" width="190" height="52" /></a>La CRM au service d'une communication ultra-personnalisée :</span></span></h2>
<p style="text-align: justify;">Vous souvenez vous du temps où notre communication s'adressait au plus grand nombre ? Du temps où un seul e-mail publicitaire était valable pour l'ensemble de votre base de donnée client ? Où l'on envoyait des messages publicitaires qui n'étaient pas personnalisés ?</p>
<!--more Lire la suite-->
<p style="text-align: justify;">Vous n'avez jamais fait de <strong>communication personnalisée</strong> ?! Vous envoyez le même e-mail à tous vos clients ? Et bien il est temps de changer vos habitudes. <strong>La communication groupée est morte</strong> depuis bien longtemps, et l'efficacité d'aujourd'hui, c'est l'ultra-personnalisation.</p>
<p style="text-align: justify;">Mais ne vous inquiétez pas, il existe aujourd'hui un grand nombre d'outils qui permettent de vous donner les moyens de personnaliser votre communication. Nous parlons bien ici de <strong>CRM</strong> (En français : Gestion de la Relation Client).</p>
<p style="text-align: justify;">Aujourd'hui indispensable pour connaitre vos clients, la CRM se développe et rentre dans une ère où son utilisation grimpe en flèche. Si vous n'utilisez toujours pas ces outils, il est temps pour vous d'y jeter un œil. L'idée est simple, et vous en êtes victime vous-même tous les jours. Car pour rester sur l'exemple de la prospection par e-mail, lorsque vous recevez un e-mail avec comme titre : "Voitures d'occasions : Nos bons plans" alors que vous venez d'acheter une nouvelle voiture, vous allez sélectionner l'e-mail et cliquer directement sur la fonction corbeille.</p>
<p style="text-align: justify;">Imaginez maintenant que ce même e-mail affiche comme titre : "Les astuces pour que votre nouvelle voiture reste comme neuve au fil du temps". Je ne suis pas certain que vous auriez eu le même réflexe que précédemment. Mais la personnalisation de ce titre n'est rendu possible que si vous prenez le temps d'observer vos clients, de les connaitre, et d'adapter votre communication au cas par cas.</p>
<p style="text-align: justify;">Il est certain que cette pratique est bien plus fastidieuse que les pratiques d'anciens temps, mais votre<strong> efficacité en sera décuplée</strong>. Le développement d'internet et la gratuité des e-mails a pour conséquence de saturer chaque jour votre boite de messagerie. Il faut donc absolument se démarquer et envoyer le bon e-mail, au bon moment, et en bonne quantité.  Il est bien plus efficace et rentable d'envoyer 10 e-mails de prospection ultra personnalisés dans une journée, que d'envoyer le même e-mail à 300 de vos clients en un clic. C'est aujourd'hui le prix à payer pour avoir un maximum de retour. Cette personnalisation est définie comme une approche comportementale du marketing.</p>
<p style="text-align: justify;">Revoyez donc votre manière d'approcher votre clientèle grâce aux fonctions CRM. Les outils CRM permettent d'établir une véritable <strong>segmentation de votre clientèle</strong>. Classer vos clients, attribué leurs une importance, et faite une communication adaptée à chaque segment de clientèle. Aquastar Consulting en partenariat avec Sage pourrait bien être votre partenaire idéal pour vous accompagner dans cette démarche. De plus, les outils Sage vous apporteront des fonctions capables de s'adapter aux technologies qui nous entourent.</p>
<a title="un titre explicatif" href="http://new.aquastar-consulting.com/index.php/solutions/gestion-metier/crm" target="_blank" rel="dofollow">La solution CRM</a>
<h2 style="text-align: justify;"><span style="text-decoration: underline;"><span style="font-size: 80%; line-height: 2em;">La mobilité Sage : Le phénomène du BYOD.</span></span></h2>
<p style="text-align: justify;"><strong>Le BYOD (Bring Your Own Device)</strong> repose sur le principe que le salarié lambda va utiliser, à des fins professionnelles, ses outils de communication personnels sur son lieu de travail. Cette pratique se développe de plus en plus dans la majorité des entreprises. 67% des employés d'aujourd'hui sont concernés par cet aspect. Principalement, ce sont les smartphones qui sont en cause en étant impliqués dans plus de deux tiers des cas. Viens ensuite les tablettes et les minis PC.</p>
<p style="text-align: justify;">Cette pratique fait naître des interrogations quant à sa légitimité. En effet, deux points de vue s'en dégagent :</p>
<p style="text-align: justify;">    - Le premier postulat nous dit qu'il est dangereux, pour la protection des données de l'entreprise, d'autoriser cette pratique. Si chaque employé possède sur son téléphone des données confidentielles, on comprend que ces dernières se retrouveront en dehors de son environnement professionnel. Il y a donc un risque pour ces données d’être exposées à un public qui ne le devrait pas.</p>
<p style="text-align: justify;">    - Le deuxième postulat part du principe qu'il faut accepter cette pratique et s'adapter en conséquence. Les défenseurs de cette idée argumentent sur le fait qu'un téléphone portable est incontrôlable, et qu'il est impossible de vérifier au cas par cas la non utilisation des outils personnels. Ils vont également plus loin et nous disent que cette pratique pourrait même être très bénéfique pour l'entreprise. En effet, un employé pourrait ainsi répondre à des e-mails en dehors de ses horaires de travail, gérer quelques dossiers le week-end, et donc <strong>augmenter leur productivité.</strong></p>
<p style="text-align: justify;">Ce phénomène est en tout cas à prendre en compte par les chefs d'entreprise. C'est peut être une excellente opportunité d’accroître l'efficacité de ses salariés. Il faudra toutefois contrôler cette usage pour éviter toutes dérives.</p>

<h2 style="text-align: justify;"><span style="text-decoration: underline;"><span style="font-size: 80%; line-height: 2em;">Les réseaux sociaux bouscule la CRM</span></span></h2>
<p style="text-align: justify;">Et oui, les réseaux sociaux ne s'arrêtent plus d'avoir un impact sur le monde des affaires, et c'est maintenant la CRM qui est touchée. Qui aujourd'hui n'est pas connecté aux réseaux sociaux ? Il est donc évident de prendre ce paramètre en compte et de l'intégrer à la CRM. Nous pouvons même dire, surtout à la CRM, dans le sens où son but est de créer une base de donnée client qui identifie au maximum ce qu'ils aiment, ce qu'ils achètent, et ce qu'ils projettent d'acheter. Les médias sociaux représentent donc là un excellent moyen d'en apprendre plus sur ses prospects et d'adapter une offre en conséquence.</p>
<p style="text-align: justify;">Pour conclure sur ce thème, nous allons rappeler une nouvelle fois que la réussite d'une entreprise repose grandement sur la connaissance de vos clients et prospects. Savoir ce qu'ils aiment, à un moment donné, dans une quantité donnée, et proposer une offre en adéquation avec ces paramètres, c’est être bien plus efficace et prendre une longueur d'avance sur vos concurrents.</p>
<a title="un titre explicatif" href="http://sage-leblog.fr/les-4-tendances-cles-des-solutions-de-crm-de-2015/" target="_blank" rel="dofollow">Source</a>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>180</wp:post_id>
		<wp:post_date>2013-05-30 09:57:12</wp:post_date>
		<wp:post_date_gmt>2013-05-30 08:57:12</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>sage-la-crm-en-pleine-revolution</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="communication"><![CDATA[communication]]></category>
		<category domain="post_tag" nicename="comportemental"><![CDATA[comportemental]]></category>
		<category domain="post_tag" nicename="crm"><![CDATA[CRM]]></category>
		<category domain="category" nicename="crm"><![CDATA[CRM]]></category>
		<category domain="post_tag" nicename="marketing"><![CDATA[marketing]]></category>
		<category domain="post_tag" nicename="personnalisee"><![CDATA[personnalisée]]></category>
		<category domain="post_tag" nicename="sage"><![CDATA[sage]]></category>
		<wp:postmeta>
			<wp:meta_key>_wpas_skip_3898347</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>publicize_twitter_user</wp:meta_key>
			<wp:meta_value><![CDATA[Aquastar_IT]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wpas_skip_3659558</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_publicize_done_external</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{s:7:"twitter";a:1:{i:821138382;b:1;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wpas_done_3659558</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>geo_public</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>tagazine-media</wp:meta_key>
			<wp:meta_value><![CDATA[a:7:{s:7:"primary";s:0:"";s:6:"images";a:1:{s:98:"http://aquastarconsultingblog.files.wordpress.com/2013/05/l_ressource_sagecrm-2-e1370871444733.jpg";a:6:{s:8:"file_url";s:98:"http://aquastarconsultingblog.files.wordpress.com/2013/05/l_ressource_sagecrm-2-e1370871444733.jpg";s:5:"width";i:190;s:6:"height";i:52;s:4:"type";s:5:"image";s:4:"area";i:9880;s:9:"file_path";b:0;}}s:6:"videos";a:0:{}s:11:"image_count";i:1;s:6:"author";s:8:"50412252";s:7:"blog_id";s:8:"52536027";s:9:"mod_stamp";s:19:"2013-06-21 10:23:26";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[94]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[CRM]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[Sage : La CRM en pleine révolution !]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[De plus en plus de sociétés se laissent convaincre par les bénéfices de la mise en place d'un outil CRM. Pourquoi maintenant ?]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437324]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:17:"130.0113122855043";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"111.6912617992068";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2319";s:5:"score";s:16:"84.3669487611467";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:17:"76.42546281513499";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"967";s:5:"score";s:16:"64.4290438112193";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2436";s:5:"score";s:17:"43.57905924662813";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"31.672110072678972";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"344";s:5:"score";s:18:"31.054990392555588";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"29.667662266661978";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"28.932854292158346";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:17:"44.83748562215417";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"38.259722588972274";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:18:"27.522442520295982";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"12.99630470707599";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"11.801873196956821";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:17:"10.47192058975572";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:17:"78.91292022372335";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"967";s:5:"score";s:17:"68.80292458732512";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"67.89394677775479";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:18:"47.085742482921724";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"344";s:5:"score";s:17:"37.62387864811336";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2319";s:5:"score";s:18:"34.975040732572914";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"126";s:5:"score";s:17:"34.01386925615721";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"20.56490011908807";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[295]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>BYOD : L&#039;usage professionnel de périphériques personnels (Smartphones, Ordinateurs..)</title>
		<link>http://www.it-news.fr/byod-lusage-professionnel-de-peripheriques-personnels-smartphones-ordinateurs/</link>
		<pubDate>Thu, 06 Jun 2013 08:48:17 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?p=223</guid>
		<description></description>
		<content:encoded><![CDATA[<h2 style="text-align: justify;"><a href="http://aquastarconsultingblog.wordpress.com/2013/06/06/byod-lusage-professionnel-de-peripheriques-personnels-smartphones-ordinateurs/"><img class="alignleft size-full wp-image-291" title="BYOD: l'usage professionnel de périphériques personnels (Smartphones, Ordinateurs...)" alt="Utilisez vos outils personnels dans un but professionnel" src="http://www.it-news.fr/wp-content/uploads/2013/06/featured-image-e1370870349821.jpg" width="190" height="104" /></a><span style="text-decoration: underline;"><span style="font-size: 80%; line-height: 2em;">BYOD : Réduisez vos coûts tout en améliorant votre efficacité</span></span></h2>
<p style="text-align: justify;">Vous utilisez déjà votre téléphone personnel pour travailler ? Vous estimez que la performance de votre propre outil est plus apte à répondre à vos besoins professionnels ? Après tout, pourquoi ne pas formaliser cette pratique ?</p>
<!--more Lire la suite-->
<p style="text-align: justify;">C'est une nouvelle tendance qui est en plein développement, <strong>nous utilisons de plus en plus nos outils personnels sur notre lieu de travail. </strong>Que ce soit notre téléphone portable, notre ordinateur personnel, ou bien notre tablette, il est agréable de pouvoir travailler avec des outils que l'on connait par cœur. Souvent plus performants que les outils délivrés par notre employeur, cette pratique pourrait permettre d'augmenter l'efficacité de chacun à moindre coût pour l'entreprise.</p>
<p style="text-align: justify;">De cette démarche, nous pouvons donc distinguer <strong>2 apports essentiels</strong> :</p>
<p style="text-align: justify;">- La réduction des dépenses liées aux outils de communication</p>
<p style="text-align: justify;">- Et une meilleure productivité des employés</p>
<p style="text-align: justify;"><strong>Attention</strong>, outre son aspect simpliste et efficace, la pratique du BYOD est à intégrer avec précaution pour l'entreprise. En effet, si elle n'est pas bien gérée, ce changement peut être la cause d'une altération et de gros problèmes de sécurité des données.  Malgré tout, <strong>cette évolution semble inévitable</strong>. Il est donc grandement conseillé de se pencher sur le sujet et commencer à anticiper les problèmes liés à cette pratique. C'est pourquoi nous allons voir ci-dessous les principaux paramètres à prendre en compte pour gérer au mieux le phénomène du BYOD.</p>
<p style="text-align: justify;">Il faut avant tout savoir que pour le moment, étant un phénomène récent, aucune jurisprudence, aucun texte de loi ne mentionne le BYOD. De ce constat, la réglementation et la définition des usages associés à cette pratique doivent être définies en interne pour l'entreprise concernée.</p>
<p style="text-align: justify;">Comment ? Dans la formulation du contrat de travail ou dans la mise en place d'un texte complémentaire (avenant) pour les employés déjà en poste. Ce texte doit énumérer les appareils utilisés et leurs spécificités techniques. En effet, il ne s'agit pas pour l'employé de pouvoir utiliser un outil personnel sans qu'il soit mentionné dans son contrat de travail. Il faudra donc qu'il respecte les conditions relatives à l'utilisation de ses outils personnels qui ont été définis avec son employeur. De plus, l'employé aura la responsabilité de se tenir à ces conditions. Il pourra être sanctionné par l'employeur dans les cas où il s'en écarterait.</p>
<p style="text-align: justify;">Thierry Sar, directeur administratif et financier du groupe D.FI, ajoute dans un communiqué (<a href="http://www.silicon.fr/comment-gerer-le-byod-la-reponse-de-la-daf-de-d-fi-86734.html?utm_source=2013-06-06&amp;utm_medium=email&amp;utm_campaign=siliconfr_daily&amp;id_prob=6742_681652" target="_blank">Source</a>) qu'il faudra anticiper la refonte de la charte informatique. Quatre points sont abordés :</p>
<p style="text-align: justify;"><em>" - </em><em>Indiquer les prérequis techniques censés répondre en terme organisationnel et technique aux questions de sécurité ;</em></p>
<p style="text-align: justify;"><em></em><em>- Réglementer l’accès aux documents professionnels de l’entreprise ;</em></p>
<p style="text-align: justify;"><em></em><em>- Gérer les situations de crise, telles que le vol de l’équipement ;</em></p>
<p style="text-align: justify;"><em></em><em>- Fixer le cadre d’accès à distance de l’employeur à l’équipement du salarié."</em></p>
<p style="text-align: justify;">La suite de l'article pose le problème incombé aux employés dans le sens où ils s'exposent à ce que leur employeur ait accès à leurs données personnelles. Ainsi, la réglementation prévoie d'obliger l'employeur à utiliser les outils personnels de ses employés seulement en leur présence et par une motivation réelle et sérieuse de son utilité pour l'activité de l'entreprise.</p>
<p style="text-align: justify;">Pour conclure, la pratique du BYOD paraît être un changement auquel les employeurs vont devoir se plier s'ils souhaitent continuer à avoir le contrôle de leurs données professionnelles. Mieux vaut accepter cette démarche, la paramétrer, la définir, la contrôler en accord avec le reste de l'entreprise, plutôt que d'aller dans son sens contraire et tenter d'arrêter l'inarrêtable.</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>223</wp:post_id>
		<wp:post_date>2013-06-06 09:48:17</wp:post_date>
		<wp:post_date_gmt>2013-06-06 08:48:17</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>byod-lusage-professionnel-de-peripheriques-personnels-smartphones-ordinateurs</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="byod"><![CDATA[BYOD]]></category>
		<category domain="post_tag" nicename="donnees-personnelles"><![CDATA[données personnelles]]></category>
		<category domain="post_format" nicename="post-format-image"><![CDATA[Image]]></category>
		<category domain="post_tag" nicename="mobile"><![CDATA[mobile]]></category>
		<category domain="post_tag" nicename="outil-personnel"><![CDATA[outil personnel]]></category>
		<category domain="post_tag" nicename="pc"><![CDATA[PC]]></category>
		<category domain="post_tag" nicename="portable"><![CDATA[portable]]></category>
		<category domain="category" nicename="reseaux-et-mobilite"><![CDATA[Réseaux et mobilité]]></category>
		<category domain="post_tag" nicename="tablette"><![CDATA[tablette]]></category>
		<wp:postmeta>
			<wp:meta_key>_publicize_done_external</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{s:7:"twitter";a:1:{i:821138382;b:1;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wpas_done_3659558</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>publicize_twitter_user</wp:meta_key>
			<wp:meta_value><![CDATA[Aquastar_IT]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>publicize_reach</wp:meta_key>
			<wp:meta_value><![CDATA[a:2:{s:7:"twitter";a:1:{i:3659558;i:22;}s:2:"wp";a:1:{i:0;i:1;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wpas_skip_3659558</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[291]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>tagazine-media</wp:meta_key>
			<wp:meta_value><![CDATA[a:7:{s:7:"primary";s:0:"";s:6:"images";a:1:{s:91:"http://aquastarconsultingblog.files.wordpress.com/2013/06/featured-image-e1370870349821.jpg";a:6:{s:8:"file_url";s:91:"http://aquastarconsultingblog.files.wordpress.com/2013/06/featured-image-e1370870349821.jpg";s:5:"width";i:190;s:6:"height";i:104;s:4:"type";s:5:"image";s:4:"area";i:19760;s:9:"file_path";b:0;}}s:6:"videos";a:0:{}s:11:"image_count";i:1;s:6:"author";s:8:"50412252";s:7:"blog_id";s:8:"52536027";s:9:"mod_stamp";s:19:"2013-06-11 06:50:49";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wpas_skip_3898347</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>geo_public</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[75]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[BYOD]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426439020]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:18:"255.63802038592976";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2362";s:5:"score";s:18:"179.46166018835302";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2266";s:5:"score";s:18:"117.74088053154776";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2354";s:5:"score";s:18:"104.93874717078899";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1454";s:5:"score";s:16:"67.3885354619799";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"46.968776963411166";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"789";s:5:"score";s:16:"46.6483908145783";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"44.63349369998404";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"1180";s:5:"score";s:17:"41.46539810268668";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1722";s:5:"score";s:18:"41.149953988394415";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"83.14964852209803";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2266";s:5:"score";s:17:"34.97549943317729";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"19.27100534815373";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"17.371627323893694";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"11.531298962641952";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"11.139059616986625";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"149.5966953212564";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1454";s:5:"score";s:17:"76.56566521855659";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2362";s:5:"score";s:17:"68.28885216824352";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2266";s:5:"score";s:17:"66.68901435317109";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"789";s:5:"score";s:17:"53.44394939327344";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1722";s:5:"score";s:17:"47.69210740887388";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1180";s:5:"score";s:17:"47.03165826368563";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"344";s:5:"score";s:18:"44.748725079765244";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[291]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Comptabilité : Nouvelle génération i7 et pilotage sur Excel. </title>
		<link>http://www.it-news.fr/les-enjeux-de-la-maitrise-de-votre-comptabilite-finance/</link>
		<pubDate>Tue, 11 Jun 2013 06:43:52 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?p=313</guid>
		<description></description>
		<content:encoded><![CDATA[Fonction indispensable à toute entreprise, la comptabilité est une source d'information à exploiter au maximum. Révélateur de la santé d'une entreprise, c'est un support très utile (Contenu disponible très prochainement)]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>313</wp:post_id>
		<wp:post_date>2013-06-11 07:43:52</wp:post_date>
		<wp:post_date_gmt>2013-06-11 06:43:52</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>les-enjeux-de-la-maitrise-de-votre-comptabilite-finance</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="comptabilite-finances"><![CDATA[Comptabilité - Finances]]></category>
		<wp:postmeta>
			<wp:meta_key>_wpas_skip_3898347</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>publicize_twitter_user</wp:meta_key>
			<wp:meta_value><![CDATA[Aquastar_IT]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wpas_done_3659558</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_publicize_done_external</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{s:7:"twitter";a:1:{i:821138382;b:1;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[41]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[comptabilité]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:18:"55.019623433689404";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"47.66394098359327";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"47.66394098359327";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"33.22795302476458";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2438";s:5:"score";s:17:"30.83131030174396";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2465";s:5:"score";s:18:"24.610454836886518";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1902";s:5:"score";s:18:"17.069317079812926";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:17:"16.59992132828937";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2424";s:5:"score";s:18:"16.343752806693615";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1605";s:5:"score";s:18:"13.886100423621825";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438625]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"17.009428212253944";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"17.009428212253944";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1902";s:5:"score";s:17:"13.42590927312091";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:17:"12.19400976206045";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"12.07014985697029";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1924";s:5:"score";s:17:"6.443801190914313";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:17:"34.75154062782922";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"29.590043671374687";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"29.590043671374687";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1902";s:5:"score";s:18:"22.771051302662595";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:17:"21.26741055886606";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"21.135745479553346";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1605";s:5:"score";s:18:"17.475791155050512";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1595";s:5:"score";s:18:"13.966274129558567";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[empty]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Système réseau - Structurer les fondements de votre réussite </title>
		<link>http://www.it-news.fr/systeme-reseau-structurer-les-fondements-de-votre-reussite/</link>
		<pubDate>Tue, 11 Jun 2013 06:58:22 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?p=319</guid>
		<description></description>
		<content:encoded><![CDATA[Le contenu sera disponible très prochainement.]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>319</wp:post_id>
		<wp:post_date>2013-06-11 07:58:22</wp:post_date>
		<wp:post_date_gmt>2013-06-11 06:58:22</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>systeme-reseau-structurer-les-fondements-de-votre-reussite</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="infrastructures"><![CDATA[Infrastructures]]></category>
		<category domain="category" nicename="systemes"><![CDATA[Systèmes]]></category>
		<wp:postmeta>
			<wp:meta_key>_wpas_skip_3898347</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[empty]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438615]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"44.58763377928843";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"42.36312107556496";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"42.36312107556496";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:17:"28.43875492283174";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"323";s:5:"score";s:18:"21.737688713713347";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1626";s:5:"score";s:18:"13.663249285485003";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"827";s:5:"score";s:18:"13.663249285485003";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:17:"12.28987606637505";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"12.28987606637505";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"12.28987606637505";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"11.954408795543287";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"11.954408795543287";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:18:"11.954408795543287";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:16:"4.35278611737095";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:16:"4.35278611737095";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:16:"4.35278611737095";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:17:"30.54160995889451";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"23.158303197111714";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"23.158303197111714";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:18:"23.158303197111714";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"323";s:5:"score";s:18:"23.158303197111714";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1626";s:5:"score";s:18:"15.270804979447256";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"827";s:5:"score";s:18:"15.270804979447256";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1495";s:5:"score";s:18:"11.579151598555857";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Virtualisation des serveurs : Un gain considérable pour les petites et moyennes entreprises</title>
		<link>http://www.it-news.fr/vmware-virtualiser-vos-serveurs/</link>
		<pubDate>Tue, 11 Jun 2013 07:03:27 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?p=323</guid>
		<description></description>
		<content:encoded><![CDATA[<a href="http://www.it-news.fr/wp-content/uploads/2013/05/logo-vmware.jpg"><img class="size-thumbnail wp-image-99 alignleft" title="Virtualisation des serveurs: un gain considérable pour les PME" alt="Leader dans le domaine de la mobilité et de la sécurité des accès réseau. " src="http://www.it-news.fr/wp-content/uploads/2013/05/logo-vmware.jpg?w=150" width="150" height="67" /></a>
<p style="text-align: justify;">Parce que ces solutions vous donnent un rendu immédiat, la virtualisation est aujourd'hui d'une grande aide pour toutes les PME. Le message est clair, là où vos serveurs vont être à 10% de leurs capacités, les solutions VMware vont pousser ces capacités à 80%.</p>
<!--more Lire la suite-->
<p style="text-align: justify;">Cette technologie permet donc d'économiser vos dépenses en énergie, et d'accentuer dans le même temps vos performances applicatives. Cette solution réduit le nombre de machines physiques essentielles à l'exploitation de votre activité, tout en optimisant vos applications. Vous ne perdez rien en applications, elles restent optimales, et sont gérées par  un matériel physique réduit.</p>
<p style="text-align: justify;">L'autre avantage de cette solution se retrouve dans le traitement des défaillances. Lors d'un plantage, et grâce à la virtualisation, les systèmes touchés sont automatiquement redémarrés. Là où les problèmes de défaillances des serveurs peuvent être traités de manière plus fastidieuse, VMware vous propose donc une solution qui va minimiser grandement les risques d'interruption de votre activité.</p>
<p style="text-align: justify;">Résumons, la virtualisation vous apporte globalement 4 effets bénéfiques :</p>

<ul>
	<li>L'exploitation maximum de vos serveurs (Allant jusqu'à 80%)</li>
	<li>La réduction considérable (Jusqu'à 50%) des coûts liés à l'entretien de vos machines physiques</li>
	<li>Un serveur en vaudra dix en termes de capacité de traitement</li>
	<li>Un réduction des risques liés aux plantages</li>
</ul>
<p style="text-align: justify;">En d'autres termes, la virtualisation par VMware est un excellent moyen pour toutes les PME de pouvoir faire des économies tout en étant plus efficace dans le traitement de vos données.</p>
<p style="text-align: justify;"><a href="http://www.vmware.com/fr/solutions/company-size/smb/server-consolidation.html" target="_blank">Source</a></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>323</wp:post_id>
		<wp:post_date>2013-06-11 08:03:27</wp:post_date>
		<wp:post_date_gmt>2013-06-11 07:03:27</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>vmware-virtualiser-vos-serveurs</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="infrastructures"><![CDATA[Infrastructures]]></category>
		<category domain="post_tag" nicename="performance-reseau"><![CDATA[performance réseau]]></category>
		<category domain="post_tag" nicename="pme"><![CDATA[PME]]></category>
		<category domain="post_tag" nicename="serveur"><![CDATA[serveur]]></category>
		<category domain="category" nicename="systemes"><![CDATA[Systèmes]]></category>
		<category domain="post_tag" nicename="virtualisation"><![CDATA[Virtualisation]]></category>
		<category domain="post_tag" nicename="vmware"><![CDATA[vmware]]></category>
		<wp:postmeta>
			<wp:meta_key>_wpas_skip_3898347</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>tagazine-media</wp:meta_key>
			<wp:meta_value><![CDATA[a:7:{s:7:"primary";s:0:"";s:6:"images";a:1:{s:73:"http://aquastarconsultingblog.files.wordpress.com/2013/05/logo-vmware.jpg";a:6:{s:8:"file_url";s:73:"http://aquastarconsultingblog.files.wordpress.com/2013/05/logo-vmware.jpg";s:5:"width";i:245;s:6:"height";i:110;s:4:"type";s:5:"image";s:4:"area";i:26950;s:9:"file_path";b:0;}}s:6:"videos";a:0:{}s:11:"image_count";i:1;s:6:"author";s:8:"50412252";s:7:"blog_id";s:8:"52536027";s:9:"mod_stamp";s:19:"2013-06-21 10:21:44";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[78]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[virtualisation]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437183]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"124.66739535810663";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"122.07463893905863";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"105.58186426050884";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"774";s:5:"score";s:17:"77.83070711249258";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2475";s:5:"score";s:17:"76.54669048996385";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"57.11287474083508";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:2:"68";s:5:"score";s:16:"54.7546189561165";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"133";s:5:"score";s:16:"50.7867358882841";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"44.58763377928843";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"42.36312107556496";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"45.249423151175336";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"38.36273421766039";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:17:"37.32265928918189";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"18.018008085843384";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"13.960200255660556";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:16:"13.7975816841355";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[empty]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:3:"774";s:5:"score";s:16:"84.7605834116707";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"77.86830768228769";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:17:"69.34628992669164";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"65.92819195650057";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:2:"68";s:5:"score";s:17:"54.74281611227454";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"133";s:5:"score";s:18:"50.800170089185286";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"760";s:5:"score";s:16:"39.7814012009395";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:17:"38.02005914691857";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Sage 100 trésorerie : Source de compétitivité. </title>
		<link>http://www.it-news.fr/visualisez-en-temps-reel-votre-tresorerie/</link>
		<pubDate>Tue, 11 Jun 2013 07:16:54 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?p=332</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/06/sage-100_-trc3a9sorerie-i7.png"><img class="alignleft size-thumbnail wp-image-548" alt="Sage trésorerie i7" src="http://www.it-news.fr/wp-content/uploads/2013/06/sage-100_-trc3a9sorerie-i7.png?w=137" width="137" height="150" /></a>La gestion de la trésorerie regroupe un ensemble de règles et de procédures qui permettent de <strong>gérer à moindre coût l'équilibre financier d'une entreprise</strong>. Cette gestion est étroitement liée avec la définition des objectifs commerciaux et industriels. N'étant plus réservé qu'aux grandes sociétés, la maîtrise des flux et la facilité de leurs traitements conduisent irrémédiablement versun développement croissant.</p>
<!--more Lire la suite-->
<p style="text-align: justify;">Outre ces aspects, la trésorerie intègre également la notion de risque lié aux fluctuations du marché. L'anticipation de ces aléas permet de réduire considérablement des erreurs parfois très coûteuses. En parallèle, cela force une évolution des rapports et de la communication faite auprès des acteurs internes et externes à l'entreprise. Nous pouvons prendre l'exemple de la relation d'une société envers sa banque lors d'un projet d'investissement. La trésorerie sera ici un élément clé et doit impérativement être optimisée pour préparer au mieux des dépenses utiles et rentable à court ou à long terme.</p>
<p style="text-align: justify;">De nos jours, l'économie étant très concurrentielle, et la gestion de la trésorerie doit véritablement être vue comme une <strong>source de compétitivité</strong>. <a href="http://new.aquastar-consulting.com/index.php/solutions/gestion-metier/comptabilite-finances/tresorerie" target="_blank">Sage 100 Trésorerie</a> est capable de vous aider dans ces démarches et de vous générer des gains en maîtrisant vos coûts. Visualisez en temps réel la situation de votre trésorerie, ce logiciel de gestion vous permet également de la suivre de manière prévisionnelle et de gérer les placements, les financements ainsi que les virements de trésorerie.</p>
<p style="text-align: justify;">Quatre grandes fonctionnalités peuvent être énumérées :</p>

<ul>
	<li><strong>Identifier sa trésorerie</strong> (Suivez les encaissements, les décaissements, intégrez y les écritures comptables, ou bien récupérer les comptes bancaires)</li>
	<li><strong>Analyser et anticiper</strong> (Vos besoins à court et moyen terme, les risques et les écarts de trésorerie)</li>
	<li><strong>Optimisation</strong> (Équilibrage des comptes, détection des retards, fructification et gestion des placements)</li>
	<li><strong>Partenariat bancaire équilibré</strong> (Diminution de frais bancaires, analyse des flux, surveillance des décisions actées auprès de vos banques)</li>
</ul>
<p style="text-align: justify;"></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>332</wp:post_id>
		<wp:post_date>2013-06-11 08:16:54</wp:post_date>
		<wp:post_date_gmt>2013-06-11 07:16:54</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>visualisez-en-temps-reel-votre-tresorerie</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="competitivite"><![CDATA[compétitivité]]></category>
		<category domain="category" nicename="comptabilite-finances"><![CDATA[Comptabilité - Finances]]></category>
		<category domain="post_tag" nicename="cout"><![CDATA[coût]]></category>
		<category domain="post_tag" nicename="sage-100"><![CDATA[Sage 100]]></category>
		<category domain="category" nicename="solutions-de-gestion"><![CDATA[Solutions de gestion]]></category>
		<category domain="post_tag" nicename="tresorerie"><![CDATA[trésorerie]]></category>
		<wp:postmeta>
			<wp:meta_key>_wpas_skip_3898347</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[79]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[trésorerie]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437843]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2438";s:5:"score";s:18:"143.57457956985982";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:16:"81.9648519139936";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"69.67497584761855";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"53.62386161748641";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"947";s:5:"score";s:17:"52.20096758477523";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"48.19384825879378";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"334";s:5:"score";s:17:"47.03468357534388";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"342";s:5:"score";s:17:"46.25136195557323";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:3:"344";s:5:"score";s:18:"44.865067593706506";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:3:"644";s:5:"score";s:17:"44.13222995847156";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"31.72674106805286";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:16:"28.1828273842913";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"21.373177434645182";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"20.460962147180666";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:17:"18.30704756693737";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:18:"17.199642271203555";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[2342]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2438";s:5:"score";s:17:"57.04788142690142";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"947";s:5:"score";s:17:"54.94625441139279";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"53.438112396866366";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"334";s:5:"score";s:15:"51.718428537377";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"953";s:5:"score";s:17:"50.89160333024621";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"342";s:5:"score";s:17:"49.49674827345534";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"344";s:5:"score";s:18:"48.233191804828294";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"46.16147862153935";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:12:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2438";s:5:"score";s:18:"143.32264965988512";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"81.88372588628411";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"69.69576202542225";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"53.45800596345279";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"947";s:5:"score";s:17:"52.16794705120009";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"48.43558826456298";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"334";s:5:"score";s:18:"46.854386498786276";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"342";s:5:"score";s:17:"46.09096445562462";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:3:"344";s:5:"score";s:17:"44.72169147380209";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:3:"644";s:5:"score";s:17:"44.02707091514806";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:3:"953";s:5:"score";s:17:"43.00503973245854";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:17:"41.27004210259091";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:comment>
			<wp:comment_id>1161</wp:comment_id>
			<wp:comment_author><![CDATA[bouhedli]]></wp:comment_author>
			<wp:comment_author_email>nassim1434@yahoo.com</wp:comment_author_email>
			<wp:comment_author_url></wp:comment_author_url>
			<wp:comment_author_IP>197.202.5.234</wp:comment_author_IP>
			<wp:comment_date>2014-05-30 13:06:38</wp:comment_date>
			<wp:comment_date_gmt>2014-05-30 12:06:38</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[merci pour l'article et bonne continuation]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type></wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
		<wp:comment>
			<wp:comment_id>1162</wp:comment_id>
			<wp:comment_author><![CDATA[jean cartier]]></wp:comment_author>
			<wp:comment_author_email>cartier8778@maiil.com</wp:comment_author_email>
			<wp:comment_author_url></wp:comment_author_url>
			<wp:comment_author_IP>197.202.5.234</wp:comment_author_IP>
			<wp:comment_date>2014-05-30 13:06:57</wp:comment_date>
			<wp:comment_date_gmt>2014-05-30 12:06:57</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[bonne continuation]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type></wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
	</item>
	<item>
		<title>Sage gestion commerciale : Maîtriser vos achats, stocks, et le suivi client.</title>
		<link>http://www.it-news.fr/gestion-commerciale-maitriser-tous-les-domaines-de-votre-pme/</link>
		<pubDate>Tue, 11 Jun 2013 07:20:05 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?p=334</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/06/boite6_gestionco_opt.jpg"><img class="alignleft size-thumbnail wp-image-542" title="Sage Gestion Commerciale: Maîtriser vos achats, stocks et le suivi client" alt="Sage gestion commerciale" src="http://www.it-news.fr/wp-content/uploads/2013/06/boite6_gestionco_opt.jpg?w=150" width="150" height="132" /></a>Indispensable à une gestion pérenne de toute PME, et pour maîtriser au mieux les performances dont elle doit faire preuve, <a href="http://new.aquastar-consulting.com/index.php/solutions/gestion-metier/gestion-commerciale" target="_blank">Sage 100 gestion commerciale</a> est un outil qui permet d'avoir un contrôle global des activités commerciales. Gérer ses devis, ses factures, ou bien ses ventes dans un seul et même outil permet de réduire considérablement les risques liés aux décalages entre les différents services.</p>
<!--more Lire la suite-->
<p style="text-align: justify;">S'il fallait lister l'ensemble des éléments qui seraient susceptibles de produire un impact positif sur l'efficacité d'une entreprise, cela pourrait ressembler à ça :</p>

<ul>
	<li style="text-align: justify;">Gestion des achats</li>
	<li style="text-align: justify;">Gestion des factures</li>
	<li style="text-align: justify;">Observation des ventes</li>
	<li style="text-align: justify;">Optimisation des stocks (et approvisionnements)</li>
	<li style="text-align: justify;">Prise en compte du risque client</li>
	<li style="text-align: justify;">Délais de livraison</li>
	<li style="text-align: justify;">Traçabilité des produits</li>
	<li style="text-align: justify;">Gestion des tarifs et autres réductions particulières (Remises, Rabais, etc..)</li>
	<li style="text-align: justify;">Génération de tableau de bord (Identification des indicateurs clés)</li>
	<li style="text-align: justify;">Suivi des commandes</li>
	<li style="text-align: justify;">Un comparatif fournisseurs</li>
	<li style="text-align: justify;">Gestion du cycle de fabrication</li>
	<li style="text-align: justify;">Gestion cycle de vente</li>
</ul>
<p style="text-align: center;"><a href="http://www.it-news.fr/wp-content/uploads/2013/06/gestion_commerciale_comptable_sage.png"><img class="aligncenter  wp-image-544" alt="Sage 100 gestion commerciale" src="http://www.it-news.fr/wp-content/uploads/2013/06/gestion_commerciale_comptable_sage.png?w=640" width="384" height="354" /></a></p>
<p style="text-align: justify;">Tout ces éléments sont plus importants les uns que les autres. Chaque paramètre génère une influence sur d'autres et il faut donc être constamment attentif afin de ne rien négliger. L'outil dont il est question dans cette article propose d'intégrer tout ces éléments à sa base et de vous ressortir d'une façon claire et simplifié vos indicateurs clés.</p>
<p style="text-align: justify;">Il est évident que ce logiciel peut et doit être personnalisé suivant votre type d'activité. Chacun n'en aura pas la même utilisation, la même sollicitation.  Toutefois, les bénéfices générés seront bien là, vous faire gagner du temps et agir directement sur votre productivité ! Concentrez vous sur votre cœur de métier, maîtrisez votre environnement interne et externe, et soyez plus efficace.</p>
<p style="text-align: justify;"></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>334</wp:post_id>
		<wp:post_date>2013-06-11 08:20:05</wp:post_date>
		<wp:post_date_gmt>2013-06-11 07:20:05</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>gestion-commerciale-maitriser-tous-les-domaines-de-votre-pme</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="achat"><![CDATA[achat]]></category>
		<category domain="category" nicename="gestion-commerciale"><![CDATA[Gestion commerciale]]></category>
		<category domain="post_tag" nicename="gestion-commerciale-2"><![CDATA[gestion commerciale]]></category>
		<category domain="post_tag" nicename="logiciel"><![CDATA[logiciel]]></category>
		<category domain="post_tag" nicename="sage-100"><![CDATA[Sage 100]]></category>
		<category domain="category" nicename="solutions-de-gestion"><![CDATA[Solutions de gestion]]></category>
		<category domain="post_tag" nicename="stock"><![CDATA[stock]]></category>
		<category domain="post_tag" nicename="vente"><![CDATA[vente]]></category>
		<wp:postmeta>
			<wp:meta_key>_wpas_skip_3898347</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[80]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[gestion commerciale]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426435966]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:3:"126";s:5:"score";s:17:"61.65612003144279";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:17:"59.66306982694262";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"342";s:5:"score";s:16:"53.8316335831027";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"644";s:5:"score";s:18:"49.515277008386335";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"48.81767073253599";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"344";s:5:"score";s:17:"47.99724253646039";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"332";s:5:"score";s:17:"47.03468357534388";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"42.24466668597264";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:17:"41.33398555111136";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:3:"820";s:5:"score";s:17:"38.93262270070813";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"20.313342176886966";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"18.436802898951107";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:18:"17.940068839400638";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"16.637949047527393";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:18:"14.726926157178404";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"12.93928010953931";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:3:"126";s:5:"score";s:17:"66.05955926449582";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"342";s:5:"score";s:16:"57.6259381729301";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"644";s:5:"score";s:17:"51.99055791853269";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"344";s:5:"score";s:17:"51.79408561247884";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"332";s:5:"score";s:18:"51.278743623540684";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"713";s:5:"score";s:18:"39.945579199362726";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"820";s:5:"score";s:17:"39.84299261061429";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:18:"33.251570911347365";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[2349]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>EDI : Dématérialiser ses documents et automatiser ses processus.</title>
		<link>http://www.it-news.fr/dematerialiser-ses-documents-et-automatiser-ses-processus/</link>
		<pubDate>Tue, 11 Jun 2013 07:23:34 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?p=336</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/06/gdi-circle-network-downline.jpg"><img class="alignleft size-thumbnail wp-image-534" title="EDI: Dématérialiser ses documents et automatiser ses processus" alt="GDI dématérialisation" src="http://www.it-news.fr/wp-content/uploads/2013/06/gdi-circle-network-downline.jpg?w=150" width="150" height="99" /></a>Les flux d'informations transitent de plus en plus par le biais de processus numériques. cette évolution est due dans un premier temps à l'évolution des nouvelles technologies, et à sa démocratisation internationale, mais aussi et surtout parce que c'est <strong>économiques et efficace !</strong></p>
<strong><!--more Lire la suite--></strong>D'autant plus si vous avez des partenaires, l'utilisation de l'EDI permet d'automatiser un certain nombre de tâches récurrentes.
<p style="text-align: justify;">Quels sont les avantages directs liés à l'utilisation d'EDI ?</p>
<p style="padding-left: 30px;"> Suppression des ressaisies
 Réduction des coûts liés au papier (impression, courriers, fax…)
 Fiabilisation des données
 Automatisation des processus
 Gains de productivité
 Un meilleur suivi des échanges (commande, bon de livraison, facture…)</p>
<p style="padding-left: 30px;"></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>336</wp:post_id>
		<wp:post_date>2013-06-11 08:23:34</wp:post_date>
		<wp:post_date_gmt>2013-06-11 07:23:34</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>dematerialiser-ses-documents-et-automatiser-ses-processus</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="automatiser"><![CDATA[automatiser]]></category>
		<category domain="post_tag" nicename="dematerialisation"><![CDATA[dématérialisation]]></category>
		<category domain="post_tag" nicename="economie"><![CDATA[économie]]></category>
		<category domain="post_tag" nicename="edi"><![CDATA[edi]]></category>
		<category domain="category" nicename="edi-ged"><![CDATA[EDI - GED]]></category>
		<category domain="category" nicename="solutions-de-gestion"><![CDATA[Solutions de gestion]]></category>
		<wp:postmeta>
			<wp:meta_key>_wpas_skip_3898347</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[57]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[EDI]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438588]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:17:"93.18543678732877";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2406";s:5:"score";s:17:"88.21793145613039";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1728";s:5:"score";s:17:"85.09808596576732";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1588";s:5:"score";s:17:"69.70783411646188";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1681";s:5:"score";s:17:"67.23992684379121";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"126";s:5:"score";s:18:"49.348409110924145";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2125";s:5:"score";s:17:"43.25352955791881";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:17:"38.15074123349007";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"36.01851528337598";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"36.01851528337598";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:18:"31.918252973507276";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:18:"16.595544631726188";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"16.467633431405602";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"15.965004574034968";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"15.457845704226157";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:16:"14.7369632068125";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[2343]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2406";s:5:"score";s:17:"91.67542309681173";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1728";s:5:"score";s:17:"87.40796035099874";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1588";s:5:"score";s:17:"70.29127325294829";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1681";s:5:"score";s:17:"66.25478940954608";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:17:"54.86851780884517";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"126";s:5:"score";s:17:"51.88656505353592";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:16:"32.7705367613417";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1868";s:5:"score";s:17:"32.21234853019982";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>PME : Outil d&#039;aide à la décision Sage.</title>
		<link>http://www.it-news.fr/prendre-les-bonnes-decisions-grace-a-nos-outils/</link>
		<pubDate>Tue, 11 Jun 2013 07:30:11 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?p=342</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/06/question-blue.jpg"><img class="alignleft size-thumbnail wp-image-515" title="PME: Outil d'aide à la décision Sage" alt="Sage décisionnel" src="http://www.it-news.fr/wp-content/uploads/2013/06/question-blue.jpg?w=120" width="120" height="150" /></a>Quelque soit la société, lors d'une prise d'initiative, et/ou de décision, il est préférable d'avoir en main l'ensemble des indicateurs qui permettent d'être en cohérence avec les capacités de la société. Lors d'un investissement, ou d'un réapprovisionnement des stocks, il est nécessaire de ne pas commettre d'erreurs bien souvent coûteuses. De plus, si vous dépenser votre énergie à chercher fastidieusement les chiffres rangés dans tel ou tel dossier, et bien il existe des solutions qui vont feront ressortir le tout en un clic.</p>
<!--more Lire la suite-->
<p style="text-align: justify;">Trop fréquemment, les chefs d'entreprises ou certains responsables ont une vision brouillon de l'activité de leurs entreprises. Le système dont il est question répond à cette problématique et offre une interface qui présente avec simplicité l'ensemble des éléments clés.</p>
<p style="text-align: center;"><a href="http://www.it-news.fr/wp-content/uploads/2013/06/paie4.jpg"><img class="aligncenter size-large wp-image-516" title="Sage: aide à la décision paie" alt="Aide à la décision paie" src="http://www.it-news.fr/wp-content/uploads/2013/06/paie4.jpg?w=640" width="640" height="429" /></a></p>
<p style="text-align: justify;"><a href="http://new.aquastar-consulting.com/index.php/solutions/gestion-metier/decisionnel" target="_blank">L'édition pilotée Sage 100</a> donne des informations sur <span style="text-decoration: underline;">trois principaux domaines</span> :</p>

<ul>
	<li style="text-align: justify;"><strong>La paie et la RH</strong>, avec des indications sur le nombre d'effectif, leurs affectations, de leur age, les horaires de travail, leurs rémunérations, ou encore les futurs congés.</li>
</ul>
<ul>
	<li style="text-align: justify;"><strong>La comptabilité</strong>, avec le suivi de votre trésorerie, vos marges brutes, votre valeur ajoutée, les clients à risques, les impayés, ou bien votre rentabilité.</li>
	<li style="text-align: justify;">Enfin, le dernier domaine repose sur <strong>la gestion commerciale </strong>où là encore on pourra retrouver tout les indicateurs essentiels à la prise de décision (Les achats, le chiffre d'affaire, carnet de commande, traçabilité par n° de produit, etc..)</li>
</ul>
<p style="text-align: justify;">Cette fonctionnalité devient très vite un impérative dès lors qu'une structure atteint une taille conséquente. C'est par des outils simples et intuitifs que l'on gagne à être plus efficaces.</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>342</wp:post_id>
		<wp:post_date>2013-06-11 08:30:11</wp:post_date>
		<wp:post_date_gmt>2013-06-11 07:30:11</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>prendre-les-bonnes-decisions-grace-a-nos-outils</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="aide-a-la-decision"><![CDATA[aide à la décision]]></category>
		<category domain="post_tag" nicename="comptabilite"><![CDATA[comptabilité]]></category>
		<category domain="category" nicename="decisionnel"><![CDATA[Décisionnel]]></category>
		<category domain="post_tag" nicename="edition-pilotee"><![CDATA[edition pilotée]]></category>
		<category domain="post_tag" nicename="paie"><![CDATA[Paie]]></category>
		<category domain="post_tag" nicename="pme"><![CDATA[PME]]></category>
		<category domain="post_tag" nicename="rh"><![CDATA[RH]]></category>
		<category domain="post_tag" nicename="sage-100"><![CDATA[Sage 100]]></category>
		<category domain="category" nicename="solutions-de-gestion"><![CDATA[Solutions de gestion]]></category>
		<wp:postmeta>
			<wp:meta_key>_wpas_skip_3898347</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[77]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[décision]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438089]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"150.4147222394446";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"132.12979905452892";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:18:"127.05169297809758";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"118.43074189813855";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2438";s:5:"score";s:17:"98.03193853199943";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2475";s:5:"score";s:17:"95.78693613274739";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"62.800888125337316";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:18:"60.844764674016574";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:3:"334";s:5:"score";s:16:"53.8316335831027";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1595";s:5:"score";s:17:"50.70861529795184";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"60.20027610613228";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"55.20819716026388";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:17:"48.75227780422499";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"43.64043877805955";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:18:"28.306859235506643";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"24.863410459049938";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[2337]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"101.94438318895803";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"90.23740897614499";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:17:"83.76373296121902";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"74.29853654864601";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"334";s:5:"score";s:17:"57.52681644324233";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1595";s:5:"score";s:18:"53.685642278979465";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"563";s:5:"score";s:18:"53.685642278979465";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"344";s:5:"score";s:18:"52.963587761691386";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Mobilité : Suivez votre activité où vous voulez, quand vous voulez !</title>
		<link>http://www.it-news.fr/connectez-vous-ou-que-vous-soyez/</link>
		<pubDate>Tue, 11 Jun 2013 07:32:59 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?p=344</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/06/mobile-iphone1.jpg"><img class="alignleft size-thumbnail wp-image-507" title="Mobilité: Suivez votre activité où vous voulez, quand vous voulez!" alt="Business mobile" src="http://www.it-news.fr/wp-content/uploads/2013/06/mobile-iphone1.jpg?w=150" width="150" height="81" /></a>Les Smartphones/ Blackberry / Tablettes sont de plus en plus présents dans le monde professionnel, ils deviennent de véritable outils de travail dont il est de plus en plus difficile de se séparer.</p>
<p style="text-align: justify;">Ils vous permettent notamment de lire vos mails, bloquer des rendez-vous mais aussi, grâce à la solution <a title="Sage Business Mobile" href="http://new.aquastar-consulting.com/index.php/solutions/gestion-metier/gestion-commerciale/business-mobile" target="_blank">Sage Business Mobile</a>, donnent la possibilité aux chefs d'entreprises ou décideurs, de suivre en temps réel, depuis n'importe où et en toute sécurité, les principaux indicateurs de votre société et d'agir en fonction: gestion commerciale, comptabilité, CRM...</p>
<p style="text-align: left;"><!--more Lire la suite--></p>
<p style="text-align: justify;"><a href="http://new.aquastar-consulting.com/index.php/solutions/gestion-metier/business-mobile#" target="_blank">Sage Business Mobile</a> est l'application personnalisable  pour n'afficher que les graphiques qui vous semble pertinents. Pilotage de son activité, transmission des informations par e-mail, et bien d'autres fonctionnalités sont à exploiter sur cet outil.</p>
<p style="text-align: justify;">Le gros point fort de cette application, c'est le gain en réactivité car vous pourrez prendre toutes les décisions que vous voulez de n'importe où. Sage Business Mobile vous rend exploitable toutes les informations et données de votre société: commerciale, CRM, comptable etc...</p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/06/sagebusinessmobile.jpg"><img class="aligncenter size-full wp-image-510" alt="sage 100 mobile" src="http://www.it-news.fr/wp-content/uploads/2013/06/sagebusinessmobile.jpg" width="339" height="220" /></a></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>344</wp:post_id>
		<wp:post_date>2013-06-11 08:32:59</wp:post_date>
		<wp:post_date_gmt>2013-06-11 07:32:59</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>connectez-vous-ou-que-vous-soyez</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="business-mobile"><![CDATA[business mobile]]></category>
		<category domain="category" nicename="mobilite"><![CDATA[Mobilité]]></category>
		<category domain="post_tag" nicename="sage"><![CDATA[sage]]></category>
		<category domain="post_tag" nicename="sage-100"><![CDATA[Sage 100]]></category>
		<category domain="post_tag" nicename="sage-30"><![CDATA[sage 30]]></category>
		<category domain="category" nicename="solutions-de-gestion"><![CDATA[Solutions de gestion]]></category>
		<category domain="post_tag" nicename="tablette"><![CDATA[tablette]]></category>
		<wp:postmeta>
			<wp:meta_key>_wpas_skip_3898347</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>geo_public</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[49]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Mobilité]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437307]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:16:"201.942094612024";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:18:"153.34794008171875";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:18:"138.27549368504805";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2362";s:5:"score";s:16:"93.2357982564973";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2319";s:5:"score";s:17:"85.51990879697544";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"70.36752795750039";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:17:"55.67837028558065";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"342";s:5:"score";s:17:"49.80126665791556";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:3:"334";s:5:"score";s:17:"47.99724253646039";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:3:"332";s:5:"score";s:18:"44.865067593706506";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[510]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:16:"76.5897608976848";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"55.68014540608991";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"30.288574271998673";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:18:"24.108278979769004";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:17:"16.55567444146646";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1940";s:5:"score";s:18:"16.177525503762602";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"126.3099837147258";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"94.75940664289422";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:17:"87.40019216010178";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"342";s:5:"score";s:17:"53.22172972866422";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"334";s:5:"score";s:18:"51.929593966850774";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"332";s:5:"score";s:17:"47.87275308252159";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"47.31624166767947";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"223";s:5:"score";s:17:"44.65584138056365";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Les Ressources Humaines et la gestion des carrières</title>
		<link>http://www.it-news.fr/les-ressources-humaines-gestion-des-carrieres/</link>
		<pubDate>Thu, 20 Jun 2013 14:16:28 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?p=563</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/07/progres_carriere.jpg"><img class="alignleft size-thumbnail wp-image-704" title="Les ressources humaines et la gestion des carrières" alt="progres_carriere" src="http://www.it-news.fr/wp-content/uploads/2013/07/progres_carriere.jpg?w=150" width="150" height="123" /></a>Et si la crise était dûe à un manque de gestion des "<strong>Ressources Humaines</strong>" ?</p>
<p style="text-align: justify;">La fonction RH n'est-elle finalement pas LE poste qu'il faudrait accentuer dans son entreprise ?</p>
<p style="text-align: left;">Plus précisément, <strong>la <a title="Sage 100 RH" href="http://new.aquastar-consulting.com/index.php/solutions/gestion-metier/paye-rh" target="_blank">gestion des carrières</a></strong> est-elle trop souvent négligée ?</p>
<p style="text-align: justify;">Vous pouvez demander à votre employeur de partir en formation, et vous n'avez jamais utilisé ce droit ?</p>
<p style="text-align: justify;">Aquastar Consulting vous éclairci ces points...</p>
<!--more Lire la suite-->Pour qu'une<img title="Lire la suite…" alt="" src="https://aquastarconsultingblog.wordpress.com/wp-includes/js/tinymce/plugins/wordpress/img/trans.gif" /> entreprise fonctionne, il lui faut des objectifs, des buts à atteindre. Gagner de l'argent est certainement l'objectif premier pour beaucoup de sociétés. Et pour cela, elles se positionnent sur un marché, se battent, et tentent d'être les plus compétitives possibles.
<p style="text-align: justify;">On observe donc la génération de nouvelles activités de jour en jour, qui produisent des produits plus différents les uns que les autres. Finalement constructeur de notre monde et de notre environnement, chaque entreprise souhaite adapter son activité pour qu'elle puisse répondre à une demande et générer des profits.</p>
<p style="text-align: justify;">Pour que tout ce processus s'active et se déroule dans de bonnes conditions, il faut donc <strong>des ressources</strong>. C'est sur ce point que nous allons nous attarder. La gestion des ressources, notamment humaines, est au cœur du bon fonctionnement d'une entreprise.</p>
<p style="text-align: justify;">Pour qu'une société se développe, elle demande qu'on la gère, qu'on s'occupe de tous les éléments dont elle a besoin pour avancer. Avoir une personne chargée d'occuper la réception, une autre pour recevoir les appels entrants, une autre pour s'atteler à la production de biens et/ou services, ou encore de marketeurs pour qu'elle puisse communiquer et se vendre sur son marché. Et c'est la plupart du temps la bonne gestion de ces ressources qui force l'entreprise à se dépasser.</p>
<p style="text-align: justify;">Mettez les <strong>bonnes ressources</strong>, aux <strong>bons endroits</strong>, aux <strong>bons moments</strong> !</p>
<p style="text-align: justify;">Tâche bien plus difficile qu'il n'y parait, il s'agit de trouver un équilibre qui permettra à la société d'avancer et de se développer à l'image de ses employés. Vous souhaitez que votre société se développe ? Et bien développez les compétences de vos salariés ! Quelque chose qui pourrait en choquer plus d'un, mais <strong>faites en sorte d'augmenter l’employabilité de vos employés !</strong></p>
<p style="text-align: justify;">Plus ils seront aptes à faire face au marché de l'emploi, plus votre entreprise se portera mieux. Mais alors pourquoi former ses ressources pour les rendre plus compétitifs sur le marché de l'emploi ? Ne vont-elles pas en profiter pour changer d'air et délaisser votre entreprise ?</p>
<p style="text-align: justify;">Et bien sachez qu'au contraire, plus ils seront employables, plus ils seront susceptibles de rester au sein de votre société et donc <strong>contribuer à la développer !</strong> Cela est tout à fait logique, car ne plus évoluer, ne plus développer de compétence, amène un sentiment de désamour chez la personne concernée envers son emploi. Cela engendre irrémédiablement une perte de motivation, une routine, et un très maigre investissement professionnel. Tout ça est normal, si vous n'aviez pas développé de compétence au sein de votre entreprise depuis un moment, vous vous ennuieriez certainement, et sans vos obligations financières, vous auriez très certainement été voir ailleurs.</p>
<p style="text-align: justify;">A contrario, développer les compétences de ses salariés et les rendre plus compétitifs sur le marché de l'emploi crée de l'épanouissement et augmente l'investissement professionnel de votre staff. Et pourquoi partiraient-ils s'ils ont le sentiment de se développer et de s'accomplir personnellement et professionnellement ?</p>
<p style="text-align: justify;">Il faut voir ici l'importance d'une relation gagnant/gagnant entre une entreprise et le facteur humain. Si une entreprise donne, elle aura forcément des retours positifs.</p>
<p style="text-align: justify;">Toutefois, si votre entreprise ne vous aide pas à vous accomplir de votre vie professionnelle, sachez qu'il existe des moyens pour l'obliger à s'y atteler. En effet, dans les cas où vous avez plus d'un an d'ancienneté, à temps partiel ou complet, et que votre contrat est à durée indéterminée, alors vous avez le droit à<strong> 20 heures de formation minimum par an !</strong></p>
<p style="text-align: justify;">Cela s'appelle le DIF (<a href="http://travail-emploi.gouv.fr/le-droit-individuel-a-la-formation,1071.html" target="_blank">Droit Individuel à la Formation</a>) et il est souvent oublié par le plus grand nombre. Il faut toutefois savoir que c'est à l'employé d'en faire la demande auprès de son employeur. N'hésitez donc pas à faire valoir ce droit, et à développer vos compétences par votre propre initiative.</p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/06/dossier-dif2.jpg"><img class="aligncenter" alt="DIF - Formation" src="http://www.it-news.fr/wp-content/uploads/2013/06/dossier-dif2.jpg?w=300" width="300" height="165" /></a></p>
<p style="text-align: justify;">Vous l'aurez compris, cette vision est une vision utopique, où les processus de développement s’enchaînent naturellement. L'objectif est malgré tout de s'en rapprocher au maximum. Malheureusement, la plupart des entreprises oublient ces facteurs et perdent en compétitivité sans se rendre compte que les solutions peuvent être réglées en interne.</p>
<p style="text-align: justify;">C'est également un élément qui est la cause directe de la montée des demandeurs d'emploi. Si chacun d'entre nous s'était retrouvé dans une structure qui prenait à cœur le développement de votre employabilité, les licenciements pour causes économiques et/ou technologiques auraient permis aux personnes licenciés de retrouver un travail plus rapidement.</p>
<p style="text-align: justify;"><span style="color: #ff6600;"><strong>Solutions conseillées par Aquastar Consulting :</strong></span></p>

<ul>
	<li>
<div style="text-align: justify;"><a title="Sage 100 Ressources Humaines" href="http://new.aquastar-consulting.com/index.php/solutions/gestion-metier/paye-rh" target="_blank">Sage 100 Ressources Humaines</a></div></li>
	<li>
<div style="text-align: justify;"><a title="Sage 100 Paie" href="http://new.aquastar-consulting.com/index.php/solutions/gestion-metier/paye-rh" target="_blank">Sage 100 Paie</a></div></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>563</wp:post_id>
		<wp:post_date>2013-06-20 15:16:28</wp:post_date>
		<wp:post_date_gmt>2013-06-20 14:16:28</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>les-ressources-humaines-gestion-des-carrieres</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="empoyabilite"><![CDATA[empoyabilité]]></category>
		<category domain="post_tag" nicename="gestion"><![CDATA[gestion]]></category>
		<category domain="category" nicename="paie-rh"><![CDATA[Paie - RH]]></category>
		<category domain="post_tag" nicename="ressources-humaines"><![CDATA[Ressources humaines]]></category>
		<category domain="post_tag" nicename="rh"><![CDATA[RH]]></category>
		<category domain="category" nicename="solutions-de-gestion"><![CDATA[Solutions de gestion]]></category>
		<wp:postmeta>
			<wp:meta_key>_wpas_done_3898347</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>publicize_twitter_user</wp:meta_key>
			<wp:meta_value><![CDATA[Aquastar_IT]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wpas_mess</wp:meta_key>
			<wp:meta_value><![CDATA[Les ressources humaines : Gestion des carrières.  http://wp.me/p3yr1h-95]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_publicize_done_external</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{s:7:"twitter";a:1:{i:821138382;b:1;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>geo_public</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wpas_skip_3898347</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[73]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[ressources humaines]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437953]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2438";s:5:"score";s:17:"232.6864758856002";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:17:"67.50731786218417";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:16:"67.1235971705471";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2319";s:5:"score";s:18:"53.782773762090486";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"342";s:5:"score";s:17:"50.70861529795184";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2371";s:5:"score";s:17:"48.45780039474981";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"39.08831625393486";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:17:"35.13835039316937";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"32.515312207371515";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"31.604631072510237";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:18:"30.155425677357567";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"17.15697143829168";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:17:"15.03082718052878";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"14.645362090226424";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"14.425964256213575";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"13.418513305322026";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2438";s:5:"score";s:17:"91.06761857613435";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"342";s:5:"score";s:17:"53.80827589071564";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:17:"46.68522974628052";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:17:"45.41611258294155";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:18:"30.776311606148653";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1156";s:5:"score";s:18:"30.300462739429314";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"578";s:5:"score";s:18:"26.919744029576663";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1868";s:5:"score";s:18:"26.864255281507386";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[2443]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Paramétrage du CICE dans votre logiciel de paie.</title>
		<link>http://www.it-news.fr/parametrage-du-cice-dans-votre-logiciel-de-paie/</link>
		<pubDate>Fri, 21 Jun 2013 10:06:37 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?p=578</guid>
		<description></description>
		<content:encoded><![CDATA[<a href="http://www.it-news.fr/wp-content/uploads/2013/06/edf-gdf-gabegie-cice-296x300.jpg"><img class="alignleft size-thumbnail wp-image-580" title="Paramétrage du CICE dans votre logiciel de paie" alt="Paramétrage CICE" src="http://www.it-news.fr/wp-content/uploads/2013/06/edf-gdf-gabegie-cice-296x300.jpg?w=148" width="148" height="150" /></a>Le CICE concerne toutes les sociétés françaises employant des salariés, imposées à l'impôt sur les sociétés (IS) ou à l'impôt sur le revenu (IR) d'après leur bénéfice réel.
<p style="text-align: justify;">Il a pour objet le financement de l’amélioration de la compétitivité des entreprises et constitue un avantage réel en trésorerie car il permet de réaliser une économie d’impôt significative voir de bénéficier d'un remboursement.</p>
<!--more Lire la suite-->
<p style="text-align: justify;">Le montant du CICE est calculé sur les rémunérations versées aux salariés au cours d'une année civile qui n'excèdent pas 2,5 fois le SMIC annuel. Pour 2013, elle équivaut à 4 % de la masse totale salariale, hors salaires supérieurs à 2,5 fois le SMIC. A partir de 2014, ce taux sera réévalué à 6 %.</p>

<div>
<p style="text-align: justify;"><small>En savoir plus sur le CICE : <a href="http://www.urssaf.fr/employeurs/dossiers_reglementaires/dossiers_reglementaires/credit_dimpot_competitivite_et_emploi_%28cice%29_01.html">Site officiel de l'urssaf</a></small></p>
<p style="text-align: justify;"><strong>Le 15 juillet c'est la date limite pour la mise en conformité légale de votre logiciel de paie !</strong></p>
<p style="text-align: justify;">Si vous n’avez pas encore paramétré votre logiciel de paie, Aquastar Consulting vous propose un forfait d'intervention d'une demi-journée à 425 € HT pour sa mise en  conformité légale.
<a href="http://emailing.aquastar-consulting.com/2013/Gestion/Intervention-CICE/images/intervention-aquastar-consulting-cice.pdf"><img class="aligncenter" alt="Je souhaite réserver une date d'intervention" src="http://emailing.aquastar-consulting.com/2013/Gestion/Intervention-CICE/images/resa-inter.jpg" /></a>
Les prestations inclues dans le forfait :</p>

<ul>
	<li>Les sauvegardes de vos dossiers Paie,</li>
	<li>La vérification du plan de paie existant, des correctifs et des mises à jour,</li>
	<li>La mise en place des paramétrages liés au CICE,</li>
	<li>L'historisation des sorties spécifiques liées au CICE (salariés sortis depuis le 1er janvier),</li>
	<li>Le paramétrage des DUCS Urssaf et du Sage DS avancé,</li>
	<li>La mise à jour des logiciels de Paie et de Sage DS Avancé.</li>
</ul>
<p style="text-align: justify;">Pour obtenir un rendez-vous prioritaire, veuillez télécharger <a href="http://emailing.aquastar-consulting.com/2013/Gestion/Intervention-CICE/images/intervention-aquastar-consulting-cice.pdf">le bon de commande</a> en cliquant sur le bouton ci-dessus et en nous le renvoyant scanné et dûment complété par mail à : <a href="mailto:polegestion@aquastar-consulting.com?subject=%20Bon%20de%20commande%20Intervention%20CICE">polegestion@aquastar-consulting.com</a>.</p>
<p style="text-align: justify;"><small>* La tarification liée à cette intervention est valable  pour les sociétés disposant de la solution "Sage DS Avancé" et pour lesquelles le Plan de Paie est conforme au standard Sage. Si votre dossier est plus complexe, veuillez vous rapprocher du Pôle Gestion d'Aquastar Consulting pour convenir d'un rendez-vous d'analyse.</small></p>

</div>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>578</wp:post_id>
		<wp:post_date>2013-06-21 11:06:37</wp:post_date>
		<wp:post_date_gmt>2013-06-21 10:06:37</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>parametrage-du-cice-dans-votre-logiciel-de-paie</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="2013"><![CDATA[2013]]></category>
		<category domain="post_tag" nicename="cice"><![CDATA[CICE]]></category>
		<category domain="post_tag" nicename="competitivite-entreprise"><![CDATA[compétitivité entreprise]]></category>
		<category domain="category" nicename="paie-rh"><![CDATA[Paie - RH]]></category>
		<category domain="post_tag" nicename="parametrage"><![CDATA[paramétrage]]></category>
		<category domain="category" nicename="solutions-de-gestion"><![CDATA[Solutions de gestion]]></category>
		<wp:postmeta>
			<wp:meta_key>_publicize_done_external</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{s:7:"twitter";a:1:{i:821138382;b:1;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wpas_done_3898347</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>publicize_twitter_user</wp:meta_key>
			<wp:meta_value><![CDATA[Aquastar_IT]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>publicize_reach</wp:meta_key>
			<wp:meta_value><![CDATA[a:2:{s:7:"twitter";a:1:{i:3898347;i:26;}s:2:"wp";a:1:{i:0;i:1;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>geo_public</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wpas_skip_3898347</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[79]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[CICE]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438078]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"149.71434719617622";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:16:"128.474993828819";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:17:"70.64060434126677";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2371";s:5:"score";s:16:"57.6752074445311";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2465";s:5:"score";s:17:"49.83864653619202";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1595";s:5:"score";s:17:"47.75448779838521";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"46.357793133640904";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:17:"44.05637245542553";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2319";s:5:"score";s:18:"38.233817673319635";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"37.33682790444462";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"47.56508021195425";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:17:"40.41896328626248";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:17:"33.61728832938526";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"20.07777610460361";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"16.962986906522943";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:17:"16.88221334956034";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[2348]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"85.81068641874455";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:17:"73.52425624870376";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1595";s:5:"score";s:18:"56.930563695785935";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:18:"51.213078817519175";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1868";s:5:"score";s:18:"37.366528740435285";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1043";s:5:"score";s:17:"37.23895017136188";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"953";s:5:"score";s:18:"37.186793393905205";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:17:"35.53409042144076";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Optimisez vos coûts de production grâce à Sage 100 GPAO</title>
		<link>http://www.it-news.fr/petit-dejeuner-du-4-juillet-2013-augmenter-sa-rentabilite-sans-changer-son-outil-de-production/</link>
		<pubDate>Tue, 25 Jun 2013 10:31:20 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?p=644</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/07/calendrier.jpg"><img class="alignleft size-full wp-image-691" title="Optimisez vos coûts de production grâce à Sage 100 GPAO" alt="calendrier" src="http://www.it-news.fr/wp-content/uploads/2013/07/calendrier.jpg" width="150" height="150" /></a><a href="http://emailing.aquastar-consulting.com/2013/Gestion/Evenement-GPAO/index.html" target="_blank">Aquastar Consulting vous invite dans ses locaux le 4 Juillet prochain à 9h00</a> pour découvrir LA solution dédiée aux TPI-PMI françaises.</p>
<p style="text-align: justify;">En effet environ 20 000 sociétés utilisent au quotidien <a title="Sage 100 Gestion de Production" href="http://new.aquastar-consulting.com/index.php/solutions/gestion-metier/gestion-de-production#" target="_blank"><strong>Sage 100 Gestion de production</strong></a>. Venez découvrir comment cette solution est en mesure de vous apporter, très simplement, des gains en productivité et en rentabilité.</p>
<!--more Lire la suite-->
<p style="text-align: justify;">L'objectif est de vous fournir toutes les informations sur les nouvelles fonctionnalités de <a title="Sage 100 Gestion de Production" href="http://new.aquastar-consulting.com/index.php/solutions/gestion-metier/gestion-de-production#" target="_blank"><strong>Sage 100 Gestion de production</strong></a>, et de vous faire rencontrer un expert sur ce thème.</p>
<p style="text-align: justify;">Quelques nouvelles fonctionnalités :</p>

<ul style="text-align: justify;">
	<li>Intégration de la gestion des rebuts dans le calcul de besoins nets,</li>
	<li>Développement d’un deviseur Technique,</li>
	<li>Compatible Windows 8,</li>
	<li>Baisser vos délais de production en maîtrisant votre planning atelier,</li>
	<li>Réduire vos stocks et achats inutiles en optimisant vos méthodes d’approvisionnement,</li>
	<li>Maîtriser vos coûts réels en fiabilisant vos analyses,</li>
</ul>
<p style="text-align: justify;"><strong><a title="événement GPAO Aquastar Consulting" href="http://emailing.aquastar-consulting.com/2013/Gestion/Evenement-GPAO/index.html" target="_blank">Cliquez ici pour vous inscrire.</a></strong></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>644</wp:post_id>
		<wp:post_date>2013-06-25 11:31:20</wp:post_date>
		<wp:post_date_gmt>2013-06-25 10:31:20</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>petit-dejeuner-du-4-juillet-2013-augmenter-sa-rentabilite-sans-changer-son-outil-de-production</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="aquastar-consulting"><![CDATA[Aquastar Consulting]]></category>
		<category domain="post_tag" nicename="evenement"><![CDATA[événement]]></category>
		<category domain="category" nicename="evenements"><![CDATA[Evénements]]></category>
		<category domain="post_tag" nicename="gestion-de-production"><![CDATA[Gestion de production]]></category>
		<category domain="post_tag" nicename="gpao"><![CDATA[GPAO]]></category>
		<category domain="post_tag" nicename="petit-dejeuner"><![CDATA[petit déjeuner]]></category>
		<category domain="post_tag" nicename="sage-100"><![CDATA[Sage 100]]></category>
		<wp:postmeta>
			<wp:meta_key>publicize_twitter_user</wp:meta_key>
			<wp:meta_value><![CDATA[Aquastar_IT]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_publicize_done_external</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{s:7:"twitter";a:1:{i:821138382;b:1;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wpas_done_3898347</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wpas_skip_3898347</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>geo_public</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[57]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Sage]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426439072]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2125";s:5:"score";s:18:"302.33208718554755";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:18:"232.47560085101654";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"963";s:5:"score";s:17:"58.61024598140587";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"334";s:5:"score";s:18:"49.515277008386335";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"342";s:5:"score";s:17:"45.79928124977567";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"332";s:5:"score";s:17:"44.13222995847156";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"344";s:5:"score";s:18:"41.935005380856865";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"26.96468772984423";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"25.351400513654667";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"24.44071937879339";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2125";s:5:"score";s:16:"98.9092339091188";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:17:"80.48212615226005";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"11.756624117754155";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"11.03459742637067";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"10.113325669092283";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:18:"10.075451265920428";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[691]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2125";s:5:"score";s:18:"177.54562816103282";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:18:"140.73909247628916";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"963";s:5:"score";s:18:"59.368928400351685";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"334";s:5:"score";s:17:"52.09932105920588";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"342";s:5:"score";s:17:"47.24871744553984";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"332";s:5:"score";s:18:"45.596400440697664";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"344";s:5:"score";s:17:"44.08047723571307";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:2:"68";s:5:"score";s:18:"25.431866810110964";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Forum International de la Cybersécurité 2014 à Lille</title>
		<link>http://www.it-news.fr/aquastar-consulting-participera-au-forum-international-de-la-cybersecurite-fic/</link>
		<pubDate>Fri, 12 Jul 2013 08:02:14 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?p=653</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/07/calendrier.jpg"><img class="alignleft size-full wp-image-691" title="Forum International de la Cybersécurité 2014 à Lille" alt="calendrier" src="http://www.it-news.fr/wp-content/uploads/2013/07/calendrier.jpg" width="150" height="150" /></a>C'est le <strong>21 et 22 Janvier prochain</strong>, à Lille Grand Palais, qu'Aquastar Consulting se rendra pour participer au rendez-vous de référence en sécurité numérique. L'objectif premier est de vous faire découvrir les dernières nouveautés en matière de Sécurité.</p>
<p style="text-align: justify;">Pour plus d'informations, n'hésitez pas à visiter le <a href="http://www.forum-fic.com/quest-ce-que-le-fic/" target="_blank">site officiel du FIC</a>.</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>653</wp:post_id>
		<wp:post_date>2013-07-12 09:02:14</wp:post_date>
		<wp:post_date_gmt>2013-07-12 08:02:14</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>aquastar-consulting-participera-au-forum-international-de-la-cybersecurite-fic</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="evenements"><![CDATA[Evénements]]></category>
		<wp:postmeta>
			<wp:meta_key>_wpas_done_3898347</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_publicize_done_external</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{s:7:"twitter";a:1:{i:821138382;b:1;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>publicize_twitter_user</wp:meta_key>
			<wp:meta_value><![CDATA[Aquastar_IT]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>publicize_reach</wp:meta_key>
			<wp:meta_value><![CDATA[a:2:{s:7:"twitter";a:1:{i:3898347;i:26;}s:2:"wp";a:1:{i:0;i:1;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>geo_public</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wpas_skip_3898347</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[34]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_post_restored_from</wp:meta_key>
			<wp:meta_value><![CDATA[a:3:{s:20:"restored_revision_id";i:1237;s:16:"restored_by_user";i:1;s:13:"restored_time";i:1383662088;}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Cybersécurité]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426439029]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2125";s:5:"score";s:17:"60.46107304259807";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:2:"68";s:5:"score";s:18:"32.593059670517604";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"30.60385892748026";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"30.310320795511252";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2411";s:5:"score";s:18:"24.458833030926407";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:18:"22.878082739817565";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2424";s:5:"score";s:18:"19.701447535331468";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1236";s:5:"score";s:18:"19.541690877848186";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:3:"644";s:5:"score";s:18:"18.524764446442827";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2354";s:5:"score";s:17:"17.75706446660477";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2125";s:5:"score";s:17:"18.97648030004257";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"14.275238726333582";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"12.982318593482525";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:17:"9.713283400320279";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1940";s:5:"score";s:17:"8.549440309641424";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:17:"8.126822121645246";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:2:"68";s:5:"score";s:17:"34.46083957849078";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2125";s:5:"score";s:18:"34.328617906941716";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1236";s:5:"score";s:18:"22.265551170544278";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"21.58549232396279";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1789";s:5:"score";s:18:"20.580234610680222";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"644";s:5:"score";s:17:"20.44876442497842";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"20.093936575122882";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1902";s:5:"score";s:18:"19.877667690439132";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[691]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>PMI - TPI : Investissez mieux en dépensant moins !</title>
		<link>http://www.it-news.fr/pmi-tpi-investissez-mieux-en-depensant-moins/</link>
		<pubDate>Fri, 19 Jul 2013 14:31:45 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?p=713</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/07/industrie-chinoise.jpg"><img class="alignleft size-thumbnail wp-image-719" title="OMI-TPI: investissez mieux en dépensant moins!" alt="PMI - TPI" src="http://www.it-news.fr/wp-content/uploads/2013/07/industrie-chinoise.jpg?w=150" width="150" height="110" /></a>Dans le contexte économique actuel, les TPI et PMI font face à une concurrence toujours plus agressive. Manquant bien souvent de moyens pour investir et faire face à la compétitivité, elles subissent les difficultés du marché et comptent précieusement leurs investissements.</p>
<!--more Lire la suite-->
<p style="text-align: justify;">Malgré tout, l’investissement semble inévitable si l’on souhaite trouver des solutions pour répondre à l’agressivité du marché. Il s’agit donc d’investir, mais de bien le faire. Le tout est de trouver un juste milieu entre ce que vous souhaitez dépenser et ce que cela va vous rapporter. Autrement dit, vous pouvez très bien investir 100 pour gagner 200, mais investir 10 pour gagner 30 n’est-il finalement pas plus judicieux ?</p>
<p style="text-align: justify;">Il existe donc différents types d’investissements. L’un va consister à remplacer une machine obsolète, l’autre à embaucher de la main d’œuvre, et encore un autre se résume à partir à la recherche de fournisseurs qui pratiqueront des prix plus attractifs. Mais l’objet de cet article s’intéresse plus particulièrement à <b>la réduction du temps passé</b> <b>entre la réception d’une commande et sa sortie de l’usine</b>.</p>
<p style="text-align: justify;">L’optimisation du cycle de production est un excellent point sur lequel il est intéressant d’investir. C’est sur cet aspect qu’il est possible de dépenser peu pour finalement beaucoup y gagner. Plusieurs solutions existent pour répondre à ce problème : Améliorer la communication en interne, former son personnel à être plus productif, ou encore travailler la cohésion entre les différents services.</p>
<p style="text-align: justify;">Toutefois, il existe également des <a href="http://new.aquastar-consulting.com/index.php/solutions/gestion-metier/gestion-de-production#" target="_blank">logiciels de gestion de production</a> qui vont permettre d’automatiser certaines tâches récurrentes, de donner de la visibilité à sa production, de prendre les bonnes décisions, et de réduire les erreurs qui enraillent le processus de fabrication.  Le pionner dans ce domaine en France, c'est <a href="http://new.aquastar-consulting.com/index.php/societe/partenaires/gestion-metier/sage" target="_blank">l'éditeur de logiciel Sage</a>.</p>
<p style="text-align: justify;">Les évolutions sur ce type d'outil ne cessent d'ailleurs pas de voir le jour. La dernière version du logiciel Sage 100 Gestion de Production propose en effet de toutes nouvelles fonctionnalités bien pratiques pour réduire son cycle de production. Prenons ensemble un exemple pour rentrer dans le concret :</p>
<p style="text-align: justify;"><span style="line-height: 1.5;">   - <strong>La gestion des rebuts dans le Calcul des Besoins Nets</strong> <strong>(CBN)</strong></span></p>
<p style="text-align: justify;">Directement lié à la Gestion Commerciale Sage et reconnu pour posséder un des CBN les plus complet du marché, Le CBN de <a href="http://new.aquastar-consulting.com/index.php/solutions/gestion-metier/gestion-de-production#" target="_blank">Sage 100 Gestion de Production</a> optimise de façon quantifiable les stocks de matières premières. Il prend en compte <strong>des rebuts prévisionnels, </strong>c'est donc la bonne nouvelle pour les industriels. Concrètement, deux nouvelles fonctions s'en dégagent :</p>
<p style="text-align: justify;">- Les fabrications tiennent compte d'un taux de rebut.</p>
<p style="text-align: justify;">- Les consommations issues des nomenclatures indiquent un taux de rebut.</p>
<p style="text-align: justify;">Cela permet aux préparations de production d'être justes et d'éviter les ruptures de production à cause d'un manque en matières premières.</p>
<p style="text-align: justify;"></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>713</wp:post_id>
		<wp:post_date>2013-07-19 15:31:45</wp:post_date>
		<wp:post_date_gmt>2013-07-19 14:31:45</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>pmi-tpi-investissez-mieux-en-depensant-moins</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="fabrication"><![CDATA[fabrication]]></category>
		<category domain="category" nicename="infrastructures"><![CDATA[Infrastructures]]></category>
		<category domain="post_tag" nicename="investissement"><![CDATA[investissement]]></category>
		<category domain="post_tag" nicename="logiciel"><![CDATA[logiciel]]></category>
		<category domain="post_tag" nicename="optimisation-de-production"><![CDATA[optimisation de production]]></category>
		<category domain="post_tag" nicename="pmi"><![CDATA[PMI]]></category>
		<category domain="post_tag" nicename="production"><![CDATA[production]]></category>
		<category domain="post_tag" nicename="tpi"><![CDATA[TPI]]></category>
		<wp:postmeta>
			<wp:meta_key>_publicize_done_external</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{s:7:"twitter";a:1:{i:821138382;b:1;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wpas_done_3898347</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>publicize_twitter_user</wp:meta_key>
			<wp:meta_value><![CDATA[Aquastar_IT]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>publicize_reach</wp:meta_key>
			<wp:meta_value><![CDATA[a:2:{s:7:"twitter";a:1:{i:3898347;i:26;}s:2:"wp";a:1:{i:0;i:2;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>geo_public</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wpas_skip_3898347</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[67]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_post_restored_from</wp:meta_key>
			<wp:meta_value><![CDATA[a:3:{s:20:"restored_revision_id";i:860;s:16:"restored_by_user";i:1;s:13:"restored_time";i:1383662293;}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[investissement]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"44.58763377928843";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"41.700780034639116";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"41.091159329577806";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"334";s:5:"score";s:17:"38.83342881834078";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"820";s:5:"score";s:17:"36.96250752298462";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"126";s:5:"score";s:17:"36.76300671907076";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:17:"27.48411814828207";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:16:"18.6693379722889";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:3:"323";s:5:"score";s:18:"16.705268156495798";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1305";s:5:"score";s:18:"16.329901156713724";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426213442]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:18:"16.597924252940956";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"13.746461951350355";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"12.259692180028683";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1794";s:5:"score";s:16:"9.16155778644464";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:16:"7.82329317809187";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1924";s:5:"score";s:17:"7.612572146807468";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:3:"334";s:5:"score";s:18:"39.986651824028336";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"820";s:5:"score";s:16:"37.3465618726193";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"126";s:5:"score";s:17:"36.37720118650126";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:18:"31.149453157031836";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"28.016400516587986";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"24.299374192141485";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"23.22698921556674";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"323";s:5:"score";s:18:"18.574747146368928";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:12:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:16:"44.3328532633536";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:16:"41.4505036253191";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:17:"40.91550687949127";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"334";s:5:"score";s:17:"38.70163864606598";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"820";s:5:"score";s:18:"36.823674360054554";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"126";s:5:"score";s:18:"36.635616461296465";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:18:"27.356387702242763";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:17:"18.53857342719035";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:3:"323";s:5:"score";s:18:"16.623137966612497";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1305";s:5:"score";s:18:"16.233514891445317";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:18:"15.670508430104128";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"15.400073054083053";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:comment>
			<wp:comment_id>1140</wp:comment_id>
			<wp:comment_author><![CDATA[buroclic.fr]]></wp:comment_author>
			<wp:comment_author_email>michael.baltro@laposte.net</wp:comment_author_email>
			<wp:comment_author_url>http://www.buroclic.com/</wp:comment_author_url>
			<wp:comment_author_IP>37.59.69.18</wp:comment_author_IP>
			<wp:comment_date>2014-02-04 11:09:04</wp:comment_date>
			<wp:comment_date_gmt>2014-02-04 10:09:04</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[Les logiciels sur le marché permettent de gagner un temps précieux et, ainsi se concentrer sur des fonctions plus lucratives. Beaucoup trop de petites entreprises n’ont pas encore d’outils de gestion de production, et je trouve cela plutôt dommage.]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type></wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
	</item>
	<item>
		<title>L’usage d’Internet au travail : Plus d’une heure par jour à des fins personnelles !</title>
		<link>http://www.it-news.fr/les-connexions-personnelles-au-travail-representent-plus-dun-mois-de-travail-perdu-par-an/</link>
		<pubDate>Mon, 22 Jul 2013 13:21:40 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?p=723</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/07/facebook-au-taf.jpg"><img class="alignleft size-thumbnail wp-image-727" alt="facebook-au-travail" src="http://www.it-news.fr/wp-content/uploads/2013/07/facebook-au-taf.jpg?w=150" width="150" height="103" /></a>La présence des outils informatiques dans l'entreprise est aujourd'hui clairement démocratisée. Cela donne même un avantage certain aux sociétés qui les maîtrisent mieux que d'autres. Toutefois, ces opportunités qu'offre le numérique peuvent parfois être ralenties par l'utilisation qu'en font vos salariés.  En effet, on constate de plus en plus que les connexions personnelles au travail ne cessent d'augmenter. Et pour cause, une étude démontre que les employés passent en moyenne <strong>une heure par jour</strong> sur internet à des fins personnelles. Mais sur quels sites vont-ils ?</p>
<!--more Lire la suite-->
<p style="text-align: justify;">En tête de liste des sites les plus consultés dans le cadre hors professionnel, on trouve Facebook, <a class="zem_slink" title="YouTube" href="http://www.youtube.com/" target="_blank" rel="homepage">Youtube</a>, ou encore le bon coin. Pour poser quelques chiffres, et toujours selon l'étude de Olfeo, si l'on s'arrête sur une base de 35 heures de travail hebdomadaires, les connexions personnelles représentent 4h45 par semaine et 28,5 jours par an.</p>
<p style="text-align: justify;">Autrement dit, <strong>vos salariés ne vont pas travailler durant 5,7 semaines</strong> (Avec jours ouvrables) sur une année. Ce chiffre est impressionnant ? Et bien sachez qu'il porte seulement sur l'année 2012, et que l'année 2013 enregistre d'ores et déjà une augmentation de cette pratique. Mais alors que faire ?</p>
<p style="text-align: justify;">Etant une menace pour l'employeur et la productivité de sa société, le divertissement des salariés au travail pose donc une véritable problématique. En effet, il est pratiquement impossible de contrôler un par un ses salariés. Quand bien même vous voudriez essayer, observer par dessus leurs épaules toutes les heures n’apporterait rien de bon dans la relation que vous entretenez avec eux, et ne se révélerait de toute manière inefficace.</p>

<h2 style="text-align: justify;">Quelles solutions pour s'assurer du travail de ses employés ?</h2>
<p style="text-align: justify;">Rassurez vous, il est tout de même possible de contrôler vos connexions et/ou les applications de vos salariés sans pour autant devoir les surveiller 24h/24.</p>
<p style="text-align: justify;">L'une des solutions les plus efficaces aujourd'hui réside dans <a href="http://new.aquastar-consulting.com/index.php/solutions/securite/firewalls#" target="_blank">la mise en place de Pare feu </a>qui vont donner accès (ou non) aux applications et sites internet de votre choix. L'exemple des <a href="http://new.aquastar-consulting.com/index.php/solutions/securite/firewalls/palo-alto" target="_blank">Firewalls Palo Alto Networks</a> illustre bien la solution qui stoppera ces abus et cette perte de productivité.</p>
<p style="text-align: justify;">Vous allez ainsi pouvoir interdire l'accès à Facebook, le bon coin, ou bien encore rassembler l'ensemble des écrans de vos salariés sur un seul et même écran. Ainsi, vous pourrez contrôler sans être vu des abus fait pas vos employés et poser des limites à ne plus dépasser.</p>
<p style="text-align: justify;">Internet est à la fois source de productivité et source de divertissement au travail. En ce moment même, l'équilibre et le poids des connexions personnelles prennent de plus en plus d'ampleur et nécessitent d'être limitées au risque de voir chuter votre activité. L'informatique et Internet représentent de gigantesques opportunités, à conditions qu'ils soient bien menés.</p>
<p style="text-align: justify;"><strong><span style="text-decoration: underline;">A</span><span style="text-decoration: underline;">quastar Consulting vous assiste :</span></strong></p>
<p style="padding-left: 30px; text-align: justify;">o Afin de limiter les accès à des sites internet à des fins personnelles durant les heures de travail, Aquastar Consulting vous accompagne dans la <a href="http://new.aquastar-consulting.com/index.php/solutions/securite/firewalls/palo-alto" target="_blank">mise en place d’un tel Pare-Feu.</a>
o Pour toutes informations complémentaires, n’hésitez pas à nous contacter : <a href="http://new.aquastar-consulting.com/index.php/contact" target="_blank">contact@aquastar-consulting.com</a></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>723</wp:post_id>
		<wp:post_date>2013-07-22 14:21:40</wp:post_date>
		<wp:post_date_gmt>2013-07-22 13:21:40</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>les-connexions-personnelles-au-travail-representent-plus-dun-mois-de-travail-perdu-par-an</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="connexion-perso"><![CDATA[connexion perso]]></category>
		<category domain="post_tag" nicename="internet"><![CDATA[internet]]></category>
		<category domain="post_tag" nicename="personnelle"><![CDATA[personnelle]]></category>
		<category domain="post_tag" nicename="salarie"><![CDATA[salarié]]></category>
		<category domain="post_tag" nicename="salaries"><![CDATA[salariés]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<wp:postmeta>
			<wp:meta_key>geo_public</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wpas_skip_3898347</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_publicize_done_external</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{s:7:"twitter";a:1:{i:821138382;b:1;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wpas_done_3898347</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>publicize_twitter_user</wp:meta_key>
			<wp:meta_value><![CDATA[Aquastar_IT]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>publicize_reach</wp:meta_key>
			<wp:meta_value><![CDATA[a:2:{s:7:"twitter";a:1:{i:3898347;i:26;}s:2:"wp";a:1:{i:0;i:2;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_zemanta_has_recommendations</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[94]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[travail]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[L’usage d’Internet au travail à des fins personnelles !]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Lorsque vous êtes au travail, que vous avez accès à internet, n'êtes vous pas tenté de naviguer sur des sites hors cadre professionnel ?]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426439055]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2232";s:5:"score";s:18:"114.61481822636408";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2030";s:5:"score";s:18:"114.61481822636408";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:18:"57.082203040698126";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2125";s:5:"score";s:17:"41.10893503799652";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:17:"41.10260842387696";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"36.16698898892049";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2444";s:5:"score";s:18:"26.247619232607764";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"25.630852033014317";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"1741";s:5:"score";s:18:"25.612783349662415";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"21.915302370577308";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2232";s:5:"score";s:16:"38.1404259706059";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2030";s:5:"score";s:16:"38.1404259706059";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:18:"22.869611540877653";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2125";s:5:"score";s:18:"17.152549237105465";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:17:"17.04441479535903";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"15.954706704371853";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2232";s:5:"score";s:17:"68.15683848761648";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2030";s:5:"score";s:17:"68.15683848761648";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:17:"37.07634033247393";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1741";s:5:"score";s:17:"31.55135338004103";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"27.989461185681286";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2125";s:5:"score";s:18:"27.103730438833665";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"25.043402000087603";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:17:"17.68851492258908";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>OVH / Apple piratées, quelles solutions pour se sortir du piratage ? </title>
		<link>http://www.it-news.fr/ovh-apple-pirates-quelle-solutions-pour-se-sortir-du-piratage/</link>
		<pubDate>Thu, 25 Jul 2013 11:35:07 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?p=736</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><span style="line-height: 1.5;"><a href="http://www.it-news.fr/wp-content/uploads/2013/07/anonymus-6744.jpg"><img class="alignleft size-thumbnail wp-image-749" alt="Piratage OVH Apple" src="http://www.it-news.fr/wp-content/uploads/2013/07/anonymus-6744.jpg?w=150" width="150" height="99" /></a>Les pirates informatiques n'ont pas posé congés cet été, et les géants du Web en font les frais. </span></p>
<p style="text-align: justify;"><strong style="line-height: 1.5;">OVH, Apple et Ubuntu</strong><span style="line-height: 1.5;"> s'activent en ce moment même pour rétablir leurs systèmes informatiques victimes d'une faille exploitée par les pirates.  </span>Chacun d'entre eux se veut toutefois rassurant sur les données captées par les hackers.</p>
<b>Malgré tout, n'auraient-ils pas pu éviter ces intrusions ? </b>La réponse à cette question est claire : OUI ! Découvrez comment...

<!--more Lire la suite-->
<p style="text-align: justify;"><a href="http://www.journaldugeek.com/2013/07/23/lhebergeur-ovh-pirate/" target="_blank"><img class="size-thumbnail wp-image-750 alignnone" alt="ovh" src="http://www.it-news.fr/wp-content/uploads/2013/07/logo_ovh-svg.png?w=150" width="150" height="150" /></a>                       <a href="http://www.lefigaro.fr/flash-eco/2013/07/22/97002-20130722FILWWW00165-un-site-d-apple-pirate.php" target="_blank"><img class="size-thumbnail wp-image-751 alignnone" alt="apple" src="http://www.it-news.fr/wp-content/uploads/2013/07/logo-apple.jpg?w=150" width="150" height="112" /></a>                        <a href="http://www.zdnet.fr/actualites/ubuntu-18-million-de-comptes-des-forums-anglophones-pirates-39792606.htm" target="_blank"><img class="size-thumbnail wp-image-752 alignnone" alt="ubuntu-flavours" src="http://www.it-news.fr/wp-content/uploads/2013/07/ubuntu-flavours.jpg?w=150" width="150" height="90" /></a><b style="line-height: 1.5;"> </b></p>
<p style="text-align: justify;"><b>Tout d'abord comment les pirates informatiques ont-ils procédés ? </b></p>
<p style="text-align: justify;">Pour simplifier la chose au maximum, ils ont réussi à récupérer les codes et mots de passe de certains employés des sociétés concernées.</p>
<p style="text-align: justify;">De cette manière, ils ont pu fouiller dans les archives et rechercher les données qu'ils souhaitaient donnant accès à des données personnelles des clients OVH.</p>
<p style="text-align: justify;">Même si ces trois acteurs mettent en avant qu'aucunes coordonnées bancaires de ses utilisateurs n'a été touchées, les adresses e-mails, postales, noms et prénoms ont quant à eux bien été récupérées par les pirates.</p>
<p style="text-align: justify;">Pire encore, l'ensemble des mots de passe et identifiants ont eux aussi été interceptés par les Hackers. A partir de cet instant, on comprend que la sécurité déployée par Apple ou OVH pour protéger ses clients puisse être remis en cause.</p>
Nous sommes face à un cas de <strong>violation des données personnelles</strong>, et ce n'est pas rien.
<p style="text-align: justify;"><strong>Comment auraient-ils pu empêcher ces attaques ?</strong></p>
<p style="text-align: justify;">Il existe des<strong> <a title="Solution de cryptage et de contrôle des accès : Imprivata" href="http://new.aquastar-consulting.com/index.php/solutions/securite/59-imprivata-onesign" target="_blank">solutions de cryptage et contrôles des accès </a></strong>qui auraient pu empêcher cela notamment celle développée par la société Imprivata.</p>
<p style="text-align: justify;">Le principe de la solution est de générer toutes les 30 à 45 secondes un nouveau mot de passe visible sur une carte ou un petit boitier mis uniquement au service d'un et un seul employé.</p>
<p style="text-align: justify;">Autrement dit, sans l'outil, il est même impossible pour la personne en question de connaitre son propre mot de passe 1 minute après sa déconnexion à un de ses comptes utilisateurs. <b>Générés par satellite</b>, les codes de cette solution permettent une haute sécurité.</p>
<p style="text-align: justify;">Utilisée par des utilisateurs souhaitant <strong>garantir à 100% la confidentialité de leurs données,</strong><b> </b>elle aurait pu éviter à OVH la panique générale de ces derniers jours.</p>
<a href="http://www.it-news.fr/wp-content/uploads/2013/07/800-rsa-securid.jpg"><img class="size-large wp-image-739 aligncenter" alt="RSA securID Imprivata" src="http://www.it-news.fr/wp-content/uploads/2013/07/800-rsa-securid.jpg?w=640" width="371" height="409" /></a>
<p style="text-align: justify;"><b>Seule, cette solution est suffisante ?</b><strong> </strong><b></b></p>
<p style="text-align: justify;">En effet, elle permet d'ores et déjà de réduire considérablement les risques d'intrusions. Ce que l'on peut conseiller d'ajouter en complément, c'est l'utilisation d'un <strong>pare-feu de nouvelle génération</strong> (<a href="http://new.aquastar-consulting.com/index.php/solutions/securite/firewalls/palo-alto" target="_blank">Firewalls Palo Alto Networks</a>) qui va <strong>contrôler les connexions</strong> et <strong>identifier tous utilisateurs</strong> avant qu'il puisse avoir accès à quelques données que ce soit.</p>
<p style="text-align: justify;"><a href="http://new.aquastar-consulting.com/index.php/solutions/securite/firewalls/palo-alto" target="_blank">Palo Alto Networks</a> propose des outils qui s'adaptent aux besoins de sécurité de votre société. Sans uniquement se baser sur l'authentification des adresses IP ou des paquets, il prend en compte l'identité propre de l'utilisateur et agit directement sur les applications utilisées.</p>
<p style="text-align: justify;"><strong>Conclusion :</strong></p>
<p style="text-align: justify;">Les pirates informatiques auront toujours de nouvelles idées et opportunités pour exploiter les failles qui se génèrent sans cesse avec l'évolution générale d'internet. On l'a vu, même les plus grands acteurs du Web se font piégés et manque de vigilance par rapport à leur sécurité informatique.</p>
<p style="text-align: justify;">Des solutions existent pourtant pour limiter ces phénomènes, et ces récents événements soulèvent la question  : Est ce que la protection des données est sérieusement considérée aujourd'hui ?</p>
<p style="text-align: justify;"><strong>Notre est avis est de défendre l'idée d'un internet sécurisant et sécurisé qui donne confiance aux utilisateurs.</strong> Indispensable notamment au bon développement du e-commerce et de la gestion de vos données bancaires ou autres sur le web, la confiance qu'accordent les utilisateurs est primordiale au bon développement du commerce électronique.</p>
<p style="text-align: justify;"><span style="text-decoration: underline;"><strong>Aquastar Consulting vous assiste :</strong></span></p>
<p style="text-align: justify; padding-left: 30px;">o Afin de vous prémunir contre le piratage informatique, Aquastar Consulting vous accompagne dans la mise en place d’un <a title="Pare-Feu Palo Alto Networks" href="http://new.aquastar-consulting.com/index.php/solutions/securite/firewalls/palo-alto" target="_blank">Pare-Feu</a> et dans l’intégration d’une <a title="Solution de cryptage des données : Imprivata" href="http://new.aquastar-consulting.com/index.php/solutions/securite/59-imprivata-onesign" target="_blank">solution de cryptage des données</a>.
o Pour toutes informations complémentaires, n’hésitez pas à nous contacter : <a href="mailto:contact@aquastar-consulting.com">contact@aquastar-consulting.com</a></p>
<p style="text-align: justify;"></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>736</wp:post_id>
		<wp:post_date>2013-07-25 12:35:07</wp:post_date>
		<wp:post_date_gmt>2013-07-25 11:35:07</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>ovh-apple-pirates-quelle-solutions-pour-se-sortir-du-piratage</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="apple"><![CDATA[Apple]]></category>
		<category domain="post_tag" nicename="authentification"><![CDATA[authentification]]></category>
		<category domain="post_tag" nicename="firewalls"><![CDATA[firewalls]]></category>
		<category domain="post_tag" nicename="hackers"><![CDATA[hackers]]></category>
		<category domain="post_tag" nicename="imprivata"><![CDATA[Imprivata]]></category>
		<category domain="post_tag" nicename="ovh"><![CDATA[OVH]]></category>
		<category domain="post_tag" nicename="palo-alto"><![CDATA[palo alto]]></category>
		<category domain="post_tag" nicename="piratage"><![CDATA[Piratage]]></category>
		<category domain="post_tag" nicename="pirate"><![CDATA[piraté]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<wp:postmeta>
			<wp:meta_key>geo_public</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>publicize_reach</wp:meta_key>
			<wp:meta_value><![CDATA[a:2:{s:7:"twitter";a:1:{i:3898347;i:26;}s:2:"wp";a:1:{i:0;i:3;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>publicize_twitter_user</wp:meta_key>
			<wp:meta_value><![CDATA[Aquastar_IT]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wpas_done_3898347</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_publicize_done_external</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{s:7:"twitter";a:1:{i:821138382;b:1;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wpas_skip_3898347</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>tagazine-media</wp:meta_key>
			<wp:meta_value><![CDATA[a:7:{s:7:"primary";s:77:"http://aquastarconsultingblog.files.wordpress.com/2013/07/800-rsa-securid.jpg";s:6:"images";a:5:{s:75:"http://aquastarconsultingblog.files.wordpress.com/2013/07/anonymus-6744.jpg";a:6:{s:8:"file_url";s:75:"http://aquastarconsultingblog.files.wordpress.com/2013/07/anonymus-6744.jpg";s:5:"width";i:800;s:6:"height";i:531;s:4:"type";s:5:"image";s:4:"area";i:424800;s:9:"file_path";b:0;}s:74:"http://aquastarconsultingblog.files.wordpress.com/2013/07/logo_ovh-svg.png";a:6:{s:8:"file_url";s:74:"http://aquastarconsultingblog.files.wordpress.com/2013/07/logo_ovh-svg.png";s:5:"width";i:220;s:6:"height";i:220;s:4:"type";s:5:"image";s:4:"area";i:48400;s:9:"file_path";b:0;}s:72:"http://aquastarconsultingblog.files.wordpress.com/2013/07/logo-apple.jpg";a:6:{s:8:"file_url";s:72:"http://aquastarconsultingblog.files.wordpress.com/2013/07/logo-apple.jpg";s:5:"width";i:640;s:6:"height";i:480;s:4:"type";s:5:"image";s:4:"area";i:307200;s:9:"file_path";b:0;}s:77:"http://aquastarconsultingblog.files.wordpress.com/2013/07/ubuntu-flavours.jpg";a:6:{s:8:"file_url";s:77:"http://aquastarconsultingblog.files.wordpress.com/2013/07/ubuntu-flavours.jpg";s:5:"width";i:800;s:6:"height";i:480;s:4:"type";s:5:"image";s:4:"area";i:384000;s:9:"file_path";b:0;}s:77:"http://aquastarconsultingblog.files.wordpress.com/2013/07/800-rsa-securid.jpg";a:6:{s:8:"file_url";s:77:"http://aquastarconsultingblog.files.wordpress.com/2013/07/800-rsa-securid.jpg";s:5:"width";i:800;s:6:"height";i:679;s:4:"type";s:5:"image";s:4:"area";i:543200;s:9:"file_path";b:0;}}s:6:"videos";a:0:{}s:11:"image_count";i:5;s:6:"author";s:8:"50412252";s:7:"blog_id";s:8:"52536027";s:9:"mod_stamp";s:19:"2013-07-26 06:52:07";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[85]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Piratage]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[OVH / Apple piratées, quelles solutions pour se sortir du piratage ?]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Internet offre des possibilités gigantesques, et le piratage risque d'y trouver son compte.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438717]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1043";s:5:"score";s:16:"96.6839320626641";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1434";s:5:"score";s:18:"55.159069519631245";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1719";s:5:"score";s:17:"46.25952471984109";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:18:"31.320177516249473";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1741";s:5:"score";s:18:"19.965036183488998";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2330";s:5:"score";s:18:"18.405574427574813";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"16.101943392472133";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:18:"15.472072207204704";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"1794";s:5:"score";s:18:"15.386143098328928";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"15.191262257610857";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1955";s:5:"score";s:18:"13.601066149294473";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1924";s:5:"score";s:18:"12.697095901411299";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:17:"10.76330763404635";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:17:"9.825775624292637";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:17:"9.825775624292637";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:17:"9.224267316033782";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1043";s:5:"score";s:17:"97.46780891283507";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1434";s:5:"score";s:17:"57.83845371408009";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1719";s:5:"score";s:18:"47.660848630734925";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1741";s:5:"score";s:17:"23.18337698340077";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:17:"20.33566940083321";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1955";s:5:"score";s:18:"20.174359734492864";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1794";s:5:"score";s:16:"19.2251424540401";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1876";s:5:"score";s:18:"19.169102021075904";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[2347]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Les nouveaux points d&#039;accès Wifi Aruba Networks !</title>
		<link>http://www.it-news.fr/les-nouveaux-points-dacces-wifi-aruba-networks/</link>
		<pubDate>Thu, 25 Jul 2013 13:55:16 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?p=760</guid>
		<description></description>
		<content:encoded><![CDATA[<a style="line-height: 1.5;" href="http://www.it-news.fr/wp-content/uploads/2013/07/aruba.png"><img class="size-thumbnail wp-image-762 alignleft" alt="Aruba point d'accès wifi" src="http://www.it-news.fr/wp-content/uploads/2013/07/aruba.png?w=136" width="136" height="150" /></a>Les réseaux locaux sans fil (WLAN) fonctionnent à des vitesses en gigabit avec le standard de transmission 802.11ac.
<p style="text-align: justify;">Les réseaux WLAN sans fil d'Aruba sont les seuls à utiliser des données contextuelles, notamment l’identité de l’utilisateur, le type de périphérique, l’usage de l’application, le lieu et l’heure, pour assurer la sécurité et les politiques de qualité de service (QoS) sur tout le réseau, jusqu’aux périphériques et applications.</p>
<p style="text-align: justify;">En plus de cela, <a href="http://www.arubanetworks.com/" target="_blank">Aruba Networks</a> a souhaité intégrer la technologie ClientMatch™ pour éliminer les problèmes de clients « fidélisés » ainsi que la technologie AppRF afin de garantir la meilleure performance Microsoft Lync.. Cette intégration permet de résoudre les problèmes de "fidélisation" aux points d'accès wifi.</p>
<!--more Lire la suite-->
<ul>
	<li>
<div style="text-align: justify;">

<strong>Protégez votre investissement et introduisez le BYOD dans votre entreprise :</strong>En avance sur ses concurrents, les solutions <a href="http://new.aquastar-consulting.com/index.php/solutions/reseau-mobilite/wifi-hotspot" target="_blank">Aruba Networks</a> s'appliquent à être en adéquation avec les évolutions du marché. Les <strong>points d’accès Aruba 802.11ac</strong> sont conçus dès le départ pour tirer profit de l’infrastructure de votre armoire de câblage héritée et prendre en charge les densités élevées de périphérique.Ainsi, et sans pour autant perdre le contrôle de votre réseau, toute personne peut désormais apporter son propre outil (Smartphone, Tablette, ..) à votre entreprise.

</div></li>
</ul>
<ul>
	<li>
<div style="text-align: justify;">

<strong></strong><strong>La fin des clients fidélisés !</strong>Pour prendre un exemple, lorsque je me connecte à un point d'accès Aruba Networks, l'outil en question va automatiquement se connecter à celui qui est le plus proche (Point A). Si je m'éloigne de ce point A, tout en me rapprochant d'un autre (point B), dès l'instant où je suis plus proche du point B, mon appareil se connecte directement à ce dernier le jugeant plus performant.Cette fonction permet d'augmenter la performance de votre connexion en se basant sur les points d'accès qui sont les plus aptes à répondre aux besoins de vos périphériques. Ici, c'est la technologie ClientMatch™ qui est intégrée aux <a href="http://new.aquastar-consulting.com/index.php/solutions/reseau-mobilite/wifi-hotspot" target="_blank">solutions Aruba</a>.

</div></li>
</ul>
<ul>
	<li style="text-align: justify;"><strong>Le réseau WLAN d'Aruba Networks est le seul au monde qui est certifié par Microsoft.</strong>Capable d’identifier des communications Lync individuellement cryptées, vidéo, voix, partage de bureau et flux de chat sur l'ensemble des périphériques, dans le but vous puissiez leur attribuer différentes politiques.</li>
</ul>
<strong>Aquastar Consulting vous assiste :</strong>
<p style="text-align: justify;">  o Afin pour vous d'augmenter votre performance réseau, Aquastar Consulting vous accompagne dans la mise en place d’une <a title="Solution Wifi Aruba Networks" href="http://new.aquastar-consulting.com/index.php/solutions/reseau-mobilite/wifi-hotspot" target="_blank">solution Aruba Networks</a> et dans l’intégration de ces nouveaux points d'accès.</p>
<p style="text-align: justify;"> o Pour toutes informations complémentaires, n’hésitez pas à nous contacter :<a href="mailto:contact@aquastar-consulting.com">contact@aquastar-consulting.com</a></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>760</wp:post_id>
		<wp:post_date>2013-07-25 14:55:16</wp:post_date>
		<wp:post_date_gmt>2013-07-25 13:55:16</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>les-nouveaux-points-dacces-wifi-aruba-networks</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="802-11ac"><![CDATA[802.11ac]]></category>
		<category domain="post_tag" nicename="aruba-networks"><![CDATA[Aruba networks]]></category>
		<category domain="post_tag" nicename="mobilite"><![CDATA[Mobilité]]></category>
		<category domain="post_tag" nicename="performance-reseau"><![CDATA[performance réseau]]></category>
		<category domain="post_tag" nicename="point-dacces"><![CDATA[point d'accès]]></category>
		<category domain="category" nicename="reseaux-et-mobilite"><![CDATA[Réseaux et mobilité]]></category>
		<category domain="post_tag" nicename="wifi"><![CDATA[wifi]]></category>
		<wp:postmeta>
			<wp:meta_key>geo_public</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wpas_skip_3898347</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>publicize_twitter_user</wp:meta_key>
			<wp:meta_value><![CDATA[Aquastar_IT]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wpas_done_3898347</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_publicize_done_external</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{s:7:"twitter";a:1:{i:821138382;b:1;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[83]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[accès wifi]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[Les nouveaux points d'accès Wifi Aruba Networks !]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Aruba Networks, leader dans le domaine de la mobilité, vient de présenter ses tout nouveaux points d'accès wifi.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438013]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"166.91206204407928";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2266";s:5:"score";s:18:"142.50244886982202";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2232";s:5:"score";s:17:"130.4740310440177";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2030";s:5:"score";s:17:"130.4740310440177";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2251";s:5:"score";s:17:"89.17526755857686";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"133";s:5:"score";s:17:"78.32057236006995";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2362";s:5:"score";s:17:"66.88145066893264";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"900";s:5:"score";s:17:"47.82677791472787";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:3:"789";s:5:"score";s:17:"41.91551965677435";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:3:"323";s:5:"score";s:17:"39.63982744346199";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:17:"51.04790132887278";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2232";s:5:"score";s:17:"45.67465771423012";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2030";s:5:"score";s:17:"45.67465771423012";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2266";s:5:"score";s:16:"40.5716573127505";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2251";s:5:"score";s:18:"33.105430133940246";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"11.533605324918504";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[2338]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:17:"95.05393297759825";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"133";s:5:"score";s:17:"86.20024806659367";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2232";s:5:"score";s:17:"79.78075778133797";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2030";s:5:"score";s:17:"79.78075778133797";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2266";s:5:"score";s:17:"78.12686221047613";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2251";s:5:"score";s:18:"56.268214334400724";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"900";s:5:"score";s:18:"54.760902845039695";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"789";s:5:"score";s:17:"47.61550744593731";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>TPE / PME : Les indicateurs qui démontrent la nécessité d&#039;utiliser un serveur.</title>
		<link>http://www.it-news.fr/tpe-pme-les-indicateurs-qui-demontrent-la-necessite-dutiliser-un-serveur/</link>
		<pubDate>Fri, 26 Jul 2013 11:48:06 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?p=774</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/07/0-iiuonsc2-serveur-piece-vladru-dreamstime-com-s.png"><img class="size-full wp-image-775 alignleft" alt="Pièce serveur" src="http://www.it-news.fr/wp-content/uploads/2013/07/0-iiuonsc2-serveur-piece-vladru-dreamstime-com-s.png" width="150" height="112" /></a>Vous êtes une PME, ou bien une TPE qui souhaite se développer ? Vous êtes au nombre de deux ou plus ? La question qui nous intéresse ici est de savoir<strong> sur quoi vous avez investi jusqu'à maintenant ? </strong></p>
<p style="text-align: justify;">Aujourd'hui en 2013, vous penserez directement à un apport technologique comme des ordinateurs ou bien des Smartphones. Chacun s'accorde à dire que c'est la base pour démarrer et pour envisager un développement d'activité.</p>
<!--more Lire la suite-->
<p style="text-align: justify;">Leurs bénéfices sont directement visibles et identifiables, ils permettent d'aller sur internet, de gérer des dossiers clients, d'en créer, de générer des factures, de faire de l'e-mailing ou bien de rechercher tout simplement de l'information.</p>
<p style="text-align: justify;">Malgré tout, <strong>vous ne penserez pas à investir dans un serveur </strong>car ses bénéfices sont bien moins identifiables. Pourtant, et même dans certains cas<strong> moins cher qu'un ordinateur</strong>, un serveur peut vous apporter des bénéfices non négligeables.</p>
<p style="text-align: justify;">Nous allons tout d'abord essayé ici de balayer tout de suite l'idée selon laquelle un serveur est onéreux. En effet, si vous avez d'ores et déjà investi dans un ordinateur portable, vous êtes en capacité d'investir dans un serveur. <strong>300 euros</strong> pour un système standard et 1000 euros pour quelque chose de plus poussé.</p>
<p style="text-align: justify;">Parlons maintenant des <strong>bénéfices qu'apporte un serveur :</strong></p>

<ul>
	<li>Facteur essentiel de croissance</li>
	<li>Traiter de grosses quantités de données</li>
	<li>Création d'un espace commun permettant de :
<ul>
	<li><em>Stocker une base de données </em></li>
	<li><em>Stocker des données confidentielles</em></li>
	<li><em>Partager des informations</em></li>
	<li><em>Partager des applications</em></li>
</ul>
</li>
	<li>Garantit la sécurité et la disponibilité des données</li>
	<li>Un retour sur investissement pratiquement immédiat</li>
</ul>
<p style="text-align: justify;"><span style="font-size: medium;"><span style="line-height: 24px;">On ne le répétera jamais assez, la gestion des bases de données est primordial pour être efficace et productif. C'est cette gestion qui vous permettra d'être réactif, de prendre de bonnes décisions, d'être en adéquation avec votre marché et de donner un coup de pouce à votre communication interne et externe. </span></span></p>
<a href="http://www.it-news.fr/wp-content/uploads/2013/07/image_article-3.jpg"><img class="size-large wp-image-777 alignnone" alt="Efficacité de gestion" src="http://www.it-news.fr/wp-content/uploads/2013/07/image_article-3.jpg?w=640" width="640" height="309" /></a>
<p style="text-align: justify;">L'autre question qui se pose, c'est de savoir <strong>à partir de quel instant un serveur devient nécessaire ?</strong> Autrement dit, quels sont les signes qui vous permettent d'être certains d'avoir besoin d'utiliser ce type d'outil ?</p>

<ul>
	<li style="text-align: justify;">Le premier signe, c'est <strong>le besoin de rendre plus accessibles vos données</strong> à l'ensemble de vos salariés. Là où des fichiers clients et base de données étaient stockées aléatoirement sur différents ordinateurs personnels, un salarié n'aura donc pas forcément accès au fichier de son collègue. Plus clairement, lorsque vos salariés sont demandeurs de fichiers de plus en plus importants, et qu'ils n'arrivent pas à obtenir ce qu'ils souhaitent en temps voulu, c'est que l'accessibilité des données offerte par un serveur vous manque.</li>
</ul>
<ul>
	<li style="text-align: justify;"><strong>Vos ordinateurs subissent le poids des données stockées</strong> dans leur mémoire. C'est classique, la performance de vos machines devient de plus en plus inquiétante. Lenteur, temps de chargement, et applications de moins en moins réactives, ce sont des signes qui ne trompent pas. Soulager ses ordinateurs permettrait de réduire considérablement leurs usures dans le temps.</li>
</ul>
<ul>
	<li style="text-align: justify;"><strong>Les besoins en outils de gestion se font de plus en plus sentir</strong>. C'est l'exemple simple où vous avez besoin d'intégrer à votre matériel des <a href="http://new.aquastar-consulting.com/index.php/solutions/gestion-metier/comptabilite-finances/comptabilite" target="_blank">logiciels de comptabilité ou de gestion de manière générale</a>. Laisser ses ordinateurs supporter ces logiciels et payer une licence pour chaque PC seraient trop onéreux.</li>
</ul>
<ul>
	<li style="text-align: justify;"><strong>Sauvegarder des informations confidentielles</strong> comme les fichiers clients sur un seul ordinateur ne vous dérange pas ? De plus, chaque employé ne pense pas forcément sauvegarder des informations essentielles en plusieurs exemplaires et risques donc de perdre des données pourtant indispensable au développement de l'activité.</li>
</ul>
<ul>
	<li style="text-align: justify;"><strong>Le besoin en mobilité</strong>. Dès lors que l'activité se développe, les salariés ont besoin d'avoir accès à leurs données ou qu'ils soient.</li>
</ul>
<p style="text-align: justify;">Désormais, si vous vous êtes reconnus dans ces points ci-dessus, c'est que le déploiement d'un serveur au sein de votre société parait pertinent. De plus, l'investissement étant assez minime et comparable à celui d'un ordinateur (Coût compris entre 300 et 1000 euros selon l'importance de votre croissance), c'est donc une solution accessible au plus grand nombre.</p>
<p style="text-align: justify;">La crise vient également diminuer grandement le prix des serveurs, et cela renforce le fait que ce soit un faible investissement capable de générer une efficacité nettement supérieur à votre productivité actuelle.</p>
<p style="text-align: justify;"><span style="text-decoration: underline;"><strong>Aquastar Consulting vous assiste : </strong></span></p>

<ul>
	<li style="text-align: justify;">A l'écoute pour répondre à toutes vos questions et peut vous accompagner dans vos démarches.</li>
	<li style="text-align: justify;">Une question ? Un renseignement ? Contactez-nous : <a href="http://new.aquastar-consulting.com/index.php/contact" target="_blank">contact@aquastar-consulting.com</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>774</wp:post_id>
		<wp:post_date>2013-07-26 12:48:06</wp:post_date>
		<wp:post_date_gmt>2013-07-26 11:48:06</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>tpe-pme-les-indicateurs-qui-demontrent-la-necessite-dutiliser-un-serveur</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="applications"><![CDATA[applications]]></category>
		<category domain="post_tag" nicename="moins-cher"><![CDATA[moins cher]]></category>
		<category domain="post_tag" nicename="ordinateur-portable"><![CDATA[ordinateur portable]]></category>
		<category domain="post_tag" nicename="pme"><![CDATA[PME]]></category>
		<category domain="post_tag" nicename="serveur"><![CDATA[serveur]]></category>
		<category domain="category" nicename="systemes"><![CDATA[Systèmes]]></category>
		<category domain="post_tag" nicename="tpe"><![CDATA[TPE]]></category>
		<wp:postmeta>
			<wp:meta_key>geo_public</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>publicize_reach</wp:meta_key>
			<wp:meta_value><![CDATA[a:2:{s:7:"twitter";a:1:{i:3898347;i:26;}s:2:"wp";a:1:{i:0;i:3;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>publicize_twitter_user</wp:meta_key>
			<wp:meta_value><![CDATA[Aquastar_IT]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wpas_done_3898347</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_publicize_done_external</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{s:7:"twitter";a:1:{i:821138382;b:1;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wpas_skip_3898347</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[92]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Serveur]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[TPE / PME : A partir de quand utiliser un serveur ?]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[A quoi sert réellement un serveur ? A partir de quand en avons nous vraiment besoin ? Cet article donne des éléments de réponse.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438847]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"97.98939174643681";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"94.18179327572444";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"323";s:5:"score";s:17:"77.83070711249258";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2475";s:5:"score";s:16:"73.4920438098276";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"43.27380221042624";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"42.36312107556496";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:17:"42.09246447361493";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"34.518155283014465";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:16:"32.7176690666638";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2406";s:5:"score";s:18:"30.314789730218937";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"38.18752777312038";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"33.95352484853976";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:17:"17.26679591471262";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"15.15467844564838";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"13.162511614006105";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"13.077800541142347";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:3:"323";s:5:"score";s:17:"84.42244025965113";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"63.94580632283717";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"58.59894553592207";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2406";s:5:"score";s:17:"37.88792528295329";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"342";s:5:"score";s:17:"36.56469537103797";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:18:"26.529042300753275";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:18:"25.774108549388757";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:16:"24.0299524756699";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[775]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>BYOD : L&#039;étude VMware confirme l&#039;intérêt des salariés Français à cette pratique.</title>
		<link>http://www.it-news.fr/byod-letude-vmware-confirme-linteret-des-salaries-francais-a-cette-pratique/</link>
		<pubDate>Mon, 29 Jul 2013 09:15:00 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://aquastarconsultingblog.wordpress.com/?p=789</guid>
		<description></description>
		<content:encoded><![CDATA[<a style="color: #ff4b33; font-size: 16px; line-height: 24px; text-align: justify;" href="http://www.it-news.fr/wp-content/uploads/2013/07/byod-pic.png"><img class="size-thumbnail wp-image-795 alignleft" alt="BYOD" src="http://www.it-news.fr/wp-content/uploads/2013/07/byod-pic.png?w=150" width="150" height="129" /></a>
<p style="text-align: justify;">En France, cette pratique fait de plus en plus de bruit, <strong>les salariés souhaitent utiliser leurs propres appareils mobiles au travail</strong>. En effet, cette tendance est confirmée par une étude faite par VMware, leader dans le Cloud Computing, qui déploie également des solutions visant à intégrer un système BYOD. Pourquoi cette évolution ?</p>
<!--more Lire la suite-->
<p style="text-align: justify;">Une autre enquête menée par Google démontre que les Français se servent de leur smartphone partout où ils le peuvent. L'usage qu'ils en ont est avant tout personnel, toutefois, VMware démontre dans le même temps qu'ils l'utilisent aussi de manière professionnelle. Toujours selon une étude du leader "Cloud Computing", on découvre que <strong>plus d'un tiers des Français envisageraient quitter leurs emplois </strong>s'ils n'avaient pas la permission d'utiliser leurs propres périphériques pour travailler.</p>
<p style="text-align: justify;">Voilà une affirmation étonnante dans cette période de crise où l'emploi est si difficile à trouver. La raison majeur de cette statistique repose sur le fait que les employés Français (62%) considèrent que <strong>les outils délivrés par leurs employeurs ne sont pas assez performants</strong> pour répondre à leurs besoins.</p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/07/byod2013-2.png"><img class="aligncenter size-full wp-image-796" alt="byod2013" src="http://www.it-news.fr/wp-content/uploads/2013/07/byod2013-2.png" width="617" height="338" /></a></p>
<p style="text-align: justify;">Coté des décideurs informatiques, 39 % se disent dans l'incapacité de répondre aux attentes des salariés. Ils reconnaissent dans le même temps que les politiques "Bring Your Own Device" <strong>sont en mesure d’accroître l'épanouissement des salariés</strong> et d'augmenter leurs productivités.</p>
<p style="text-align: justify;">Pour continuer dans les chiffres, 76 % des Directeur du Système d'Information Français ont mis ou prévois de mettre en place le système BYOD.  C'est une pratique qui va donc se généraliser, d'autant plus que cela est tout aussi productif pour le salarié que pour l'employeur. Les salariés sont de plus en plus nomades, les outils technologiques sont sans cessent en développement, il faudra donc <strong>s'adapter à ces nouvelles mœurs</strong>.</p>
<p style="text-align: justify;">Le problème que soulève cette pratique est un<strong> problème de sécurité</strong>. En effet, stocker des données professionnelles sur un portable personnel n'est jamais rassurant pour une entreprise. Les données peuvent se retrouver très vite en dehors de l'environnement de la société, peuvent être perdues, ou bien même visibles par une personne non autorisée.</p>
<p style="text-align: justify;">L'étude de <a href="http://new.aquastar-consulting.com/index.php/societe/partenaires/infrastructures/vmware">VMware</a> met en avant cette problématique et nous dit que deux tiers des DSI affirment que les salariés stockent des informations appartenant à l'entreprise, parfois même sensibles, sur leurs outils personnels. Vient donc ensuite les problèmes de perte de téléphone, et donc de données parfois très importantes pour l'entreprise.</p>
<p style="text-align: justify;">Malgré tout, <a href="http://aquastarconsultingblog.wordpress.com/2013/06/06/byod-lusage-professionnel-de-peripheriques-personnels-smartphones-ordinateurs/">il existe des solutions pour se prémunir de ces risques</a> et de gérer au mieux l'utilisation des périphériques personnelles au travail.</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>789</wp:post_id>
		<wp:post_date>2013-07-29 10:15:00</wp:post_date>
		<wp:post_date_gmt>2013-07-29 09:15:00</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>byod-letude-vmware-confirme-linteret-des-salaries-francais-a-cette-pratique</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="boyd"><![CDATA[BOYD]]></category>
		<category domain="post_tag" nicename="mobile"><![CDATA[mobile]]></category>
		<category domain="post_tag" nicename="mobilite"><![CDATA[Mobilité]]></category>
		<category domain="post_tag" nicename="nomade"><![CDATA[nomade]]></category>
		<category domain="post_tag" nicename="peripheriques"><![CDATA[périphériques]]></category>
		<category domain="category" nicename="reseaux-et-mobilite"><![CDATA[Réseaux et mobilité]]></category>
		<wp:postmeta>
			<wp:meta_key>publicize_twitter_user</wp:meta_key>
			<wp:meta_value><![CDATA[Aquastar_IT]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>publicize_reach</wp:meta_key>
			<wp:meta_value><![CDATA[a:2:{s:7:"twitter";a:1:{i:3898347;i:26;}s:2:"wp";a:1:{i:0;i:3;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>geo_public</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>tagazine-media</wp:meta_key>
			<wp:meta_value><![CDATA[a:7:{s:7:"primary";s:72:"http://aquastarconsultingblog.files.wordpress.com/2013/07/byod2013-2.png";s:6:"images";a:2:{s:70:"http://aquastarconsultingblog.files.wordpress.com/2013/07/byod-pic.png";a:6:{s:8:"file_url";s:70:"http://aquastarconsultingblog.files.wordpress.com/2013/07/byod-pic.png";s:5:"width";i:254;s:6:"height";i:219;s:4:"type";s:5:"image";s:4:"area";i:55626;s:9:"file_path";b:0;}s:72:"http://aquastarconsultingblog.files.wordpress.com/2013/07/byod2013-2.png";a:6:{s:8:"file_url";s:72:"http://aquastarconsultingblog.files.wordpress.com/2013/07/byod2013-2.png";s:5:"width";i:617;s:6:"height";i:338;s:4:"type";s:5:"image";s:4:"area";i:208546;s:9:"file_path";b:0;}}s:6:"videos";a:0:{}s:11:"image_count";i:2;s:6:"author";s:8:"50412252";s:7:"blog_id";s:8:"52536027";s:9:"mod_stamp";s:19:"2013-07-29 09:15:00";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wpas_done_3898347</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_publicize_done_external</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{s:7:"twitter";a:1:{i:821138382;b:1;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[80]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[BYOD]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[BYOD : L'étude VMware confirme l'intérêt des salariés Français.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438891]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2266";s:5:"score";s:18:"142.50244886982202";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2362";s:5:"score";s:18:"100.77523110530421";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"49.50748159544453";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"223";s:5:"score";s:16:"46.6483908145783";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"46.00650384317385";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1180";s:5:"score";s:17:"44.11796324864341";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1454";s:5:"score";s:17:"42.63974899073712";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"760";s:5:"score";s:17:"41.91551965677435";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"1728";s:5:"score";s:17:"39.88165114108692";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:17:"38.93470394556668";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1832]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2266";s:5:"score";s:16:"40.5716573127505";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"19.35304646962389";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"17.866980799934822";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:18:"15.718575776789514";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"13.413216756168218";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"11.003669780464085";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2266";s:5:"score";s:17:"78.12686221047613";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"223";s:5:"score";s:16:"53.1695935912623";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1180";s:5:"score";s:17:"50.97236901372608";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1454";s:5:"score";s:18:"48.895109846126616";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"760";s:5:"score";s:17:"47.61550744593731";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1728";s:5:"score";s:17:"45.38950539377689";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2362";s:5:"score";s:18:"37.368835384410325";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"32.11284989923683";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>La pérennité des actifs logiciels passe par la sécurisation du système d&#039;information.</title>
		<link>http://www.it-news.fr/la-securisation-des-actifs-logiciels-passe-par-la-securisation-du-systeme-d-information/</link>
		<pubDate>Mon, 05 Aug 2013 07:09:00 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=820</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/08/alarme.jpg"><img class="size-thumbnail wp-image-824 alignleft" alt="alarme" src="http://www.it-news.fr/wp-content/uploads/2013/08/alarme-150x134.jpg" width="150" height="134" /></a>L’utilisation des outils informatiques évoluent avec l’avènement du Cloud Computing et le développement du BYOD (Bring Your Own Device). Face à ces changements une entreprise doit adapter sa sécurité informatique via une politique de gestion des actifs logiciels efficace et garantir la sécurité du système d'information.</p>
<!--more Lire la suite-->
<p style="text-align: justify;">Pour une entreprise, le logiciel a une fonction déterminante : aucune entreprise ne peut se développer sans <a href="http://new.aquastar-consulting.com/index.php/solutions/gestion-metier#">logiciel (bureautique ou métier)</a>. Il constitue un véritable investissement, ce qui veut dire un coût important parfois supérieur à celui d’une machine. En effet, il faut compter les coûts d’acquisitions, de mise à jour, de maintenance et les évolutions produits.</p>
<p style="text-align: justify;">Le logiciel permet de stocker et de traiter les informations d’une entreprise, en cela il est lié à la propriété intellectuelle. Par la même, il est donc menacé par le piratage et les attaques virales comme le fishing ou le spamming. Les menaces sont principalement porteuses de risques de pertes de données ou d’accès frauduleux à des données sensibles.</p>
<p style="text-align: justify;">Son caractère immatériel et l’avènement du cloud rendent sa protection compliquée. Il faut ajouter à cela le développement du BYOD qui consiste à utiliser des équipements personnels (smartphones, portables, tablettes..) dans un contexte professionnel, cette utilisation d’applications personnelles augmente les risques potentiels de piratage.</p>
<p style="text-align: justify;">Selon François Rey, Président du comité France de la Business Software Alliance, La meilleure façon de protéger ses logiciels c’est d’abord d’assurer la sécurité du système informatique en s’appuyant sur un environnement sécurisé. Cela passe par les <a href="http://new.aquastar-consulting.com/index.php/solutions/securite/firewalls/palo-alto">pare feu</a> et le blocage du spam qui sécurise la périphérie de l’environnement informatique et des antivirus qui en protège le centre.</p>
<p style="text-align: justify;">La Business Software Alliance (BSA) est la principale organisation à but non-lucratif consacrée à la promotion de la légalité et de la sécurité de l’environnement numérique. La mission internationale de la BSA est de promouvoir sur le long terme un environnement législatif et juridique dans lequel notre industrie peut prospérer, et d’être un porte-parole commun à ses membres à travers le monde.</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>820</wp:post_id>
		<wp:post_date>2013-08-05 08:09:00</wp:post_date>
		<wp:post_date_gmt>2013-08-05 07:09:00</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>la-securisation-des-actifs-logiciels-passe-par-la-securisation-du-systeme-d-information</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="byod"><![CDATA[BYOD]]></category>
		<category domain="post_tag" nicename="cloud"><![CDATA[cloud]]></category>
		<category domain="post_tag" nicename="logiciel"><![CDATA[logiciel]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<category domain="post_tag" nicename="securite-2"><![CDATA[sécurité]]></category>
		<category domain="post_tag" nicename="systeme-dinformation"><![CDATA[système d'information]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[82]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[système d'information]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[L'importance de la sécurisation du système d'information.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[François Rey explique en quoi il est important d'assurer la sécurité du système d'information pour protéger ses logiciels.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_old_slug</wp:meta_key>
			<wp:meta_value><![CDATA[la-securisation-des-actifs-logiciels-passe-par-la-securisation-du-systeme-informatique]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426439045]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2266";s:5:"score";s:18:"117.74088053154776";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2354";s:5:"score";s:17:"88.90416281040243";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"88.23762709258509";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"87.43962387692962";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:17:"80.59353553165673";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2444";s:5:"score";s:17:"77.14232280994234";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"76.17965132079098";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1741";s:5:"score";s:17:"72.29840520406907";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2424";s:5:"score";s:18:"56.536236078851644";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1731";s:5:"score";s:17:"41.74766390858415";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[empty]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"37.94948192531121";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"35.77537153716925";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"35.711018773510695";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2266";s:5:"score";s:17:"34.88758695199728";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"33.66934959831867";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"12.414365666703667";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1741";s:5:"score";s:17:"75.13572788881302";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2266";s:5:"score";s:17:"66.68901435317109";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"60.38915732706718";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"58.33302263967613";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:17:"55.99470817118421";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"52.835612107503934";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1731";s:5:"score";s:18:"44.099001915422775";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"880";s:5:"score";s:17:"42.86294881389699";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Nouveau projet du gouvernement : Les Quartiers Numériques.</title>
		<link>http://www.it-news.fr/nouveau-projet-du-gouvernement-les-quartiers-numeriques/</link>
		<pubDate>Tue, 06 Aug 2013 06:53:13 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=827</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/08/Quartier-Numérique.jpg"><img class="alignleft size-thumbnail wp-image-828" alt="Quartier Numérique" src="http://www.it-news.fr/wp-content/uploads/2013/08/Quartier-Numérique-150x150.jpg" width="150" height="150" /></a>Un communiqué publié la semaine dernière sur le portail du gouvernement annonce l’adoption du principe du « quartier numérique ». Ce projet initié par Fleur Pellerin, ministre en charge des petites et moyennes entreprises, de l’innovation et de l’Economie numérique, a pour but de créer des incubateurs de start-up.</p>
<p style="text-align: justify;"><!--more Lire la suite--></p>
<p style="text-align: justify;">Le label « quartier numérique » désignera des zones dédiées aux entreprises du numérique, disposant d’une offre immobilière attractive et d’outils nécessaire à leur activité comme l’ultra haut débit. La concentration de start-up  permettra de stimuler l’investissement et la création d’entreprises. Les premiers quartiers numériques devraient être créés dès la fin de l’année. Ils seront financés par le programme des « investissements d’avenir » dont 200 millions d’euros doivent être dédiés à l’économie numérique.</p>
<p style="text-align: justify;">Paris sera le cœur du système et fera le lien entre les différents quartiers numériques régionaux. Le quartier parisien de la Halle Freyssinet (XIIIème) est d’ailleurs pressenti pour être le premier incubateur. Ce projet s’ajoute à l’ambition de la mairie de Paris de transformer la ville en « la capitale du numérique ».</p>
<p style="text-align: justify;">Ce projet donne un avantage à Paris dans la compétition franco-anglaise pour attirer les entreprises innovantes. En effet les deux villes se disputent le titre de capitale high-tech européenne et Londres avait pris un peu d’avance avec la « tech city », son quartier consacré au numérique créé en 2010. Avec les « quartiers numériques » Paris devrait revenir en force et devenir la vitrine internationale des champions du numérique français.</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>827</wp:post_id>
		<wp:post_date>2013-08-06 07:53:13</wp:post_date>
		<wp:post_date_gmt>2013-08-06 06:53:13</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>nouveau-projet-du-gouvernement-les-quartiers-numeriques</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="entreprises"><![CDATA[entreprises]]></category>
		<category domain="post_tag" nicename="gouvernement"><![CDATA[Gouvernement]]></category>
		<category domain="post_tag" nicename="label"><![CDATA[label]]></category>
		<category domain="post_tag" nicename="paris"><![CDATA[Paris]]></category>
		<category domain="post_tag" nicename="quartier-numerique"><![CDATA[quartier numérique]]></category>
		<category domain="category" nicename="systemes"><![CDATA[Systèmes]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[80]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Quartiers numériques]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[Nouveau projet du gouvernement : Les "quartiers numériques"]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Le gouvernement a bien conscience que le numérique est source de créativité et d'emploi, et le projet "quartiers numériques" répond à ces attentes.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438497]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:17:"135.2473067623159";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"66.96331012887349";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:2:"68";s:5:"score";s:17:"51.82194481727648";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"947";s:5:"score";s:17:"43.89397932858408";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"42.36312107556496";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2438";s:5:"score";s:17:"35.79821744159609";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1444";s:5:"score";s:17:"34.39564750643576";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"28.90183447768065";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:18:"20.186304842442794";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:17:"19.83704675632338";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:17:"40.46838019118877";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"22.658243228942993";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"12.435086991075742";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:18:"12.024812686506074";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:16:"9.94869995597025";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"8.409659637957681";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[862]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:16:"75.7524028425859";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:2:"68";s:5:"score";s:17:"52.04802234494821";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"947";s:5:"score";s:18:"44.210687248667824";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"39.91506423792654";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1444";s:5:"score";s:18:"39.197343440616464";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"23.09229635646489";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1776";s:5:"score";s:18:"20.615780209809852";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"19.46505192106233";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Points d&#039;accès Wi-fi : Des connexions dont il faut se méfier ?</title>
		<link>http://www.it-news.fr/le-danger-des-points-dacces-wi-fi/</link>
		<pubDate>Tue, 13 Aug 2013 09:34:38 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=849</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/08/379_wifi.png"><img class="alignleft size-thumbnail wp-image-886" alt="zone wifi" src="http://www.it-news.fr/wp-content/uploads/2013/08/379_wifi-150x128.png" width="150" height="128" /></a>Les points d'accès Wi-fi sont devenus incontournables et se multiplient à une vitesse phénoménale. En effet, quelle aubaine de pouvoir se connecter à internet partout où l'on se trouve. C'est un confort auquel nous nous sommes de plus en plus habitués.</p>
<p style="text-align: justify;">Pourtant, beaucoup ne font pas encore la différence entre une connexion Wi-fi de chez soit, et une connexion publique. <strong>L'une étant plutôt bien sécurisée, et l'autre porteuse de menaces à ne surtout pas négliger</strong>. Quelles précautions faut-il donc prendre pour éviter tout danger ?</p>
<p style="text-align: justify;"><!--more Lire la suite--></p>

<h2 style="text-align: justify;">Points d'accès Wi-fi : Les sources du danger.</h2>
<p style="text-align: justify;">Tout d'abord, lorsqu'on parle de danger lié aux connexions Wi-fi, <strong>on cible à juste titre les appareils mobiles tels que les tablettes et/ou Smartphones.</strong> Nous allons mettre un peu plus en retrait les ordinateurs portables car ils sont actuellement <a href="http://www.lesnumeriques.com/tablette-tactile/2013-annee-ventes-tablettes-passent-devant-celles-pc-n28920.html" target="_blank">en train de chuter dans les ventes au détriment des tablettes</a>. Soyons donc en accord avec notre regretté Steve Jobs qui annonçait en 2010 que les tablettes représenteraient l'après PC Portable.</p>
<p style="text-align: justify;">Si j'étais donc un pirate numérique,<strong> je m'attaquerais aux outils qui dominent le marché.</strong> Aujourd'hui et de plus en plus, ce sont les Smartphones et tablettes. Vous aurez compris jusqu'ici, qu'être en possession d'un de ces deux outils et les connecter à un réseau Wi-fi public n'est pas des plus sécurisants.  On ne peut pas vous donner tort, mais quelles en sont les raisons particulières ?</p>
<p style="text-align: justify;">Parce qu’il n'y a jamais d'argument pertinent sans chiffre, l'<a href="https://www.google.fr/search?q=ANSSI&amp;oq=anssi&amp;aqs=chrome.0.69i59j5j69i61j0l2j69i61.1419j0&amp;sourceid=chrome&amp;ie=UTF-8" target="_blank">ANSSI</a> nous dit que près de la moitié des points d'accès Wi-fi en France n'utilisent pas de moyen de chiffrement ou utilisent des systèmes obsolètes. Autrement dit, Une connexion Wi-fi sur deux est potentiellement dangereuse pour votre confidentialité. Comment se prémunir ?</p>

<h2 style="text-align: justify;">Les précautions à prendre</h2>
<p style="text-align: justify;"><strong>Le conseil du jour serait donc d'éviter les paiements, ou bien de taper pour quelques raisons que ce soit, vos coordonnées bancaires et/ou mot de passe lors d'une connexion Wi-fi.</strong></p>
<p style="text-align: center;"><a href="http://www.it-news.fr/wp-content/uploads/2013/08/jpg.jpg"><img class="aligncenter  wp-image-851" alt="Points d'accès Wi-fi public" src="http://www.it-news.fr/wp-content/uploads/2013/08/jpg.jpg" width="770" height="380" /></a></p>
<p style="text-align: justify;">Aéroports, gares, métro, restaurants, bibliothèques, offices de tourisme ou bien même les cybercafés peuvent très bien être infectés par des logiciels espions. Si vous souhaitez donc aller plus loin dans votre protection face à ces risques, <strong>il est recommandé de désactivé votre association automatique aux différents points d'accès</strong>.</p>
<p style="text-align: justify;">Il est également possible de paramétrer un pare-feu ou bien de passer par un réseau virtuel privé (<a href="http://free.korben.info/index.php/VPN" target="_blank">VPN</a>). Une autre solution qui serait à privilégier, serait de créer soit même sa propre connexion Wi-fi. Elle est rendue possible par le biais d'un routeur de voyage où vous aurez inséré une carte SIM ayant un forfait data.</p>
<p style="text-align: justify;">Ces solutions demandent malgré tout un peu de votre temps et sont malheureusement mis à l'écart en pensant généralement que ne vous serez jamais victime d'une attaque pirate. <strong>Limitez donc vos connexions confidentielles</strong> lorsque vous êtes en déplacement, et gardez à l'esprit qu'il peut parfois être très facile pour un pirate d'avoir accès à votre connexion.</p>
<p style="text-align: justify;">Le dernier conseil du jour serait également d'effectuer autant de sauvegarde que possible. Car en cas de perte de bien de vol, votre terminal a de la valeur, <strong>mais aussi et surtout les données qui s'y trouvent. </strong></p>
<p style="text-align: justify;"><span style="text-decoration: underline;">Aquastar Consulting vous assiste :</span></p>

<ul>
	<li>Vous souhaitez mettre en place <a href="http://new2.aquastar-consulting.com/index.php/solutions/reseau-mobilite/wifi-hotspot#" target="_blank">un point d'accès Wi-fi sécurisé </a>?</li>
	<li>Fort de son expérience, Aquastar Consulting est là pour vous conseiller au mieux selon vos installations.</li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>849</wp:post_id>
		<wp:post_date>2013-08-13 10:34:38</wp:post_date>
		<wp:post_date_gmt>2013-08-13 09:34:38</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>le-danger-des-points-dacces-wi-fi</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="logiciel-espion"><![CDATA[Logiciel espion]]></category>
		<category domain="category" nicename="mobilite"><![CDATA[Mobilité]]></category>
		<category domain="post_tag" nicename="points-dacces-wi-fi"><![CDATA[Points d'accès Wi-fi]]></category>
		<category domain="post_tag" nicename="reseau-wi-fi"><![CDATA[Réseau Wi-fi]]></category>
		<category domain="post_tag" nicename="securise"><![CDATA[sécurisé]]></category>
		<category domain="post_tag" nicename="smartphones"><![CDATA[SmartPhones]]></category>
		<category domain="post_tag" nicename="tablettes"><![CDATA[Tablettes]]></category>
		<category domain="post_tag" nicename="wi-fi"><![CDATA[Wi-Fi]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[90]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Points d'accès Wi-fi]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[Les points d'accès Wi-fi : Des connexions dont il faut se méfier ?]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Une connexion Wi-fi sur deux n'est pas sécurisée. Pourquoi ce constat ? Comment se prémunir des menaces générées par les différents points d'accès Wi-fi ?]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_old_slug</wp:meta_key>
			<wp:meta_value><![CDATA[les-points-dacces-wi-fi-des-connexions-dont-il-faut-se-mefier]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437439]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2232";s:5:"score";s:18:"150.81458795541664";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"57.40245982764357";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1180";s:5:"score";s:17:"49.44216868938808";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2354";s:5:"score";s:18:"42.942377748404034";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"41.06840511878179";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:17:"38.73312185535467";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"133";s:5:"score";s:17:"38.42787632281693";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:17:"31.93045974224011";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"31.368825669816147";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"31.368825669816147";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2232";s:5:"score";s:17:"44.16182792495599";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:18:"25.285412852228408";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"18.85316852809312";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:18:"18.709956181323065";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"16.550115869748378";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"15.423571671938465";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[851]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2232";s:5:"score";s:17:"84.05834696835743";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1180";s:5:"score";s:18:"51.354458444444404";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"133";s:5:"score";s:17:"43.43041273903505";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"39.51865886709545";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"29.178015544982472";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:14:"27.77523792509";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:18:"23.677220657979817";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"23.626264554449044";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>La protection des données personnelles n&#039;est pas une priorité pour les sites Web</title>
		<link>http://www.it-news.fr/protectiondesdonneespersonnelles-on-manque-dinformation/</link>
		<pubDate>Mon, 19 Aug 2013 10:08:09 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=880</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/08/Protection-des-données-personnelles.jpeg"><img class="alignleft size-thumbnail wp-image-897" alt="Protection des données personnelles" src="http://www.it-news.fr/wp-content/uploads/2013/08/Protection-des-données-personnelles-150x137.jpeg" width="150" height="137" /></a>Vous ne vous êtes jamais demandé ce que font les sites web avec vos données personnelles ? Cela ne vous inquiète pas de savoir si elles sont entre de bonnes mains ? Et bien voilà l'erreur que font encore beaucoup d'acteur du web aujourd'hui : Ne pas prendre en compte le besoin de l'internaute <strong>sur la protection des données personnelles.</strong></p>
<p style="text-align: justify;"><!--more Lire la suite--></p>

<h2 style="text-align: justify;">Les sources du problème de protection des données personnelles</h2>
<p style="text-align: justify;"><strong>Nous faisons tous plus ou moins attention</strong> à ce que nous divulguons comme information sur la toile. Certains sont en effet plus enclins que d'autres à laisser des informations confidentielles (âge, sexe, localisation, situation familiale, etc..). La plupart du temps, nous nous sentirons agressé lorsqu'un formulaire nous demandera <strong>des informations sans qu'elles ne soient justifiées</strong>. C'est par exemple lorsqu'on vous demande votre situation familiale alors que vous souhaitez simplement acheter une paire de chaussure.</p>
<p style="text-align: justify;"><strong>En revanche,</strong> nous allons généralement accepter de donner des informations personnelles à condition que l'on y trouve un intérêt. Autrement dit, "Monsieur x" est d'accord pour donner sa situation familiale <strong>car il sait qu'en retour le site web en question lui offrira</strong> des offres promotionnelles pour son enfant. "Monsieur x" y voit donc là un intérêt et se trouve plus enclin à divulguer cette information.</p>
<p style="text-align: justify;">Il y a donc ici un point essentiel à traiter pour les acteurs du net : <strong>Prouver à son audience que donner de ses informations leurs sera utile.</strong> C'est de cette manière qu'ils arriveront à capter un maximum de prospects. Chaque site web a tout intérêt à en savoir plus sur les internautes qui sont l'origine de son trafic. L'objectif étant de <strong>les relancer sur des offres qui les intéressent particulièrement</strong> et qui sont en rapport direct avec leurs réels besoins.</p>
<p style="text-align: justify;">Attention toutefois aux erreurs. En effet, même dans les cas où votre audience est convaincue qu'il est bon de vous laisser des informations personnelles, <strong>ils ne sont peut-être pas réceptifs à l'idée de recevoir des e-mails tous les jours</strong>. Il y aura donc un jugement à faire par la suite quant aux fréquences d'envoi des e-mails. L'un va accepter d'en recevoir tous les jours, l'autre supprimera son inscription au bout d'une semaine car il en aura marre d'être relancé de manière journalière.</p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/08/Protection-des-données-personnelles-emails.png"><img class="alignleft size-medium wp-image-894" alt="Protection des données personnelles emails" src="http://www.it-news.fr/wp-content/uploads/2013/08/Protection-des-données-personnelles-emails-300x238.png" width="300" height="238" /></a>Pour conclure, le client ou/et prospect parfait est celui qui <strong>accepte de donner de ses informations personnelles</strong> et qui est dans le même temps <strong>réceptif aux e-mails qu'il reçoit.</strong> L'objectif d'une communication Web est donc d'amener chacun de ses prospects à penser de la même manière que ce dernier.</p>

<h2 style="text-align: justify;">Un défaut d'information soulevé par la CNIL</h2>
<p style="text-align: justify;">Si tout ce qui importe pour les acteurs du web est finalement de trouver de l'information pertinente sur ses clients/prospects dans le but de répondre à leurs besoins, <strong>ils oublient toutefois leurs propres devoirs</strong>. En effet, la CNIL (Commission Nationale de l'Informatique et des Libertés) met en avant le fait que l'information sur la protection des données personnelles de ses internautes doit être présente sur tout site web qui stock des données sur ses clients.</p>
<p style="text-align: justify;">De ce postulat, chaque site <strong>doit indiquer les informations respectives à la protection des données personnelles</strong> de leurs utilisateurs. La CNIL (Pour la France) a donc voulu savoir si la grande partie des sites répondaient à ces devoirs. C'est ainsi que plus de 2 000 sites faisant partie des acteurs principaux de la toile ont été passé en revu. Quel bilan en tirer ?</p>
<p style="text-align: justify;">Malheureusement, les résultats sont plutôt alarmants car plus de 20% des sites mondiaux passé au rayon X ne donnent aucunes informations sur le traitement des données de ses internautes. Pire encore, <strong>ce pourcentage s'élève à 50% lorsqu'on accède à un site par le biais d'un terminal mobile. </strong>Voilà donc un levier important d'amélioration<strong> </strong>à faire de la part des acteurs du web. Toujours selon la CNIL, ces manques se doivent d'être rattrapés car : « sans ces informations, les personnes qui visitent ces sites ou applications n'ont pas les moyens de maîtriser leurs données. »</p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/08/anti-intrusion-jpeg-kS.jpeg"><img class="size-full wp-image-895 alignright" alt="anti-intrusion" src="http://www.it-news.fr/wp-content/uploads/2013/08/anti-intrusion-jpeg-kS.jpeg" width="225" height="225" /></a>Parfois difficilement accessible, en anglais, ou bien écrit en minuscule, même lorsque les informations sur la protection des données personnelles des internautes est bien présente, <strong>elle n'est pas toujours de tout reproche</strong>. C'est pour cela que les organismes de protection des données vont durcir leurs demandes auprès des acteurs du web et évoquent même des sanctions. En effet, la CNIL nous dit que : <strong>« les procédures contraignantes prévues par la loi pourront être utilisées. »</strong> dans les cas où le site en question ne respecterait pas les droits de ses internautes.</p>
<p style="text-align: justify;"><a href="http://www.01net.com/editorial/601191/donnees-personnelles-selon-la-cnil-20pour-cent-des-sites-mondiaux-n-informent-pas-assez/#?xtor=EPR-1-[NL-01net-Actus]-20130813"> </a></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>880</wp:post_id>
		<wp:post_date>2013-08-19 11:08:09</wp:post_date>
		<wp:post_date_gmt>2013-08-19 10:08:09</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>protectiondesdonneespersonnelles-on-manque-dinformation</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="donnees"><![CDATA[données]]></category>
		<category domain="post_tag" nicename="intrusion"><![CDATA[intrusion]]></category>
		<category domain="post_tag" nicename="protection-des-donnees-personnelles"><![CDATA[protection des données personnelles]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<category domain="post_tag" nicename="securite-2"><![CDATA[sécurité]]></category>
		<category domain="post_tag" nicename="vie-prive"><![CDATA[vie privé]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[87]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Protection des données personnelles]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[La protection des données personnelles : Pas une priorité sur le Web !]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Pourquoi les sites internet recueillent de nos informations personnelles ? La protection des données personnelles faite par les sites est-elle efficace ?]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438487]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1741";s:5:"score";s:17:"78.56275508957683";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:17:"53.83188021509808";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1444";s:5:"score";s:18:"51.546993239122514";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1731";s:5:"score";s:18:"48.470833918694346";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"820";s:5:"score";s:18:"40.036141822265925";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1434";s:5:"score";s:17:"35.96946168719473";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"31.720376473374994";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"28.932854292158346";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"27.32318649915699";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"25.573123968344316";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"22.788371543272717";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"15.839978536076199";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:18:"12.712843619894938";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"12.380969385171348";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"11.820731377315546";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"11.801873196956821";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[2341]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1741";s:5:"score";s:16:"81.8524280582042";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1444";s:5:"score";s:17:"53.95706213832158";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1731";s:5:"score";s:18:"52.145150597578066";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"820";s:5:"score";s:17:"42.59335110809468";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1434";s:5:"score";s:18:"38.079368857405804";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:17:"35.64288192135964";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"24.283572779012843";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1786";s:5:"score";s:18:"20.475659283949135";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Le succès du Wi-Fi en Europe </title>
		<link>http://www.it-news.fr/le-succes-du-wi-fi-en-europe/</link>
		<pubDate>Mon, 19 Aug 2013 11:39:22 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=900</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/08/Wi-Fi-en-europe.png"><img class="alignleft size-full wp-image-902" alt="Wi-Fi en europe" src="http://www.it-news.fr/wp-content/uploads/2013/08/Wi-Fi-en-europe.png" width="144" height="144" /></a><strong>Le Wi-Fi en europe est le premier canal de consommation de l’internet mobile.</strong> Selon une nouvelle étude de la Commission européenne 71% du trafic de données sans fil sur Smartphones et tablettes transite par cette technologie, un taux qui devrait s’élever à 78% d’ici 2016.</p>
<p style="text-align: justify;">Le Wi-Fi est utilisé principalement à domicile et sur le lieu de travail mais il connaît aussi une croissance rapide dans les lieux publics tels que les cafés, gares ou aéroports. Son utilisation <strong>permet de décharger le trafic des réseaux 3G</strong> souvent saturés et constitue pour l’utilisateur un coût relativement bas face aux réseaux mobiles.</p>
<p style="text-align: justify;"><!--more Lire la suite--></p>
<p style="text-align: justify;">La Commission européenne souhaite alors faciliter l’accès au Wi-Fi car selon Mme Neelie Kroes, vice-présidente de la Commission européenne <strong>« tout le monde en Europe devrait pouvoir accéder à internet, même hors de chez soi ou de son lieu de travail »</strong>.</p>
<p style="text-align: justify;">Pour améliorer l’accès au WI-FI en Europe, la nouvelle étude de la Commission européenne préconise essentiellement :</p>

<ul>
	<li style="text-align: justify;">L’utilisation combinée du Wi-Fi et des infrastructures à petites cellules</li>
	<li style="text-align: justify;"><span style="text-align: justify;">Que plus de bandes de fréquences soient mises à disposition du Wi-Fi dans toute l’UE</span></li>
</ul>
<p style="text-align: justify;">Les opérateurs multiplieraient l’installation des petites cellules qui sont des bornes d’accès à faible puissance. <strong>Celles-ci complètent les macro-cellules</strong> (antennes 3G/4G de base). Une plus large utilisation des petites cellules permettrait de décongestionner le réseau mobile en faisant transiter les communications par les réseaux fixes.</p>
<p style="text-align: justify;">Les opérateurs économiseraient ainsi des dizaines de milliards d’euros tout en densifiant le réseau. Le renforcement de l’utilisation du Wi-Fi en Europe passera également par la mise à disposition des bandes de fréquences comprises <strong>entre 5. 150 MHz et 5.925 MHz</strong> pour le Wi-Fi en plus des bandes comprises entre 2.6 GHz et 3.5 GHz.</p>
<p style="text-align: justify;">La Commission propose dans le même temps de réduire les charges administratives qui pèse sur le déploiement de services et de réseaux de « décharge » dans les lieux publics.</p>
<p style="text-align: justify;">Ces mesures permettront <strong>un accès plus pratique au Wi-Fi dans l’ensemble de l’Europe et un coût plus abordables</strong> pour les utilisateurs comme pour les opérateurs.</p>
<p style="text-align: justify;"><span style="text-decoration: underline;">Aquastar Consulting vous assiste :</span></p>

<ul>
	<li>Dans la <a href="http://new2.aquastar-consulting.com/index.php/solutions/reseau-mobilite/wifi-hotspot#" target="_blank">mise en place d'un réseau Wi-Fi</a> au sein de votre organisation</li>
	<li>Nos ingénieurs, ayant plus de 10 ans d'expérience dans ce domaine sauront répondre à toutes vos questions.</li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>900</wp:post_id>
		<wp:post_date>2013-08-19 12:39:22</wp:post_date>
		<wp:post_date_gmt>2013-08-19 11:39:22</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>le-succes-du-wi-fi-en-europe</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="reseaux-et-mobilite"><![CDATA[Réseaux et mobilité]]></category>
		<category domain="post_tag" nicename="succes-europeen"><![CDATA[succès européen]]></category>
		<category domain="post_tag" nicename="wi-fi-en-europe"><![CDATA[Wi-Fi en Europe]]></category>
		<category domain="post_tag" nicename="wifi"><![CDATA[wifi]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[95]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Wi-Fi en Europe]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[Le succès grandissant du Wi-Fi en Europe]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[La montée du Wi-Fi en Europe est principalement due à la volonté des internautes de se connecter où qu'ils soient. Le Wi-Fi est également un gain économique]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426436940]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"166.91206204407928";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"760";s:5:"score";s:17:"47.82677791472787";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1480";s:5:"score";s:18:"39.104531855758744";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"33.93991433593737";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"33.313315423026985";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:17:"28.66283283327985";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"27.430001461093287";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"25.326043918551772";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:18:"25.213365999345957";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2400";s:5:"score";s:18:"23.248587072530235";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:17:"50.93429201926508";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"14.535680466110401";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"13.562365720600084";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"12.028216915470788";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:18:"11.435938816780268";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"11.148310299222997";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:17:"95.51907505426381";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"760";s:5:"score";s:17:"55.05929331316672";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1480";s:5:"score";s:18:"43.997902911068586";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1789";s:5:"score";s:18:"29.827722965469324";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"23.37582566658279";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"22.39637204594093";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"18.742998005646236";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:18:"17.602349565433578";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[902]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Le numérique en France : Une solution à la crise ?!</title>
		<link>http://www.it-news.fr/le-numerique-en-france/</link>
		<pubDate>Tue, 20 Aug 2013 14:20:35 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=907</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/08/Le-numérique-en-France.jpg"><img class="alignleft size-full wp-image-909" alt="Le numérique en France" src="http://www.it-news.fr/wp-content/uploads/2013/08/Le-numérique-en-France.jpg" width="150" height="150" /></a>Le 19 août dernier le gouvernement de François Hollande était chargé de rendre ses devoirs de vacances. En effet un mois plus tôt le président avait commandé à chacun de ses ministres de plancher sur le sujet suivant <a href="http://www.lepoint.fr/politique/exclusif-la-france-de-2025-vue-par-le-gouvernement-15-08-2013-1714315_20.php" target="_blank">« exposez votre vision de la France en 2025 »</a>.</p>
<p style="text-align: justify;"><!--more Lire la suite--></p>

<h2 style="text-align: justify;">2025 et le numérique en France selon les membres du gouvernement</h2>
<p style="text-align: justify;">Si chaque ministre en a profité pour faire l’éloge de sa politique en cours on peut aussi remarquer que <strong>les nouvelles technologies et le numérique en France</strong> ont une place primordiale et semble pouvoir résoudre de nombreuses difficultés.</p>

<ul>
	<li style="text-align: justify;">Pour <strong>Pierre Moscovici</strong>, ministre de l’Economie et des Finances l’évolution passerait par la dématérialisation d’une partie de l’administration fiscale, « la déclaration, le paiement et contrôle de premier niveau des déclarations » seraient concernés.</li>
</ul>
<ul style="text-align: justify;">
	<li>Pour son confrère <strong>Arnaud Montebourg</strong>, ministre du Redressement Productif, l’objectif est de faire de Paris une des capitales mondiale du numérique au cœur d’une Europe qu’il imagine comme un géant de l’internet capable de concurrencer les nord-américains.</li>
</ul>
<ul style="text-align: justify;">
	<li>Du côté du ministère de l’Intérieur, <strong>Manuel Valls</strong>, le défi repose sur l’intégration de l’innovation au sein des stratégies de sécurité afin de mettre en place « des forces de l’ordre 3.0 » grandes utilisatrices de technologies avec une « utilisation accrue des technologies existantes (biométrie, intelligence artificielle, vidéo, équipements intelligents, etc.) et de celles qui verront le jour d'ici là. »</li>
</ul>
<ul style="text-align: justify;">
	<li><strong>Christiane Taubira</strong>, Ministre de la justice, souhaite quant à elle tirer profit du numérique en France pour simplifier les procédures pour les justiciables, les magistrats et les greffiers.</li>
</ul>
<ul>
	<li style="text-align: justify;">Enfin <strong>Cécile Duflot</strong>, ministre de l’Egalité des territoires et du logement, prône le haut débit pour tous afin d’assurer la cohésion sociale et de réconcilier les citoyens avec la politique, il s’agira de « lancer un grand plan pour le développement sur tout le territoire de lieux identifiés, axés autour du numérique et destinés à l’entraide pour les démarches, l’organisation d’événements artistiques et culturels et accueillant tout aussi bien des start-up que des écoles ou des personnes âgées. »</li>
</ul>
<p style="text-align: justify;"><span style="font-size: 16px;">Les évolutions du numérique en France semblent donc au cœur de l’avenir.</span></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>907</wp:post_id>
		<wp:post_date>2013-08-20 15:20:35</wp:post_date>
		<wp:post_date_gmt>2013-08-20 14:20:35</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>le-numerique-en-france</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="crise"><![CDATA[crise]]></category>
		<category domain="post_tag" nicename="france"><![CDATA[france]]></category>
		<category domain="category" nicename="infrastructures"><![CDATA[Infrastructures]]></category>
		<category domain="post_tag" nicename="manuel-valls"><![CDATA[manuel valls]]></category>
		<category domain="post_tag" nicename="montebourg"><![CDATA[montebourg]]></category>
		<category domain="post_tag" nicename="numerique"><![CDATA[Numérique]]></category>
		<category domain="post_tag" nicename="technologies"><![CDATA[technologies]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[94]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[numérique en France]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[Le numérique en France : Une solution à la crise ?!]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Et si le numérique en France était la solution à tout nos problèmes ? Les membres du gouvernement donnent leurs opinions.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426436305]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2436";s:5:"score";s:18:"104.24033116290131";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:17:"99.09677265858078";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"67.36012276571141";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"980";s:5:"score";s:17:"43.89397932858408";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"39.83186335891399";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:17:"29.23512449660104";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"26.74398407688346";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:17:"23.29726724722087";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"22.772488986422974";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2475";s:5:"score";s:17:"19.21778426758161";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"20.850302733470762";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"15.83491798489088";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:18:"11.134976915815441";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:17:"10.23100666828521";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"10.015745339885772";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1955";s:5:"score";s:17:"9.196175801718645";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[909]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:18:"109.66310292147199";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"980";s:5:"score";s:17:"44.27803367821875";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2436";s:5:"score";s:17:"39.95397741269484";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"37.178086266673176";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"25.925370374662464";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:18:"18.350375859829438";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"16.629744976982312";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:18:"16.227862855501286";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Comment maîtriser les coûts IT ? </title>
		<link>http://www.it-news.fr/comment-maitriser-les-couts-it/</link>
		<pubDate>Tue, 27 Aug 2013 12:48:05 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=927</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/08/argent-public-subvention-depense.jpg"><img class="alignleft size-full wp-image-928" alt="Coûts IT" src="http://www.it-news.fr/wp-content/uploads/2013/08/argent-public-subvention-depense.jpg" width="150" height="112" /></a>Les DSI le constatent par eux même, <strong>les coûts IT sont de plus en plus difficiles à gérer</strong>. Les besoins en outils informatiques ne cessent de croître et de se développer. Irrémédiablement, l'entreprise d'aujourd'hui verra ses coûts IT exploser si elle n'en prête pas une attention particulière.</p>
<p style="text-align: justify;">La question est donc de savoir quels facteurs est susceptibles, pour vous DSI, de faire basculer vos dépenses IT dans le rouge ?</p>
<p style="text-align: justify;"><!--more Lire la suite--></p>

<h2 style="text-align: justify;">Les points susceptibles de générer des coûts IT supplémentaires</h2>
<a href="http://www.it-news.fr/wp-content/uploads/2013/08/Enjeux-DSI.jpg"><img class="aligncenter size-full wp-image-933" alt="Enjeux DSI" src="http://www.it-news.fr/wp-content/uploads/2013/08/Enjeux-DSI.jpg" width="438" height="329" /></a>
<h3 style="text-align: justify;"><span style="text-decoration: underline;">De plus en plus d'outils se connectent à Internet</span></h3>
<p style="text-align: justify;">Et on commence par un facteur en relation directe avec l'évolution fulgurante des nouvelles technologies, <strong>l'augmentation des outils capables de naviguer sur la toile</strong>. En effet, il n'y a pas si longtemps, le téléphone portable n'était pas capable de nous délivrer une connexion internet. Aujourd'hui, que l'on soit dans son canapé ou en train de marcher sur le trottoir, il est possible d'accéder à Google avec son téléphone.</p>
<p style="text-align: justify;">Plus on ira dans ce sens et plus il y aura d'objets capables d'être inter-connectés, plus les coûts IT augmenteront. Autrement dit, un outil supplémentaire génère un coût supplémentaire en licences additionnelles.</p>
<p style="text-align: justify;"><strong>Limitez les outils connectés et utilisez ceux réellement utiles.</strong></p>

<h3 style="text-align: justify;"><span style="text-decoration: underline;">Les programmes BYOD</span></h3>
<p style="text-align: justify;">Autre point sur lequel les DSI devront prêter une attention particulière, c'est <a href="http://www.it-news.fr/byod-letude-vmware-confirme-linteret-des-salaries-francais-a-cette-pratique/">l'utilisation faite par les salariés de leurs propres outils communicatifs</a>. Etant donné que cette tendance se développe, il faudra donc pour les DSI entamer une réflexion à ce sujet. Synonyme de risque et donc de coûts supplémentaires, ce phénomène est à prendre très au sérieux.</p>
<p style="text-align: justify;"><strong>Calculez bien ce que vous dépensez en programme BYOD et ce qu'il vous rapporte.</strong></p>

<h3 style="text-align: justify;"><span style="text-decoration: underline;">La Big data</span></h3>
<p style="text-align: justify;">En effet, car pour être compétitif aujourd'hui (et à condition d'en faire une bonne utilisation), il faut détenir plus d'information que son concurrent. Cela passe donc irrémédiablement par des bases de données toujours plus grandes dans le but d'en tirer des analyses toujours plus pertinentes. Qui dit plus de stockage, dit plus de moyens, et donc une <strong>augmentation de vos coûts IT</strong>.</p>
<p style="text-align: justify;">Les responsables informatiques commenceront également à intégrer l’achat de données mais également mettre en place les niveaux de service adaptés (en termes d'intégrité et de qualité des données).</p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/08/A-quoi-sert-la-Big-Data.jpg"><img class="aligncenter size-full wp-image-934" alt="A quoi sert la Big Data" src="http://www.it-news.fr/wp-content/uploads/2013/08/A-quoi-sert-la-Big-Data.jpg" width="460" height="260" /></a></p>

<h3 style="text-align: justify;"></h3>
<h3 style="text-align: justify;"><span style="text-decoration: underline;">La maintenance</span></h3>
<p style="text-align: justify;">Ça y est, vous avez investi dans tel ou tel logiciel, acheté telle ou telle licence, et vous pensez que vos dépenses s'arrêtent là ? Malheureusement, la réponse est non.</p>
<p style="text-align: justify;">Car si les éditeurs de logiciels génèrent leur C.A. par le biais de ces ventes, c'est bel et bien la maintenant de ces derniers qui représente une part importante de leur rentabilité. Pouvant aller<strong> jusqu'à 85%</strong> et représenter la moitié de leur chiffre d'affaire, les frais de maintenance ne cessent pas de s’accroître.</p>
<p style="text-align: justify;"><strong>Choisissez bien vos logiciels, gérez vos achats, n'achetez pas de licence inutile, et négociez les prix !</strong></p>

<h3 style="text-align: justify;"><span style="text-decoration: underline;">Les audits logiciels</span></h3>
<p style="text-align: justify;">Le contrôle de vos logiciels a environ 60% de chance d'être effectué sur une période de 12 mois. Sachant d'autant plus que cette pratique est en augmentation, il faudra donc vous attendre à être contrôlés à ce sujet.</p>
<p style="text-align: justify;"><strong>Veillez donc à bien vous assurer de la conformité de vos logiciels en tous points.</strong></p>

<h3 style="text-align: justify;"><span style="text-decoration: underline;">L'explosion du Cloud Computing</span></h3>
<p style="text-align: justify;">En 2015, les prévisions annoncent que le marché mondial des services Cloud public <strong>dépasseront les 180 milliards de dollars</strong>. Autrement dit, ce marché n'a pas fini de grandir.</p>
<p style="text-align: justify;">Ainsi, les responsables IT se doivent de mettre en place des grilles permettant de comparer les coûts des services traditionnels avec ceux des services industrialisés et cloud.</p>
<p style="text-align: justify;"><strong>Il faudra de cette manière qu'ils soient capables d'expliquer les avantages comparatifs mais également les risques.</strong></p>
<p style="text-align: justify;"><strong>En conclusion</strong>, les DSI auront toujours tendance à voir leurs coûts IT augmenter dans les années à venir. C'est une évolution naturelle des choses car les avancés technologiques filent à une vitesse folle et les premières entreprises à en bénéficier seront certainement les premières à gagner en compétitivité.</p>
<p style="text-align: justify;">Le tout est donc de bien choisir ce qui vous est vraiment nécessaire et ce qui vous rapportera bien plus que ce qui ne vous en coûtera.</p>
<p style="text-align: justify;"><span style="text-decoration: underline;">Aquastar Consulting répond à vos questions : </span></p>

<ul>
	<li>Besoin d'installer <a href="http://www.aquastar-consulting.com/">un réseau Wi-Fi ? de virtualiser vos serveurs ?</a></li>
	<li><span style="text-align: justify;">Fort de son expérience, Aquastar Consulting est là pour vous conseiller au mieux selon vos installations.</span></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>927</wp:post_id>
		<wp:post_date>2013-08-27 13:48:05</wp:post_date>
		<wp:post_date_gmt>2013-08-27 12:48:05</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>comment-maitriser-les-couts-it</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="couts-it"><![CDATA[coûts IT]]></category>
		<category domain="post_tag" nicename="dsi"><![CDATA[DSI]]></category>
		<category domain="post_tag" nicename="infrastructure"><![CDATA[infrastructure]]></category>
		<category domain="post_tag" nicename="it"><![CDATA[IT]]></category>
		<category domain="post_tag" nicename="maitriser-les-couts"><![CDATA[Maîtriser les couts]]></category>
		<category domain="category" nicename="reseaux-et-mobilite"><![CDATA[Réseaux et mobilité]]></category>
		<category domain="category" nicename="systemes"><![CDATA[Systèmes]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[90]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[coûts IT]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[Comment maîtriser les coûts IT ? Voici nos réponses.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Les avancées technologiques s'intègrent sans cesse dans l'infrastructure des entreprises. Cela n'est pas sans répercussion sur les coûts IT. Comment faire ?]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437077]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:17:"154.8663719284363";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2436";s:5:"score";s:17:"95.69437742913198";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"49.71880352566109";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1439";s:5:"score";s:17:"46.25762847115702";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"43.27380221042624";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"39.99899738879614";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"31.604631072510237";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"27.145865958265198";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:18:"25.125196552186704";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"23.819983423152525";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:17:"56.36858965368308";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"17.367975115046605";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"16.323412365068975";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"15.15467844564838";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"12.777242314084983";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"12.222839303913727";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:17:"96.94014263090801";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1439";s:5:"score";s:18:"47.329189565911484";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2436";s:5:"score";s:17:"40.44137570103696";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"29.48069833066555";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"27.975919529340707";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"26.04809758827426";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1059";s:5:"score";s:18:"22.846473614016638";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"223";s:5:"score";s:18:"21.838496228487216";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[928]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Un mot de passe long suffit-il à vous protéger du piratage ? </title>
		<link>http://www.it-news.fr/mot-de-passe-proteger-du-piratage/</link>
		<pubDate>Mon, 02 Sep 2013 13:25:16 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=940</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/08/Hashcat-mot-de-passe-long-e1377857513485.jpg"><img class="alignleft size-full wp-image-942" alt="Hashcat mot de passe long" src="http://www.it-news.fr/wp-content/uploads/2013/08/Hashcat-mot-de-passe-long-e1377857513485.jpg" width="118" height="138" /></a>Voilà un article qui ne va rassurer personne, très loin est le temps où <strong>un mot de passe long d'une dizaine de caractères</strong> suffisait à repousser les pirates. Pire encore, nous apprenons qu'un mot de passe de 55 caractères ne pose plus de problème au logiciel "ocl-Hashcat-plus" pour être découvert. Spécialisé dans le craquage des mots de passe, ce <a href="http://fhack.troptop.net/?BruteForce_%26amp%3B_Rainbow_%26amp%3B_Dico___Outils___Hashcat" target="_blank">"Hashcat"</a> répond à une grosse demande selon <strong>Jens Steube</strong>, le développeur principal de cet outil. Voyons cela plus en détails.</p>
<p style="text-align: justify;"><!--more Lire la suite--></p>

<h2 style="text-align: justify;">Comment faire pour ne pas être piraté ? Quel mot de passe choisir ?</h2>
<p style="text-align: justify;">Malheureusement, il n'existe aucune solution réellement viable <span style="text-decoration: underline;">dans le temps</span> qui soit <strong>sûre à 100% d'être intouchable par les pirates</strong>. Internet et l'outil informatique de manière général est par nature instable. Autrement dit, il existera toujours un moyen de contourner les dispositifs mis en place par les personnes qui se chargent de la sécurité informatique.</p>
<p style="text-align: justify;">Heureusement, et à contrario du paragraphe précédent, nous pouvons tout de même nous reposer sur une bonne dose d'optimisme. Tout d'abord parce que la plus grande majorité d'entre nous, <strong>99% des personnes qui lisent cet article</strong>, n'intéressent en aucun cas les hackers. Sans épiloguer, combien de personne connaissez-vous dans votre entourage qui ont été victime d'un piratage réel et sérieux ? Nous entendons ici par réel et sérieux, un préjudice financier portant atteinte directement au niveau de vie de la personne en question.</p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/08/mot-de-passe-long-hacker.jpg"><img class="aligncenter size-full wp-image-943" alt="mot de passe long hacker" src="http://www.it-news.fr/wp-content/uploads/2013/08/mot-de-passe-long-hacker.jpg" width="602" height="340" /></a>Nous pouvons toutefois vous rassurer sur un autre point, la plupart des sites internet les plus sérieux utilisent des protocoles <strong>qui rendent la tâche longue et difficile aux Hackers</strong>. En effet, lorsque sa sécurité est pertinente, le site internet en question rajoute des valeurs uniques et aléatoires au mot de passe des internautes. Ils protègent également vos mots de passe par un système de hachage.</p>
<p style="text-align: justify;">Néanmoins, avec un logiciel de craquage, les pirates peuvent faire <strong>jusqu'à 8 milliards de tentatives par seconde.</strong> Autant vous dire qu'un mot de passe faible est le premier à tomber. Là où un mot de passe fort et long devient difficile à craquer, les mots de passe hachés doivent d'abord être récupérés à partir d'un site web compromis avant que les apprentis pirates puissent tenter une opération de craquage.</p>
<p style="text-align: justify;">En bref, ne retenez qu'une et unique chose, faites des mots de passe long et fort, <strong>mais surtout unique à chaque création de compte (Notez-les sur du papier).</strong> Utilisez le même mot de passe pour tous vos sites web, et c'est la catastrophe assurée en termes de sécurité.</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>940</wp:post_id>
		<wp:post_date>2013-09-02 14:25:16</wp:post_date>
		<wp:post_date_gmt>2013-09-02 13:25:16</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>mot-de-passe-proteger-du-piratage</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[94]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[mot de passe]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[Un mot de passe long protège-t-il du piratage ?]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Désormais, un mot de passe long de 55 caractères n'est plus un problème pour être découvert par un hacker. Comment se protéger ?]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"38.646357526880266";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"28.704858997460178";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2330";s:5:"score";s:17:"25.06354717685488";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1786";s:5:"score";s:18:"17.874720095514594";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2376";s:5:"score";s:18:"17.663524492942003";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1924";s:5:"score";s:18:"17.438317678918736";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1955";s:5:"score";s:16:"16.1624779465036";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"15.54775688092559";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"1794";s:5:"score";s:18:"15.377713168211173";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:18:"15.094991536290944";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_old_slug</wp:meta_key>
			<wp:meta_value><![CDATA[mot-passe-proteger-du-piratage]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437370]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"18.930396049859354";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1924";s:5:"score";s:17:"16.64862212555658";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1955";s:5:"score";s:17:"15.96860634322307";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"15.818971023629949";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:18:"10.059504303909495";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:17:"9.859337386354353";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"28.512506973793517";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1786";s:5:"score";s:18:"25.980793688170248";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1924";s:5:"score";s:17:"24.77111069092039";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1955";s:5:"score";s:17:"24.20588365984473";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:17:"22.86465853931293";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1794";s:5:"score";s:17:"21.90793064070133";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1779";s:5:"score";s:18:"17.090298071558127";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1773";s:5:"score";s:18:"16.911880849241985";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[943]]></wp:meta_value>
		</wp:postmeta>
		<wp:comment>
			<wp:comment_id>1127</wp:comment_id>
			<wp:comment_author><![CDATA[[BLOCKED BY STBV] 2014 ou une année riche en Cyberattaque - L&#039;actualité pour décideurs informatiques]]></wp:comment_author>
			<wp:comment_author_email></wp:comment_author_email>
			<wp:comment_author_url>http://www.it-news.fr/2014-ou-une-annee-riche-en-cyberattaque/</wp:comment_author_url>
			<wp:comment_author_IP>37.187.41.26</wp:comment_author_IP>
			<wp:comment_date>2013-12-09 10:01:22</wp:comment_date>
			<wp:comment_date_gmt>2013-12-09 09:01:22</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[[&#8230;] de l’importance d’une authentification à deux facteurs dans un monde où la connexion par un seul mot de passe ne suffit plus pour éloigner les [&#8230;]]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type>pingback</wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
	</item>
	<item>
		<title>Réforme des retraites : Les entreprises participent !</title>
		<link>http://www.it-news.fr/reforme-des-retraites/</link>
		<pubDate>Mon, 02 Sep 2013 15:50:25 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=947</guid>
		<description></description>
		<content:encoded><![CDATA[<img class="alignleft size-full wp-image-948" alt="Réforme des retraites" src="http://www.it-news.fr/wp-content/uploads/2013/09/Réforme-des-retraites.gif" width="150" height="120" />
<p style="text-align: justify;">C'est le mardi 27 Août que le gouvernement a annoncé certaines mesures prises en rapport avec la <strong>réforme des retraites</strong>. Dans ces points abordés, nous pouvons constater trois changements. Mais avant de les aborder, la spécificité de cette actualité réside dans le fait que ce sont bel et bien les entreprises qui vont en payer certaines charges.</p>
<p style="text-align: justify;"><!--more Lire la suite--></p>

<h2 style="text-align: justify;">Les mesures prises dans la cadre de la réforme des retraites</h2>
<p style="text-align: justify;">Nous l'avons dit, elles sont au nombre de trois :</p>

<ul>
	<li>
<div style="text-align: justify;">Relèvement de la durée légale de cotisation</div></li>
	<li>Création d'un compte de pénibilité</li>
	<li>Hausse des cotisations retraites</li>
</ul>
<p style="text-align: justify;">Sans pour autant rentrer dans les détails, l'objectif de ces mesures est de <strong>ramener 7,3 milliards € en 2020</strong>. Cet argent permettra en théorie de combler le déficit du régime, et d'espérer en terminer définitivement pour 2040. Le conseil des ministres officialisera les mesures le 18 Septembre prochain.</p>
<p style="text-align: justify;">Si l'on part du principe que chacun d'entre nous comprend en quoi consiste le relèvement de la durée légale de cotisation et leurs hausses, <strong>la création d'un compte pénibilité est quant à lui une nouveauté</strong>. En quoi consiste-t-il ?</p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/09/Pénébilité-réforme-des-retraites.jpg"><img class="alignright size-full wp-image-949" alt="Pénébilité réforme des retraites" src="http://www.it-news.fr/wp-content/uploads/2013/09/Pénébilité-réforme-des-retraites.jpg" width="300" height="300" /></a></p>
<p style="text-align: justify;">Appelé plus précisément <strong>" compte personnel de la prévention et de la pénibilité ",</strong> le but est de prévenir les travailleurs ayant des conditions de travail jugés difficiles (<a href="http://www.inrs.fr/accueil/demarche/evaluation-risques/penibilite.html" target="_blank">En savoir plus</a>). Plus simplement, les métiers exposés aux produits dangereux, aux fortes températures ou encore au travail de nuit seront ciblés. Les mesures prévoient de mettre à disposition de ces salariés des formations, du temps partiel ou bien d'envisager un arrêt de leurs carrières de manière anticipée.</p>

<h2 style="text-align: justify;">Le financement des mesures</h2>
<p style="text-align: justify;">Cette fois-ci, <strong>le gouvernement Hollande a décidé de s'attaquer aux entreprises</strong>, et les poussent irrémédiablement à mettre eux-mêmes la main à la poche. Que cela s'illustre par une aide partielle ou totale, les patrons voient les dépenses liées aux cotisations de leurs salariés augmenter.</p>
<p style="text-align: justify;">En effet, pour ce qui est de l'augmentation des cotisations retraites, les entreprises vont en payer <strong>la moitié dès 2014</strong> (Ce qui représente 2.2 milliard d'ici 2020). L'augmentation se fait de manière progressive. En 2014, les cotisations pour les actifs et donc pour les employeurs, augmenteront de 0.15 point, puis ensuite de 0.05 de 2015 à 2017. Qu'en est-il du plan de création de compte de pénibilité au travail ?</p>
<p style="text-align: justify;">Là aussi, les entreprises vont devoir payer, et cette fois-ci, elle prennent tout en charge. Grossièrement, le projet coûte jusqu'à 1 milliard d'euros en 2020 et sera mis en place à partir de 2016. A cette date, chaque entreprise devra <strong>verser une cotisation minimale</strong>. Il faut noter qu'un coût supplémentaire sera imposée aux sociétés qui possèdent des salariés concernés par la pénibilité de leur travail.</p>
<p style="text-align: justify;">Ces mesures sont vivement critiquées par le patronat, et malgré une promesse de compensation de la part du gouvernement, les inquiétudes subsistent. <strong>D'un coté, la solution permet de solutionner la réforme des retraites et son déséquilibre en ne touchant pas au pouvoir d'achat des ménages, mais de l'autre, elle augmente le coût du travail pour les employeurs.</strong></p>
<p style="text-align: justify;"></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>947</wp:post_id>
		<wp:post_date>2013-09-02 16:50:25</wp:post_date>
		<wp:post_date_gmt>2013-09-02 15:50:25</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>reforme-des-retraites</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="comptabilite-finances"><![CDATA[Comptabilité - Finances]]></category>
		<category domain="post_tag" nicename="cout"><![CDATA[coût]]></category>
		<category domain="post_tag" nicename="gouvernement"><![CDATA[Gouvernement]]></category>
		<category domain="post_tag" nicename="mesures"><![CDATA[mesures]]></category>
		<category domain="post_tag" nicename="penebilite"><![CDATA[pénébilité]]></category>
		<category domain="post_tag" nicename="reforme-des-retraites"><![CDATA[réforme des retraites]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[91]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Réforme des retraites]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[Réforme des retraites : Les entreprises participent !]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Dans le cadre de la réforme des retraites, deux nouveautés voient le jour : Les entreprises mettent la main à la poche et la pénibilité du travail est prise en compte.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426436137]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"56.10603576068341";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"332";s:5:"score";s:17:"52.20096758477523";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"827";s:5:"score";s:17:"43.89397932858408";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"34.025956240420044";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"34.025956240420044";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:17:"33.22795302476458";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2438";s:5:"score";s:18:"25.519467180315033";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:17:"25.31873869313999";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:3:"953";s:5:"score";s:17:"18.37095549025524";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"17.835053511715373";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"20.80535702125194";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"15.336622002148069";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"14.701551932018674";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:16:"13.7975816841355";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:17:"9.734200233594194";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1955";s:5:"score";s:16:"8.43175931000732";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:3:"332";s:5:"score";s:18:"54.642237966428056";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"827";s:5:"score";s:18:"44.210687248667824";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"34.55317598829689";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"23.856581387729847";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:15:"23.721888528628";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1902";s:5:"score";s:18:"22.801822807756537";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:18:"21.917860015493773";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"953";s:5:"score";s:17:"21.76597022329873";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[948]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Objectifs CICE : &quot;Soulager la trésorerie et maintenir les emplois&quot;</title>
		<link>http://www.it-news.fr/objectifs-cice-soulager-tresorerie/</link>
		<pubDate>Tue, 03 Sep 2013 14:21:50 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=953</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/09/CICE.jpg"><img class="alignleft size-full wp-image-954" alt="CICE" src="http://www.it-news.fr/wp-content/uploads/2013/09/CICE.jpg" width="149" height="148" /></a>C'est ce que disent les chefs d'entreprises selon un sondage réalisé sur la <a href="http://www.bpifrance.fr/actualites/a_la_une/cice_l_opinion_des_chefs_d_entreprise_sur_le_credit_d_impot_competitivite_emploi" target="_blank">communauté OSEO Excellence</a>. Selon les 2000 patrons sondés, "maintenir ou créer des emplois" revient le plus souvent comme étant l'un des objectifs prioritaires du CICE (48%). Tout juste dernier, 47% des répondants affirment que le Crédit d'Impôt Compétitivité et Emploi permet de soulager sa trésorerie et dégager du fonds de roulement. Découvrez les quelques statistiques à savoir.</p>
<p style="text-align: justify;"><!--more Lire la suite--></p>

<h2 style="text-align: justify;">Les objectifs du CICE selon les chefs d'entreprises</h2>
<a href="http://www.it-news.fr/wp-content/uploads/2013/09/Graphique-usage-CICE.jpg"><img class="aligncenter size-full wp-image-957" alt="Graphique usage CICE" src="http://www.it-news.fr/wp-content/uploads/2013/09/Graphique-usage-CICE.jpg" width="876" height="502" /></a>

&nbsp;
<p style="text-align: justify;">Autre constat, on remarque que seulement 10% se disent "pas concerné" par le CICE. A juste titre, la majorité reconnait les avantages qu'il procure. Si l'on s'en réfère à ce graphique, et si vous ne devez retenir qu'une chose sur le CICE, ce serait <strong>la possibilité pour vous de maintenir/créer de l'emploi tout en soulageant votre trésorerie.</strong></p>
 Nous pouvons également vous relayer plusieurs statistiques à connaitre :
<ul>
	<li style="text-align: justify;">Les 88 % des entrepreneurs sondés souhaitent disposer rapidement de trésorerie par le biais d'un préfinancement.</li>
</ul>
<ul>
	<li style="text-align: justify;">Toujours pour les entrepreneurs (94 % d'entre eux), ils ne souhaitent pas que le CICE ait pour but d'accroître les revenus des dirigeants &amp; actionnaires.</li>
	<li style="text-align: justify;">3/4 des répondants ont besoin d'un complément d'information à ce sujet.</li>
</ul>
<h2>Qui est en capacité de bénéficier du CICE ?</h2>
<p style="text-align: justify;"><span style="color: #000000;">Vous aussi vous voulez en bénéficier et vous ne savez pas si vous en avez le droit. Et bien voici les critères à rassembler : </span></p>

<ul>
	<li style="text-align: justify;"><span style="color: #000000;">Vous n'êtes pas un auto-entrepreneur, une entreprise au forfait ou une micro-entreprise. </span></li>
	<li style="text-align: justify;"><span style="color: #000000;">Vous avez au moins un salarié à votre charge (pas de collaborateur).</span></li>
	<li style="text-align: justify;"><span style="color: #000000;">Les entreprises dont le bénéfice est exonéré temporairement ont également le droit au CICE. </span></li>
	<li style="text-align: justify;"><span style="color: #000000;">Ensuite, quel que soit votre domaine d'activité, votre régime d'imposition, ou votre forme, vous pouvez bénéficier du Crédit d'Impôt.</span></li>
</ul>
<p style="text-align: justify;"><span style="color: #000000;">SI vous remplissez ces conditions, vous êtes concernés par le Crédit d'Impôt Compétitivité et Emploi. </span></p>
<p style="text-align: justify;"><a href="http://www.service-public.fr/professionnels-entreprises/actualites/00903.html" target="_blank">Plus d'information sur le CICE et les démarches à réaliser</a>.</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>953</wp:post_id>
		<wp:post_date>2013-09-03 15:21:50</wp:post_date>
		<wp:post_date_gmt>2013-09-03 14:21:50</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>objectifs-cice-soulager-tresorerie</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="c-i-c-e"><![CDATA[C.I.C.E.]]></category>
		<category domain="post_tag" nicename="chef-dentreprise"><![CDATA[chef d'entreprise]]></category>
		<category domain="post_tag" nicename="cice"><![CDATA[CICE]]></category>
		<category domain="post_tag" nicename="competitivite-emplois"><![CDATA[compétitivité emplois]]></category>
		<category domain="category" nicename="comptabilite-finances"><![CDATA[Comptabilité - Finances]]></category>
		<category domain="post_tag" nicename="credit-dimpot"><![CDATA[crédit d'impôt]]></category>
		<category domain="category" nicename="decisionnel"><![CDATA[Décisionnel]]></category>
		<category domain="post_tag" nicename="fond-de-roulement"><![CDATA[fond de roulement]]></category>
		<category domain="post_tag" nicename="fonds-de-roulement"><![CDATA[fonds de roulement]]></category>
		<category domain="category" nicename="gestion-commerciale"><![CDATA[Gestion commerciale]]></category>
		<category domain="post_tag" nicename="tresorerie"><![CDATA[trésorerie]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[97]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[CICE]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[CICE : "Soulager sa trésorerie et maintenir les emplois"]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Quelques statistiques intéressantes sur le CICE et ce qu'il peut rapporter aux entreprises. Dégager de la trésorerie et maintenir les emplois.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437462]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"180.77343111879006";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2438";s:5:"score";s:18:"129.11418079810102";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:17:"92.89102285170719";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"68.90088125422619";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"58.76893596260347";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"332";s:5:"score";s:18:"43.038060266033675";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1595";s:5:"score";s:18:"40.625237517309756";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2475";s:5:"score";s:17:"40.55769077808232";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:17:"38.56984556531269";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:3:"578";s:5:"score";s:18:"32.318249261118616";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"56.06896226741355";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"30.732113409884267";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:18:"29.175967623145226";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"28.076871489808948";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"16.156400292194036";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:18:"14.417193056626324";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"102.43094368233062";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:18:"52.958836086331836";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2438";s:5:"score";s:17:"50.46134057399237";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"332";s:5:"score";s:17:"50.46134057399237";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"48.756486302883296";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1595";s:5:"score";s:18:"47.517774968487615";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:15:"43.267135220566";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"578";s:5:"score";s:18:"37.186793393905205";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[954]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Aquastar Consulting conserve la note de G4+ par la banque de France</title>
		<link>http://www.it-news.fr/aquastar-conserve-la-note-de-g4/</link>
		<pubDate>Wed, 04 Sep 2013 14:45:51 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=963</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/08/aquastar.png"><img class="size-full wp-image-863 alignleft" alt="Aquastar Consulting G4+" src="http://www.it-news.fr/wp-content/uploads/2013/08/aquastar.png" width="172" height="171" /></a>Nous vous présentons aujourd'hui un communiqué de <a href="www.aquastar-consulting.com">la société Aquastar Consulting</a>, intégrateur de solutions informatiques. Cette entreprise, réussi depuis dix années à évoluer de manière constante et <strong>a récemment obtenu la note de G4+ par la banque de France</strong>. Si vous êtes à la recherche de solutions informatiques, d'un logiciel de gestion, ou bien d'une infrastructure numérique, cette société semble être une bonne référence.</p>
<p style="text-align: justify;"><!--more Lire la suite--></p>
<p style="text-align: justify;">"Après analyse de notre société, la banque de France a conservé notre notation <strong>G4+ pour la deuxième année consécutive.</strong></p>
<em><span style="text-decoration: underline;">Mais que signifie cette notation ?</span></em>

Cette notation est un indice (disponible et visible par tous) qui permet de classifier les entreprises vis-à-vis de leur chiffre d’affaire généré ainsi que de leur capacité à respecter ses engagements financiers.

Autrement dit, cet indice est surtout utile s’il l’on souhaite savoir si telle ou telle société ne présente pas de risques financiers particuliers. Pour en revenir à notre notation, elle présente un indice rassurant pour le marché : G4+.
<ul>
	<li>Le « G » signifie un Chiffre d’Affaire <strong>supérieur à 1.5 Millions d’euros</strong></li>
	<li><span style="font-size: 16px;">Le « 4+ » quant à lui est associé à la classification dite <strong>« assez forte »</strong> vis-à-vis de notre capacité à honorer l’ensemble de nos engagements financiers. Ce « 4+ » prévoit également <strong>une stabilité de notre situation d’ici les 3 ans à venir</strong> (Soit la 4ième position sur 13).</span></li>
</ul>
<p style="text-align: justify;">Aquastar Consulting est donc fier de vous annoncer cette notation en cette période de turbulence économique dans notre environnement.</p>
L’équipe Aquastar Consulting,"]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>963</wp:post_id>
		<wp:post_date>2013-09-04 15:45:51</wp:post_date>
		<wp:post_date_gmt>2013-09-04 14:45:51</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>aquastar-conserve-la-note-de-g4</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="aquastar-consulting"><![CDATA[Aquastar Consulting]]></category>
		<category domain="post_tag" nicename="banque-de-france"><![CDATA[banque de France]]></category>
		<category domain="category" nicename="evenements"><![CDATA[Evénements]]></category>
		<category domain="post_tag" nicename="g4"><![CDATA[G4+]]></category>
		<category domain="post_tag" nicename="notation"><![CDATA[notation]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[82]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[G4+]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[Aquastar Consulting conserve la note de G4+ par la banque de France]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Société de service informatique basée à Mons-en-Baroeul, Aquastar Consulting a obtenu la bonne note de G4+ par la banque de France.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437201]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2125";s:5:"score";s:17:"59.66306982694262";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"644";s:5:"score";s:17:"58.61024598140587";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:17:"37.60861475951505";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:17:"26.87198680821196";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:17:"26.15302315371352";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"21.572869611897307";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"19.773561247799677";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2444";s:5:"score";s:17:"19.61476736528514";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"18.261063228169736";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:18:"15.839088846581195";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2125";s:5:"score";s:17:"16.83685897003869";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:17:"12.16292142926909";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:17:"9.996354474545974";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:17:"9.692470732178354";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:17:"9.345509673735114";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1955";s:5:"score";s:17:"9.316908573392327";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[863]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:3:"644";s:5:"score";s:17:"59.46793866088862";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2125";s:5:"score";s:18:"32.321210516050634";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"22.087903539046636";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:18:"17.539202245805374";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"653";s:5:"score";s:18:"17.494948645601845";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"17.115129467998187";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:2:"68";s:5:"score";s:18:"16.160605258025317";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"15.597170982441728";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Le CRM d&#039;usage met le CRM classique à la porte !</title>
		<link>http://www.it-news.fr/crm-dusage-met-crm-classique-porte/</link>
		<pubDate>Thu, 05 Sep 2013 09:46:23 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=967</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/09/CRM-dusage.jpg"><img class="size-thumbnail wp-image-969 alignleft" alt="CRM d'usage" src="http://www.it-news.fr/wp-content/uploads/2013/09/CRM-dusage-150x150.jpg" width="150" height="150" /></a>C'est une analyse donnée par <strong>Pierre Touton</strong>, <strong>le dirigeant d’update software France, il faut passer à un <a href="http://thoughtsoncloud.fr/index.php/2013/08/le-crm-classique-est-mort-vive-le-crm-dusage/" target="_blank">CRM d'usage</a></strong>. Les réseaux sociaux, l'utilisation d'appareils mobiles (Portable, tablette, etc..) qui explose tant au travail qu'en dehors, pousse la CRM à évoluer pour garantir la collecte des informations clients la plus pertinente possible. <strong>
</strong></p>
<p style="text-align: justify;">Qu'est-ce que le CRM d'usage ? Quels sont ses avantages ?</p>
<p style="text-align: justify;"><!--more Lire la suite--></p>

<h2>Un outil CRM d'usage, c'est celui que tout le monde sait utiliser</h2>
<p style="text-align: justify;">Pour faire son boulot, votre outil CRM doit prendre en compte l'environnement métier dans lequel il va évoluer ainsi que celui qui va l'utiliser. <strong>Un seul mot d'ordre : SIMPLIFICATION. </strong>On ne le dira jamais assez, ce qui fonctionne le mieux, ce sont les choses les plus simples.</p>
<p style="text-align: justify;">Pour cela, il faut que dès la conception d'un quelconque outil CRM, il soit pensé pour l'utilisateur final. Il n'y a que de cette manière que l'outil pourra refléter l'ensemble de son potentiel.  Bien que logique, la conception des outils CRM ne prend pas assez en compte les attentes de l'utilisateur final.</p>
<span style="text-decoration: underline;"><em>Bon, on ne sait toujours pas ce que c'est le CRM d'usage ?</em></span>
<p style="text-align: justify;">Pour être le plus clair possible, nous allons qualifier le CRM d'usage en trois points principaux :</p>

<ul>
	<li style="text-align: justify;">Le CRM d’usage accentue son utilisation sur l'intuitivité, la convivialité et la possibilité de personnaliser l'interface utilisateur. L'objectif premier, c'est que l'utilisateur passe le moins de temps possible pour découvrir l'outil. On saura si l'outil CRM est bien fait quand l'utilisateur qui le prend en main s'y retrouve de lui-même. <strong>Les avantages : Autonomie accrue des utilisateurs, baisse des coûts de formation, et réduction des réclamations faites au support.</strong></li>
</ul>
<ul>
	<li style="text-align: justify;">L'adaptabilité ! Voilà un autre point indispensable pour la réussite d'un projet CRM. Il faudra donc définir clairement l'exploitation plus ou moins poussée que va en faire son utilisateur. Autrement dit, les besoins diffèrent selon que l'utilisateur est dans le domaine de la banque, ou dans la vente de voiture. Chaque secteur doit donc retrouver ses spécificités afin qu'il s'adapte à tous besoins. <strong>Les avantages : Les utilisateurs acceptent l’utilité et la valeur ajoutée de la solution CRM. Ils la voient comme quelque chose qui est là pour les aider dans la réalisation de leurs missions.</strong></li>
</ul>
<ul>
	<li style="text-align: justify;">L'adaptabilité ! Oui, on l'a déjà dit, mais cette fois ci concernant son contexte d'utilisation. Vous l'utilisez sur un pc fixe ? Un ordinateur portable ? Une tablette ? En effet, beaucoup de scénarios sont envisageable. <strong>Les avantages : Les utilisateurs bénéficient là d'un outil qui peut être piloté de n'importe quel support. Le confort de l'utilisation est donc fortement accru.  </strong></li>
</ul>
<p style="text-align: justify;">Pour réussir votre projet CRM, il faut donc que les utilisateurs soient au coeur de vos choix. Il faut que ce soit eux qui décident si oui ou non ils comprennent, si oui ou non ils adhèrent à l'outil. Pour résumer, la CRM d'usage repose sur 4 mots clés : Évaluation, implémentation, déploiement et évolution.</p>
 <a href="http://www.it-news.fr/wp-content/uploads/2013/09/Simplification-CRM-dusage.jpg"><img class="aligncenter size-full wp-image-972" alt="Simplification CRM d'usage" src="http://www.it-news.fr/wp-content/uploads/2013/09/Simplification-CRM-dusage.jpg" width="400" height="300" /></a>
<h2>Une conclusion sur le CRM d'usage ?</h2>
<p style="text-align: justify;">Si on devait faire <strong>un bilan sur dix ans,</strong> plus de 75 milliards de dollars sont passé dans l'investissement en logiciels et services CRM. Dans le même temps le taux de satisfaction concernant ces outils n'a pratiquement pas évolué (de 3 à 5%). Cela montre qu'il y a un véritable besoin de CRM en entreprise, mais qu'il est le plus souvent non adapté aux utilisateurs. C'est ici que le CRM d'usage vient prendre tout son sens.</p>
<p style="text-align: justify;">Il semble être une très bonne réponse afin que chaque service d'une entreprise (Marketing, Commercial, ..) puisse l'utiliser à sa guise. Un utilisateur satisfait de son outil CRM, <strong>est un utilisateur qui répond aux besoins de ses clients</strong> au mieux, et qui donne une image positive de son entreprise.</p>
<p style="text-align: justify;"><span style="font-size: 16px;"> </span></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>967</wp:post_id>
		<wp:post_date>2013-09-05 10:46:23</wp:post_date>
		<wp:post_date_gmt>2013-09-05 09:46:23</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>crm-dusage-met-crm-classique-porte</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="crm"><![CDATA[CRM]]></category>
		<category domain="category" nicename="crm"><![CDATA[CRM]]></category>
		<category domain="post_tag" nicename="crm-classique"><![CDATA[CRM classique]]></category>
		<category domain="post_tag" nicename="crm-dusage"><![CDATA[CRM d'usage]]></category>
		<category domain="post_tag" nicename="simplification"><![CDATA[simplification]]></category>
		<category domain="post_tag" nicename="utilisateurs"><![CDATA[utilisateurs]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[94]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[CRM d'usage]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[Le CRM d'usage met le CRM classique à la porte !]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[La CRM est incontournable aujourd'hui, mais pose encore beaucoup de problèmes à ses utilisateurs. La solution ? Passer à un CRM d'usage..]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437453]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:17:"75.62745959947952";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"180";s:5:"score";s:16:"64.4290438112193";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2436";s:5:"score";s:17:"42.98055683488653";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:17:"30.60992655267254";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"27.346250450086863";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2444";s:5:"score";s:18:"24.230492033330773";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:17:"22.73393469716323";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:18:"21.989455515340698";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"19.163637876135873";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1902";s:5:"score";s:17:"16.29240358849275";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:18:"27.371057861280395";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"12.063253935828586";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1924";s:5:"score";s:18:"10.695426925617292";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:18:"10.383752625545533";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"10.342514051169474";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1955";s:5:"score";s:16:"8.34729378314313";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:3:"180";s:5:"score";s:17:"68.80292458732512";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:17:"46.24456084726049";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:18:"19.483441524921528";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1902";s:5:"score";s:18:"19.171767778288547";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"19.050587186176386";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2436";s:5:"score";s:18:"17.679689567925784";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:18:"16.331723830972326";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1924";s:5:"score";s:18:"15.576770942153061";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[2370]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>La télémédecine : Une réponse au vieillissement de la population ? </title>
		<link>http://www.it-news.fr/la-telemedecine/</link>
		<pubDate>Mon, 09 Sep 2013 10:10:49 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=980</guid>
		<description></description>
		<content:encoded><![CDATA[<a style="color: #ff4b33; line-height: 21.81818199157715px; font-size: 16.363636016845703px;" href="http://www.it-news.fr/wp-content/uploads/2013/09/telemedecine.jpg"><img class="alignleft size-thumbnail wp-image-981" alt="telemedecine" src="http://www.it-news.fr/wp-content/uploads/2013/09/telemedecine-150x150.jpg" width="150" height="150" /></a>
<p style="text-align: justify;">C'est un constat qui doit être pris en compte, <strong>un tiers de la population Européenne aura plus de 60 ans dans les 40 années à venir.</strong> Se pose donc le problème de l'augmentation des traitements destinés à la vieillesse. En effet, le nombre de médecin n'aura quant à lui pas assez augmenté pour palier à la hausse de cette demande, la télémédecine semble donc être une bonne solution pour accroître la productivité des médecins.</p>
<p style="text-align: justify;"><!--more Lire la suite--></p>

<h2 style="text-align: justify;">La télémédecine rapproche le médecin du patient</h2>
<p style="text-align: justify;">Nous ne sommes actuellement pas tous égaux dans la proximité que nous avons avec notre médecin. Un citadin aura bien plus facilement accès à des soins qu'une personne étant dans un milieu rural. En effet, ce dernier va parfois devoir faire <strong>plusieurs dizaines de kilomètre pour trouver ce dont il a besoin.</strong></p>
<p style="text-align: justify;"><a href="http://www.sante.gouv.fr/deploiement-de-la-telemedecine-tout-se-joue-maintenant.html" target="_blank">La télémédecine</a> va donc permettre à chacun de pouvoir avoir accès à un suivi personnalisé, quel que soit le nombre de kilomètres qui vous sépare de votre médecin. Par le biais des nouvelles technologies, des réseaux haut débit, et des services qui y sont associés (vidéo conférence, diagnostics à distance ou encore l'imagerie), tout le monde est en mesure d'avoir accès à la médecine.</p>
<p style="text-align: justify;">Ainsi, vous êtes en milieu rural où la première porte qui cache un médecin est à plus de 30 kilomètres, grâce à la télémédecine, <strong>vous pouvez tout de même avoir un suivi sans bouger de chez vous.</strong></p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/09/La-télémédecine.jpg"><img class="aligncenter size-large wp-image-982" alt="La télémédecine" src="http://www.it-news.fr/wp-content/uploads/2013/09/La-télémédecine-1024x768.jpg" width="640" height="480" /></a></p>
<p style="text-align: justify;">On peut également noter que la m-santé se développe aussi. La santé par le mobile, car aujourd'hui, plus de <strong>100 000 applications sont destinées et/ou en relation avec la médecine.</strong> On ne pas dire que ces applications vont apporter de vraies solutions aux patients, mais simplement que la télémédecine et ses moyens se développent à une grande vitesse.</p>

<h2 style="text-align: justify;">Les limites de la télémédecine</h2>
<p style="text-align: justify;">Car chaque solution possède ses limites, la condition au bon fonctionnement de ce système <strong>réside malgré tout dans les technologies employées par ses utilisateurs.</strong> En effet, autant les médecins que les patients vont devoir se saisir d'infrastructures adaptées pour pratiquer la télémédecine.</p>
<p style="text-align: justify;">De plus, les services de la télémédecine nécessitent des réseaux à très haut débit. En effet, pour véritablement être efficace, le transfert d’images IRM et/ou les consultations vidéo en haute définition <strong>doivent s’appuyer sur des réseaux robustes et ultra performants.</strong> L'objectif est d'avoir :</p>

<ul>
	<li>Une bande passante de qualité</li>
	<li>Une capacité de stockage adaptée</li>
	<li>Une sécurité des données adaptée à leur criticité</li>
</ul>
<p style="text-align: justify;">Si la télémédecine semble donc être une bonne solution au vieillissement de la population, il sera malgré tout nécessaire de faire des investissements dans ce domaine afin d'assurer un traitement de qualité.</p>
<p style="text-align: justify;">Cela ne va donc pas sans <strong>des outils de communication modernes, innovants,</strong> permettant de donner plus de soins, plus vite, sans pour autant mettre en péril les informations échangées et le budget des patients pour leurs traitements.</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>980</wp:post_id>
		<wp:post_date>2013-09-09 11:10:49</wp:post_date>
		<wp:post_date_gmt>2013-09-09 10:10:49</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>la-telemedecine</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="medecine"><![CDATA[médecine]]></category>
		<category domain="post_tag" nicename="patient"><![CDATA[patient]]></category>
		<category domain="category" nicename="reseaux-et-mobilite"><![CDATA[Réseaux et mobilité]]></category>
		<category domain="post_tag" nicename="technologies"><![CDATA[technologies]]></category>
		<category domain="post_tag" nicename="telemedecine"><![CDATA[télémédecine]]></category>
		<category domain="post_tag" nicename="vieillissement"><![CDATA[vieillissement]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[94]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Télémédecine]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[La télémédecine : Une réponse au vieillissement de la population ?]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[La télémédecine semble être l'évolution normal de la médecine d'aujourd'hui. A quoi cela ressemble ? Y-a-t-il des limites à cette pratique ?]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_old_slug</wp:meta_key>
			<wp:meta_value><![CDATA[la-telemedecine-une-reponse-au-vieillissement-de-la-population]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426435162]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:3:"907";s:5:"score";s:17:"43.89397932858408";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"42.918286594703005";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"32.472777736628494";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"29.636941311398285";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1794";s:5:"score";s:18:"28.005714855925554";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"27.145865958265198";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2400";s:5:"score";s:18:"26.736764705398883";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:18:"25.942020759891733";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"25.046951838069575";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"24.24894862241411";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"14.278190857406486";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"13.602294253841155";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"13.404602584876713";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"11.41679991555679";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"11.155381881034678";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:17:"10.95911677039027";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:3:"907";s:5:"score";s:17:"44.12673183646956";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1794";s:5:"score";s:18:"33.121372164408015";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:17:"26.02842162821748";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1779";s:5:"score";s:18:"24.763078578649274";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"21.169032280159797";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"21.077883141405422";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1465";s:5:"score";s:18:"20.630094298918024";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1789";s:5:"score";s:18:"19.953309801780534";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[2350]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Vous préférez les tablettes tactiles aux ordinateurs portables !</title>
		<link>http://www.it-news.fr/les-tablettes-tactiles-pc-portables/</link>
		<pubDate>Tue, 10 Sep 2013 15:45:28 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1000</guid>
		<description></description>
		<content:encoded><![CDATA[<a style="color: #ff4b33; line-height: 21.81818199157715px; font-size: 16.363636016845703px; text-align: justify;" href="http://www.it-news.fr/wp-content/uploads/2013/09/tablettes-tactiles.jpg"><img class="alignleft size-thumbnail wp-image-1001" alt="tablettes-tactiles" src="http://www.it-news.fr/wp-content/uploads/2013/09/tablettes-tactiles-150x150.jpg" width="150" height="150" /></a>
<p style="text-align: justify;">Cette affirmation est de plus en plus vraie, <strong>les tablettes tactiles deviennent peu à peu vos outils préférés.</strong> Le principal responsable de cet engouement n'est autre qu'<em>Apple</em>. En effet, là où elles ne représentaient qu'un marché de niche dans les années 2000, l'Ipad sorti en 2010 a changé ce marché. Aujourd'hui positionné à mi-chemin des téléphones portables et des PC, les tablettes tactiles séduisent de plus en plus les consommateurs. <strong>Comment ? Pourquoi ? Analysons cela avec quelques chiffres</strong>.</p>
<p style="text-align: justify;"><!--more Lire la suite--></p>

<h2 style="text-align: justify;">Le marché des tablettes tactiles dominé par <em>Apple</em> ?</h2>
<p style="text-align: justify;"><strong>Oui en 2012, non en 2013</strong>. En effet, et comme nous l'avons dit ci-dessus, c'est bel et bien <em>Apple</em> et son Ipad (qui se vend encore aujourd'hui à plus de 5 millions d'exemplaires par mois) qui a bousculé le marché et fait des tablettes tactiles des outils demandés et re-demandés par les consommateurs. Détenant plus de 60% du marché en 2012, <em>Apple</em> est le précurseur dans ce domaine.</p>
<p style="text-align: justify;">Toutefois, ce sont bien les constructeurs asiatiques tel que <em>Samsung</em> ou <em>Asus</em> qui détiennent en ce moment plus des 2/3 du marché. En un an, <strong>les volumes de ventes de ces tablettes sous Android ont pratiquement triplés. </strong></p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/09/tablettes-tactiles-Asus.jpeg"><img class="aligncenter size-medium wp-image-1002" alt="tablettes-tactiles-Asus" src="http://www.it-news.fr/wp-content/uploads/2013/09/tablettes-tactiles-Asus-300x158.jpeg" width="300" height="158" /></a></p>

<h2 style="text-align: justify;">Des Français particulièrement réceptifs</h2>
<p style="text-align: justify;">Vous allez le constater par vous-même,<strong> les tablettes tactiles vont envahir de plus en plus notre environnement</strong>. L'engouement n'est donc pas près de s’arrêter selon une étude récente faite par <a href="http://www.zenithoptimedia.com/zenithoptimedia-publishes-new-media-forecasts/" target="_blank">zenithoptimedia.com</a>. Et la France et les Français en sont particulièrement friands.</p>
<p style="text-align: justify;">L'évolution explose, et même si à travers le monde seulement 4.7% des ménages en étaient équipés en 2012, 2015 revoit ce pourcentage à la hausse le poussant à 13%. Là où l'on va remarquer que la France est particulièrement sensible à ce phénomène, c'est que <strong>ces mêmes chiffres ramenés aux Français dépassent les 45% en 2015</strong>.</p>
<p style="text-align: justify;">Autrement dit, si vous êtes Français, vous avez pratiquement une chance sur deux de posséder une tablette en 2015. Et comme les tablettes tactiles marchent sur le marché des ordinateurs portables, il ne serait donc pas étonnant que les ventes reculent au détriment de cette technologie.</p>

<h2 style="text-align: justify;">Des ventes supérieures aux ordinateurs portables</h2>
<p style="text-align: justify;"><strong>C'est en 2016</strong> que les prévisions affirment que les tablettes tactiles seront des outils plus populaires que les ordinateurs portables. En laisse témoigner ce schéma :</p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/09/Tablettes-tactiles-vs-ordinateurs-portables.jpg"><img class="aligncenter size-full wp-image-1004" alt="Tablettes tactiles vs ordinateurs portables" src="http://www.it-news.fr/wp-content/uploads/2013/09/Tablettes-tactiles-vs-ordinateurs-portables.jpg" width="590" height="420" /></a></p>
<p style="text-align: justify;">Ventes prévues dans le monde pour les tablettes et ordinateurs portables :</p>

<ul>
	<li><strong>208 à 393 millions d’unités</strong> en 2017 pour les ordinateurs portables</li>
	<li><strong>121 à 416 millions d’unités</strong> en 2017 pour les tablettes tactiles</li>
</ul>
<p style="text-align: justify;">Autrement dit, même si les ordinateurs portables gardent une bonne croissance de vente, elle n'est rien comparée à celle des tablettes.</p>

<h2 style="text-align: justify;">Quel impact sur les entreprises ?</h2>
<p style="text-align: justify;">Irrémédiablement, le monde du travail va donc changer si cela n'est pas encore fait. En effet, on estime que <strong>47% des entreprises sont d'ores et déjà équipées de tablettes</strong> pour des services de navigation web, de messagerie, ou bien de présentation. Beaucoup estiment même que les tablettes vont prendre peu à peu la place des ordinateurs dans les 5 années qui viennent.</p>
<p style="text-align: justify;">Et ça n'est pas plus mal, car là aussi on estime qu'il existe un véritable gain de productivité à utiliser ce genre d'outil. En effet, on dénombre<strong> plus de 25 000 applications dédiées à l'augmentation de la productivité en entreprise</strong>. D'ailleurs, une application de prise de note sur Ipad se vante déjà de pouvoir faire gagner 30 minutes par jour aux travailleurs.</p>
<p style="text-align: justify;">Les tablettes tactiles sont donc aujourd'hui au cœur d'une évolution qu'il sera impossible d'arrêter. <strong>Mélangeant praticité et mobilité</strong>, ces outils séduisent, et si vous n'en avez pas encore, il est fort probable que vous les manipuliez dans un an ou deux.</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1000</wp:post_id>
		<wp:post_date>2013-09-10 16:45:28</wp:post_date>
		<wp:post_date_gmt>2013-09-10 15:45:28</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>les-tablettes-tactiles-pc-portables</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="mobilite"><![CDATA[Mobilité]]></category>
		<category domain="category" nicename="reseaux-et-mobilite"><![CDATA[Réseaux et mobilité]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[97]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[tablettes tactiles]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[Vous préférez les tablettes tactiles aux ordinateurs portables !]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[En effet, fini le temps où vous souhaitiez acheter des PC portables, aujourd'hui, ce sont bel et bien les tablettes tactiles qui vous séduisent. Pourquoi ?]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:17:"65.61275834014148";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"44.80596304282683";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"38.852510851240766";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:17:"33.88012453630276";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"31.73263380383873";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"31.368825669816147";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"31.368825669816147";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:18:"29.033542406389024";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2266";s:5:"score";s:18:"29.033542406389024";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:18:"29.033542406389024";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"23.628931468605302";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:18:"19.428642653253952";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"18.651611553415172";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:17:"16.55567444146646";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"14.782905443837036";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:17:"14.63285210745133";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_post_restored_from</wp:meta_key>
			<wp:meta_value><![CDATA[a:3:{s:20:"restored_revision_id";i:1132;s:16:"restored_by_user";i:37;s:13:"restored_time";i:1398237702;}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437550]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:17:"41.62368467186534";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:18:"30.083268049679166";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"27.986378735698022";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"23.626264554449044";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"849";s:5:"score";s:18:"23.355322122445937";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"22.411311502719236";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:18:"21.912585084630475";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"21.059844373524307";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[2353]]></wp:meta_value>
		</wp:postmeta>
		<wp:comment>
			<wp:comment_id>1157</wp:comment_id>
			<wp:comment_author><![CDATA[[BLOCKED BY STBV] La mobilité en entreprise : un réel facteur de productivité | L&#039;actualité pour décideurs informatiquesL&#039;actualité pour décideurs informatiques]]></wp:comment_author>
			<wp:comment_author_email></wp:comment_author_email>
			<wp:comment_author_url>http://www.it-news.fr/mobilite-en-entreprise-reel-facteur-productivite/</wp:comment_author_url>
			<wp:comment_author_IP>37.187.41.26</wp:comment_author_IP>
			<wp:comment_date>2014-04-24 07:44:31</wp:comment_date>
			<wp:comment_date_gmt>2014-04-24 06:44:31</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[[&#8230;] avec l’introduction des tablettes et des smartphones que le monde professionnel s’est retrouvé positivement chamboulé. Non [&#8230;]]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type>pingback</wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
	</item>
	<item>
		<title>Le préjudice moyen pour le vol de données augmente de 11%</title>
		<link>http://www.it-news.fr/le-prejudice-moyen-vol-de-donnees/</link>
		<pubDate>Wed, 11 Sep 2013 15:59:08 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1006</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/09/Vol-de-données.jpg"><span style="font-size: medium;"><img class="alignleft size-full wp-image-1007" alt="Vol de données" src="http://www.it-news.fr/wp-content/uploads/2013/09/Vol-de-données.jpg" width="150" height="110" /></span></a><span style="font-size: medium;">Voici un problème de plus en plus posé sur la table, <strong>le vol de données.</strong> En effet, on assiste aujourd'hui à la guerre des données et c'est à celui qui en aura le plus qui gagnera la partie. Le vol de données est donc pris très au sérieux et vient de voir son préjudice augmenter par rapport à 2012. Avant cette année, le coût moyen par actif dérobé était de 130 dollars pour 136 dollars en 2013 (<a href="https://www4.symantec.com/mktginfo/whitepaper/053013_GL_NA_WP_Ponemon-2013-Cost-of-a-Data-Breach-Report_daiNA_cta72382.pdf" target="_blank">source</a>). Qui sont les plus touchés par ce fléau ? </span></p>
<p style="text-align: justify;"><!--more Lire la suite--></p>

<h2 style="text-align: justify;">Acteurs et secteurs touchés par le vol de données</h2>
<p style="text-align: justify;">Les facteurs qui agissent directement sur l'augmentation de ce coût n'est autre que les failles de sécurité, l'environnement et le contexte du marché, mais aussi la législation retenue concernant la protection des données.</p>
<p style="text-align: justify;">Nous pouvons observer le cas en Allemagne, au Japon ou bien même en Océanie où <strong>les attaques pirates ainsi que les logiciels malintentionnés causent les principaux vol de données</strong>. Le cas du Brésil est un peu différent car le vol de données est plus souvent dû à une erreur humaine (Le coût moyen est estimé à 58 dollars).</p>
<p style="text-align: justify;">Le nombre d'actifs touchés varie légèrement d'une nation à une autre. En effet, on trouve <strong>une moyenne de 28 765 pour les Américains</strong> tandis que les entreprises Australiennes est à une moyenne de 34 249. La différence est plus prononcée pour l'Italie et le Japon où l'on trouve une moyenne de 18 000 actifs touchés.</p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/09/Vol-de-données1.jpg"><img class="aligncenter size-full wp-image-1013" alt="Vol de données" src="http://www.it-news.fr/wp-content/uploads/2013/09/Vol-de-données1.jpg" width="400" height="267" /></a></p>
<p style="text-align: justify;">Il existe toutefois un préjudice qui s'étend sur une durée plus longue lorsque l'accroc engage un appareil volé ou perdu.</p>
<p style="text-align: justify;">Les sociétés peuvent ainsi faire le choix de <strong>refermer l'affaire sans pour autant en informer les autorités en vigueur.</strong> Malgré tout, dans certains pays, la législation empêche cette pratique ce qui touche à leur réputation. En Amérique, ce sont les investisseurs qui s'agitent tandis qu'en France et en Australie les clients coupent les ponts.</p>
<p style="text-align: justify;">Si l'on regarde cette fois les secteurs les plus touchés par le vol de données, on trouve en pole position la santé avec 233 dollars par actif volé, viens ensuite la finance (215) puis les transports (169) et les télécommunications (150).</p>
<p style="text-align: justify;">Pour terminer sur ce thème et donner un dernier mot sur les entreprises qui investissent le plus dans la protection de leur SI, <strong>on trouve les sociétés Australiennes et Allemandes avec respectivement 1.2 et 1.3 million de dollars</strong>.</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1006</wp:post_id>
		<wp:post_date>2013-09-11 16:59:08</wp:post_date>
		<wp:post_date_gmt>2013-09-11 15:59:08</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>le-prejudice-moyen-vol-de-donnees</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[91]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[vol de données]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[Le préjudice moyen pour le vol de données augmente de 11%]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Voici un problème de plus en plus posé sur la table, le vol de données. En effet, on assiste aujourd'hui à la guerre des données. Voici quelques chiffres.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_old_slug</wp:meta_key>
			<wp:meta_value><![CDATA[le-prejudice-moyen-pour-le-vol-de-donnees]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437431]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:17:"46.32753652742796";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:18:"31.432855436569227";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"28.095238292398875";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"19.64787538534989";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"16.683101771299093";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:18:"15.547756880925592";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"15.547756880925592";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:18:"15.472072207204704";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"15.233991174484151";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"14.674068991549241";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:17:"17.87854405472661";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:18:"12.003382159251638";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"11.624108291966936";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:17:"10.76330763404635";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:17:"9.224267316033782";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1940";s:5:"score";s:17:"9.224267316033782";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:17:"29.21213634775065";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:17:"19.57646897531544";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"18.406165145868542";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1305";s:5:"score";s:18:"16.871675481050204";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1789";s:5:"score";s:17:"15.42410714209398";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1043";s:5:"score";s:17:"14.52160264677351";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:18:"14.224282883535542";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1876";s:5:"score";s:18:"14.090491148975909";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>L&#039;augmentation des objets internet multiplie vos inquiètudes</title>
		<link>http://www.it-news.fr/objets-internet-et-inquietudes/</link>
		<pubDate>Fri, 13 Sep 2013 14:33:35 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1016</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/09/Objets-internet.jpg"><img class="alignleft size-full wp-image-1018" alt="Objets internet" src="http://www.it-news.fr/wp-content/uploads/2013/09/Objets-internet.jpg" width="160" height="120" /></a>Voici quelque chose qui vous rend tous méfiants, <strong>la multiplication des objets internet</strong>. Pourquoi ? Car cette augmentation vient augmenter de la même manière les intrusions à votre vie privée. En effet, plus il existera d'objets internet, plus il y aura de possibilités pour les annonceurs d'avoir accès à vos données personnelles. Appuyé par une étude faite par <a href="http://www.avg.com/fr-fr/company/about-us/company-profile" target="_blank">AVG Technologies</a>, un fournisseur en solutions de sécurité, nous n'avons pas fini de nous inquiéter.</p>
<p style="text-align: justify;"><!--more Lire la suite--></p>

<h2 style="text-align: justify;">La montée des objets internet et l'atteinte à la vie privée</h2>
<p style="text-align: justify;">Le contexte actuel dans laquelle notre société évolue en ce moment voit <strong>de plus en plus d'articles fortement médiatisés</strong> sur les possibilités qu'offre internet pour recueillir des données. Autrement dit, les personnes ont aujourd'hui de plus en plus conscience qu'internet peut leur porter préjudice.</p>
<p style="text-align: justify;">Si l'on reprend <strong>l'étude faite par AVG Technologies sur 5000 consommateurs</strong>, la moitié se dit inquiets sur la protection de leurs vies privées sur le web. L'étude ajoute qu'ils sont de moins en moins prêts à faire confiance aux entreprises vis à vis de leurs politiques de protection des données.</p>
<p style="text-align: justify;">Autre statistique intéressante à prendre en compte, 70% des personnes interrogées estiment que l'augmentation des objets internet et leurs technologies seront <strong>de plus en plus utiles dans la vie de tous les jours</strong>. Toutefois, dans le même temps, ces 70% disent également que ce phénomène sera de plus en plus intrusif.</p>
<p style="text-align: justify;">La question ici est donc de savoir jusqu'où cette intrusion sera acceptée par les consommateurs ? Ne va-t-il pas y avoir une limite où l'intrusion sera tellement forte que <strong>les consommateurs vont totalement rejeter les objets internet</strong> et finalement tuer ce marché. D'ailleurs, vos comportements montrent d'ores et déjà que vous faites attention à ce que vous divulguez comme informations sur la toile.</p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/09/Les-objets-internet.jpg"><img class="aligncenter size-full wp-image-1021" alt="Les objets internet" src="http://www.it-news.fr/wp-content/uploads/2013/09/Les-objets-internet.jpg" width="600" height="333" /></a></p>
<p style="text-align: justify;">En effet, 90% des personnes interrogés prêtent une attention particulière lorsqu'il faut inscrire des données personnelles pour accéder à un service. De plus, <strong>8 personnes sur 10 ont déjà interrompu un téléchargement</strong> lorsqu'il demandait un accès à certaines informations.</p>
<p style="text-align: justify;"><strong>Le développement des connectivités et des objets internet</strong> rend difficile pour l'utilisateur de protéger ses données. Autrement dit, le traitement des données d'une entreprise envers son client va devoir être le plus transparent possible. Le risque pour les annonceurs est donc de voir naître une grosse perte de confiance de leurs consommateurs.</p>
<p style="text-align: justify;">En conclusion, on peut dire que si vous souhaitez que vos clients gardent une confiance aveugle en vous, vous allez devoir leur donner facilement accès au traitement que vous faites de leurs données personnelles. <strong>Ils doivent donc savoir pourquoi ils sont stockés, à quoi ils servent, et à quel moment ils sont utilisés.</strong> Cela semble être l'une des seules solutions qui permet aux utilisateurs d'accepter de donner de leurs informations personnelles.</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1016</wp:post_id>
		<wp:post_date>2013-09-13 15:33:35</wp:post_date>
		<wp:post_date_gmt>2013-09-13 14:33:35</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>objets-internet-et-inquietudes</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[94]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Objets internet]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[L'augmentation des objets internet multiplie vos inquiètudes]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Les objets internet se multiplie à une très grande vitesse. Vous êtes donc de plus en plus connectés et observés par les annonceurs. Découvrez comment vous réagissez.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_old_slug</wp:meta_key>
			<wp:meta_value><![CDATA[objets-internet-multiplie-vos-inquietudes]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437389]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:17:"42.45707311102112";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:17:"38.97698309745595";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:18:"28.929522752972403";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"28.367888680548443";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"28.134851076502883";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2330";s:5:"score";s:18:"24.215077249404008";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:18:"23.787735138732224";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2125";s:5:"score";s:18:"22.788884551699038";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2465";s:5:"score";s:18:"22.470405171127542";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"20.75018245259365";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"19.543916550149728";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"16.909088965580665";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"14.255567429642399";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:18:"14.214941669735037";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:18:"13.184887048948209";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2125";s:5:"score";s:18:"11.074787993401719";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"30.750833857186173";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"26.838732896139064";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1773";s:5:"score";s:18:"22.912503036139245";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1779";s:5:"score";s:17:"21.86304597779246";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"21.206509482944046";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:18:"21.206509482944046";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:17:"18.73035264910723";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"880";s:5:"score";s:18:"18.193493940286295";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Licenciement Facebook : Un nouveau cas en France</title>
		<link>http://www.it-news.fr/licenciement-facebook-nouveau-cas/</link>
		<pubDate>Mon, 16 Sep 2013 14:41:55 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1024</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/09/facebook.jpg"><img class="alignleft size-full wp-image-1025" alt="licenciement facebook" src="http://www.it-news.fr/wp-content/uploads/2013/09/facebook.jpg" width="150" height="150" /></a>Il va falloir le prendre sérieusement en considération, user de connexions personnelles au travail est un motif de licenciement. Tout en sachant que vous passez en moyenne <a href="http://www.it-news.fr/les-connexions-personnelles-au-travail-representent-plus-dun-mois-de-travail-perdu-par-an/">plus d'une heure par jour sur internet à des fins personnelles</a>, chacun d'entre nous est donc plus ou moins concerné par ce phénomène de "licenciement facebook". Il faut donc savoir qu'un usage exhaustif des médias sociaux, des messageries électroniques, et de site internet marchand lors d'un exercice professionnel peut tout à fait <strong>justifier un licenciement.</strong></p>
<p style="text-align: justify;">Découvrez le dernier cas sur ce sujet délivré par la cour d'appel de Pau.</p>
<!--more Lire la suite-->
<h2>Licenciement facebook, et seulement pour facebook ?</h2>
<p style="text-align: justify;">Le motif qui a poussé la cour d'appel de Pau à donner raison à l'employeur ne réside pas seulement sur quelques connexions à Facebook. En effet, il faut que ces connexions <strong>soient suffisamment significatives pour que l'employé ne puisse pas être en capacité d'effectuer le travail pour lequel il est payé.</strong></p>
<p style="text-align: justify;">Dans notre dossier, ce sont des captures d'écran qui ont prouvé que l'employée en question usait trop fréquemment internet à des fins personnelles. Faisant partie d'une agence d’intérim, <strong>elle fréquentait Facebook, des sites de lingerie féminine ainsi que sa boite mail personnelle</strong>. Autrement dit, Facebook n'est donc pas le responsable pour tout, mais c'est une conjugaison de connexion non appropriés qui ont déterminé qu'elle abusait de connexions personnelles à son travail.</p>
<p style="text-align: justify;">En parallèle de ces connexions, elle avait pris du retard dans son travail. En effet, et plus précisément sur des contrats d'embauche à déclarer, elle se défendait en disant qu'elle était débordée par la charge de travail que son employeur lui incombait.</p>
<p style="text-align: justify;">Son patron, voyant qu'elle n'avançait pas dans son travail est donc devenu très suspicieux quant à l’honnêteté de son employé. C'est alors que lors d'une absence de l'employée en question, <strong>un léger contrôle de son ordinateur à suffit à éclaircir ses doutes. </strong></p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/09/Licenciement-Facebook.jpg"><img class="aligncenter size-full wp-image-1026" alt="Licenciement Facebook" src="http://www.it-news.fr/wp-content/uploads/2013/09/Licenciement-Facebook.jpg" width="605" height="270" /></a></p>
<p style="text-align: justify;">C'est après avoir reconstitué l'historique des connexions de son employée qu'il découvre, pour prendre un exemple, des photos personnelles ayant pour but d'être publiées sur Facebook. <strong>L'employeur décide donc de mettre en place une procédure de licenciement</strong>. Toutefois, l'intéressée ne s'est pas laissé faire et à saisi les prud'hommes de Bayonne, qui lui ont d'ailleurs donné raison.</p>
<p style="text-align: justify;">L'argumentaire de l'employeur n'étant pas assez élaboré pour convaincre les Prud’hommes de Bayonne, c'est en appel, et après l'apport de nouveaux éléments (tel que les captures d'écran) qui ont finalement convaincu la cour d'appel de Pau à donner raison à l'employeur.</p>
<p style="text-align: justify;">Le véritable élément déterminant de ce dossier est la fréquence avec laquelle l'intéressée usait de ses connexions à des fins personnelles. Celles-ci étant vraiment trop importante, cela prouvait donc qu'<strong>elle n'était pas dans la capacité d’accomplir le travail pour lequel elle était rémunérée. </strong></p>
<p style="text-align: justify;">Dernier élément majeur de ce dossier, le fait que l'employée n'est pas engagée de pourvoi en cassation donne à cet arrêt une valeur définitive et peut donc à partir de cet instant être utilisé en cas de jurisprudence (<a href="http://www.cadremploi.fr/editorial/conseils/droit-du-travail/detail/article/facebook-les-statuts-qui-les-ont-fait-virer-ou-pas.html" target="_blank">Plus d'informations</a>). Attention donc, le licenciement Facebook n'est donc pas quelque chose qui risque de diminuer avec le temps, mais bien d'augmenter.</p>
<p style="text-align: justify;">En effet, et pour tenter une conclusion sur ce thème, il faut prendre conscience que beaucoup d'entre nous <strong>ont pris le pli de mélanger connexions professionnelles et connexions personnelles.</strong> Une fois cette habitude prise, vous êtes donc logiquement susceptibles d'être jugé de la même manière que le cas ci-dessus.</p>
<p style="text-align: justify;">De plus, il existe aujourd'hui bon nombre de solution qui permettent à l'employeur de vérifier vos connexions internet sans pour autant que vous ne soyez au courant. Ce type de licenciement peut donc arriver très vite.</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1024</wp:post_id>
		<wp:post_date>2013-09-16 15:41:55</wp:post_date>
		<wp:post_date_gmt>2013-09-16 14:41:55</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>licenciement-facebook-nouveau-cas</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="capture-decran"><![CDATA[capture d'écran]]></category>
		<category domain="post_tag" nicename="connexions"><![CDATA[connexions]]></category>
		<category domain="post_tag" nicename="espionnage"><![CDATA[espionnage]]></category>
		<category domain="post_tag" nicename="facebook"><![CDATA[facebook]]></category>
		<category domain="post_tag" nicename="licenciement"><![CDATA[licenciement]]></category>
		<category domain="post_tag" nicename="personnelles"><![CDATA[personnelles]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<category domain="category" nicename="systemes"><![CDATA[Systèmes]]></category>
		<category domain="post_tag" nicename="travail"><![CDATA[travail]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[93]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[licenciement facebook]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[Licenciement Facebook : Un nouveau cas]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[De plus en plus, le licenciement facebook devient une banalité. Voici un nouveau cas qui témoigne de la dangerosité d'aller sur facebook au travail.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437378]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1776";s:5:"score";s:17:"85.40286537776063";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"43.27380221042624";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"42.36312107556496";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:17:"41.86508986276725";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"29.648486407470838";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2376";s:5:"score";s:18:"29.226129395187133";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"27.104865717933233";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:17:"26.13300024797396";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2330";s:5:"score";s:17:"25.06354717685488";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"23.192627827421138";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"18.207310492683092";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:18:"16.693313187037898";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1924";s:5:"score";s:17:"16.37905057009218";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1955";s:5:"score";s:18:"14.346498567480218";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"13.98766985719913";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"12.442811031615637";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1776";s:5:"score";s:17:"88.41853181390678";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"28.882035390938125";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:18:"26.537732189209066";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"24.87542781887407";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1059";s:5:"score";s:18:"24.815014272836976";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1924";s:5:"score";s:18:"24.337546840207477";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"23.09229635646489";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1955";s:5:"score";s:18:"22.580993548249126";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1025]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:12:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1776";s:5:"score";s:17:"85.10779215160235";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:18:"43.031397150740894";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"42.10834055973885";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"41.593055485442555";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:17:"29.50721657432225";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2376";s:5:"score";s:17:"29.04374286626725";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"26.884564422786532";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:17:"25.92917583684116";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2330";s:5:"score";s:18:"24.850239802163266";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"23.038982538840635";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"22.408791014725274";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"1059";s:5:"score";s:17:"20.95088024873074";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:comment>
			<wp:comment_id>469</wp:comment_id>
			<wp:comment_author><![CDATA[Interim paris]]></wp:comment_author>
			<wp:comment_author_email>allan.jocalaz@akabia.fr</wp:comment_author_email>
			<wp:comment_author_url>http://evs.fr</wp:comment_author_url>
			<wp:comment_author_IP>88.188.0.60</wp:comment_author_IP>
			<wp:comment_date>2013-09-25 15:28:27</wp:comment_date>
			<wp:comment_date_gmt>2013-09-25 14:28:27</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[En même temps, aller sur Facebook pendant ses heures de boulot c'est un peu mérité... Faut pas en abuser...]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type></wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
			<wp:commentmeta>
				<wp:meta_key>akismet_result</wp:meta_key>
				<wp:meta_value><![CDATA[false]]></wp:meta_value>
			</wp:commentmeta>
			<wp:commentmeta>
				<wp:meta_key>akismet_history</wp:meta_key>
				<wp:meta_value><![CDATA[a:4:{s:4:"time";d:1380119308.017221;s:7:"message";s:47:"Akismet a revérifié et validé ce commentaire";s:5:"event";s:9:"check-ham";s:4:"user";s:0:"";}]]></wp:meta_value>
			</wp:commentmeta>
			<wp:commentmeta>
				<wp:meta_key>akismet_history</wp:meta_key>
				<wp:meta_value><![CDATA[a:4:{s:4:"time";d:1380119945.789098;s:7:"message";s:52:"admin a changé le statut du commentaire en approved";s:5:"event";s:15:"status-approved";s:4:"user";s:5:"admin";}]]></wp:meta_value>
			</wp:commentmeta>
		</wp:comment>
		<wp:comment>
			<wp:comment_id>470</wp:comment_id>
			<wp:comment_author><![CDATA[admin]]></wp:comment_author>
			<wp:comment_author_email>evoltolini@aquastar-consulting.com</wp:comment_author_email>
			<wp:comment_author_url></wp:comment_author_url>
			<wp:comment_author_IP>78.113.174.143</wp:comment_author_IP>
			<wp:comment_date>2013-09-25 15:49:14</wp:comment_date>
			<wp:comment_date_gmt>2013-09-25 14:49:14</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[Je suis bien d'accord avec vous.
Malgré tout, je pense qu'il était également possible pour l'employeur d'utiliser des outils qui auraient empêché la salarié de se connecter à Facebook. 

Ça n'est jamais une bonne nouvelle d'apprendre ce genre de licenciement..]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type></wp:comment_type>
			<wp:comment_parent>469</wp:comment_parent>
			<wp:comment_user_id>1</wp:comment_user_id>
			<wp:commentmeta>
				<wp:meta_key>akismet_result</wp:meta_key>
				<wp:meta_value><![CDATA[false]]></wp:meta_value>
			</wp:commentmeta>
			<wp:commentmeta>
				<wp:meta_key>akismet_history</wp:meta_key>
				<wp:meta_value><![CDATA[a:4:{s:4:"time";d:1380120554.9264121;s:7:"message";s:47:"Akismet a revérifié et validé ce commentaire";s:5:"event";s:9:"check-ham";s:4:"user";s:5:"admin";}]]></wp:meta_value>
			</wp:commentmeta>
		</wp:comment>
		<wp:comment>
			<wp:comment_id>1143</wp:comment_id>
			<wp:comment_author><![CDATA[[BLOCKED BY STBV] Journée de la sécurité sur Internet | L&#039;actualité pour décideurs informatiquesL&#039;actualité pour décideurs informatiques]]></wp:comment_author>
			<wp:comment_author_email></wp:comment_author_email>
			<wp:comment_author_url>http://www.it-news.fr/journee-de-la-securite-sur-internet/</wp:comment_author_url>
			<wp:comment_author_IP>37.187.41.26</wp:comment_author_IP>
			<wp:comment_date>2014-02-11 14:00:25</wp:comment_date>
			<wp:comment_date_gmt>2014-02-11 13:00:25</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[[&#8230;] individu (exemples : hacker, employeur…) peut avoir accès aux informations que vous postez sur les réseaux sociaux. Pour empêcher cela, il faut modifier vos paramètres et être plus [&#8230;]]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type>pingback</wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
		<wp:comment>
			<wp:comment_id>1383</wp:comment_id>
			<wp:comment_author><![CDATA[luottoa]]></wp:comment_author>
			<wp:comment_author_email></wp:comment_author_email>
			<wp:comment_author_url>http://luottoa.webnode.com/</wp:comment_author_url>
			<wp:comment_author_IP>91.236.75.102</wp:comment_author_IP>
			<wp:comment_date>2015-01-20 18:28:10</wp:comment_date>
			<wp:comment_date_gmt>2015-01-20 17:28:10</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[<strong>luottoa</strong>

Kristina]]></wp:comment_content>
			<wp:comment_approved>trash</wp:comment_approved>
			<wp:comment_type>trackback</wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
			<wp:commentmeta>
				<wp:meta_key>_wp_trash_meta_status</wp:meta_key>
				<wp:meta_value><![CDATA[0]]></wp:meta_value>
			</wp:commentmeta>
			<wp:commentmeta>
				<wp:meta_key>_wp_trash_meta_time</wp:meta_key>
				<wp:meta_value><![CDATA[1423842770]]></wp:meta_value>
			</wp:commentmeta>
		</wp:comment>
	</item>
	<item>
		<title>BYOD et sécurité : Les entreprises n&#039;y arrivent pas</title>
		<link>http://www.it-news.fr/byod-et-securite/</link>
		<pubDate>Tue, 17 Sep 2013 16:06:29 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1030</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/09/byod-147x150.png"><img class="alignleft size-full wp-image-1031" alt="BYOD et sécurité" src="http://www.it-news.fr/wp-content/uploads/2013/09/byod-147x150.png" width="147" height="150" /></a>Que les entreprises acceptent l'utilisation des terminaux personnelles de leurs employés au travail pour gagner en productivité sans investissements est d'ores et déjà une belle avancée. <strong>Malgré tout, BYOD et sécurité ne peuvent pas se dissocier</strong> s'il l'on veut que les programmes BYOD soient bénéfique pour l'entreprise. Pourtant, on constate que les entreprises ont encore beaucoup de mal à intégrer la sécurité nécessaire à cette pratique.</p>
<p style="text-align: justify;">Focus sur cette problématique.</p>
<p style="text-align: justify;"><!--more Lire la suite--></p>

<h2 style="text-align: justify;">BYOD et sécurité doivent marcher dans le même sens</h2>
<p style="text-align: justify;">C'est une information que l'on vous relie de <a href="http://www.itespresso.fr/pme-francaises-peinent-securiser-terminaux-mobiles-67303.html" target="_blank">ITespresso</a>, les téléphones portables, smartphones, ou encore tablettes tactiles s'installe de plus en plus dans l'environnement des entreprises. Malgré tout, leur intégration reste encore trop mal encadrée.</p>
<p style="text-align: justify;"><strong>Une étude auprès de 1250 entreprises</strong> au sein de l'union Européenne, en Océanie, et dans une partie des Amériques confirme que cette intégration a encore beaucoup de progrès à faire.  Et les enjeux sont énormes puisque cette prolifération des outils personnels au sein d'un cadre professionnel s'accélère à une vitesse folle.</p>
<p style="text-align: justify;">Prenons la première statistique qui appuie ce que nous venons de dire, en France, 61% des PME sondées déclarent encourager le phénomène. Autrement dit, <strong>plus d'une entreprise sur deux souhaitent voir des systèmes BYOD au sein de leur société</strong>. Le pourcentage est à peu de chose près le même aux Etats-Unis et en Allemagne. Seul le Royaume-Unis constate un pourcentage de 45%, ce qui reste important.</p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/09/BYOD-et-sécurité-MDM.jpg"><img class="aligncenter size-medium wp-image-1033" alt="BYOD et sécurité MDM" src="http://www.it-news.fr/wp-content/uploads/2013/09/BYOD-et-sécurité-MDM-300x200.jpg" width="300" height="200" /></a></p>
<p style="text-align: justify;"><strong>A contrario,</strong> 3/4 des chefs d'entreprises disent ne pas mettre en place de politiques de sécurité face à l'augmentation de ce phénomène. 38% d'entre eux se disent également inquiets des répercutions que pourraient amener certains failles de sécurité.</p>
<p style="text-align: justify;">Il est donc fortement conseillé d'utiliser, ou plutôt de mettre en place du chiffrement, ou encore du verrouillage à distance dans les cas où le terminal en question serait perdu ou volé.</p>
<p style="text-align: justify;">Nous vous laissons par la même consulter ce très bon résumé du phénomène BYOD en image :</p>
<a href="http://www.it-news.fr/wp-content/uploads/2013/09/infographie-citrix-mobilite.jpg"><img class="size-full wp-image-1034 alignnone" alt="BYOD et sécurité" src="http://www.it-news.fr/wp-content/uploads/2013/09/infographie-citrix-mobilite.jpg" width="1179" height="5960" /></a>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1030</wp:post_id>
		<wp:post_date>2013-09-17 17:06:29</wp:post_date>
		<wp:post_date_gmt>2013-09-17 16:06:29</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>byod-et-securite</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="reseaux-et-mobilite"><![CDATA[Réseaux et mobilité]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[90]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[BYOD et sécurité]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[BYOD et sécurité : Les entreprises n'y arrivent pas]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[A l'heure où les entreprises adoptent de plus en plus les mobiles de leurs employés au travail, ils n'arrivent toutefois pas a associer BYOD et sécurité.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426436756]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"46.62731489571012";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"41.895619623535325";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"37.27781124988791";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2400";s:5:"score";s:18:"31.220051117063747";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"223";s:5:"score";s:18:"29.624875309576986";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2354";s:5:"score";s:18:"28.257914458344334";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:18:"28.185862300967113";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"27.145865958265198";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2501";s:5:"score";s:17:"24.72523212769293";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:17:"24.09925731109235";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"19.146439741153195";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"14.279194013582678";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"14.101126769315957";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:18:"12.387992771674353";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"11.477836812905123";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"10.717774747618257";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:3:"223";s:5:"score";s:17:"34.00369028059576";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"30.508300857775133";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1789";s:5:"score";s:17:"26.59046453945581";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:17:"25.41953718830544";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"23.306542330963154";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1731";s:5:"score";s:18:"20.840798345514163";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"789";s:5:"score";s:18:"19.157619774640743";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1776";s:5:"score";s:16:"18.9044567918373";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:12:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:16:"46.5454604699415";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:17:"41.78241986001678";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"37.17117770575325";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2400";s:5:"score";s:18:"31.140075958771412";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"223";s:5:"score";s:18:"29.672599726526528";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2354";s:5:"score";s:18:"28.711101860133837";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:17:"28.05728209046648";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:17:"27.18602552360841";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"23.970677100596617";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2438";s:5:"score";s:18:"21.942784534796136";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"21.57335044360618";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"21.57335044360618";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1031]]></wp:meta_value>
		</wp:postmeta>
		<wp:comment>
			<wp:comment_id>1124</wp:comment_id>
			<wp:comment_author><![CDATA[[BLOCKED BY STBV] La sécurité informatique est toujours sous-estimée - L&#039;actualité pour décideurs informatiques]]></wp:comment_author>
			<wp:comment_author_email></wp:comment_author_email>
			<wp:comment_author_url>http://www.it-news.fr/la-securite-informatique-est-toujours-sous-estimee/</wp:comment_author_url>
			<wp:comment_author_IP>37.187.41.26</wp:comment_author_IP>
			<wp:comment_date>2013-12-05 11:14:18</wp:comment_date>
			<wp:comment_date_gmt>2013-12-05 10:14:18</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[[&#8230;] cela fait quelques années que les pays d’Asie-Pacifique investissent massivement en matière de sécurité informatique, l’Europe, quant à elle,  connaît un retard important dans ce domaine, plus particulièrement [&#8230;]]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type>pingback</wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
		<wp:comment>
			<wp:comment_id>1155</wp:comment_id>
			<wp:comment_author><![CDATA[[BLOCKED BY STBV] Un grand nombre de PME utilisent encore des logiciels dépassés | L&#039;actualité pour décideurs informatiquesL&#039;actualité pour décideurs informatiques]]></wp:comment_author>
			<wp:comment_author_email></wp:comment_author_email>
			<wp:comment_author_url>http://www.it-news.fr/grand-nombre-pme-utilisent-encore-logiciels-depasses/</wp:comment_author_url>
			<wp:comment_author_IP>37.187.41.26</wp:comment_author_IP>
			<wp:comment_date>2014-04-07 08:11:24</wp:comment_date>
			<wp:comment_date_gmt>2014-04-07 07:11:24</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[[&#8230;] phénomène BYOD (Bring Your Own Device) n’est plus un secret pour les PME, les employés préfèrent apporter leur propre outil [&#8230;]]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type>pingback</wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
	</item>
	<item>
		<title>Simplifier son entreprise : Un projet de loi actif dès 2014</title>
		<link>http://www.it-news.fr/simplifier-son-entreprise/</link>
		<pubDate>Thu, 19 Sep 2013 10:11:25 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1037</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/09/Simplifier-son-entreprise.jpg"><img class="alignleft size-full wp-image-1038" alt="Simplifier son entreprise" src="http://www.it-news.fr/wp-content/uploads/2013/09/Simplifier-son-entreprise.jpg" width="160" height="155" /></a>Simplifier son entreprise, voilà quelque chose que beaucoup de dirigeants et chefs d'entreprises souhaitent dans le but de faciliter leur développement. <strong>"Arrêtez de nous mettre des bâtons dans les roues"</strong> sort aujourd'hui de manière régulière de la bouche des différents cadres de notre société. Et le gouvernement semble avoir entendu ces critiques, et compte selon nos informations, remédier à ce problème dès 2014.</p>
<p style="text-align: justify;">Très bien, mais voyons plus précisément les points d'actions sur lesquels le gouvernement souhaite agir <strong>pour que chacun puisse "simplifier son entreprise"</strong>.</p>
<p style="text-align: justify;"><!--more Lire la suite--></p>

<h2 style="text-align: justify;">Simplifier son entreprise en trois étapes</h2>
<p style="text-align: justify;">Nous allons donc aborder trois points sur lesquels le gouvernement à clairement annoncé <strong>qu'il y allait avoir un "choc de simplification"</strong>. <a href="http://www.economie.gouv.fr/simplification-et-securisation-vie-des-entreprises" target="_blank">Disponible sur le site du ministère de l'économie et des finances</a>, ce projet de loi insiste pour dire qu'il va y avoir du changement.</p>
<p style="text-align: justify;">Et l'on va commencer avec l'un des premiers points sur lequel la simplification va s'opérer, <strong>le "Crowdfunding"</strong>. Ne prenez pas peur par son nom assez barbare, si vous préférez, on parle ici du fameux <strong>financement participatif</strong>. <a href="http://www.economie.gouv.fr/mise-en-ligne-dun-guide-financement-participatif-crowdfunding" target="_blank">Plus d'informations sur le site du ministère</a> en charge de ce point.</p>

<h3 style="text-align: justify;">Le Crowdfunding, ça apporte quoi ?</h3>
<p style="text-align: justify;">Sans trop s’attarder sur ce point, le gouvernement désir adapter son environnement pour qu'il soit plus attractif. Dans le même temps, il souhaite voir naître un statut de « conseiller en investissement propre au financement participatif ».</p>
<p style="text-align: justify;">Pour rappelle, et si l'on remonte jusqu'à 2010, <strong>le financement participatif ou le Crowdfunding a engendré 6 millions d’euros qui ont permis de financer jusqu'à plus de 15 000 projets. </strong>Ces chiffres mesurent à eux seuls l'impact positif de ce projet.</p>
<p style="text-align: justify;">Ce système permet donc de récolter des fonds auprès d'un grand public et de laisser la chance à des projets innovants de voir le jour et de créer de l'économie positive.</p>

<h3 style="text-align: justify;">Deuxième axe de simplification, la facture électronique</h3>
<p style="text-align: justify;">C'est irrémédiable, que vous le voulez ou non, il existera de moins en moins de facture papier dans les années à venir. Et pour cause, les bénéfices de la facture numérique (ou de l'e-facture) va permettre <strong>un gain considérable en papier, en rapidité, et en facilité de traitement. </strong></p>
<p style="text-align: justify;">Le gouvernement l'a bien compris, et va donc le mettre directement mettre la machine en marche concernant sur ce point pour sa propre gestion avec ses fournisseurs. En effet, l’État reçoit par an <strong>plus de 4 millions de facture papier</strong> de la part de ses fournisseurs. Et sur ce chiffre, seulement 6000 factures parviennent de manière dématérialisées.</p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/09/Simplifier-son-entreprise-avec-la-facture-électronique.jpg"><img class="alignleft size-full wp-image-1040" alt="Simplifier son entreprise avec la facture électronique" src="http://www.it-news.fr/wp-content/uploads/2013/09/Simplifier-son-entreprise-avec-la-facture-électronique.jpg" width="400" height="400" /></a></p>
<p style="text-align: justify;">Imaginez le gain généré par le simple fait d'utiliser la voie électronique. Voici donc une nouvelle façon de simplifier son entreprise.</p>

<h3 style="text-align: justify;">Enfin, développer le numérique</h3>
<p style="text-align: justify;">C'est <strong>Fleur Pellerin, ministre en charge plus particulièrement des PME</strong>, qui a intégré ce point d’innovation et de l’Economie numérique. Pour être plus précis, cela s'illustre par exemple par la mise en place de raccordement des immeubles au très haut débit. Le projet prévoit d'intégrer ces procédures dès la mise en route des chantiers THD.</p>
<p style="text-align: justify;">Pour citer quelques chiffres, on note plus de 300 000 raccordements dans les grandes villes pour un coût de 200 euros par immeuble collectif. Ce coût est doublé pour un habitat individuel.</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1037</wp:post_id>
		<wp:post_date>2013-09-19 11:11:25</wp:post_date>
		<wp:post_date_gmt>2013-09-19 10:11:25</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>simplifier-son-entreprise</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="erp"><![CDATA[ERP]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<category domain="category" nicename="systemes"><![CDATA[Systèmes]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[97]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[simplifier son entreprise]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[Simplifier son entreprise : Un projet de loi actif dès 2014]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Voici une chose dont beaucoup auraient à y gagner : Simplifier son entreprise. Découvrez en quoi le gouvernement agit pour faire avancer les choses.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426436746]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"57.91087795649055";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"50.40572790211154";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"43.27380221042624";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"42.812050367829826";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2444";s:5:"score";s:17:"37.20579351484206";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2424";s:5:"score";s:17:"34.35009466180779";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"29.648486407470838";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"28.704858997460178";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2465";s:5:"score";s:18:"28.102061536886794";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1902";s:5:"score";s:17:"25.21903614453492";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1038]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:18:"20.526106442876934";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"19.55704840385595";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"15.818971023629949";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"15.338471514718414";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:18:"14.519608375518985";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1924";s:5:"score";s:16:"12.9228339441045";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"35.44954791661759";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"34.41288158211047";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1902";s:5:"score";s:17:"31.27797797317681";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1059";s:5:"score";s:17:"26.84086521047857";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:17:"26.74914444303786";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"25.66525829877915";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1076";s:5:"score";s:18:"24.665536709991258";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1794";s:5:"score";s:17:"23.11309665760403";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Les plus gros piratages en 2013 : 19 Hackers en action</title>
		<link>http://www.it-news.fr/les-plus-gros-piratages-en-2013/</link>
		<pubDate>Fri, 20 Sep 2013 08:00:17 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1043</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/09/Les-plus-gros-piratages.jpg"><img class="alignleft size-thumbnail wp-image-1044" alt="Les plus gros piratages" src="http://www.it-news.fr/wp-content/uploads/2013/09/Les-plus-gros-piratages-150x150.jpg" width="150" height="150" /></a>On va s'attarder ici sur deux cas qui constituent à eux seuls les plus gros piratages depuis ce début d'année 2013. <strong>La cible ? Les banques</strong>. Pendant que l'un des deux groupes de hackers retire près de 2.8 millions de dollars en une journée à Manhattan, l'autre se faisait arrêté de justesse par la police Britannique. Et oui, même si on ne peut pas vraiment dire que nous en sommes aux premiers coups dans ce genre, les pirates informatiques restent malgré tout impressionnants par leurs ingéniosités.</p>
<p style="text-align: justify;"><!--more Lire la suite--></p>

<h2 style="text-align: justify;">Les plus gros piratages : 2013, c'est l'année des banques</h2>
<p style="text-align: justify;">Être une banque, ça n'est effectivement pas de tout repos en 2013. En effet, avec comme prédateurs des pirates informatiques qui ne cessent de rechercher des failles dans leurs systèmes, serait bien malin celui qui arrive à prévoir ce que vont bien pouvoir imaginer les hackers pour les plus gros piratages à venir.</p>

<h3>On commence ici par le plus ancien, le cas aux Etats-Unis.</h3>
<p style="text-align: justify;">Dans cette histoire, "rapidité d'exécution" et "organisation" étaient certainement les maîtres mots des hackers qui ont fait le coup.  <strong>Leurs méthodes portent d'ailleurs un nom depuis, la "flashmob délinquante"</strong>. Grossièrement, c'est retirer de l'argent aux distributeurs aussi vite que possible dans tous les pays du monde.</p>
<p style="text-align: justify;">Quelques chiffres pour appuyer le sérieux de ces attaques, <strong>7 complices avaient réussi à retirer près de 2.8 millions de dollars en une journée dans le quartier de Manhattan.</strong> D'autant plus que ce montant retiré n'était qu'une partie de l'argent qu'ils avaient réussi en tout à retirer. En effet, les hackers procédaient par vague de retrait. La première était en 2012, le 22 Décembre, tandis que la deuxième vague de retrait massif était programmée le 19 et 20 Février dernier.</p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/09/les-plus-gros-piratages-distributeurs.jpg"><img class="alignleft size-medium wp-image-1052" alt="les plus gros piratages distributeurs" src="http://www.it-news.fr/wp-content/uploads/2013/09/les-plus-gros-piratages-distributeurs-300x199.jpg" width="300" height="199" /></a>Le bilan de ce piratage informatique s'élève donc à <strong>45 millions de dollars retirés des distributeurs, et les 7 complices de Manhattan arrêtés</strong>.</p>
<p style="text-align: justify;">Ces Hackers ont donc réussi à vider des comptes bancaires en supprimant les éventuelles limites de retrait au préalable. Cela a été rendu possible car ils ont notamment eux accès aux systèmes informatiques de deux banques (L'une étant aux Emirats arabes Unis, l'autre à Oman).</p>
<p style="text-align: justify;">Pour conclure sur l'un de ces plus gros piratages en 2013, on retiendra les mots de la procureure en charge de ce dossier : <strong>« <em>Ces attaques relèvent d'un piratage hautement sophistiqué et de cellules criminelles organisées, dont le rôle était de retirer de l'argent aussi vite que possible</em> »</strong></p>

<h3 style="text-align: justify;">Une grosse tentative, mais celle-ci est ratée</h3>
<p style="text-align: justify;">On se dirige ici en Grand Bretagne, où le détective "Mark Raymond" nous décrit l'affaire qui suit : <em>« On est là devant un plan sophistiqué qui aurait pu aboutir à des pertes d'argent substantielles pour la banque. C'est la plus grosse affaire de ce genre qu'on ait jamais eue ». </em></p>
<p style="text-align: justify;">En effet, il s'agit ici d'un coup monté par 12 hackers avec pour cible la banque Espagnole Santander. <strong>Le procédé ?</strong> Ils avaient réussi par un tour de passe-passe, à se faire passer pour un ouvrier de maintenance afin de s'infiltrer dans une agence de Londres située dans un centre commercial. Ainsi, l'un des complices a pu placer <a href="http://www.commentcamarche.net/faq/17443-qu-est-ce-qu-un-switch#definition" target="_blank">un commutateur</a> dans le but de prendre le contrôle des ordinateurs de la banque à distance.</p>
<p style="text-align: justify;"><span style="font-size: 16px;">Là encore l'organisation des malfaiteurs était très bien préparée et témoigne des sommes qu'ils auraient éventuellement pu réussir à s'accaparer. Malgré tout, <strong>la police Britannique a réussi à les stopper le 13 septembre 2013</strong> sans qu'ils puissent détourner de l'argent à temps. La banque Espagnole Santander a depuis affirmé qu'aucun compte n'avait été touché et qu'ils se félicitaient de la sécurité de leur système informatique. </span></p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/09/Plus-gros-piratages-système-informatique.jpg"><img class="alignright size-medium wp-image-1055" alt="Plus gros piratages système informatique" src="http://www.it-news.fr/wp-content/uploads/2013/09/Plus-gros-piratages-système-informatique-300x199.jpg" width="300" height="199" /></a>Ces deux plus gros piratages informatiques de 2013 démontrent que le système informatique des banques est mis à rude épreuve par les pirates.</p>
<p style="text-align: justify;">Si j'étais responsable d'une agence de banque et que je consultais l'actualité sur ce sujet, j'aurais donc tendance à faire un petit "check" de mes installations. Vérifier les protections mises en place sur mon système informatique ne serait visiblement pas du luxe pour cette période.</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1043</wp:post_id>
		<wp:post_date>2013-09-20 09:00:17</wp:post_date>
		<wp:post_date_gmt>2013-09-20 08:00:17</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>les-plus-gros-piratages-en-2013</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="2013"><![CDATA[2013]]></category>
		<category domain="post_tag" nicename="commutateur"><![CDATA[commutateur]]></category>
		<category domain="post_tag" nicename="hackers"><![CDATA[hackers]]></category>
		<category domain="post_tag" nicename="piratage"><![CDATA[Piratage]]></category>
		<category domain="post_tag" nicename="plus-gros-piratages"><![CDATA[plus gros piratages]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<category domain="post_tag" nicename="switch"><![CDATA[switch]]></category>
		<category domain="post_tag" nicename="systeme-informatique"><![CDATA[système informatique]]></category>
		<category domain="category" nicename="systemes"><![CDATA[Systèmes]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[94]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[plus gros piratages]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[Les plus gros piratages en 2013 : 19 Hackers en action]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Un point de fait sur ce que les pirates informatiques sont capables de faire en 2013. Découvrez l'actualité sur les plus gros piratages de cette année.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437164]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:18:"136.91381633977994";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"736";s:5:"score";s:16:"96.6839320626641";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"42.36312107556496";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"42.36312107556496";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:17:"34.32650050193668";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"578";s:5:"score";s:17:"32.47489898934621";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:18:"31.429583166085592";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:2:"68";s:5:"score";s:18:"31.166848839526658";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"29.519840420964723";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:18:"22.285218962638425";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1831]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:17:"43.96601278855823";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1924";s:5:"score";s:18:"14.944198375353785";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:17:"14.01592135606123";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"13.982359593999513";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:16:"13.7975816841355";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"13.327532791969219";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:3:"736";s:5:"score";s:17:"97.46780891283507";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:17:"79.06395300006908";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"578";s:5:"score";s:17:"37.23895017136188";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:2:"68";s:5:"score";s:18:"34.066031160864064";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"24.19677828109083";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"24.08866359260582";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"22.744581315148405";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1794";s:5:"score";s:18:"22.293862303894706";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Le numérique en France : au secours de l&#039;industrie et de l&#039;emploi</title>
		<link>http://www.it-news.fr/le-numerique-en-france-2/</link>
		<pubDate>Fri, 27 Sep 2013 06:45:29 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1059</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/09/Le-numérique-en-France.jpg"><img class="alignleft size-full wp-image-1061" alt="Le numérique en France" src="http://www.it-news.fr/wp-content/uploads/2013/09/Le-numérique-en-France.jpg" width="150" height="150" /></a><strong>Le numérique en France est au secours de l'industrie</strong> et de l'emploi. En effet, l'une des missions de notre ministre Arnaud Montebourg est aussi de bâtir un ensemble de priorités industrielles. En d'autres termes, c'est définir les axes d'amélioration et les pistes à exploiter pour augmenter la part de l'industrie en France sur le PIB, et de créer par la même occasion de l'emploi. Et le numérique en France est bien près de l'aider !</p>
<p style="text-align: justify;"><!--more Lire la suite--></p>

<h2>Augmenter l'industrie passe par le numérique en France</h2>
<p style="text-align: justify;">On va tout de même rappeler l'objectif des actions à mener pour A. Montebourg : <strong>C'est augmenter la création d'emploi ainsi que la part de l'industrie dans le PIB Français.</strong></p>
Pour essayer de caractériser ce que pourrait être cette nouvelle France industrielle, on peut s'appuyer sur trois points majeurs :
<ul>
	<li>La transition énergétique et environnementale</li>
	<li><span style="font-size: 16px;">La santé </span></li>
	<li><span style="font-size: 16px;">Et enfin, le numérique (Virtualisation, réseau, Cloud, big data, etc..)</span></li>
</ul>
<p style="text-align: justify;">On notera que la big data est un enjeux qualifié de stratégique par le gouvernement. Et sur ce domaine, la France n'est pas dépourvu de qualité. En effet, il existe d'ores et déjà une toile d'entreprise comme Atos, Criteo ou encore Talend qui prouvent que la France est capable de voir éclore des talents en informatique.</p>
<p style="text-align: justify;">Si l'on s'éloigne maintenant de la Big Data, il y a également un thème très en vogue en ce moment, le Cloud Computing. Mieux connu sous sa définition de "nuage", <a href="http://fr.wikipedia.org/wiki/Cloud_computing" target="_blank">Wikipédia va se charger de vous expliquer</a> le concept s'il vous est encore inconnu. Ce marché représente en tout cas une croissance très importante en France car ça ne représente pas moins de 25% par an et pèse aujourd'hui plus de 2 milliards d'euros.</p>
<p style="text-align: justify;">La France est d'ailleurs composé de prestataires de prestiges tels que <strong>OVH ou Gandi</strong>. Ce qui est une très bonne nouvelle pour le développement de cette nouvelle industrie. Le numérique en France représente donc une très bonne porte de sortie afin de pouvoir générer des emplois sur un secteur porteur. Cloud, interconnexions, système réseau, virtualisation, ou encore le domaine de la sécurité informatique sont des secteurs d'avenir.</p>
<p style="text-align: justify;">Ces arguments expliquent donc pourquoi le gouvernement est aujourd'hui près à faire un effort financier pour booster cette croissance. C'est de cette manière que l'Etat souhaite investir près de 4 milliards d'euros dans ces différents domaines. Les résultats attendus seraient <strong>la création ou le maintien de plus de 480 000 emplois</strong> industriels sur une période de 10 ans.</p>
<p style="text-align: justify;">Ces signaux sont tout de même très bon pour le numérique en France. Cela permet aux investisseurs d'être plus sereins sur certains points et de voir peut-être le numérique devenir l'élément principal qui aura sauvé bon nombre d'emploi.</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1059</wp:post_id>
		<wp:post_date>2013-09-27 07:45:29</wp:post_date>
		<wp:post_date_gmt>2013-09-27 06:45:29</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>le-numerique-en-france-2</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="reseaux-et-mobilite"><![CDATA[Réseaux et mobilité]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<category domain="category" nicename="systemes"><![CDATA[Systèmes]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[94]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[2]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Le numérique en France]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[Le numérique en France : Au secours de l'industrie et de l'emploi]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Si Arnaud Montebourg est en charge du redressement productif, il pourrait bien trouver dans le numérique en France une façon de faire remonter l'industrie.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_old_slug</wp:meta_key>
			<wp:meta_value><![CDATA[le-numerique-en-france]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426436649]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"56.86316404554066";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"53.012110490126545";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"49.96259337691801";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"49.71880352566109";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"43.27380221042624";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:17:"42.08400213412948";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:17:"37.00416885756695";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"25.159629757275383";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:17:"25.00993844595363";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:17:"24.34785183816915";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1061]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"22.694603729582944";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"21.961520904886157";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"18.42142664501756";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:17:"16.70133740488867";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:17:"16.68287005331831";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"16.323412365068975";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"37.27437661386384";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"35.53723793846651";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"30.184702905716115";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"29.361886016589274";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1037";s:5:"score";s:17:"27.02598460819243";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:18:"26.537732189209066";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"26.251146537785367";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:18:"25.930186398847383";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Le danger Windows XP sera actif en Avril 2014 </title>
		<link>http://www.it-news.fr/danger-windows-xp/</link>
		<pubDate>Mon, 23 Sep 2013 09:20:03 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1066</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/09/Danger-Windows-XP.png"><img class="alignleft size-full wp-image-1067" alt="Danger Windows XP" src="http://www.it-news.fr/wp-content/uploads/2013/09/Danger-Windows-XP.png" width="150" height="112" /></a>Il y aura bien un danger Windows XP lorsque celui-ci va arrêter son support le 8 Avril prochain. En effet, l'une des versions les plus connues du système d'exploitation Microsoft, va certainement <strong>subir une augmentation d'attaque pirate à partir de cette date.</strong> Le problème, c'est qu'encore beaucoup d'institutions et d'organisations utilisent ce système d'exploitation. Les dangers sont bien réels, et c'est plus particulièrement inquiétant pour les écoles Américaines (96% utilisent encore Windows XP).</p>
<p style="text-align: justify;"><!--more Lire la suite--></p>

<h2>Danger Windows XP en 2014</h2>
<p style="text-align: justify;">Après l'annonce par Microsoft de la fin du support de Windows XP, un nombre encore très important d'utilisateurs risquent clairement des attaques pirates. Il y a ici un vrai problème de sécurité et le risque de voir plusieurs institutions, comme la majorité des écoles Américaine (96%), subir <strong>une crise technologique</strong>. Vieux de 12 ans, ce système d'exploitation garde encore de nombreux adeptes.</p>
<p style="text-align: justify;">C'est d'après une étude faite par <a href="http://www.avast.com/fr-fr/enterprise" target="_blank">Avast</a>, il y aura après l'arrêt complet du support, encore beaucoup d'utilisateurs de ce système. L'explication avancée démontre que le coût des mises à jour en pousseraient plus d'un à ne pas les mettre en place. En effet, ces coûts peuvent être rapidement très onéreux puisque qu'il peut s'élever à 200 euros par poste de travail.</p>
<p style="text-align: justify;">Une deuxième raison expliquerait également la conservation de ce danger windows XP, <strong>la vieillesse des ordinateurs</strong>. En effet, et là encore plus particulièrement pour les écoles Américaines, plusieurs d'entre elles auraient des PC vieux de plus de 3 ans. Cela signifie qu'il faut non seulement une mise à jour, mais également le changement du matériel informatique.</p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/09/Danger-windows-xp-2014.jpg"><img class="aligncenter size-full wp-image-1071" alt="Danger windows xp 2014" src="http://www.it-news.fr/wp-content/uploads/2013/09/Danger-windows-xp-2014.jpg" width="1024" height="768" /></a></p>
<p style="text-align: justify;">Avast ajoute à la suite de son étude que ces établissements risquent grandement de subir une violation de la protection des données personnelles des utilisateurs. Bien que cette étude soit à but commercial pour Avast, il n'en reste pas moins qu'elle soulève une vraie problématique pour de nombreuses organisations.</p>
<p style="text-align: justify;">Malgré les nouveaux systèmes d'exploitation mis en route par le géant Microsoft, plus du tiers de la part de marché mondiale compte encore des systèmes d'exploitation Windows XP. <strong>Seulement 5 mois nous sépare de son terme et beaucoup estiment qu'ils attendront la mort de leurs ordinateurs pour réellement en finir avec ce danger Windows XP</strong>. C'est une décision qui peut être lourde de conséquences.</p>
<p style="text-align: justify;">En effet, nous pouvons tenter de rappeler qu'il est naturel pour les pirates informatiques de s'attaquer aux cibles les plus fragilisés. Windows XP, représente donc <strong>une cible parfaite</strong> avec un nombre d'utilisateur qui risque d'être encore très important lors de l'arrêt du support. Ajoutons à cela la sérieuse baisse de sa sécurité, tout porte à croire qu'il ne faut pas négliger ces menaces.</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1066</wp:post_id>
		<wp:post_date>2013-09-23 10:20:03</wp:post_date>
		<wp:post_date_gmt>2013-09-23 09:20:03</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>danger-windows-xp</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[94]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Danger Windows XP]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[Le danger Windows XP sera actif en Avril 2014]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Dès Avril 2014, le danger windows XP sera bien présent. En effet, Microsoft annonce la fin du support pour ce système d'exploitation. Mais beaucoup utilise encore]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426436992]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"58.24934346699942";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:18:"44.060195137649664";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"31.284655741053935";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:18:"31.284655741053935";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2376";s:5:"score";s:17:"30.47561954015712";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:18:"24.897260526747814";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"19.63436187080035";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"18.83635865514489";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"1434";s:5:"score";s:17:"16.59141041853824";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:18:"15.076329621027106";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1067]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"20.25783742474208";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:18:"12.597927499770073";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"11.76422921442407";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:15:"11.117971572932";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"9.501424990904557";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1868";s:5:"score";s:17:"7.478223167413269";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"36.05872922238329";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:18:"29.730064900073252";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1434";s:5:"score";s:18:"20.642598841419723";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"19.68275472790469";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"19.523793415384556";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:17:"18.87180537152769";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1786";s:5:"score";s:18:"18.371152799789584";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1626";s:5:"score";s:17:"16.89236756067077";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:12:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"57.897835227819286";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:18:"44.099342936866215";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"31.08083132861506";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"31.08083132861506";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2376";s:5:"score";s:17:"30.28395141860731";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:17:"24.69784361694441";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:18:"19.486678044210983";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"18.734446449178616";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"1434";s:5:"score";s:17:"16.49060008795154";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:17:"15.31489432979387";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:4:"1626";s:5:"score";s:18:"14.453164125882523";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"1786";s:5:"score";s:18:"12.682448243843794";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:comment>
			<wp:comment_id>1121</wp:comment_id>
			<wp:comment_author><![CDATA[Flo]]></wp:comment_author>
			<wp:comment_author_email>florent.neyret@free.fr</wp:comment_author_email>
			<wp:comment_author_url></wp:comment_author_url>
			<wp:comment_author_IP>78.244.212.102</wp:comment_author_IP>
			<wp:comment_date>2013-11-29 19:06:09</wp:comment_date>
			<wp:comment_date_gmt>2013-11-29 18:06:09</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[Bonjour,
Pour l'avenir quels sont les risques à continuer d'utiliser XP connecté, en mode utilisateur restreint, si on ne tape jamais aucun mot de passe? (Et on confie tout ce qui a besoin de sécurité: mail, achats, sites à mot de passe à un Linux sur live USB)]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type></wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
	</item>
	<item>
		<title>Déploiement ERP pour PME : quels sont les risques ? </title>
		<link>http://www.it-news.fr/deploiement-erp-quels-risques/</link>
		<pubDate>Wed, 25 Sep 2013 18:37:06 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1076</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/09/Déploiement-ERP.jpg"><img class="alignleft size-full wp-image-1075" alt="Déploiement ERP" src="http://www.it-news.fr/wp-content/uploads/2013/09/Déploiement-ERP.jpg" width="204" height="168" /></a>C'est un fait, d<strong>e plus en plus d'entreprise font l'objet d'un déploiement de solution ERP</strong>.  Parce qu'aujourd'hui chaque entreprise dispose d'un volume de données considérable, les besoins en gestion de ces données deviennent primordiaux.</p>
<p style="text-align: justify;">Malgré tout, il peut y avoir beaucoup de problèmes liés au déploiement ERP. Un projet qui tarde à se mettre en place, des besoins qui changent au cours de l'intégration de la solution, <strong>des précautions sont à prendre avant de franchir le cap</strong>.</p>
<p style="text-align: justify;"><!--more Lire la suite--></p>
<p style="text-align: justify;">La mise en place d'un progiciel de gestion intégré est définie comme étant un outil de communication et d'interconnexion des fonctions d'une entreprise dans leur système informatique. Piloter toutes ses activités sur l'ordinateur est actuellement un moyen très efficace pour augmenter votre productivité.</p>

<h2>Les risques liés au déploiement ERP</h2>
<p style="text-align: justify;">Le premier problème que l'on pourrait noter est le temps de mise en place de ce genre de solution. Bien sûr, cela varie selon le poste de travail à équiper et de la taille générale de l'entreprise. Malgré tout, on constate qu'en 2012, <strong>2/3 des déploiements ERP</strong> ont dépassés leurs dates de livraison initialement prévues.</p>
<p style="text-align: justify;">Ce constat peut être expliqué par notre contexte économique actuel qui ne pousse pas à entreprendre des transformations importantes de ses infrastructures informatiques. Viens ensuite les problèmes de communications entre les clients et les sociétés qui proposent de déployer ces solutions. On entend ici des besoins qui évoluent ou des incompréhensions à rectifier. C'est de cette manière que les solutions qui demandent moins d'investissement et de temps de déploiement remportent plus de succès auprès des PME en 2013.</p>
<p style="text-align: justify;">Nous l'avons dit un peu plus tôt, le temps de déploiement ERP au sein d'une PME varie selon la solution et la structure qui accueille l'ERP. Il est malgré tout important de noter quelles sont les solutions qui enregistrent le plus de retard. En pole position, on trouve les produits <a href="http://www.oracle.com/fr/index.html" target="_blank">Oracle</a> qui sont ceux qui se déploient avec le plus de retard. En effet, <strong>certains projets notent plus de 4 mois de décalage</strong>.</p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/09/Déploiement-ERP-2.jpg"><img class="alignleft size-full wp-image-1084" alt="Déploiement ERP (2)" src="http://www.it-news.fr/wp-content/uploads/2013/09/Déploiement-ERP-2.jpg" width="1000" height="592" /></a></p>

<h2 style="text-align: justify;">Quelles solutions ?</h2>
<p style="text-align: justify;">Mais on ne peut pas expliquer l'ensemble des problèmes liés au déploiement ERP en PME par le simple mauvais élève qu'est Oracle. En effet, l'une des principales raisons qui expliquerait également ces soucis d'intégration ERP serait <strong>un manque de préparation des PME.</strong>  Généralement, l'impact de ce genre de solution n'est pas bien anticipé. Il faut savoir qu'il y a une réelle gestion du changement et de l'organisation en entreprise à faire si vous décidez d'intégrer des ERP.  <strong>Il est donc grandement conseillé d'établir une véritable étude de l'impact qu'un ERP</strong> peut avoir sur votre organisation. Ainsi, en anticipant les risques et les besoins, le temps de déploiement mais également l'efficacité de l'installation de l'ERP sera de qualité. Cela est d'autant plus valable pour les PME qui n'ont pas forcément les mêmes moyens que de plus grands groupes et qui se retrouvent parfois obligés d'acheter plusieurs extensions à la solution initialement prévue.</p>
<p style="text-align: justify;"><strong>Autre point sur lequel une PME se doit de réfléchir</strong> avant d'intégrer une solution ERP au sein de sa structure, <strong>le retour sur investissement (ROI)</strong>. En effet, l'objectif d'une ERP est quand même que son coût soit moins important que ces recettes. Il faut savoir qu'en moyenne, le retour sur investissement d'un ERP est de 2.5 ans. Là aussi, il faut faire un calcul, se poser les bonnes questions, et définir une période approximative où vous envisagez de récupérer la somme investie. Cela est encore trop négligé par les PME car ils ne s'interrogent pas assez sur ces questions.</p>
<p style="text-align: justify;">En oubliant un peu l'aspect financier, une ERP est également un moyen pour la PME <strong>d'améliorer son confort au travail</strong>. En effet, même si l'une des principales raisons est certainement l'augmentation de la disponibilité des données, il existe d'autres bénéfices qui poussent les PME à investir et dont il faut être également conscient. La facilité d'échange entre les différents services, la baisse des coûts de main d'oeuvre ainsi que la réduction des délais sont autant d'avantages à prendre en compte dans un déploiement ERP.</p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/09/ERP-planification.jpg"><img class="aligncenter size-full wp-image-1086" alt="ERP planification" src="http://www.it-news.fr/wp-content/uploads/2013/09/ERP-planification.jpg" width="609" height="373" /></a></p>
<p style="text-align: justify;"></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1076</wp:post_id>
		<wp:post_date>2013-09-25 19:37:06</wp:post_date>
		<wp:post_date_gmt>2013-09-25 18:37:06</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>deploiement-erp-quels-risques</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="erp"><![CDATA[ERP]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[97]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[2]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Déploiement ERP]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[Déploiement ERP pour PME : quels sont les risques ?]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Le déploiement ERP pour PME est souvent lié à des problèmes d'intégration. Nous faisons le point sur les éléments qui sont souvent source de difficultés.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>Version</wp:meta_key>
			<wp:meta_value><![CDATA[1.5]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426436984]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2424";s:5:"score";s:17:"61.16528419203506";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2444";s:5:"score";s:16:"51.0213040740595";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:18:"46.710807350604995";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:17:"29.51231757985579";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2125";s:5:"score";s:18:"25.844160206482606";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2411";s:5:"score";s:17:"21.89854409427628";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1037";s:5:"score";s:18:"20.058293578127536";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1868";s:5:"score";s:15:"20.006026114175";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2491";s:5:"score";s:17:"19.85301730474446";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"18.849872169694432";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1075]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:18:"17.882928959426053";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:18:"11.770046986694835";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1933";s:5:"score";s:17:"10.41899395790921";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2125";s:5:"score";s:17:"9.331172926265447";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"8.548538091047869";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"8.321149619920188";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"31.08211398809587";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2424";s:5:"score";s:18:"26.774599189501078";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1868";s:5:"score";s:18:"25.336984033618137";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1037";s:5:"score";s:17:"24.62689175468402";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1459";s:5:"score";s:18:"19.846602623645374";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1439";s:5:"score";s:18:"19.315196292312695";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:18:"18.604167783216628";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1448";s:5:"score";s:18:"16.794490016215274";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Microsoft sans Bill Gates</title>
		<link>http://www.it-news.fr/microsoft-bill-gates/</link>
		<pubDate>Wed, 09 Oct 2013 12:39:57 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1099</guid>
		<description></description>
		<content:encoded><![CDATA[<img class="size-full wp-image-1100 alignleft" title="Microsoft sans Bill Gates?" alt="Article_Microsoft sans Bill Gates_08102013" src="http://www.it-news.fr/wp-content/uploads/2013/10/Article_Microsoft-sans-Bill-Gates_08102013.jpg" width="290" height="174" />
<p style="text-align: justify;">Un vent de scandale souffle chez Microsoft où une rumeur vient titiller nos oreilles passionnées. Bill Gates serait bientôt licencié ?</p>
<p style="text-align: justify;">Après la mort de Steve Jobs de Apple, le départ de Jerry Yang de Yahoo nous nous inquiétons au sujet de ce que le monde de l’IT pourrait devenir.</p>
<!--more Lire la suite-->
<p style="text-align: justify;">A part pour Marc Zuckenberg, qui tient les rênes de Facebook, malgré un léger coup de chaud dans le lancement boursier du célèbre réseau social, les pères fondateurs de la Sillicon Valley disparaissent petit à petit pour laisser la place à un monde qui s’amuse avec les réseaux sociaux et les Smartphones.</p>
<p style="text-align: justify;">Malgré tout, les actionnaires des conseils d’administrations « Boards » ont aujourd’hui une visée plus financière que révolutionnaire. Privilégiant les profits à court terme au R&amp;D, ces politiciens pourraient faire sombrer le plus puissant des empires.</p>
<p style="text-align: justify;">Cette manière de penser l’IT pourrait ouvrir la porte à une forme de conformisme industriel qui nuirait aux entreprises modèles comme Microsoft qui a fait rêver des millions d’étudiants et ceux pendant quelques quarante années.</p>
<p style="text-align: justify;">Les actionnaires reprocheraient à Bill Gates son manque d’anticipation face à l’explosion des réseaux sociaux et des Smartphones. Malgré cette « faute » de parcours, il n’en reste pas moins une icône de la Sillicon Valley. <a href="http://www.it-news.fr/wp-content/uploads/2013/10/Article_Microsoft-sans-Bill-Gates_08102013.jpg">
</a></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1099</wp:post_id>
		<wp:post_date>2013-10-09 13:39:57</wp:post_date>
		<wp:post_date_gmt>2013-10-09 12:39:57</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>microsoft-bill-gates</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="bill-gates"><![CDATA[Bill Gates]]></category>
		<category domain="post_tag" nicename="microsoft"><![CDATA[Microsoft]]></category>
		<category domain="category" nicename="non-classe"><![CDATA[Non classé]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[63]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[microsoft, Bill Gates]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Un vent de scandale souffle chez Microsoft où une rumeur vient titiller nos oreilles passionnées. Bill Gates serait bientôt licencié ?]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"103.97396793038504";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:18:"101.63868466695791";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"101.63868466695791";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:18:"101.63868466695791";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1794";s:5:"score";s:17:"48.55437690042202";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2411";s:5:"score";s:17:"38.66532574782501";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1933";s:5:"score";s:18:"26.944525463596904";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1434";s:5:"score";s:18:"25.993491982596257";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:18:"19.388301626787335";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2501";s:5:"score";s:17:"18.40846179600751";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426436072]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"38.700528158851476";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:17:"36.80115013459144";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"36.80115013459144";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"36.80115013459144";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1933";s:5:"score";s:17:"18.73623699429873";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:17:"6.745369119608352";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1100]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"66.30696050751158";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:17:"63.68922983588929";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"63.68922983588929";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"63.68922983588929";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1794";s:5:"score";s:17:"53.25805570949358";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1434";s:5:"score";s:17:"33.15348025375579";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1933";s:5:"score";s:17:"32.06212046328668";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1465";s:5:"score";s:18:"19.353855535254546";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>La conservation des données ? Une obligation légale! </title>
		<link>http://www.it-news.fr/conservation-donnees-surtout-comment/</link>
		<pubDate>Wed, 09 Oct 2013 15:23:14 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1108</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/10/Conservation-des-données.jpg"><img class="size-full wp-image-1109 alignleft" title="La conservation des donées? Une obligation légale!" alt="" src="http://www.it-news.fr/wp-content/uploads/2013/10/Conservation-des-données.jpg" width="268" height="166" /></a><b>Pour qui ?</b></p>
<p style="text-align: justify;">Il est interdit par la loi de ne pas conserver de traces informatiques. C’était un fait déjà connu par les professionnels et les spécialistes du monde IT, c’est-à-dire principalement les fournisseurs de réseaux et les hébergeurs de contenus.</p>
<!--more Lire la suite-->
<p style="text-align: justify;">Ce qui est moins connu aujourd’hui c’est que toute institution partageant un accès réseau ou ayant un site Internet est tenue de garantir la sécurité informatique de ses utilisateurs et, par conséquent, de conserver une trace informatique de leur identité du contenu.</p>
<p style="text-align: justify;"><b>Pourquoi ? Parce que c’est la loi !  </b></p>
<p style="text-align: justify;">Pour <a href="http://www.cnil.fr/" target="_blank">la CNIL (Commission nationale de l’informatique et des libertés)</a>, les employeurs ne sont pas soumis à une obligation de conservation des données de trafic :</p>
<p style="text-align: justify;">« La CNIL considère que les entreprises et les administrations fournissant un accès Internet à leurs employés ne sont pas concernées par cette obligation de conservation.</p>
<p style="text-align: justify;"><i>Au-delà, un employeur a le droit de mettre en œuvre un dispositif de surveillance de l’activité de ses salariés (contrôle de la messagerie, des sites Internet consultés, etc.) dès lors qu’un certain nombre de garanties sont respectées, en particulier, l’information des intéressés sur le système mis en œuvre et la déclaration préalable du </i>dispositif auprès de la CNIL. »</p>
<p style="text-align: justify;">Mais il faut garder à l’esprit que la loi impose « aux personnes qui, au titre d’une activité professionnelle ou accessoire, offrent au public une connexion permettant une communication en ligne par l’intermédiaire d’un accès au réseau, y compris à titre gratuit » de conserver des logs.</p>
<p style="text-align: justify;">L’article 6-III de la Loi pour la Confiance Numérique (LCEN) du 21 juin 2004 impose aux fournisseurs d’hébergement et aux FAI de conserver les données d’identification pour les connexions à leurs services.</p>
<p style="text-align: justify;">Ces informations doivent permettre l’identification des utilisateurs ayant procédé à la mise en ligne de contenus sur le réseau Internet. Ces données doivent pouvoir être communiquées aux autorités judiciaires pour les besoins de la recherche, de la constatation et de la poursuite des infractions pénales.</p>
<p style="text-align: justify;">Par ailleurs, l’article L.34-1 du Code des postes et des communications électroniques (CPCE) impose une obligation de conservation de ces données.  Les opérateurs de communications électroniques doivent ainsi conserver les informations relatives au trafic pendant un an, à compter du jour d’enregistrement. Il ne s’agit là que de données techniques et non pas du contenu des communications dont la diffusion est prohibée. Ces données sont les suivantes :</p>
<p style="text-align: justify;">1-   Les données relatives à l’identification de l’utilisateur, comme l’adresse IP ou l’adresse de courrier électronique.</p>
<p style="text-align: justify;">2-   Les données relatives aux équipements de communication utilisés.</p>
<p style="text-align: justify;">3-   Les caractéristiques techniques ainsi que la date, l’horaire et la durée de chaque communication.</p>
<p style="text-align: justify;">4-   Les données relatives aux services complémentaires demandés ou utilisés et à leurs fournisseurs.</p>
<p style="text-align: justify;">5-   Les données permettant d’identifier le ou les destinataires de la communication.</p>
<p style="text-align: justify;">La sanction pénale pour le non-respect de cette obligation est d’un an d’emprisonnement et de 75.000€ d’amendes (350.000€ pour une personne morale).</p>
<p style="text-align: justify;">Et comme les collectivités locales peuvent être amenées à fournir un accès au réseau Internet la CNIL évoque ce sujet au détour d’un guide sur les obligations des collectivités :</p>
<p style="text-align: justify;"><i>Un EPN, dès lors qu’il offre un accès au réseau internet au public, est considéré par la loi comme un opérateur de communications électroniques. A ce titre, le responsable de cet espace public est soumis à une obligation de conserver les « </i>données de trafic» […] Toutefois, la CNIL considère que la collectivité fournissant un accès Internet à ses employés n’est pas concernée par cette obligation de conservation des données de trafic.</p>
<p style="text-align: justify;">En outre, <a href="http://www.hadopi.fr/" target="_blank">les lois Hadopi </a>imposent aux particuliers et aux entreprises une <i>« sécurisation d’accès »</i> à l’Internet afin de lutter contre la contrefaçon des œuvres audio et vidéo. La conservation de traces est également recommandée dans ce cadre pour pouvoir démontrer, autant que possible, les bonnes pratiques en place pour sécuriser l’accès à Internet. Encore faudrait-il que l’on sache précisément où commence et où s’arrête un “accès Internet” et les moyens à disposition pour le “sécuriser”.</p>
<p style="text-align: justify;"><b>Les Solutions d’Aquastar Consulting : </b></p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls/palo-alto" target="_blank">Palo Alto Networks </a>– Solution de conservation et de traçabilité de données</li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1108</wp:post_id>
		<wp:post_date>2013-10-09 16:23:14</wp:post_date>
		<wp:post_date_gmt>2013-10-09 15:23:14</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>conservation-donnees-surtout-comment</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="cnil"><![CDATA[CNIL]]></category>
		<category domain="post_tag" nicename="conservation-de-donnees"><![CDATA[Conservation de données]]></category>
		<category domain="post_tag" nicename="palo-alto-networks"><![CDATA[Palo Alto Networks]]></category>
		<category domain="category" nicename="reseaux-et-mobilite"><![CDATA[Réseaux et mobilité]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[69]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[CNIL]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Il est interdit par la loi de ne pas conservé des traces informatiques. C’était un fait déjà connu par les professionnels et les spécialistes du monde IT, c’est-à-dire principalement les fournisseurs de réseaux et les hébergeurs de contenus. Ce qui est moins connus aujourd’hui c’est que toute institution partageant un accès réseau ou ayant un site internet est tenue de garantir la sécurité informatique de ses utilisateurs et par conséquent de conserver une trace informatique de leur identité, du contenu.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1876";s:5:"score";s:17:"86.56035042309568";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2330";s:5:"score";s:18:"49.236992316809946";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1731";s:5:"score";s:17:"48.76366984448384";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"46.62731489571012";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:18:"46.338892104408615";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"43.713391607572156";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1571";s:5:"score";s:17:"42.17670415883141";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"38.075814465543374";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2125";s:5:"score";s:17:"35.08098593309901";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"31.559750169130943";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437562]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:17:"18.71833767368325";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"18.594950536010806";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"18.078199955776803";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"14.71309400998074";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2125";s:5:"score";s:18:"14.417262746573767";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:17:"13.68881844826377";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1876";s:5:"score";s:17:"90.24953910966393";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1731";s:5:"score";s:18:"51.097618225412056";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1571";s:5:"score";s:18:"43.639515078232314";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1789";s:5:"score";s:18:"33.188564492319195";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:18:"30.149283189604045";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"29.285688042066617";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:17:"29.19647513137389";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1773";s:5:"score";s:18:"27.815490134940294";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1109]]></wp:meta_value>
		</wp:postmeta>
		<wp:comment>
			<wp:comment_id>1132</wp:comment_id>
			<wp:comment_author><![CDATA[[BLOCKED BY STBV] Lorsque le Cloud fait peur aux entreprises | L&#039;actualité pour décideurs informatiquesL&#039;actualité pour décideurs informatiques]]></wp:comment_author>
			<wp:comment_author_email></wp:comment_author_email>
			<wp:comment_author_url>http://www.it-news.fr/lorsque-cloud-fait-peur-aux-entreprises/</wp:comment_author_url>
			<wp:comment_author_IP>37.187.41.26</wp:comment_author_IP>
			<wp:comment_date>2014-01-02 11:03:22</wp:comment_date>
			<wp:comment_date_gmt>2014-01-02 10:03:22</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[[&#8230;] &larr; La conservation des données ? Une obligation légale! Lorsque la migration SEPA devient une urgence &rarr; [&#8230;]]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type>pingback</wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
	</item>
	<item>
		<title>Lorsque le Cloud fait peur aux entreprises</title>
		<link>http://www.it-news.fr/lorsque-cloud-fait-peur-aux-entreprises/</link>
		<pubDate>Mon, 14 Oct 2013 15:12:05 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1127</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/10/Lorsque-le-cloud-fait-peur-aux-entreprises-bis1.jpg"><img class="size-full wp-image-1153 alignleft" title="Lorsque le Cloud fait peur aux entreprises" alt="Lorsque-le-cloud-fait-peur-aux-entreprises-bis" src="http://www.it-news.fr/wp-content/uploads/2013/10/Lorsque-le-cloud-fait-peur-aux-entreprises-bis1.jpg" width="225" height="225" /></a>Le Cloud est un outil de sauvegarde révolutionnaire.</p>
<p style="text-align: justify;">Pourtant 43% des entreprises françaises sont encore méfiantes vis à vis des offres en  Cloud.</p>
<p style="text-align: justify;">Les raisons mentionnées par celles-ci sont la sécurité et les législations.</p>

<div></div>
<div style="text-align: justify;">Plus de 54% des entreprises européennes se déclarent inquiètes par rapport à la <strong>sécurité du Cloud</strong>, notamment lorsqu’il s’agit de la propriété intellectuelle (brevets, idées…), du respect de la vie privée et des failles de s<strong>écurité du Cloud</strong> au sujet de données confidentielles.<span style="color: #ffffff;">-</span></div>
<p style="text-align: justify;"><span style="color: #ffffff;">-</span></p>
<!--more Lire la suite-->
<p style="text-align: justify;"><a href="http://www.it-news.fr/conservation-donnees-surtout-comment/" target="_blank">Toute donnée</a> doit être sécurisée. Et donc les entreprises favorables à ce moyen de stockage ont prévu la problématique de la <strong>sécurité du Cloud</strong> dès le début de leur projet.</p>
<p style="text-align: justify;"><span style="color: #ffffff;">-</span>93% des entreprises françaises favorables au Cloud disposent d'un système de gestion des identités et des accès, contre seulement 48% des entreprises réticentes.</p>
<p style="text-align: justify;"><span style="color: #ffffff;">-</span>Plus des trois quarts de ces entreprises françaises réticentes au Cloud déclarent manquer de moyens pour sécuriser leur Cloud, tandis que le reste explique ne par avoir les compétences nécessaires. Ce qui laisserait entendre que si on les aidait à mettre en place et à garantir la sécurité de leur Cloud, la plupart pourrait surmonter la principale barrière qui freine leur adoption.</p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/10/Lorsque-le-cloud-fait-peur-aux-entreprises.jpg"><img class="size-full wp-image-1152 alignright" title="Lorsque le Cloud fait peur aux entreprises" alt="Lorsque-le-cloud-fait-peur-aux-entreprises" src="http://www.it-news.fr/wp-content/uploads/2013/10/Lorsque-le-cloud-fait-peur-aux-entreprises.jpg" width="271" height="186" /></a></p>
<p style="text-align: justify;">« <em>Notre enquête prouve que la gestion des identités et des accès est primordiale pour les entreprises adoptant le Cloud. Les entreprises françaises encore réticentes peuvent surmonter leurs problématiques de sécurité et simplifier leurs processus grâce à des offres SaaS. D'ailleurs l'étude montre que 82% des entreprises favorables au Cloud considèrent que de nombreux services de sécurité - Single Sign On (SSO), gouvernance fédérée des identités et des accès - sont plus efficaces lorsqu'ils sont délivrés via des modèles SaaS ou hybride</em>s », déclare Gaël Kergot, Directeur des Solutions de Sécurité chez<a href="http://www.ca.com/fr/default.aspx" target="_blank"> CA Technologies</a>.</p>
<p style="text-align: justify;">Les solutions proposées (gestion des identités et des accès en mode SaaS) répondent surtout au besoin de réduction de la complexité informatique  que certaines entreprises européenne ont mentionné.</p>
<p style="text-align: justify;">Qu'elles oui ou non favorable au Cloud, 30 à 40% des entreprises européennes déclarent  que la complexité est encore un obstacle majeur à l’adoption et à l’expansion du Cloud. La <strong>sécurité du Cloud</strong> est, donc, non seulement un frein majeur pour l’adoption de ce moyen de stockage, mais il y a aussi, les compétences défaillantes des utilisateurs et la complexité de son utilisation qui font que le Cloud ne fait pour l’instant pas l’unanimité.</p>
<p style="text-align: justify;"><strong>Comment Aquastar Consulting peut vous aider ? </strong></p>

<ul>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/securite-des-postes-de-travail/sophos" target="_blank"><span style="color: #444444; font-family: Georgia, 'Bitstream Charter', serif; line-height: 1.5;">Solution de sauvegarde informatique - Sophos Safe Guard </span></a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/systemes/virtualisation-serveurs/vmware" target="_blank"><span style="color: #444444; font-family: Georgia, 'Bitstream Charter', serif; line-height: 1.5;">Virtualisation - VMware</span></a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/systemes/sauvegarde" target="_blank"><span style="color: #444444; font-family: Georgia, 'Bitstream Charter', serif; line-height: 1.5;">Solution de sauvegarde informatique - CA technologies ARCserve </span></a></li>
</ul>
<p style="text-align: justify;"></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1127</wp:post_id>
		<wp:post_date>2013-10-14 16:12:05</wp:post_date>
		<wp:post_date_gmt>2013-10-14 15:12:05</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>lorsque-cloud-fait-peur-aux-entreprises</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="reseaux-et-mobilite"><![CDATA[Réseaux et mobilité]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<category domain="post_tag" nicename="securite-du-cloud"><![CDATA[Sécurité du cloud]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[68]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[1129]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[sécurité du cloud]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_post_restored_from</wp:meta_key>
			<wp:meta_value><![CDATA[a:3:{s:20:"restored_revision_id";i:1134;s:16:"restored_by_user";i:1;s:13:"restored_time";i:1381765569;}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"47.99171130345754";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:17:"46.49788634499522";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:17:"39.31004387399227";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"37.104927609863665";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2475";s:5:"score";s:17:"34.69373526908532";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2400";s:5:"score";s:18:"30.652308890542272";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:17:"27.52529306181524";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"26.584231885841234";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2330";s:5:"score";s:18:"25.107342990339486";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:17:"22.35441921558753";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437720]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"19.521372754572866";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:17:"16.10269441242843";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"15.882524431857139";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"14.234910664608623";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:17:"14.01767540599534";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"12.224125462364269";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"31.909932316989156";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"28.329081286497285";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1789";s:5:"score";s:18:"26.580449737248642";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:18:"26.146646371149533";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"25.719851043663716";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"23.93816569722413";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1779";s:5:"score";s:18:"22.690764208321937";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1773";s:5:"score";s:18:"22.690764208321937";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:comment>
			<wp:comment_id>1129</wp:comment_id>
			<wp:comment_author><![CDATA[[BLOCKED BY STBV] Cloud et virtualisation se battent pour plus de sécurité]]></wp:comment_author>
			<wp:comment_author_email></wp:comment_author_email>
			<wp:comment_author_url>http://www.it-news.fr/cloud-et-virtualisation-se-battent-pour-plus-de-securite/</wp:comment_author_url>
			<wp:comment_author_IP>37.187.41.26</wp:comment_author_IP>
			<wp:comment_date>2013-12-12 11:29:59</wp:comment_date>
			<wp:comment_date_gmt>2013-12-12 10:29:59</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[[&#8230;] côté des entreprises et des hébergeurs, la sécurité informatique est devenue une véritable obsession pour les DSI. Notamment en ce qui concerne les solutions de [&#8230;]]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type>pingback</wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
		<wp:comment>
			<wp:comment_id>1133</wp:comment_id>
			<wp:comment_author><![CDATA[[BLOCKED BY STBV] La rébellion des jeunes salariés | L&#039;actualité pour décideurs informatiquesL&#039;actualité pour décideurs informatiques]]></wp:comment_author>
			<wp:comment_author_email></wp:comment_author_email>
			<wp:comment_author_url>http://www.it-news.fr/rebellion-jeunes-salaries/</wp:comment_author_url>
			<wp:comment_author_IP>37.187.41.26</wp:comment_author_IP>
			<wp:comment_date>2014-01-02 11:12:05</wp:comment_date>
			<wp:comment_date_gmt>2014-01-02 10:12:05</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[[&#8230;] primaires de la sécurité des services Cloud. La question est de savoir ce qui est stocké sur ces Cloud personnels. Voici les chiffres donnés par Vision [&#8230;]]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type>pingback</wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
	</item>
	<item>
		<title>Lorsque la migration SEPA devient une urgence</title>
		<link>http://www.it-news.fr/lorsque-migration-sepa-devient-urgence/</link>
		<pubDate>Tue, 15 Oct 2013 08:40:46 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1156</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><span style="font-size: 16px;"><a href="http://www.it-news.fr/wp-content/uploads/2013/10/lorsque-la-migration-sepa-devient-une-urgence-.jpg"><img class="alignleft size-full wp-image-1162" title="Lorsque la migration SEPA devient une urgence" alt="lorsque-la-migration-sepa-devient-une-urgence-" src="http://www.it-news.fr/wp-content/uploads/2013/10/lorsque-la-migration-sepa-devient-une-urgence-.jpg" width="373" height="135" /></a>Le 1</span><sup>er</sup><span style="font-size: 16px;"> Févier 2014, la norme européenne SEPA (espace unique de paiement en euros) entrera en vigueur pour tous les virements et prélèvements effectués au sein de l’Europe. Cette mesure concerne toutes les entreprises, quelles que soient leurs tailles et leurs activités.</span></p>

<div style="text-align: justify;"><span style="color: #ffffff;">-</span></div>
<!--more Lire la suite-->
<p style="text-align: justify;">Alors que la plupart des grands groupes et administrations ont effectué leur <b>migration SEPA</b>, certaines tardent à franchir le pas, notamment les PME. La raison évoquée est que la majorité d’entre elles craignent de faire face à des démarches et des dépenses à rallonge. Pourtant effectuer <b>une migration SEPA</b> est simple et économique, et prend quelques jours, SI on s’y prend dés maintenant.</p>
<p style="text-align: justify;">Norbert Jamet, responsable marketing produit PME pour la ligne 100 de chez sage, a expliqué, lors du SEPA Day, aux PME les bonnes pratiques à suivre pour réussir leur migration SEPA.</p>

<h1 style="text-align: justify;">Pratique n°1 : Mettre à jour ses équipements informatiques</h1>
<p style="text-align: justify;">Concrètement, il s’agit pour les entreprises de s’assurer de pouvoir mettre à jour<a href="http://www.conseil-sup-services.com/ressources-SEPA/sepa-sic-septembre.pdf" target="_blank"> les bases RIB </a>de leurs tiers (codes IBAN et BIC) dans leur solution de gestion. A ce moment là, en fonction du type d’équipement dont dispose la PME, il peut y avoir trois cas de figures.</p>

<h2 style="text-align: justify;"><span style="color: #000080;">Cas n°1 : La PME dispose déjà de logiciels de gestion compatibles avec la norme SEPA.</span></h2>
<p style="text-align: justify;"><img class="size-full wp-image-1161 alignright" title="La PME dispose déjà de logiciels de gestion compatible avec la norme SEPA" alt="lorsque-la-migration-sepa-devient-une-urgence" src="http://www.it-news.fr/wp-content/uploads/2013/10/lorsque-la-migration-sepa-devient-une-urgence.jpg" width="200" height="200" /></p>
<p style="text-align: justify;"><span style="font-size: 12.222222328186035px; line-height: 20px;"> </span></p>
<p style="text-align: justify;"><span style="text-decoration: underline;">Etape 1</span><span style="font-size: 16px;"> : la PME doit se rapprocher de son éditeur de logiciels de gestion. </span></p>
<p style="text-align: justify;"><span style="font-size: 16px;"><span style="text-decoration: underline;">Etape 2</span><span style="font-size: 16px;"> : la PME doit solliciter </span><a style="font-size: 16px;" href="http://www.trader-finance.fr/lexique-finance/definition-lettre-A/Avenant.html" target="_blank">un avenant</a><span style="font-size: 16px;"> auprès de sa banque afin de basculer sur des échanges au format SEPA.</span>logiciels ou </span><a style="font-size: 16px;" href="http://www.aquastar-consulting.com/" target="_blank">intégrateur,</a><span style="font-size: 16px;">  afin d’activer les paramètres d’utilisation des nouveaux formats SEPA (XML).</span></p>

<h2 style="text-align: justify;"></h2>
<h2 style="text-align: justify;"><span style="color: #000080;">Cas n°2 : La PME dispose déjà de logiciels de gestion compatibles avec la norme SEPA, mais qui n'intègrent pas la gestion des flux bancaires.</span></h2>
<p style="text-align: justify;"><span style="text-decoration: underline;">Etape Unique</span><span style="font-size: 16px;"> : LA PME devra donc se rapprocher de son éditeur ou</span><a style="font-size: 16px;" href="http://www.aquastar-consulting.com/" target="_blank"> intégrateur de logiciels</a><span style="font-size: 16px;"> pour acquérir un module de gestion des moyens de paiement à intégrer à sa solution existante.</span></p>

<h2 style="text-align: justify;"></h2>
<h2 style="text-align: justify;"><span style="color: #000080;">Cas n°3 : La PME ne dispose pas de logiciels de gestion compatibles avec la norme SEPA</span></h2>
<p style="text-align: justify;"><span style="text-decoration: underline;">Etape Unique</span><span style="font-size: 16px;"> : La PME devra renouveler entièrement ou partiellement </span><a style="font-size: 16px;" href="http://www.aquastar-consulting.com/index.php/solutions/gestion-metier" target="_blank">sa solution de gestion.</a><span style="font-size: 16px;"> Attention, dans ce cas-ci, la </span><b style="font-size: 16px;">migration SEPA</b><span style="font-size: 16px;"> est d’autant plus urgente qu’il faut du temps pour renouveler sa solution de gestion</span></p>

<h1 style="text-align: justify;">Pratique n°2 : Avant de lancer sa migration SEPA, il faut  internaliser la gestion des mouvements bancaires</h1>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/10/lorsque-la-migration-sepa-devient-une-urgence-1.jpg"><img class="size-full wp-image-1160 alignleft" title="Avant de lancer sa migration SEPA, il faut  internaliser la gestion des mouvements bancaires" alt="lorsque-la-migration-sepa-devient-une-urgence-1" src="http://www.it-news.fr/wp-content/uploads/2013/10/lorsque-la-migration-sepa-devient-une-urgence-1.jpg" width="305" height="165" /></a>Avant de lancer sa migration, l'entreprise doit impérativement informer tous ses clients débiteurs de son évolution vers un prélèvement au format SEPA.</p>
<p style="text-align: justify;">Sur le plan opérationnel, <b>la migration SEPA</b> implique des changements logistiques pour l'entreprise :</p>
<p style="text-align: justify;"><b>- Initialiser la gestion des mandats :</b> la mise en œuvre de nouveaux prélèvements SEPA requiert désormais la signature d'un mandat entre le créancier et son débiteur. Quant aux prélèvements récurrents déjà en place, rien ne change. Le principe de continuité s'applique, assorti d'une obligation d'information au débiteur bien entendu.</p>
<p style="text-align: justify;"><b>- Archiver les mandats :</b> les mandats établissent le cadre juridique des flux financiers entre le débiteur et le créancier et c'est au créancier, et non plus à la banque, que revient la charge de leur gestion et de leur archivage, au format papier ou électronique.</p>
<p style="text-align: justify;">Cette migration engage également une évolution dans le cadre légal car en cas de contestation d'un ordre de prélèvement par un débiteur, c'est désormais au créancier (et non plus aux banques) de fournir la preuve (le mandat). D'où l'importance d'adopter un système permettant de tracer et d'archiver ces documents.</p>

<h1 style="text-align: justify;">Pratique n°3 : Planifier sa migration SEPA</h1>
<p style="text-align: justify;">La proportion d'entreprises ayant déjà effectué leur migration SEPA est dérisoire selon les<a href="http://www.it-news.fr/wp-content/uploads/2013/10/lorsque-la-migration-sepa-devient-une-urgence-2.jpg"><img class="alignright  wp-image-1159" title="Planifier sa migration SEPA" alt="lorsque-la-migration-sepa-devient-une-urgence-2" src="http://www.it-news.fr/wp-content/uploads/2013/10/lorsque-la-migration-sepa-devient-une-urgence-2.jpg" width="233" height="138" /></a> études de marché de <a href="http://www.sage.fr/fr" target="_blank">SAGE</a>.</p>
<p style="text-align: justify;">En effet, 50% des clients de Sage ont effectué leurs virements avec le format SEPA, par contre, ceux-ci ne représente que 35% des flux de virements totaux.  Du côté de la migration vers les prélèvements SEPA (SDD), les données sont alarmantes puisque seuls 3% des clients de Sage l'ont activée (contre 1,9 % des entreprises de l'ensemble du marché).</p>
<p style="text-align: justify;">Dès lors, il est essentiel d'attirer l'attention sur ce taux de migration encore trop faible, car si toutes les entreprises décident d'effectuer leurs démarches peu de temps avant la date d'échéance elles risquent d'être confrontées à « embouteillage ».</p>

<h1 style="text-align: justify;">Attendre, c'est mettre en danger son entreprise !</h1>
<p style="text-align: justify;">Ne pas effectuer sa migration SEPA avant le 1<sup>er</sup> février 2014 pourrait avoir des <a href="http://www.it-news.fr/wp-content/uploads/2013/10/attendre-cest-mettre-en-danger-son-entreprise.jpg"><img class=" wp-image-1158 alignleft" title="Attendre, c'est mettre en danger son entreprise!" alt="attendre-cest-mettre-en-danger-son-entreprise" src="http://www.it-news.fr/wp-content/uploads/2013/10/attendre-cest-mettre-en-danger-son-entreprise.jpg" width="368" height="137" /></a><a href="http://www.sage.fr/fr/mediatheque/dossiers-d-experts/migration-sepa-demarrer-vite" target="_blank">conséquences opérationnelles et financières importantes pour l’entreprise</a>. Par exemple, elle pourrait se retrouver dans l’incapacité d’effectuer des virements (y compris en France), que ce soit pour payer le salaire de ses employés, des règlements de factures ou de taxes et impôts divers.</p>
<p style="text-align: justify;">De plus, si l’entreprise n’effectue pas sa migration SEPA elle devra faire face à des  défauts de paiement et des pénalités de retard qui coûteront très chers et qui se prolongeront jusqu'à ce que la migration puisse être effectuée.</p>

<h1 style="text-align: justify;">Comment Aquastar peut vous aider ?</h1>
<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/gestion-metier/comptabilite-finances/moyens-de-paiement">Logiciel de gestion pour PME - Sage</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1156</wp:post_id>
		<wp:post_date>2013-10-15 09:40:46</wp:post_date>
		<wp:post_date_gmt>2013-10-15 08:40:46</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>lorsque-migration-sepa-devient-urgence</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="comptabilite-finances"><![CDATA[Comptabilité - Finances]]></category>
		<category domain="category" nicename="gestion-commerciale"><![CDATA[Gestion commerciale]]></category>
		<category domain="post_tag" nicename="migration-sepa"><![CDATA[migration SEPA]]></category>
		<category domain="category" nicename="paie-rh"><![CDATA[Paie - RH]]></category>
		<category domain="category" nicename="solutions-de-gestion"><![CDATA[Solutions de gestion]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[86]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[migration SEPA]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[1162]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_post_restored_from</wp:meta_key>
			<wp:meta_value><![CDATA[a:3:{s:20:"restored_revision_id";i:1170;s:16:"restored_by_user";i:1;s:13:"restored_time";i:1381846372;}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:18:"104.08328994632879";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2371";s:5:"score";s:17:"70.22829084950254";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:16:"69.8426011256113";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"68.66916874180029";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"57.476901647178686";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:17:"54.45063633439166";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"48.81767073253599";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2319";s:5:"score";s:18:"48.697630510530644";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2465";s:5:"score";s:18:"45.398841509296105";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:17:"41.33398555111136";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437666]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:17:"33.22053387867794";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:18:"30.940549083872664";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"25.91045847429861";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"22.50096228889529";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"20.94841224701636";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"17.079706137438226";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:17:"59.96899111047093";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:17:"48.23812295308182";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"43.43859906854834";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:18:"37.373903595409686";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:17:"36.86609121250983";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"36.53655873289426";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"32.93468427804814";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"334";s:5:"score";s:18:"32.507663919122564";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1162]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Adobe a été cyberattaqué</title>
		<link>http://www.it-news.fr/adobe-ete-cyberattaque/</link>
		<pubDate>Wed, 16 Oct 2013 10:00:45 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1172</guid>
		<description></description>
		<content:encoded><![CDATA[<h1 style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/10/adobe-a-ete-cyberattaque.jpg"><img class=" wp-image-1173 alignleft" title="Adobe a été cyberattaqué" alt="adobe-a-ete-cyberattaque" src="http://www.it-news.fr/wp-content/uploads/2013/10/adobe-a-ete-cyberattaque.jpg" width="180" height="180" /></a>Adobe a été attaqué !!</h1>
<p style="text-align: justify;">Adobe a été victime d’une cyberattaque massive qui a eu pour conséquence de compromettre 2.9 millions de comptes clients et des données confidentielles comme des numéros de carte bancaire et des dates d’expiration.</p>
<!--more Lire la suite-->
<p style="text-align: justify;"><span style="font-size: 16px;">Heureusement, l’éditeur (via </span><a style="font-size: 16px;" href="http://blogs.adobe.com/conversations/2013/10/important-customer-security-announcement.html" target="_blank">son blog</a><span style="font-size: 16px;">) affirme que le cybercriminel  a volé des données sous une forme cryptée et, par conséquent, rien ne laisse à penser qu’elles aient pu être décryptées.</span></p>
<p style="text-align: justify;">Les codes sources <a href="https://www.acrobat.com/acrobatplus/en/home.html?trackingid=JPZKR" target="_blank">d'Adobe Acrobat</a>, <a href="http://www.adobe.com/fr/products/coldfusion-family.html" target="_blank">ColdFusion</a> et <a href="http://www.adobe.com/fr/products/coldfusion-builder.html" target="_blank">Coldfusion Builder</a> ont également été dérobés au cours de l'attaque.</p>
<p style="text-align: justify;">L'éditeur a réinitialisé les mots de passe de ses comptes utilisateurs et indique travailler avec ses partenaires bancaires pour limiter les conséquences de ce piratage, tout en ayant demandé une enquête aux autorités. Les clients dont les comptes ont été touchés par l'attaque seront informés personnellement.</p>

<h1 style="text-align: justify;">Comment Aquastar peut vous aider :</h1>
<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls/palo-alto" target="_blank">Solution de sécurité internet : Palo Alto Networks</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1172</wp:post_id>
		<wp:post_date>2013-10-16 11:00:45</wp:post_date>
		<wp:post_date_gmt>2013-10-16 10:00:45</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>adobe-ete-cyberattaque</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="adobe"><![CDATA[Adobe]]></category>
		<category domain="post_tag" nicename="cyberattaque"><![CDATA[Cyberattaque]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[70]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[adobe]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[1173]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426436246]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:17:"123.9643218721863";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1476";s:5:"score";s:17:"90.94640695515052";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1773";s:5:"score";s:16:"83.4638171008289";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:16:"48.8442963959487";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:17:"44.45844579355938";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"34.040755840512446";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1719";s:5:"score";s:18:"30.991080468046576";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:17:"30.84143633317582";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"28.84281782312394";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2330";s:5:"score";s:18:"27.952734780686214";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:17:"38.95997198071153";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:18:"19.753722034233057";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:18:"19.348549291775896";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:18:"17.966086282159665";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1955";s:5:"score";s:18:"14.810473263325576";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"14.358844953115637";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1476";s:5:"score";s:17:"96.37830148646418";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1773";s:5:"score";s:17:"93.63945209121435";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:17:"68.60437611558251";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1719";s:5:"score";s:18:"34.302188057791255";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:16:"33.0608798140826";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:18:"30.874264141229492";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:17:"28.45016177443572";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1955";s:5:"score";s:17:"22.60505206799634";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:comment>
			<wp:comment_id>1134</wp:comment_id>
			<wp:comment_author><![CDATA[[BLOCKED BY STBV] Adobe: Les véritables conséquences de la cyberattaque | L&#039;actualité pour décideurs informatiquesL&#039;actualité pour décideurs informatiques]]></wp:comment_author>
			<wp:comment_author_email></wp:comment_author_email>
			<wp:comment_author_url>http://www.it-news.fr/adobe-les-veritables-consequences-de-la-cyberattaque/</wp:comment_author_url>
			<wp:comment_author_IP>37.187.41.26</wp:comment_author_IP>
			<wp:comment_date>2014-01-02 11:22:23</wp:comment_date>
			<wp:comment_date_gmt>2014-01-02 10:22:23</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[[&#8230;] avions parlé, début Octobre, du cyber vol chez l’éditeur Adobe. Le directeur de la sécurité Adobe avait alors déclaré être victime d’une cyberattaque. Il [&#8230;]]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type>pingback</wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
	</item>
	<item>
		<title>Lorsque les applications deviennent la norme</title>
		<link>http://www.it-news.fr/lorsque-les-applications-deviennent-norme/</link>
		<pubDate>Thu, 17 Oct 2013 10:00:00 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1180</guid>
		<description></description>
		<content:encoded><![CDATA[<a href="http://www.it-news.fr/wp-content/uploads/2013/10/lorsque-les-applications-deviennent-la-norme.jpg"><img class="alignleft  wp-image-1181" alt="lorsque-les-applications-deviennent-la-norme" src="http://www.it-news.fr/wp-content/uploads/2013/10/lorsque-les-applications-deviennent-la-norme.jpg" width="242" height="134" /></a>Médiamétrie a indiqué ce jeudi que : « Pour se connecter à Internet depuis <i>leur téléphone mobile, les Français passent de plus en plus par les applications</i> »
<!--more Lire la suite-->
<b>Lorsque Smartphone équivaut à Applications</b>
<p style="text-align: justify;">D’après <a href="http://www.mediametrie.fr/internet/communiques/l-audience-de-l-internet-mobile-en-france-en-aout-2013.php?id=946#.Ul1PLlDFFjQ" target="_blank">Médiamétrie</a>, « <i>83,4% d’entre eux en ont consulté au moins une en août 2013 contre 72,2% un an auparavant ». </i>De plus, la plupart des propriétaires de smartphone (3 sur 4) possèdent entre 1 et 50 application(s) sur leur téléphone, 14% en ont plus de 100.</p>
<p style="text-align: justify;">Cette frénésie de l’application vient probablement du fait que la plupart des applications sont gratuites, surtout sachant que la moitié des possesseurs de smartphones ont téléchargé au moins une application gratuite au cours du dernier mois !</p>
<p style="text-align: justify;">La raison de ce phénomène est plutôt évidente. Les applications sont plus simples à utiliser et plus pratiques que les sites Internet. Selon Médiamétrie « <i>Les utilisateurs de Smartphones qui privilégient les applications comme mode d'accès à un contenu mobile le font à 59% pour leur facilité d'utilisation</i> ».</p>
<p style="text-align: justify;">Pour information, selon <a href="http://www.youtube.com/yt/press/fr/statistics.html" target="_blank">YouTube</a>, les mobiles représentent plus de 25% des contenus visionnés sur YouTube dans le monde soit plus d’un milliard de vues par jour.</p>
<p style="text-align: justify;">Quant à Facebook, elle comptabilise 17 millions d’utilisateurs mobiles actifs par mois, soit 65% des utilisateurs français qui se connectent au célèbre réseau social depuis son application.</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1180</wp:post_id>
		<wp:post_date>2013-10-17 11:00:00</wp:post_date>
		<wp:post_date_gmt>2013-10-17 10:00:00</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>lorsque-les-applications-deviennent-norme</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="applcations"><![CDATA[Applcations]]></category>
		<category domain="post_tag" nicename="mobile"><![CDATA[mobile]]></category>
		<category domain="category" nicename="reseaux-et-mobilite"><![CDATA[Réseaux et mobilité]]></category>
		<category domain="post_tag" nicename="smartphones"><![CDATA[SmartPhones]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[78]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[applications]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[1181]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2362";s:5:"score";s:18:"100.77523110530421";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:17:"59.36249694585541";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"849";s:5:"score";s:17:"49.44216868938808";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"789";s:5:"score";s:17:"44.11796324864341";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"223";s:5:"score";s:17:"41.46539810268668";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1454";s:5:"score";s:17:"37.65625708275937";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"33.948528071379755";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"32.17923960471013";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2354";s:5:"score";s:18:"30.550509228564696";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:16:"27.1806844359202";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437832]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:18:"22.584191279500576";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1789";s:5:"score";s:18:"17.174611961079396";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"13.399110574438671";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"13.202733464073114";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"12.250777697999304";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"9.220957175024239";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:3:"849";s:5:"score";s:16:"51.2492980615708";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"789";s:5:"score";s:17:"51.10106578322619";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"223";s:5:"score";s:18:"46.906695828610964";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1454";s:5:"score";s:17:"43.56818301283087";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:18:"38.430914496817294";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2362";s:5:"score";s:18:"37.448569896769804";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1789";s:5:"score";s:16:"27.6218527123983";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"22.26736172752682";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>La souveraineté du Cloud : une problématique importante</title>
		<link>http://www.it-news.fr/souverainete-du-cloud-problematique-importante/</link>
		<pubDate>Mon, 21 Oct 2013 12:49:14 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1207</guid>
		<description></description>
		<content:encoded><![CDATA[<img class="alignleft  wp-image-1191" title="La Nationalité des fournisseurs de services Cloud remise en cause!" alt="la-souverainee-du-cloud-une-problematique-importante" src="http://www.it-news.fr/wp-content/uploads/2013/10/la-souverainee-du-cloud-une-problematique-importante.jpg" width="266" height="189" />
<p style="text-align: justify;">La nationalité des fournisseurs de services Cloud remise en cause!<a href="http://fr.wikipedia.org/wiki/Cloud_computing" target="_blank">
</a></p>
<p style="text-align: justify;">Le principe du service <a href="http://fr.wikipedia.org/wiki/Cloud_computing" target="_blank">Cloud</a> est connu. Le concept est d’externaliser ses données à un tiers. Par conséquent, l’entreprise stocke ses données (confidentielles ou pas) chez un <strong>fournisseur de services Cloud</strong>. Elle doit, par conséquent, accepter de perdre le contrôle total sur ses données et dans le même temps de faire confiance à l’opérateur choisi.</p>
<!--more Lire la suite-->
<p style="text-align: justify;">Mais la question ici, est de savoir si la confiance accordée à votre fournisseur doit s’étendre au gouvernement dont il dépend.</p>

<h2 style="text-align: justify;">Le PRISM dévoile les failles des fournisseurs de services Cloud</h2>
<p style="text-align: justify;">En effet, après les révélations d’Edward Snowden sur le programme de surveillance <a href="http://www.it-news.fr/wp-content/uploads/2013/10/Lorsque-le-cloud-fait-peur-aux-entreprises.jpg"><img class="alignright size-thumbnail wp-image-1152" title="Le PRISM dévoile les failles des fournisseurs de services cloud" alt="Lorsque-le-cloud-fait-peur-aux-entreprises" src="http://www.it-news.fr/wp-content/uploads/2013/10/Lorsque-le-cloud-fait-peur-aux-entreprises-150x150.jpg" width="150" height="150" /></a>«<a href="http://fr.wikipedia.org/wiki/PRISM_(programme_de_surveillance)" target="_blank">PRISM</a>», de nombreuses entreprises, devenues méfiantes, ont décidé de « repenser » leurs services Cloud.</p>
<p style="text-align: justify;">Parce que <a href="http://fr.wikipedia.org/wiki/Edward_Snowden" target="_blank">Snowden </a>prouve - documents à l’appuie - que les entreprises IT américaines avaient un accord avec leur gouvernement acceptant de fournir un accès sur demande aux données détenues dans leurs systèmes, un sentiment de méfiance est né et de nombreuses sociétés ont décidé de changer de <strong>fournisseurs de services Cloud</strong> les mettant face à des complications financières.
Le lieu physique où les données sont stockées et la nature des organisations qui les stockent – deviennent une problématique cruciale pour les DSI.</p>
<p style="text-align: justify;"><a href="http://www.glossaire-international.com/pages/tous-les-termes/risque-commercial.html" target="_blank">Le risque commercial</a> engendré par le simple fait de confier ses données à <strong>des fournisseurs de services Cloud</strong> d’un autre pays est un risque commercial sérieux et dommageable pour la pérennité de l’entreprise. Savoir que ces fournisseurs seront, d’une manière ou d’une autre, dans l’obligation de céder vos données aux gouvernements dont ils sont rattachés est un risque irréversible. Ainsi, la possibilité de choisir l'endroit où les données se trouvent, et même de les transférer d'un pays à un autre, à volonté, est désormais une préoccupation majeure.</p>

<h2 style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/10/Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud.jpg"><img class="size-thumbnail wp-image-1190 alignleft" title="Quelques Conseils pour bien choisir son fournisseur de services Cloud " alt="" src="http://www.it-news.fr/wp-content/uploads/2013/10/Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-150x150.jpg" width="150" height="150" /></a>Quelques Conseils pour bien choisir son fournisseur de services Cloud:</h2>
<p style="text-align: justify;">Voici donc, quelques conseils pour bien choisir son fournisseur de services Cloud.</p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/10/Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-11.jpg"><img class="wp-image-1194 aligncenter" title="Quelques conseils pour bien choisir son fournisseur de services Cloud" alt="Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-1" src="http://www.it-news.fr/wp-content/uploads/2013/10/Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-11.jpg" width="652" height="89" /></a> <a href="http://www.it-news.fr/wp-content/uploads/2013/10/Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-21.jpg"><img class="wp-image-1193 aligncenter" title="Quelques conseils pour bien choisir son fournisseur de services Cloud" alt="Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-2" src="http://www.it-news.fr/wp-content/uploads/2013/10/Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-21.jpg" width="652" height="86" /></a> <a href="http://www.it-news.fr/wp-content/uploads/2013/10/Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-3.jpg"><img class="wp-image-1187 aligncenter" title="Quelques conseils pour bien choisir son fournisseur de services Cloud" alt="Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-3" src="http://www.it-news.fr/wp-content/uploads/2013/10/Quelques-Conseils-pour-bien-choisir-son-fournisseur-de-services-Cloud-3.jpg" width="657" height="365" /></a></p>

<h2 style="text-align: justify;">Comment Aquastar peut vous aider ?</h2>
<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/securite-des-donnees" target="_blank">Solution de chiffrement – Sophos Safe Guard</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/systemes/virtualisation-serveurs/vmware" target="_blank">Solution en virtualisation de serveur – VMWare </a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/systemes/virtualisation-serveurs/windows-server" target="_blank">Solution de virtualisation – Windows Server 2012</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/systemes/virtualisation-serveurs/windows-server" target="_blank">Solution de sauvegarde informatique – CA technologies ARCerve</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1207</wp:post_id>
		<wp:post_date>2013-10-21 13:49:14</wp:post_date>
		<wp:post_date_gmt>2013-10-21 12:49:14</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>souverainete-du-cloud-problematique-importante</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="fournisseurs"><![CDATA[Fournisseurs]]></category>
		<category domain="post_tag" nicename="fournisseurs-de-services-cloud"><![CDATA[fournisseurs de services Cloud]]></category>
		<category domain="category" nicename="reseaux-et-mobilite"><![CDATA[Réseaux et mobilité]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<category domain="post_tag" nicename="services-cloud"><![CDATA[services Cloud]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[75]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[fournisseurs de services Cloud]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[1191]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438023]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"64.88759555293689";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"45.65642804003041";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:17:"40.78235908127751";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"35.540232274551094";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"31.559750169130943";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:17:"22.95575738862933";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"22.157754172973867";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2400";s:5:"score";s:17:"21.49712462495989";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"21.438790513614673";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:18:"20.229822627290357";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"25.427004521073716";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"18.74853892812274";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:18:"18.560361692413153";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:17:"15.21113665978702";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"14.279053240133559";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:17:"14.25195790008248";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"42.28977836067475";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"30.322220795608896";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:18:"28.350159163985218";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1789";s:5:"score";s:16:"24.7897305291501";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"24.092741356537893";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1731";s:5:"score";s:18:"23.760919368233164";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1320";s:5:"score";s:17:"23.68487547396245";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1876";s:5:"score";s:17:"23.36839051896395";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:comment>
			<wp:comment_id>1135</wp:comment_id>
			<wp:comment_author><![CDATA[[BLOCKED BY STBV] La Suisse investit dans le Cloud | L&#039;actualité pour décideurs informatiquesL&#039;actualité pour décideurs informatiques]]></wp:comment_author>
			<wp:comment_author_email></wp:comment_author_email>
			<wp:comment_author_url>http://www.it-news.fr/la-suisse-investit-dans-le-cloud/</wp:comment_author_url>
			<wp:comment_author_IP>37.187.41.26</wp:comment_author_IP>
			<wp:comment_date>2014-01-02 11:25:36</wp:comment_date>
			<wp:comment_date_gmt>2014-01-02 10:25:36</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[[&#8230;] concernée par cette initiative. De plus en plus de pays en Europe ont décidé de fournir un « Cloud souverain ». En France, par exemple, nous avons le Cloudwatt, par Orange et Thales, et le Numergy par SFR et [&#8230;]]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type>pingback</wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
	</item>
	<item>
		<title> La rébellion des jeunes salariés</title>
		<link>http://www.it-news.fr/rebellion-jeunes-salaries/</link>
		<pubDate>Thu, 24 Oct 2013 07:17:13 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1257</guid>
		<description></description>
		<content:encoded><![CDATA[<img class="alignleft size-thumbnail wp-image-1258" title="La rébellion de la génération Y" alt="La-rebellion-de-la-generation-y" src="http://www.it-news.fr/wp-content/uploads/2013/10/La-rebellion-de-la-generation-y-150x150.jpg" width="150" height="150" />
La <a href="http://fr.wikipedia.org/wiki/G%C3%A9n%C3%A9ration_Y" target="_blank">génération Y</a>, ou les jeunes salariés de 21 à 30 ans, se disent prêt à transgresser la politique anti-BOYD de sécurité de leur entreprise. Ils sont aussi nombreux à utiliser des services de Cloud personnels au bureau.<!--more Lire la suite-->

Les opposants du <a href="http://fr.wikipedia.org/wiki/BYOD" target="_blank">BYOD</a> (Bring Your Own Device) auront beaucoup de travail avec leurs jeunes salariés âgés de 21 à 32 ans. Le plus fervent, Patrick Pailloux, patron de l’Agence nationale de la sécurité des systèmes d’information (Anssi), alertait, il y a de cela un an, sur les dangers à autoriser les collaborateurs à utiliser leur propre matériel.
<p style="text-align: justify;"><i>70% des jeunes salariés français interrogés, farouches adeptes du BYOD, se disent prêts à transgresser la politique de leur entreprise si elle interdit les supports personnels. </i></p>
<p style="text-align: justify;">De plus, plus de huit jeunes salariés sur dix, utilisent un service <a href="http://fr.wikipedia.org/wiki/Cloud_Computing" target="_blank">Cloud</a> personnel, contournant ainsi, les règles primaires de la sécurité des services Cloud. La question est de savoir ce qui est stocké sur ces <a href="http://www.it-news.fr/lorsque-cloud-fait-peur-aux-entreprises/" target="_blank">Cloud personnels</a>. Voici les chiffres donnés par Vision Critical :</p>

<ul style="text-align: justify;">
	<li>46% stockent des fichiers sur lesquels ils travaillent présentement</li>
	<li>22%, des documents sensibles de type contrat ou business plan</li>
	<li>33% des données clients</li>
	<li>54% des messages électroniques professionnels</li>
	<li>27% des jeunes collaborateurs s’interdisent de stocker des informations liées à leur activité professionnelle contre 13% dans le monde.</li>
</ul>
<p style="text-align: justify;">Malgré ce constat peu réjouissant, il est rassurant de savoir que 82% des jeunes français interrogés, sont prêts à suivre une formation de sensibilisation aux risques du BYOD.</p>
<p style="text-align: justify;">Les responsables de la sécurité des systèmes d’information (<a href="http://fr.wikipedia.org/wiki/RSSI" target="_blank">RSSI</a>), pourront témoigner de la réalité du BYOD. Plus de 45% de ces jeunes salariés ont été victimes d’une attaque sur leur ordinateur personnel, et un septième sur leur terminal mobile (tablette ou smartphone).</p>
<p style="text-align: justify;">Comment Aquastar Consulting peut vous aider ?</p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls/netasq" target="_blank">Solution de sécurité internet – Netasq</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls/palo-alto" target="_blank">Solution de sécurité internet – Palo Alto Networks</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/securite-des-postes-de-travail/sophos" target="_blank">Solution de sécurité des messageries – Sophos</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/securite-des-donnees" target="_blank">Solution de chiffrement – Sophos Safe Guard</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1257</wp:post_id>
		<wp:post_date>2013-10-24 08:17:13</wp:post_date>
		<wp:post_date_gmt>2013-10-24 07:17:13</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>rebellion-jeunes-salaries</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="byod"><![CDATA[BYOD]]></category>
		<category domain="post_tag" nicename="generation-y"><![CDATA[Génération Y]]></category>
		<category domain="post_tag" nicename="jeunes-salaries"><![CDATA[jeunes salariés]]></category>
		<category domain="category" nicename="non-classe"><![CDATA[Non classé]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[77]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[jeunes salariés]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[1258]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2266";s:5:"score";s:18:"117.74088053154776";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2354";s:5:"score";s:17:"88.90416281040243";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2411";s:5:"score";s:17:"48.30730998841218";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1444";s:5:"score";s:17:"37.79392495414996";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"820";s:5:"score";s:18:"33.752685932465766";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1454";s:5:"score";s:18:"29.862391220516127";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1722";s:5:"score";s:18:"29.662890416602263";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"223";s:5:"score";s:18:"29.435220132886943";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"1794";s:5:"score";s:18:"26.631226007141706";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1933";s:5:"score";s:18:"26.232224399313978";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426436694]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1794";s:5:"score";s:14:"19.44413850412";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1933";s:5:"score";s:17:"17.89775872826842";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"10.640864521618958";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1876";s:5:"score";s:18:"10.276221407784895";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:17:"8.443639944036583";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:17:"6.927795112785043";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2266";s:5:"score";s:17:"66.53059793664869";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1444";s:5:"score";s:17:"43.18489867086702";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"820";s:5:"score";s:17:"39.56457756046383";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1454";s:5:"score";s:17:"35.05887895609605";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2354";s:5:"score";s:17:"34.23465965444238";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1722";s:5:"score";s:17:"34.08951826997801";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"223";s:5:"score";s:18:"33.265298968324345";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1794";s:5:"score";s:18:"32.965542926894294";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>SaaS : pour ou contre ?</title>
		<link>http://www.it-news.fr/saas-contre/</link>
		<pubDate>Thu, 24 Oct 2013 10:30:43 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1262</guid>
		<description></description>
		<content:encoded><![CDATA[<h1 style="text-align: justify;"><a style="font-size: 16px;" href="http://www.it-news.fr/wp-content/uploads/2013/10/saas-pour-ou-contre.jpg"><img class="alignleft size-thumbnail wp-image-1263" title="SaaS: pour ou contre?" alt="saas-pour-ou-contre" src="http://www.it-news.fr/wp-content/uploads/2013/10/saas-pour-ou-contre-150x150.jpg" width="150" height="150" /></a></h1>
<p style="text-align: justify;"><a href="http://fr.wikipedia.org/wiki/Logiciel_en_tant_que_service" target="_blank">Saas</a> – Abréviation pour <b>Software as a Service</b> – est la branche la plus connue du <a href="http://fr.wikipedia.org/wiki/Cloud_computing" target="_blank">Cloud Computing</a>. C'est un modèle de prestation dans lequel les applications sont hébergées et gérées dans le centre de traitement d'un fournisseur de services, payées sur la base d'un abonnement et accessibles par un navigateur via une connexion internet.</p>
<!--more Lire la suite-->
<p style="text-align: justify;">L’expression Saas, est communément employée depuis près d’une décennie, alors que d’autres expressions issues du Cloud Computing le sont moins ; par exemple, <a href="http://fr.wikipedia.org/wiki/PaaS" target="_blank">PaaS</a> – Platform as a Service - ou <a href="http://fr.wikipedia.org/wiki/IaaS" target="_blank">IaaS</a> – infrastructure as a service.</p>

<h2 style="text-align: justify;">Pour le SaaS</h2>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/10/pour-le-saas1.jpg"><img class="alignleft size-full wp-image-1269" title="Pour le SaaS" alt="pour-le-saas" src="http://www.it-news.fr/wp-content/uploads/2013/10/pour-le-saas1.jpg" width="150" height="150" /></a>1-    <b>Réduction des coûts</b> : économique par rapport aux coûts qu’implique la mise en place d’une infrastructure informatique</p>
<p style="text-align: justify;">2-    <b>Évolutivité </b>: rajustez votre abonnement Saas au fur et à mesure de l’évolution de votre entreprise</p>
<p style="text-align: justify;">3-    <b>Accessibilité</b> : il suffit d’un navigateur et d’une connexion internet pour accéder à une application SaaS</p>
<p style="text-align: justify;">4-    <b>Capacité de mise à niveau</b> : votre prestataire de services de cloud computing s'occupe des mises à jour logicielles et matérielles</p>
<p style="text-align: justify;">5-    <b>Résilience</b> : comme votre infrastructure informatique ne se trouve plus dans vos locaux, si votre entreprise devait subir un sinistre quelconque, vous redeviendrez opérationnel dés que vous pourriez connecter votre ordinateur sur Internet</p>

<h2 style="text-align: justify;">Contre le Saas</h2>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/10/contre-le-saas1.jpg"><img class="alignleft size-full wp-image-1270" title="Contre le SaaS" alt="contre-le-saas" src="http://www.it-news.fr/wp-content/uploads/2013/10/contre-le-saas1.jpg" width="150" height="150" /></a>1-    <b><a href="http://www.aquastar-consulting.com/index.php/solutions/securite" target="_blank">Sécurité </a></b>: il est question ici de confier ses données confidentielles à un tiers, il est donc indispensable de faire attention aux points de la gestion des identités et de l’accès, notamment sur les appareils mobiles</p>
<p style="text-align: justify;">2-    <b><a href="http://www.aquastar-consulting.com/index.php/solutions/systemes/pra-pca" target="_blank">Interruption de service </a></b>(lien vers PRA) : les fournisseurs de Cloud auront beau planifier de leur mieux, les interruptions de service sont inévitables, que ce soit à cause d’une catastrophe naturelle, à une erreur humaine ou aux nombreuses causes intermédiaires. Des outils tels qu'<a href="http://www.outageanalyzer.com/" target="_blank">Outage Analyzer</a> de Compuware et <a href="http://www.isitdownrightnow.com/" target="_blank">Is It Down Right Now?</a> vous permettent de surveiller en continu les interruptions de service dans le Cloud.</p>
<p style="text-align: justify;">3-    <b>Conformité</b> : comme vous n’êtes plus gestionnaires de vos données, il peut être difficile de se conformer aux normes et réglementations gouvernementales.</p>
<p style="text-align: justify;">4-   <b>Performances</b> : une application par navigateur hébergée dans un centre de traitements à distance et accessible via une connexion internet peut inquiéter quant aux performances.</p>
<p style="text-align: justify;">5-    <b><a href="http://www.aquastar-consulting.com/index.php/solutions/reseau-mobilite" target="_blank">Mobilité des données </a>:</b>Beaucoup de startups sont spécialisées dans le SaaS. Certaines connaîtront un échec. Lorsque vous choisissez votre fournisseur veillez à avoir une porte de sortie.</p>
<p style="text-align: justify;">6-    <b>Intégration</b> : pour une entreprise qui a plusieurs applications SaaS, la question de l’intégration des logiciels devient un problème.</p>

<h2 style="text-align: justify;">Comment Aquastar Consulting peut vous aider ?</h2>
<p style="text-align: justify;">1-   Solutions de Virtualisation :</p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/systemes/virtualisation-serveurs/vmware" target="_blank">VMware</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/systemes/virtualisation-serveurs/windows-server" target="_blank">Windows Server</a></li>
</ul>
<p style="text-align: justify;">2-   Solution de sécurité :</p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls/netasq" target="_blank">Netasq</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls/palo-alto" target="_blank">Palo Alto Networks</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1262</wp:post_id>
		<wp:post_date>2013-10-24 11:30:43</wp:post_date>
		<wp:post_date_gmt>2013-10-24 10:30:43</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>saas-contre</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="decisionnel"><![CDATA[Décisionnel]]></category>
		<category domain="category" nicename="infrastructures"><![CDATA[Infrastructures]]></category>
		<category domain="category" nicename="reseaux-et-mobilite"><![CDATA[Réseaux et mobilité]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[89]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[saas]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[1263]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"114.42540746907831";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:17:"53.18456985177954";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"48.81075011227782";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"47.90231251068774";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:18:"39.589314032213785";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"37.104927609863665";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2465";s:5:"score";s:17:"35.95210439800204";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:17:"32.12940933330814";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2319";s:5:"score";s:18:"31.443447971730684";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"29.72652309722637";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426436580]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"43.56861115593064";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:17:"26.90149640448494";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"23.70628949448739";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"22.38227561510172";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"16.29121613416115";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:18:"15.611865989416494";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"73.77325759881154";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:18:"40.528127454137795";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"36.38375972565736";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"35.38991428862336";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:17:"32.14619342359805";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1320";s:5:"score";s:18:"29.456850904862584";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1786";s:5:"score";s:18:"26.125700098178932";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:18:"25.641556799407116";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:comment>
			<wp:comment_id>1144</wp:comment_id>
			<wp:comment_author><![CDATA[[BLOCKED BY STBV] Le Cloud en 2014 trouve enfin sa place en France. | L&#039;actualité pour décideurs informatiquesL&#039;actualité pour décideurs informatiques]]></wp:comment_author>
			<wp:comment_author_email></wp:comment_author_email>
			<wp:comment_author_url>http://www.it-news.fr/le-cloud-en-2014-trouve-enfin-sa-place-en-france/</wp:comment_author_url>
			<wp:comment_author_IP>37.187.41.26</wp:comment_author_IP>
			<wp:comment_date>2014-02-13 10:01:34</wp:comment_date>
			<wp:comment_date_gmt>2014-02-13 09:01:34</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[[&#8230;] étude constate que 63% d’entre elles utilisent déjà un ou plusieurs services en Cloud, augmentation de 15% par rapport à [&#8230;]]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type>pingback</wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
	</item>
	<item>
		<title>Changement du taux de TVA au 1er Janvier 2014</title>
		<link>http://www.it-news.fr/modification-taux-tva-au-1-janvier-2014/</link>
		<pubDate>Tue, 05 Nov 2013 09:00:29 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1273</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a style="font-size: 16px;" href="http://www.it-news.fr/wp-content/uploads/2013/10/Changement-du-taux-de-TVA.jpg"><img class="alignleft size-thumbnail wp-image-1309" title="Modification des taux de TVA au 1er Janvier 2014" alt="Changement du taux de TVA" src="http://www.it-news.fr/wp-content/uploads/2013/10/Changement-du-taux-de-TVA-150x150.jpg" width="150" height="150" /></a><span style="font-size: 16px;">Au premier 1er janvier 2014, les taux de TVA appliqués en France augmentent. </span></p>
<p style="text-align: justify;">Cette mesure permet de financer le crédit d’impôt compétitivité (CICE) .</p>
<!--more Lire la suite-->
<ul style="text-align: justify;">
	<li>Le Taux de 19,6% augmente à 20%</li>
	<li>Le Taux de 7% augmente à 10%</li>
	<li>Le Taux réduit, en l’état actuel des débats, reste inchangé</li>
	<li><span style="font-size: 16px;">Certains taux spécifiques évoluent également</span></li>
</ul>
<p style="text-align: justify;">Cette évolution entraîne de multiples conséquences techniques dans vos outils comptables et de facturation :</p>

<ul>
	<li>
<div style="text-align: justify;"><strong>Impacts sur la facturation :</strong> l’ensemble des affaires en cours (Devis, commandes, livraisons non facturées) enregistrées au taux actuel de TVA devra être modifié dans le cadre d’une facturation après le 1e janvier 2014.</div></li>
</ul>
<ul>
	<li>
<div style="text-align: justify;"><strong>Impacts sur la comptabilité :</strong> une gestion simultanée des anciens et nouveaux taux sera nécessaire durant la période de liquidation des opérations. Cette double gestion sera d’autant plus délicate que votre entreprise est soumise à la TVA aux encaissements. Par ailleurs, la loi ne précise pas encore les traitements spécifiques tel que la TVA sur les acomptes.</div></li>
</ul>
<p style="text-align: justify;">Afin de vous préparer à cette échéance technique, et d’aborder le mois de Janvier en toute sérénité, Aquastar Consulting vous propose :</p>

<ul>
	<li>
<div style="text-align: justify;">Une analyse de votre système de gestion Sage en rapport à cette échéance, <a href="mailto:polegestion@aquastar-consulting.com?subject=Je%20souhaite%20planifier%20une%20analyse%20de%20ma%20solution%20de%20gestion" target="_blank">Cliquez ici.</a></div></li>
	<li>
<div style="text-align: justify;">Des forfaits spécifiques d’assistance à la mise en œuvre du changement de taux, <a href="mailto:polegestion@aquastar-consulting.com?subject=Je%20souhaite%20profiter%20des%20forfaits%20specifiques" target="_blank">Cliquez ici.</a></div></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1273</wp:post_id>
		<wp:post_date>2013-11-05 10:00:29</wp:post_date>
		<wp:post_date_gmt>2013-11-05 09:00:29</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>modification-taux-tva-au-1-janvier-2014</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="solutions-de-gestion"><![CDATA[Solutions de gestion]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[77]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[TVA]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[1276]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_post_restored_from</wp:meta_key>
			<wp:meta_value><![CDATA[a:3:{s:20:"restored_revision_id";i:1280;s:16:"restored_by_user";i:1;s:13:"restored_time";i:1383233834;}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"68.70188633060505";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"38.874107952216285";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:18:"30.279152437347783";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:18:"30.210652124233892";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:17:"30.17291621072777";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"27.494913020702512";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2371";s:5:"score";s:18:"27.404118516591872";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:18:"26.584231885841234";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"25.046951838069575";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"25.046951838069575";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438535]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"26.73032160418972";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:18:"17.101203462875507";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"16.84414006515487";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:17:"14.70931900418007";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"13.407283673178684";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:18:"13.368399723182003";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"44.706443725578005";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1868";s:5:"score";s:17:"32.39233717581858";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:17:"30.49261540487744";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"26.294229377217768";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:18:"24.560070799470296";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"334";s:5:"score";s:17:"24.03297381382353";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:18:"22.110949943714797";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:18:"21.051244459698673";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:12:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"68.64754055191995";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"38.48358854824006";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:18:"30.041517067820518";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:18:"29.915921279496764";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:17:"29.88949349255919";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"27.218681278380217";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2371";s:5:"score";s:18:"27.136598977969356";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:18:"26.295624687378172";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"24.74639970479629";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"24.74639970479629";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:4:"1868";s:5:"score";s:18:"21.309377166231634";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:18:"21.137355068164158";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:comment>
			<wp:comment_id>1120</wp:comment_id>
			<wp:comment_author><![CDATA[Bruno]]></wp:comment_author>
			<wp:comment_author_email>contact@rethel-web.fr</wp:comment_author_email>
			<wp:comment_author_url>http://rdinews.com</wp:comment_author_url>
			<wp:comment_author_IP>77.198.99.105</wp:comment_author_IP>
			<wp:comment_date>2013-11-25 14:31:56</wp:comment_date>
			<wp:comment_date_gmt>2013-11-25 13:31:56</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[Bonjour,

Le pire n'est pas que les taux passent de 7 à 10% ou de 19,6 à 20%, mais bien que le gouvernement actuel en a profité pour passer nombre de taux de 7 à 20%, comme pour tout ce qui concerne l'animalerie par exemple.
C'est vrai que c'est devenu un luxe en France que de vouloir se remonter un peu le moral en "élevant" quelques poissons rouges ou un hamster!
Malheureusement trop peu de français le savent et penseront au premier janvier que leur animalerie préférée a profité du premier janvier et de la hausse de la TVA pour elle-même augmenter ses tarifs!

Amicalement,

Bruno]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type></wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
			<wp:commentmeta>
				<wp:meta_key>akismet_result</wp:meta_key>
				<wp:meta_value><![CDATA[false]]></wp:meta_value>
			</wp:commentmeta>
			<wp:commentmeta>
				<wp:meta_key>akismet_history</wp:meta_key>
				<wp:meta_value><![CDATA[a:4:{s:4:"time";d:1385386316.7908521;s:7:"message";s:47:"Akismet a revérifié et validé ce commentaire";s:5:"event";s:9:"check-ham";s:4:"user";s:0:"";}]]></wp:meta_value>
			</wp:commentmeta>
			<wp:commentmeta>
				<wp:meta_key>akismet_as_submitted</wp:meta_key>
				<wp:meta_value><![CDATA[a:61:{s:15:"comment_post_ID";i:1273;s:14:"comment_author";s:5:"Bruno";s:20:"comment_author_email";s:21:"contact@rethel-web.fr";s:18:"comment_author_url";s:18:"http://rdinews.com";s:15:"comment_content";s:606:"Bonjour,

Le pire n'est pas que les taux passent de 7 à 10% ou de 19,6 à 20%, mais bien que le gouvernement actuel en a profité pour passer nombre de taux de 7 à 20%, comme pour tout ce qui concerne l'animalerie par exemple.
C'est vrai que c'est devenu un luxe en France que de vouloir se remonter un peu le moral en "élevant" quelques poissons rouges ou un hamster!
Malheureusement trop peu de français le savent et penseront au premier janvier que leur animalerie préférée a profité du premier janvier et de la hausse de la TVA pour elle-même augmenter ses tarifs!

Amicalement,

Bruno";s:12:"comment_type";s:0:"";s:14:"comment_parent";i:0;s:7:"user_ID";i:0;s:7:"user_ip";s:13:"77.198.99.105";s:10:"user_agent";s:101:"Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.57 Safari/537.36";s:8:"referrer";s:62:"http://www.it-news.fr/modification-taux-tva-au-1-janvier-2014/";s:4:"blog";s:21:"http://www.it-news.fr";s:9:"blog_lang";s:5:"fr_FR";s:12:"blog_charset";s:5:"UTF-8";s:9:"permalink";s:62:"http://www.it-news.fr/modification-taux-tva-au-1-janvier-2014/";s:21:"akismet_comment_nonce";s:6:"passed";s:11:"POST_author";s:5:"Bruno";s:10:"POST_email";s:21:"contact@rethel-web.fr";s:8:"POST_url";s:18:"http://rdinews.com";s:16:"POST_si_code_com";s:16:"JVklg8mT3iSsft81";s:17:"POST_captcha_code";s:4:"DR9R";s:12:"POST_comment";s:606:"Bonjour,

Le pire n'est pas que les taux passent de 7 à 10% ou de 19,6 à 20%, mais bien que le gouvernement actuel en a profité pour passer nombre de taux de 7 à 20%, comme pour tout ce qui concerne l'animalerie par exemple.
C'est vrai que c'est devenu un luxe en France que de vouloir se remonter un peu le moral en "élevant" quelques poissons rouges ou un hamster!
Malheureusement trop peu de français le savent et penseront au premier janvier que leur animalerie préférée a profité du premier janvier et de la hausse de la TVA pour elle-même augmenter ses tarifs!

Amicalement,

Bruno";s:11:"POST_submit";s:22:"Laisser un commentaire";s:20:"POST_comment_post_ID";s:4:"1273";s:19:"POST_comment_parent";s:1:"0";s:26:"POST_akismet_comment_nonce";s:10:"0bff0e1556";s:14:"POST_eventDate";s:0:"";s:18:"POST_bb2_screener_";s:24:"1385386056 77.198.99.105";s:15:"SERVER_SOFTWARE";s:22:"Apache/2.2.22 (Ubuntu)";s:11:"REQUEST_URI";s:21:"/wp-comments-post.php";s:8:"W3TC_ENC";s:5:"_gzip";s:9:"HTTP_HOST";s:14:"www.it-news.fr";s:15:"HTTP_CONNECTION";s:10:"keep-alive";s:14:"CONTENT_LENGTH";s:3:"992";s:18:"HTTP_CACHE_CONTROL";s:9:"max-age=0";s:11:"HTTP_ACCEPT";s:74:"text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8";s:11:"HTTP_ORIGIN";s:21:"http://www.it-news.fr";s:15:"HTTP_USER_AGENT";s:101:"Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.57 Safari/537.36";s:12:"CONTENT_TYPE";s:33:"application/x-www-form-urlencoded";s:12:"HTTP_REFERER";s:62:"http://www.it-news.fr/modification-taux-tva-au-1-janvier-2014/";s:20:"HTTP_ACCEPT_ENCODING";s:17:"gzip,deflate,sdch";s:20:"HTTP_ACCEPT_LANGUAGE";s:35:"fr-FR,fr;q=0.8,en-US;q=0.6,en;q=0.4";s:11:"HTTP_COOKIE";s:0:"";s:4:"PATH";s:28:"/usr/local/bin:/usr/bin:/bin";s:16:"SERVER_SIGNATURE";s:75:"<address>Apache/2.2.22 (Ubuntu) Server at www.it-news.fr Port 80</address>
";s:11:"SERVER_NAME";s:14:"www.it-news.fr";s:11:"SERVER_ADDR";s:12:"37.187.41.26";s:11:"SERVER_PORT";s:2:"80";s:11:"REMOTE_ADDR";s:13:"77.198.99.105";s:13:"DOCUMENT_ROOT";s:18:"/home/it-news/www/";s:12:"SERVER_ADMIN";s:18:"[no address given]";s:15:"SCRIPT_FILENAME";s:38:"/home/it-news/www/wp-comments-post.php";s:11:"REMOTE_PORT";s:4:"1989";s:17:"GATEWAY_INTERFACE";s:7:"CGI/1.1";s:15:"SERVER_PROTOCOL";s:8:"HTTP/1.1";s:14:"REQUEST_METHOD";s:4:"POST";s:12:"QUERY_STRING";s:0:"";s:11:"SCRIPT_NAME";s:21:"/wp-comments-post.php";s:8:"PHP_SELF";s:21:"/wp-comments-post.php";s:12:"REQUEST_TIME";s:10:"1385386315";s:25:"comment_post_modified_gmt";s:19:"2013-11-05 13:47:45";}]]></wp:meta_value>
			</wp:commentmeta>
			<wp:commentmeta>
				<wp:meta_key>akismet_history</wp:meta_key>
				<wp:meta_value><![CDATA[a:4:{s:4:"time";d:1385386401.6281481;s:7:"message";s:55:"aquastar a changé le statut du commentaire en approved";s:5:"event";s:15:"status-approved";s:4:"user";s:8:"aquastar";}]]></wp:meta_value>
			</wp:commentmeta>
		</wp:comment>
	</item>
	<item>
		<title>Lorsque la France est aussi une « victime » de la NSA</title>
		<link>http://www.it-news.fr/lorsque-france-victime-nsa/</link>
		<pubDate>Mon, 28 Oct 2013 08:00:22 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1283</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><span style="font-size: 16px;"><a href="http://www.it-news.fr/wp-content/uploads/2013/10/lorsque-la-France-est-aussi-une-victime-de-la-nsa.jpg"><img class="alignleft size-thumbnail wp-image-1286" title="Lorsque la France est aussi une victime de la NSA" alt="lorsque-la-France-est-aussi-une-victime-de-la-nsa" src="http://www.it-news.fr/wp-content/uploads/2013/10/lorsque-la-France-est-aussi-une-victime-de-la-nsa-150x150.jpg" width="150" height="150" /></a>Le journal Le Monde est celui qui a expliqué comment l’agence américaine NSA à écouter les conversations téléphoniques des français et a espionné de grands groupes.</span></p>
<p style="text-align: justify;">L’amitié diplomatique qu’entretient la France avec les Etats-Unis, n’a pas suffi pour empêcher les antennes de la NSA de s’infiltrer dans les systèmes de communications et informatiques de citoyens et entreprises français.</p>
<!--more Lire la suite-->
<p style="text-align: justify;">Selon les fuites de <a href="https://www.google.fr/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=4&amp;cad=rja&amp;ved=0CD8QFjAD&amp;url=http%3A%2F%2Ffr.wikipedia.org%2Fwiki%2FEdward_Snowden&amp;ei=8vFnUtXsEYSp0QXtvoHwDA&amp;usg=AFQjCNHsGkIf1MemI1DGG0coIPDxiuZaWg&amp;sig2=Z3bZqGdiC60wERfIU18LDQ&amp;bvm=bv.55123115,d.d2k" target="_blank">Snowden</a>, le quotidien dévoile un graphique de la NSA où une moyenne d’interceptions de 3 millions de données par jour avec des pointes de presque 7 millions les 24 décembre 2012 et 7 Janvier 2013.</p>
<p style="text-align: justify;">"<i>Les documents donnent suffisamment d'explications pour penser que les cibles de la NSA concernent aussi bien des personnes suspectées de liens avec des activités terroristes que des individus visés pour leur simple appartenance au monde des affaires, de la politique ou à l'administration française</i>", souligne le journal.</p>
<p style="text-align: justify;">Des grands groupes ont également été visés. "<i>Au détour d'une liste de 35 exemples d'adresses choisies pour montrer l'intérêt de cette recherche élargie, on découvre ainsi que la NSA s'est intéressée de très près, du 1er au 31 janvier 2013, à tout ce qui est lié à wanadoo.fr (ancienne marque Internet d'Orange) et </i><i><a href="https://www.google.fr/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=5&amp;cad=rja&amp;sqi=2&amp;ved=0CEIQFjAE&amp;url=http%3A%2F%2Fwww.lesechos.fr%2Fentreprises-secteurs%2Fauto-transport%2Factu%2F0203080345231-pourquoi-espionner-alcatel-lucent-620669.php&amp;ei=fvVoUsGxB-So0QWTwoD4AQ&amp;usg=AFQjCNFjlXH6iD1FSs0wmsdjnrn0G1bPzQ&amp;sig2=j90p2hs0UBTxWrxJ1cJ80Q&amp;bvm=bv.55123115,d.d2k" target="_blank">alcatel-lucent.com</a></i>", peut-on lire.</p>
<p style="text-align: justify;"><a href="https://www.google.fr/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=1&amp;cad=rja&amp;ved=0CDQQqQIwAA&amp;url=http%3A%2F%2Fwww.huffingtonpost.fr%2F2013%2F10%2F21%2Fnsa-manuel-valls-revelations-choquantes_n_4134447.html&amp;ei=MvVoUoDYHOmu0AWx5oCwAw&amp;usg=AFQjCNExeeweCy4V1vOfcvaBtnz8zOX_zA&amp;sig2=XLeIsvuBlEOnw6qud73X-g&amp;bvm=bv.55123115,d.d2k" target="_blank">Manuel Valls</a>, ministre de l’intérieur, a nommé ces révélations « <i>choquantes</i> » et a appelé les autorités américaines à s’expliquer immédiatement.</p>
<p style="text-align: justify;"><a href="https://www.google.fr/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=1&amp;cad=rja&amp;ved=0CDQQqQIwAA&amp;url=http%3A%2F%2Fwww.france24.com%2Ffr%2F20131021-france-diplomatie-etats-unis-nsa-ecoutes-ambassadeur-americain-convoque-fabius&amp;ei=W_VoUpvfN6mq0QXr_YG4Bg&amp;usg=AFQjCNHe_w1uyy6iWfRosgTqmbODyLufNQ&amp;sig2=3G_l5zc06krsyj41veQjog&amp;bvm=bv.55123115,d.d2k" target="_blank">Laurent Fabius</a>, ministre des affaires étrangères, a déclaré avoir convoqué immédiatement l’ambassadeur des Etats-Unis à Paris. "<i>Ce type de pratiques entre partenaires qui portent atteinte à la vie privée est totalement inacceptable. Il faut s'assurer, très rapidement, qu'en tout cas elles ne sont plus pratiquées"</i>, a ajouté Laurent Fabius devant la presse.</p>
<p style="text-align: justify;">Comment Aquastar Consulting peut vous aider ?</p>
<p style="text-align: justify;">-      <a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls/palo-alto" target="_blank">Solutions de sécurité internet - Palo Alto Networks</a></p>
<p style="text-align: justify;">-      <a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls/netasq" target="_blank">Solutions de sécurité internet - Netasq</a></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1283</wp:post_id>
		<wp:post_date>2013-10-28 09:00:22</wp:post_date>
		<wp:post_date_gmt>2013-10-28 08:00:22</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>lorsque-france-victime-nsa</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="reseaux-et-mobilite"><![CDATA[Réseaux et mobilité]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[81]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[nsa]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[1286]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"42.44067754888432";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"39.440210880024964";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"36.538824688789155";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:17:"34.32650050193668";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"33.598452268236336";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:17:"33.47198846714388";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2330";s:5:"score";s:18:"32.145612292297926";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:18:"30.566471467970796";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"1776";s:5:"score";s:17:"30.10238795112762";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2400";s:5:"score";s:18:"28.900846442971933";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426436780]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"17.73430708986635";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1955";s:5:"score";s:18:"16.342158158274444";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:17:"15.85286601497514";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"15.120058521499544";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"14.911786971755095";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1940";s:5:"score";s:17:"14.28482153362383";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1776";s:5:"score";s:17:"37.01642371216277";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1789";s:5:"score";s:18:"35.447891742578754";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:16:"28.9399083813848";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"26.394434223375704";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1955";s:5:"score";s:18:"25.592542387714104";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:17:"23.19079125839806";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:17:"22.92522289946382";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"22.664302072460053";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Adobe: Les véritables conséquences de la cyberattaque</title>
		<link>http://www.it-news.fr/adobe-les-veritables-consequences-de-la-cyberattaque/</link>
		<pubDate>Thu, 31 Oct 2013 09:58:02 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1305</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;"><a href="http://www.it-news.fr/wp-content/uploads/2013/10/adobe-a-ete-cyberattaque.jpg"><img class="alignleft size-thumbnail wp-image-1173" title="Adobe: Les véritables conséquences de la cyberattaque" alt="adobe-a-ete-cyberattaque" src="http://www.it-news.fr/wp-content/uploads/2013/10/adobe-a-ete-cyberattaque-150x150.jpg" width="150" height="150" /></a>Nous avions parlé, début Octobre, du <a href="http://www.it-news.fr/adobe-ete-cyberattaque/" target="_blank">cyber vol chez l’éditeur Adobe</a>. Le directeur de la sécurité Adobe avait alors déclaré être victime d’une cyberattaque. Il avait aussi déclaré que 2.9 millions de comptes clients étaient compromis et que les codes sources d’<a href="http://www.google.fr/aclk?sa=L&amp;ai=ClA0hPShyUoPKM5OR0wX42ICACN_UhsUE34_SgWf8mI0GCAAQAVCJ46jJ______8BYPvhhYOcCsgBAaoEH0_QmQ7YAVSgxoYVMzSS-vnLAO7_897Zl58N228iU1-4BgGAB7fN9g-QBwI&amp;sig=AOD64_0H7_HXTatW0rZOvuCtq3SnHgog7Q&amp;rct=j&amp;q=Acrobat&amp;ved=0CDQQ0Qw&amp;adurl=http://pixel.everesttech.net/3085/cq%3Fev_sid%3D3%26ev_ln%3Dacrobat%26ev_crx%3D27576043263%26ev_mt%3De%26ev_n%3Dg%26ev_ltx%3D%26ev_pl%3D%26ev_pos%3D1t1%26ev_dvc%3Dc%26ev_dvm%3D%26url%3D!http://www.adobe.com/fr/products/acrobat.html%3Fsdid%3DKARFC%26skwcid%3DTC%7C22629%7Cacrobat%7C%7CS%7Ce%7C27576043263" target="_blank">Acrobat</a> et de <a href="https://www.google.fr/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=2&amp;cad=rja&amp;sqi=2&amp;ved=0CDgQFjAB&amp;url=http%3A%2F%2Fwww.adobe.com%2Ffr%2Fproducts%2Fcoldfusion-family.html&amp;ei=XihyUoT_EIrM0QWjz4DoDg&amp;usg=AFQjCNEVaCIeewdSDfEnbJ2uyCWzZs2oZw&amp;sig2=sGXeXa6fZMYQWLc--YhnHg&amp;bvm=bv.55819444,d.d2k" target="_blank">ColdFusion </a>avaient été volés. </span></p>
<!--more Lire la suite-->

<span style="font-size: 16px;">Or, Brian Krebs, spécialiste de la sécurité affirme sur <a href="http://krebsonsecurity.com/" target="_blank">son blog</a>, le 29 Octobre, que les dégâts seraient bien plus importants. </span>
<p style="text-align: justify;"><span style="font-size: 16px;">Selon Krebs, le vol aurait exposé des dizaines de millions de comptes. L’éditeur d’Adobe a d’ailleurs indiqué au bloggeur, que les pirates ont eu accès à environs 38 millions de comptes d’utilisateurs actifs. Bien loin, en effet des 2.9 millions annoncé. Et ce n’est pas tout, un fichier comportant les données de 150 millions d’utilisateurs aurait fait une apparition éphémère sur le site <a href="http://www.anonnews.org/" target="_blank">AnonNews.org</a>. </span></p>
<p style="text-align: justify;"><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;">Et ce n’est pas fini. Sur ce même site internet, un fichier qui contiendrait le code source de Photoshop aurait également fait son apparition. Interrogé à ce propos, l’éditeur a admis que les pirates avaient probablement « mis la main sur une partie du code source de son logiciel de retouche d’image ».</span></p>
<p style="text-align: justify;"><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;">Comment Aquastar Consulting peut vous aider ? </span></p>
<p style="text-align: justify;"><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;">•<a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls/palo-alto" target="_blank"> Solution de sécurité internet : Palo alto Network</a></span></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1305</wp:post_id>
		<wp:post_date>2013-10-31 10:58:02</wp:post_date>
		<wp:post_date_gmt>2013-10-31 09:58:02</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>adobe-les-veritables-consequences-de-la-cyberattaque</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="infrastructures"><![CDATA[Infrastructures]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[78]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[cyber]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"53.93713742511064";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"28.095238292398875";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:18:"26.404558230433267";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1571";s:5:"score";s:18:"23.283988918728074";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1480";s:5:"score";s:18:"22.546643110236406";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1454";s:5:"score";s:17:"21.67084234123529";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1236";s:5:"score";s:16:"20.7189427235572";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"20.298982761648613";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2330";s:5:"score";s:18:"18.405574427574813";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1320";s:5:"score";s:18:"17.325125187950697";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438448]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:18:"16.750321310358633";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"16.670881728736816";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1955";s:5:"score";s:18:"12.006698795442372";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1924";s:5:"score";s:18:"12.006698795442372";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:18:"11.862057472391646";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1876";s:5:"score";s:18:"11.642055681683921";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:18:"30.515712327104474";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"30.360500309818963";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1571";s:5:"score";s:18:"24.905372824615647";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1480";s:5:"score";s:17:"23.33454022995107";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1454";s:5:"score";s:18:"22.592412867262123";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1741";s:5:"score";s:17:"20.53039003004104";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1236";s:5:"score";s:18:"20.447051546284943";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1391";s:5:"score";s:17:"20.22761688630774";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1830]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:12:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"53.63062382621496";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:17:"27.95396845920485";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:17:"26.26217277262879";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1571";s:5:"score";s:17:"23.19771535735847";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1480";s:5:"score";s:18:"22.459617491618104";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1454";s:5:"score";s:18:"21.590288965914688";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1236";s:5:"score";s:17:"20.64250856889262";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"20.209446011460894";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2330";s:5:"score";s:18:"18.258566069000757";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1320";s:5:"score";s:17:"17.23566749215755";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:4:"1391";s:5:"score";s:18:"16.683149903984273";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"1741";s:5:"score";s:18:"16.492265338567954";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Cloud Computing et la réversibilité : 1ère décision judiciaire</title>
		<link>http://www.it-news.fr/cloud-computing-et-la-reversibilite-1ere-decision-judiciaire/</link>
		<pubDate>Thu, 31 Oct 2013 13:00:19 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1320</guid>
		<description></description>
		<content:encoded><![CDATA[<a href="http://www.it-news.fr/wp-content/uploads/2013/10/cloud-computing-reversibilite.jpg"><img class="alignleft size-full wp-image-1323" title="Cloud Computing et la réversibilité: 1ère décision judiciaire" alt="cloud-computing-reversibilite" src="http://www.it-news.fr/wp-content/uploads/2013/10/cloud-computing-reversibilite.jpg" width="150" height="150" /></a>Oracle mis sur le banc de touche par une décision judiciaire sur la réversibilité des données
<p style="text-align: justify;"><span style="font-size: 16px;"><a href="https://www.google.fr/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=4&amp;cad=rja&amp;ved=0CD8QFjAD&amp;url=http%3A%2F%2Fwww.u-m-p.org%2F&amp;ei=ADVyUtKUEoer0QWDlYHQCw&amp;usg=AFQjCNHF_jzwZhfU8AKBQnCzdGQ7lwggCA&amp;sig2=qR7z9HgjxyF_xkwEHYX3KQ&amp;bvm=bv.55819444,d.d2k" target="_blank">L’UMP</a>, le parti de droite français et client d’Oracle, ayant choisie l’offre «</span><a href="https://www.google.fr/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=1&amp;cad=rja&amp;ved=0CEsQFjAA&amp;url=http%3A%2F%2Fwww.oracle.com%2Ffr%2Fproducts%2Fapplications%2Fcrmondemand%2F&amp;ei=MjVyUta_Humj0QXu8IDQAQ&amp;usg=AFQjCNGRG_VKJrfpMHwAs4yalfgwswO36Q&amp;sig2=zPT9fdCuNP2cqBsAWiQwug&amp;bvm=bv.55819444,d.d2k" target="_blank"><i style="font-size: 16px;">Oracle CRM on Demand</i></a><span style="font-size: 16px;"> »   voulait changer de prestataire de Service Cloud. Pour ce faire, il doit récupérer ses données dans un format standard pour ensuite les basculer chez le nouveau prestataire.</span></p>
<!--more Lire la suite-->
<p style="text-align: justify;">Seulement, <a href="https://www.google.fr/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=1&amp;cad=rja&amp;sqi=2&amp;ved=0CDAQFjAA&amp;url=http%3A%2F%2Fwww.oracle.com%2Ffr%2F&amp;ei=FDVyUpOnL-aK0AWUkYHYAQ&amp;usg=AFQjCNGXqBCyEnQqeO14O38AJTubTYjfxg&amp;sig2=g4WHjpemwhmIkUYMR4Q8vQ&amp;bvm=bv.55819444,d.d2k" target="_blank">Oracle </a>fait fasse à un « <i>bug de la 20<sup>ème</sup> version de l’application Oracle CRM on Demand</i> » et par conséquent la fonction qui permet d’exporter des données est défaillante.</p>
<p style="text-align: justify;">Le résultat est qu’Oracle ne peut permettre à son ex-client de procéder à l’extraction de ses donnés. Le client, fait donc fasse à deux problématiques :</p>
<p style="text-align: justify;">1-    L’échéance de son contrat qui se termine</p>
<p style="text-align: justify;">2-    L'impossibilité de déporter le service chez un autre professionnel.</p>
<p style="text-align: justify;">La question est de savoir si dans le contrat  il est spécifié, dans le cas d’un bug informatique, le délai de réparation d’une telle défaillance. La réponse est non.</p>

<h2 style="text-align: justify;">UMP passe à l’action</h2>
<p style="text-align: justify;">Voyant ces options diminuées, le client lésé décide de poursuivre son éditeur, Oracle, en justice, afin d’obtenir réparation.</p>
<p style="text-align: justify;">Cette action judiciaire est unique et ce pour quatre raisons :</p>
<p style="text-align: justify;">1-    <b>Rapidité de la décision</b> : Le parti politique a mis en demeure son éditeur le 2 Novembre 2012 et l’ordonnance du juge date du 30 Novembre 2012</p>
<p style="text-align: justify;">2-    <b>La problématique soumise</b> : le magistrat a rendu son ordonnance en retenant les enjeux du débat qui lui était soumis. Ici la problématique concernait la réversibilité. La réversibilité fait souvent l’objet d’une clause insérée au contrat de prestations de services voire d’une convention dédiée, à côté du contrat de prestations de services. Or, dans notre cas, aucune des parties ne s’est prémunie d’une clause ayant pour objet la réversibilité.</p>
<p style="text-align: justify;">3-    <b>La réponse à la problématique </b>: Le juge impose donc cette réversibilité en lui insérant une forte amende de 5.000€ par jour de retard. Ce que cette décision donne c’est l’espoir aux clients de prestataires de services Cloud qui se croient dépourvus de solutions au moment où ils demandent la réversibilité pour rejoindre un concurrent.</p>
<p style="text-align: justify;">4-    <b>Des progrès dans le monde IT </b>: Le magistrat a su répondre correctement à cette problématique parce qu’il a compris ce qu’était le Cloud Computing, ses enjeux et ses risques.</p>

<h2 style="text-align: justify;">La décision du magistrat par rapport à la réversibilité</h2>
<p style="text-align: justify;"><i>« La société Oracle ne peut soutenir de bonne foi qu’elle ne manquerait pas à ses obligations contractuelles si elle ne permettait pas à l’UMP de bénéficier en temps utile de ses données pour permettre à son nouveau prestataire de les exploiter et d’être opérationnel dès la fin de sa propre prestation. »</i></p>
<p style="text-align: justify;">Cette <a href="http://www.legalis.net/spip.php?page=jurisprudence-decision&amp;id_article=3794" target="_blank">ordonnance</a>, datée du 30 Novembre 2012, montre une volonté de comprendre les enjeux du Cloud Computing et de l’informatique et d’évaluer ses conséquences dans toutes les sphères de notre société.</p>

<h2 style="text-align: justify;">Comment Aquastar Consulting peut vous aider ?</h2>
<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/systemes/virtualisation-serveurs" target="_blank">Solution en virtualisation : VMware et Windows Server</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/systemes/sauvegarde" target="_blank">Solution de Sauvegarde Informatique : CA technologies ARCserve</a></li>
</ul>
<p style="text-align: justify;"></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1320</wp:post_id>
		<wp:post_date>2013-10-31 14:00:19</wp:post_date>
		<wp:post_date_gmt>2013-10-31 13:00:19</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cloud-computing-et-la-reversibilite-1ere-decision-judiciaire</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="infrastructures"><![CDATA[Infrastructures]]></category>
		<category domain="category" nicename="reseaux-et-mobilite"><![CDATA[Réseaux et mobilité]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[77]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[réversibilité]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"94.73768235509554";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"56.605907155856805";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:16:"44.2211504396905";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:17:"28.66283283327985";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:17:"28.53593809960421";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1262";s:5:"score";s:17:"26.76531067094667";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"25.159629757275383";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:18:"24.956099562507724";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:17:"22.73393469716323";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2400";s:5:"score";s:17:"21.49712462495989";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1424447679]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"30.666358149112916";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:16:"20.0493611981831";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"11.022940668084743";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"10.082397217255943";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:17:"9.707443981040079";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:17:"9.200669326905565";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"54.99038479767827";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:16:"34.7773239329916";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1262";s:5:"score";s:18:"29.456850904862584";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:18:"28.525571117345187";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:17:"27.79402786250311";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1207";s:5:"score";s:17:"23.68487547396245";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"133";s:5:"score";s:18:"23.391663171279617";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1789";s:5:"score";s:18:"20.102153150029466";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Espionnage de la NSA : Un autre programme révélé - Muscular   </title>
		<link>http://www.it-news.fr/espionnage-de-la-nsa-un-nouveau-programme-revele-muscular/</link>
		<pubDate>Wed, 06 Nov 2013 08:00:13 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1391</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><span style="font-size: 16px;"><a href="http://www.it-news.fr/wp-content/uploads/2013/11/muscular-espionnage-nsa.jpg"><img class="alignleft size-full wp-image-1524" alt="muscular-espionnage-nsa" src="http://www.it-news.fr/wp-content/uploads/2013/11/muscular-espionnage-nsa.jpg" width="250" height="200" /></a>Il y avait </span><a style="font-size: 16px;" href="http://fr.wikipedia.org/wiki/PRISM_(programme_de_surveillance)" target="_blank">PRISM</a><span style="font-size: 16px;">, puis </span><a style="font-size: 16px;" href="http://fr.wikipedia.org/wiki/XKeyscore" target="_blank">XKeyscore</a><span style="font-size: 16px;">. Maintenant, voici Muscular.</span></p>
<p style="text-align: justify;">Parce qu’on s’y perd entre tous ces programmes, voici un récapitulatif de tous ceux révélés par Edouard Snowden.</p>
<p style="text-align: right;"><!--more Lire la suite-->
</p><p style="text-align: justify;"><b>Prism</b> est un programme de surveillance électronique qui cible des personnes vivant hors des Etats-Unis.</p>
<p style="text-align: justify;"><b>XKeyscore</b>, quant à lui, est un programme installé sur environ 500 serveurs (situés un peu partout dans le monde, y compris en Chine et en Russie) qui permet de suivre en temps réel des conversations sur Facebook, de consulter le contenu d’e-mails ou encore d’accéder à l’historique de navigation d’une personne donnée.</p>
<p style="text-align: justify;"><b>Muscular </b>est un programme beaucoup plus puissant que les deux premiers. D'une part, parce qu’il contourne la loi en agissant en dehors des frontières américaines.  D'autre part, parce qu’il peut intercepter des données stockées dans le Cloud de grandes sociétés (entre autres Google et Yahoo), en infiltrant les liens entre les serveurs. Les données qui passent par la fibre optique sont interceptées, copiées et exploitées par la NSA.</p>
<p style="text-align: justify;">D’après le <a href="https://www.google.fr/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=1&amp;cad=rja&amp;sqi=2&amp;ved=0CDQQFjAA&amp;url=http%3A%2F%2Fwww.washingtonpost.com%2F&amp;ei=Gqt4UsWqL6ex0AWczYDYCQ&amp;usg=AFQjCNETSDsQaKbctlDIXhQmMKDbJ-6GyQ&amp;sig2=QJ5pW63heBO4ndaJJiKRhg&amp;bvm=bv.55980276,d.d2k" target="_blank">Washington Post</a>, c’est ainsi que la <a href="https://www.google.fr/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=1&amp;cad=rja&amp;ved=0CDAQFjAA&amp;url=http%3A%2F%2Fwww.nsa.gov%2F&amp;ei=Vqt4UuDaOeyr0gWu_4CICQ&amp;usg=AFQjCNGSoS3DjaczCnKuUOJQgDGEu7ogOw&amp;sig2=9zeyeSpnmZX_JEMNkJP8kA&amp;bvm=bv.55980276,d.d2k" target="_blank">NSA</a> a récolté plus de 181 280 466 données en un seul mois ! Ces derniers affirment également que les services secrets britanniques auraient participé à cette récolte de données !</p>
<p style="text-align: justify;">Bien entendu, Yahoo et Google crient au scandale et exigent des explications. Yahoo, qui avait toujours démenti avoir collaboré avec l’agence, voit ici une preuve de sa bonne foi et affirme que Muscular est tout simplement un acte de piratage. Google s’est dit<span style="text-decoration: line-through;">e</span> troublée par ces révélations et va continuer à <a href="http://www.aquastar-consulting.com/index.php/solutions/securite/securite-des-donnees#" target="_blank">chiffrer</a> ses données pour plus de sécurité.</p>
<p style="text-align: justify;">Sans surprise, la <a href="https://www.google.fr/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=1&amp;cad=rja&amp;ved=0CDAQFjAA&amp;url=http%3A%2F%2Fwww.nsa.gov%2F&amp;ei=Vqt4UuDaOeyr0gWu_4CICQ&amp;usg=AFQjCNGSoS3DjaczCnKuUOJQgDGEu7ogOw&amp;sig2=9zeyeSpnmZX_JEMNkJP8kA&amp;bvm=bv.55980276,d.d2k" target="_blank">National Security Agency (NSA)</a> a aussitôt démenti et indique que ce programme n’a jamais  existé.</p>
<p style="text-align: justify;">Comment Aquastar Consulting peut vous aider ?</p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls/netasq" target="_blank">Solution de sécurité internet : Netasq</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls/palo-alto" target="_blank">Solution de sécurité internet : Palo Alto Networks</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/securite-des-donnees" target="_blank">Solution de chiffrement : Sophos Sage Guard</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1391</wp:post_id>
		<wp:post_date>2013-11-06 09:00:13</wp:post_date>
		<wp:post_date_gmt>2013-11-06 08:00:13</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>espionnage-de-la-nsa-un-nouveau-programme-revele-muscular</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="infrastructures"><![CDATA[Infrastructures]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[79]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[NSA]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438525]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"65.99511319690474";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1741";s:5:"score";s:17:"47.13697840692796";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"34.442509960632236";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:18:"24.956099562507724";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:16:"21.4524518753051";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:16:"21.4524518753051";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2465";s:5:"score";s:17:"20.03761452452919";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1262";s:5:"score";s:18:"18.468893476949695";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"1465";s:5:"score";s:17:"17.56278971927397";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1305";s:5:"score";s:18:"16.785540870432925";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1524]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"22.929779049636785";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"13.474369245401855";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1924";s:5:"score";s:17:"12.14277749143672";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:17:"11.78243174281802";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:18:"11.285509024688174";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"10.409156141850186";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1741";s:5:"score";s:16:"51.6190566774444";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"39.076908170747906";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:17:"27.79402786250311";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"22.432725710800582";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1262";s:5:"score";s:18:"22.127908421096084";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1465";s:5:"score";s:18:"20.202807576709123";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1779";s:5:"score";s:18:"20.151017834664092";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1305";s:5:"score";s:18:"20.141404874622182";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:comment>
			<wp:comment_id>1131</wp:comment_id>
			<wp:comment_author><![CDATA[[BLOCKED BY STBV] TOR – The Onion Router – en passe de devenir la norme ? - L&#039;actualité pour décideurs informatiques]]></wp:comment_author>
			<wp:comment_author_email></wp:comment_author_email>
			<wp:comment_author_url>http://www.it-news.fr/tor-onion-router-en-passe-de-devenir-la-norme/</wp:comment_author_url>
			<wp:comment_author_IP>37.187.41.26</wp:comment_author_IP>
			<wp:comment_date>2013-12-23 10:01:26</wp:comment_date>
			<wp:comment_date_gmt>2013-12-23 09:01:26</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[[&#8230;] par l’affaire PRISM, les ingénieurs de l’IETF (The Internet Engineering Task Force) envisagent fortement d’adopter [&#8230;]]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type>pingback</wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
		<wp:comment>
			<wp:comment_id>1136</wp:comment_id>
			<wp:comment_author><![CDATA[[BLOCKED BY STBV] Les mobiles et la sécurité: La préoccupation première des entreprises | L&#039;actualité pour décideurs informatiquesL&#039;actualité pour décideurs informatiques]]></wp:comment_author>
			<wp:comment_author_email></wp:comment_author_email>
			<wp:comment_author_url>http://www.it-news.fr/les-mobiles-et-la-securite-la-preoccupation-premiere-des-entreprises/</wp:comment_author_url>
			<wp:comment_author_IP>37.187.41.26</wp:comment_author_IP>
			<wp:comment_date>2014-01-02 11:27:38</wp:comment_date>
			<wp:comment_date_gmt>2014-01-02 10:27:38</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[[&#8230;] est les récentes révélations d’écoutes de portables de plusieurs dirigeants de pays par la NSA, il n’est donc pas étonnant de savoir qu’un quart des DSI interrogés indique qu’ils vont [&#8230;]]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type>pingback</wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
	</item>
	<item>
		<title>La Suisse investit dans le Cloud</title>
		<link>http://www.it-news.fr/la-suisse-investit-dans-le-cloud/</link>
		<pubDate>Thu, 07 Nov 2013 08:00:44 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1398</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><span style="font-size: 16px;"><a href="http://www.it-news.fr/wp-content/uploads/2013/11/cloud-suisse1.jpg"><img class="alignleft size-full wp-image-1525" alt="cloud-suisse" src="http://www.it-news.fr/wp-content/uploads/2013/11/cloud-suisse1.jpg" width="250" height="200" /></a>La </span><a style="font-size: 16px;" href="http://fr.wikipedia.org/wiki/Suisse" target="_blank">Suisse</a><span style="font-size: 16px;"> est connue pour être un paradis bancaire. Mais aujourd’hui, la Suisse en plus de ses comptes, veut aussi être connue par son </span><a style="font-size: 16px;" href="http://fr.wikipedia.org/wiki/Cloud_computing" target="_blank">Cloud</a><span style="font-size: 16px;">.</span></p>
On va bientôt pouvoir ouvrir un compte Cloud en Suisse et ce en toute légalité. Le petit pays pourrait profiter de sa législation très protectionniste par rapport à la confidentialité des données pour développer un service Cloud digne de ce qu’il promet.
<p style="text-align: right;"><!--more Lire la suite-->
L’opérateur <a href="http://www.swisscom.ch/fr/clients-prives.html" target="_blank">Swisscom</a> est en train de construire une infrastructure qui abriterait ces centres de stockage de données. D’ici à 2016, le groupe espère avoir 70% de son système d’information stocké dans le Cloud.</p>
<p style="text-align: justify;">Ce Cloud sera aussi proposé aux clients de Swisscom à des conditions aussi avantageuses que celles de ses concurrents, Amazon Web Services et IBM.</p>
<p style="text-align: justify;"><em>« La protection des données et de la vie privée est une tradition de longue date en Suisse »</em>, a expliqué à <a href="http://www.swisscom.ch/fr/ghq/portrait/entreprise/direction-de-lentreprise/direction-du-groupe/andreas-koenig.html" target="_blank">Reuters Andreas Koenig</a>, le CIO de  Swisscom, non sans émettre une réserve : <em>« Mais si la loi l'exige et si un juge nous demande de recueillir ou de lui livrer certaines informations, nous serions évidemment obligés de nous y plier. »</em></p>
<p style="text-align: justify;">Cette nouvelle n’est pas sans rapport avec les révélations successives <a href="https://www.google.fr/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=1&amp;cad=rja&amp;ved=0CDIQFjAA&amp;url=http%3A%2F%2Ffr.wikipedia.org%2Fwiki%2FEdward_Snowden&amp;ei=S6l4UubMEsa00QWFkYGICA&amp;usg=AFQjCNHsGkIf1MemI1DGG0coIPDxiuZaWg&amp;sig2=TiEomV7MSA1nDNvsBASptg&amp;bvm=bv.55980276,d.d2k" target="_blank">d’Edward Snowden</a>. L’espionnage massif pratiqué par les services secrets américains et probablement par d’autres gouvernements est la raison principale de ce nouveau service suisse.</p>
<p style="text-align: justify;">L’opérateur suisse est aussi le principal fournisseur des plus grandes banques du pays, et procure (contraint par le <a href="http://fr.wikipedia.org/wiki/Autorit%C3%A9_f%C3%A9d%C3%A9rale_de_surveillance_des_march%C3%A9s_financiers" target="_blank">régulateur financier</a>) un service de stockage de données à tous ses clients  en Suisse. <em></em></p>
<p style="text-align: justify;"><em>L</em>a Suisse n’est pas la seule concernée par cette initiative. De plus en plus de pays en Europe ont décidé de fournir un<em> « </em><a href="http://www.it-news.fr/souverainete-du-cloud-problematique-importante/" target="_blank">Cloud souverain </a><em>». </em>En France, par exemple, nous avons le <a href="http://www.google.fr/aclk?sa=L&amp;ai=CDVkor6l4UvnbMO2s0gXXsIDgDe6AwskEnpbY3EPm06fvmAEIABABUL68odMCYPvhhYOcCsgBAakCowKOmRCntj6qBCJP0NcPEPnp8a-RFZmtj3fQBGF7B1Cc09jDW7etyMTztOHkuAYBgAfurKolkAcC&amp;sig=AOD64_2B-ExgzJKgn9cHCBuH62BKzcW9rQ&amp;rct=j&amp;q=cloudwatt&amp;ved=0CDQQ0Qw&amp;adurl=http://www.cloudwatt.com/" target="_blank">Cloudwatt</a>, par Orange et Thales, et le <a href="http://www.google.fr/aclk?sa=l&amp;ai=CToLPzql4UtefNM2T0wWWkYGgCpCl9bUEkMzX22-LgOHiwwEIABABUK-gwNoHYPvhhYOcCqAB6Pmg2wPIAQGpAsf9ENjqpLY-qgQiT9AaDlutT2pHNAe-wMy9e-pmYzZZzPCObDkukn7pouDAFbgGAYAHgIbfJJAHAg&amp;sig=AOD64_1FmYAk8-anVh8U1iYUrVh17xNbvA&amp;rct=j&amp;q=numergy+&amp;ved=0CDIQ0Qw&amp;adurl=https://www.numergy.com/" target="_blank">Numergy</a> par SFR et Bull.</p>
<p style="text-align: justify;">Il a donc fallu qu’une personne dévoile un espionnage massif des données par le gouvernement américain avec la complicité plus ou moins déterminée de fournisseurs de services Cloud pour que les pays européens décident enfin à se frotter au domaine du virtuel.</p>
<p style="text-align: justify;"> Comment Aquastar Consulting peut vous aider ?</p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls/netasq" target="_blank">Solution de sécurité internet : Netasq</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls/palo-alto" target="_blank">Solution de sécurité internet : Palo Alto Networks</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/securite-des-donnees" target="_blank">Solution de chiffrement : Sophos Sage Guard</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1398</wp:post_id>
		<wp:post_date>2013-11-07 09:00:44</wp:post_date>
		<wp:post_date_gmt>2013-11-07 08:00:44</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>la-suisse-investit-dans-le-cloud</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="cloud"><![CDATA[cloud]]></category>
		<category domain="post_tag" nicename="cloud-souverain"><![CDATA[Cloud Souverain]]></category>
		<category domain="category" nicename="reseaux-et-mobilite"><![CDATA[Réseaux et mobilité]]></category>
		<category domain="post_tag" nicename="suisse"><![CDATA[Suisse]]></category>
		<category domain="post_tag" nicename="swisscom"><![CDATA[Swisscom]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[81]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Cloud]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"111.68857249934373";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:17:"94.42069164580344";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"89.77490714035675";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"77.71693136856265";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2444";s:5:"score";s:17:"65.57971790769722";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2424";s:5:"score";s:17:"58.28769852642199";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:17:"41.33398555111136";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"38.64220765763533";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"35.54011893238569";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1789";s:5:"score";s:17:"31.12447257684743";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437315]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"45.10542805480051";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:17:"41.39138280037296";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"37.69819387118438";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"35.19083054182126";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"15.819296224029786";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:17:"14.31359001159058";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1525]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"73.95159151478128";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:17:"65.15456396892806";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"60.95075331129841";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"54.61216114346498";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1789";s:5:"score";s:17:"38.19688170178428";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"820";s:5:"score";s:17:"35.07997274475298";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2444";s:5:"score";s:18:"29.707091978423154";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2424";s:5:"score";s:18:"26.765499913147405";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Les mobiles et la sécurité: La préoccupation première des entreprises</title>
		<link>http://www.it-news.fr/les-mobiles-et-la-securite-la-preoccupation-premiere-des-entreprises/</link>
		<pubDate>Fri, 08 Nov 2013 15:47:48 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1419</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/11/mobile-et-securite.jpg"><img class="alignleft size-full wp-image-1526" alt="mobile-et-securite" src="http://www.it-news.fr/wp-content/uploads/2013/11/mobile-et-securite.jpg" width="250" height="200" /></a>Dans un monde où tout est devenu mobile, la sécurité est un véritable enjeu qui ne concerne pas seulement les particuliers mais aussi et surtout les entreprises.</p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;">En effet, tous les dirigeants d’entreprise sont impactés par une faille de sécurité.</p>
<p style="text-align: justify;">Depuis le PDG qui voit cet enjeu comme une menace portant atteinte à la réputation de son entreprise (49%) ou pour le Directeur Général dont les principales préoccupations sont liées aux arrêts de production (42%) ou encore pour le Directeur Financier qui est soucieux <a href="http://www.it-news.fr/wp-content/uploads/2013/11/tableau-explicatif-de-la-problématique-de-la-sécurité-des-mobiles-en-entreprise.jpg"><img class="size-medium wp-image-1423 alignleft" title="problématique de la sécurité des mobiles en entreprise" alt="tableau explicatif de la problématique de la sécurité des mobiles en entreprise" src="http://www.it-news.fr/wp-content/uploads/2013/11/tableau-explicatif-de-la-problématique-de-la-sécurité-des-mobiles-en-entreprise-290x300.jpg" width="290" height="300" /></a>des pertes financières (47%) que pourraient occasionner un piratage informatique.</p>
<p style="text-align: justify;">Le DSI, quant à lui, doit être capable de répondre à toutes les questions et faire face à tous les problèmes qu’engendre une faille de sécurité.</p>
<p style="text-align: justify;">De toutes les technologies existantes, c’est la sécurité liée aux terminaux mobiles qui inspire la plus grande inquiétude.</p>
<p style="text-align: justify;">L’une des raisons principales est les récentes révélations d’écoutes de portables de plusieurs dirigeants de pays par <a href="http://www.it-news.fr/espionnage-de-la-nsa-un-nouveau-programme-revele-muscular/" target="_blank">la NSA</a>, il n’est donc pas étonnant de savoir qu’un quart des DSI interrogés indique qu’ils vont déployer un système de protection des mobiles dans les 12 derniers mois.</p>
<p style="text-align: justify;">Pour renforcer la sécurité des terminaux mobiles d’entreprise, ils ont défini une stratégie en 4 points :</p>
<p style="text-align: justify;">1-    La mise en place d’une fonction de sécurité sur les mobiles,</p>
<p style="text-align: justify;">2-    La supervision de la flotte de terminaux via le réseau,</p>
<p style="text-align: justify;">3-    Une diffusion en interne des bonnes pratiques en matière d’utilisation des mobiles,<a href="http://www.it-news.fr/wp-content/uploads/2013/11/la-sécurité-mobile-nest-toujours-pas-la-grande-priorité-des-entreprises..jpg"><img class="alignright  wp-image-1422" title="la sécurité mobile n'est toujours pas la grande priorité des entreprises." alt="la sécurité mobile n'est toujours pas la grande priorité des entreprises." src="http://www.it-news.fr/wp-content/uploads/2013/11/la-sécurité-mobile-nest-toujours-pas-la-grande-priorité-des-entreprises.-300x185.jpg" width="300" height="185" /></a></p>
<p style="text-align: justify;">4-    Isolation des applications et chiffrement des données sensibles.</p>
<p style="text-align: justify;"><span style="font-size: 16px;">Malgré ces bonnes résolutions, seulement 10% des DSI ont défini une réelle stratégie face </span><span style="font-size: 16px;">au phénomène du <a href="http://www.it-news.fr/rebellion-jeunes-salaries/" target="_blank">BYOD (Bring Your Own Device)</a>.</span></p>
<p style="text-align: justify;"><span style="font-size: 16px;">Comment Aquastar Consulting peut vous aider :</span></p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls/netasq" target="_blank">Solution de sécurité internet : Netasq</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls/palo-alto" target="_blank">Solution de sécurité internet : Palo Alto Networks</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/securite-des-donnees" target="_blank">Solution de Chiffrement : Sophos Safe Guard</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1419</wp:post_id>
		<wp:post_date>2013-11-08 16:47:48</wp:post_date>
		<wp:post_date_gmt>2013-11-08 15:47:48</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>les-mobiles-et-la-securite-la-preoccupation-premiere-des-entreprises</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="decisionnel"><![CDATA[Décisionnel]]></category>
		<category domain="category" nicename="mobilite"><![CDATA[Mobilité]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[81]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[1421]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[mobile]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:17:"89.83026060561446";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"58.647235280874156";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"57.46726309321214";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"54.65890181867956";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2354";s:5:"score";s:18:"46.714029705697776";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"41.06840511878179";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"38.91087174055715";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:17:"38.73312185535467";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"36.575588477130026";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"35.473550788687675";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438856]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"28.961150374242344";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"25.908321075409813";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:18:"24.308445896824146";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"21.131335233816912";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"19.208512899801782";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:17:"19.02748488466129";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:17:"63.01810802849049";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"43.27294577635851";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"40.10187785709196";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:18:"37.680529549792226";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"30.461355771102554";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"29.178015544982472";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"27.84362509948027";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:18:"27.176066276429943";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Microsoft piraté</title>
		<link>http://www.it-news.fr/microsoft/</link>
		<pubDate>Mon, 18 Nov 2013 09:15:57 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1434</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/11/Microsoft-piraté.jpg"><img class="alignleft size-full wp-image-1435" alt="Microsoft piraté" src="http://www.it-news.fr/wp-content/uploads/2013/11/Microsoft-piraté.jpg" width="160" height="160" /></a>Mardi dernier <a href="http://www.microsoft.com/fr-fr/default.aspx" target="_blank">Microsoft</a> a détecté une grosse faille de sécurité dans certaines versions de Windows, Office et <a href="file:///C:/Users/ecalliati/AppData/Local/Microsoft/Windows/Temporary%20Internet%20Files/Content.Outlook/ZDIDO3J1/office.microsoft.com/fr-fr/lync/%E2%80%8E" target="_blank">Lync</a>.</p>
<p style="text-align: justify;">En réaction, ils ont publié en urgence un correctif permettant de bloquer l’exploitation d’une faille découverte dans le composant traitant les images au format TIFF.</p>
<p style="text-align: right;"><!--more Lire la suite-->
</p><p style="text-align: justify;">Les produits concernés par cette faille sont :</p>

<ul style="text-align: justify;">
	<li>Les suites bureautiques Office 2003, 2007 et 2010</li>
	<li>Windows Vista</li>
	<li>Windows Server 2008</li>
	<li>Lync 2010 et 2013</li>
</ul>
<p style="text-align: justify;">Microsoft a donc fourni <a href="https://support.microsoft.com/kb/2896666" target="_blank">un petit soft</a> permettant de bloquer les effets de cette faille.</p>
<p style="text-align: justify;">Des attaques ont déjà eu lieu provenant essentiellement du Moyen Orient et d’Asie. Cette faille permet aux pirates informatiques de prendre le contrôle de votre machine à distante et ceux avec les mêmes droits que ceux du compte piraté (les droits administrateur dans la majorité des cas).</p>
<p style="text-align: justify;">Microsoft déclare qu’une simple ouverture d’un fichier est nécessaire pour infecter la machine sous-entendant que la faille n’est pas exploitable de manière automatisée.</p>
<p style="text-align: justify;">Comment Aquastar peut vous aider ?</p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls" target="_blank">Solution de sécurité internet </a>: <a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls/netasq" target="_blank">Netasq</a> ou <a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls/palo-alto" target="_blank">Palo Alto Networks</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/securite-des-postes-de-travail" target="_blank">Solution anti-spams </a>: <a href="http://www.aquastar-consulting.com/index.php/solutions/securite/securite-des-postes-de-travail/spamblock" target="_blank">Spamblock de Barracuda</a> ou <a href="http://www.aquastar-consulting.com/index.php/solutions/securite/securite-des-postes-de-travail/vaderetro" target="_blank">VadeRetro</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1434</wp:post_id>
		<wp:post_date>2013-11-18 10:15:57</wp:post_date>
		<wp:post_date_gmt>2013-11-18 09:15:57</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>microsoft</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="faille"><![CDATA[faille]]></category>
		<category domain="post_tag" nicename="microsoft"><![CDATA[Microsoft]]></category>
		<category domain="post_tag" nicename="pirate"><![CDATA[piraté]]></category>
		<category domain="category" nicename="reseaux-et-mobilite"><![CDATA[Réseaux et mobilité]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<category domain="post_tag" nicename="securite-2"><![CDATA[sécurité]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[78]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[1435]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[microsoft]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Mardi dernier Microsoft a détecté une grosse faille de sécurité dans certaines versions de Windows, Office et Lync. En réaction, ils ont publié en urgence un correctif permettant de bloquer l’exploitation d’une faille découverte dans le composant traitant les images au format TIFF.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426588815]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"131.2024493702155";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"120.50887000616882";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"118.97158995839717";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:18:"111.78619152843558";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1779";s:5:"score";s:17:"85.12204834154866";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1741";s:5:"score";s:17:"70.09146309863618";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"736";s:5:"score";s:18:"55.159069519631245";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2376";s:5:"score";s:17:"52.53342357159956";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"48.96259815913725";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1731";s:5:"score";s:18:"42.416018854741175";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:18:"48.214915467719266";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"45.05854472928575";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"44.30462781778828";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:18:"44.296264304981946";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"20.50365114716257";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"15.215722867351374";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1779";s:5:"score";s:17:"89.33859753477824";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"82.60609434307968";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"76.65378611921466";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:16:"76.3025902056523";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:15:"73.792497324567";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1741";s:5:"score";s:17:"72.83336988453497";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"736";s:5:"score";s:17:"57.96547138554984";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1731";s:5:"score";s:17:"45.70039418219213";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Windows 8.1 une version controversée</title>
		<link>http://www.it-news.fr/windows-8-1-une-version-controversee/</link>
		<pubDate>Mon, 18 Nov 2013 09:29:46 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1439</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/11/windows-8.1.jpg"><img class="alignleft size-medium wp-image-1549" title="Windows 8.1 une version controversée" alt="windows-8.1" src="http://www.it-news.fr/wp-content/uploads/2013/11/windows-8.1.jpg" width="250" height="200" /></a>Depuis le lancement de la <a href="http://windows.microsoft.com/fr-fr/windows-8/meet" target="_blank">version 8.1 de Windows</a>, beaucoup d’encre a été versé, en bien comme en mal.</p>
<p style="text-align: justify;">Totalement revisitée et modernisée, utilisant un système d’écrans dynamiques et d’applications, cette nouvelle manière d’utiliser son ordinateur est loin de faire l’unanimité.</p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;">Lorsque Microsoft a décidé de sortir cette nouvelle version de Windows, celle-ci n’était pas complète. Aujourd’hui, une nouvelle version existe, la <a href="http://windows.microsoft.com/fr-fr/windows/home" target="_blank">8.1</a>. Voici certains des témoignages que nous avons pu trouver à ce sujet.</p>
<p style="text-align: justify;">Armand Assouline, DSI de <a href="http://www.necotrans.com/" target="_blank">Necotrans</a>, déplore la non-compatibilité de Windows 8.1 avec ses serveurs Windows.</p>
<p style="text-align: justify;">"<i>Pour la première fois, un nouvel OS Windows n'est pas compatible avec notre écosystème serveur existant.</i> <i>La rétrocompatibilité a disparu</i>", constate, sidéré, Armand Assouline, DSI de Necotrans.</p>
<p style="text-align: justify;">Il rajoute que «  <i>Microsoft pousse un peu à la consommation avec </i><a href="http://www.journaldunet.com/solutions/systemes-reseaux/windows-8/" target="_blank"><i>Windows 8</i></a><i> et </i><a href="http://www.journaldunet.com/solutions/reseau-social-d-entreprise/office-2013/" target="_blank"><i>Office 2013</i></a><i>, qui nécessitent tous deux de migrer vers des versions de serveur plus récentes</i>. <i>C'est une vraie révolution pour ce groupe qui a toujours fait en sorte de rendre un nouvel OS client compatible avec les anciennes versions de </i><a href="http://www.aquastar-consulting.com/index.php/solutions/systemes/virtualisation-serveurs/windows-server" target="_blank"><i>Windows Server</i></a><i> et </i><a href="http://www.aquastar-consulting.com/index.php/solutions/systemes/messagerie"><i>Exchange Server</i></a><i>.</i> » Autre surprise : l'antivirus <a href="http://www.trendmicro.fr/entreprises/index.html" target="_blank">Trend Micro Office Scan</a> (version Enterprise), utilisé par Necotrans, n'est, lui non plus, pas compatible avec Windows 8.</p>
<p style="text-align: justify;">Bertrand Lenain, DSI de la <a href="http://www.seineetmarne.cci.fr/" target="_blank">CCI Seine-et-Marne</a>, a quant à lui un avis plus positif même s’il déplore la présence du nouveau bouton « démarrer » qui n’était pas présent dans la version 8, et qu’il estime comme non nécessaire. Selon lui, la version 8.1 présente de nombreux avantages notamment une administration très complète. A la question de l’adaptation des utilisateurs à cette nouvelle version, il affirme, qu’il n’y aura pas de problème vu que lors de la sortie de Windows 7 et Office 2010, il n’y a pas eu de problèmes : « <i>Chez nous, les utilisateurs se sont bien adaptés à </i><a href="http://windows.microsoft.com/fr-fr/windows7/products/home" target="_blank"><i>Windows 7</i></a><i> et </i><a href="http://office.microsoft.com/fr-fr/business/office-2010-vous-aide-a-diriger-vos-affaires-ou-vous-le-souhaitez-HA101674750.aspx?CTT=1" target="_blank"><i>Office 2010</i></a><i>. Ils ont pris en mains le nouvel environnement beaucoup plus vite que pour les précédentes migrations de Windows et d'Office, je pense, par conséquent, que l'absence du bouton Démarrer ne sera donc pas forcément un problème pour eux.</i> »</p>
<p style="text-align: justify;">Pour beaucoup, il était, au contraire, nécessaire de réintégrer le bouton démarrer. C’est ce que constate Dominique El Sayed, DSI de la <a href="http://www.ville-stains.fr/" target="_blank">mairie de Stains</a> et membre du Club décision DSI qui a déjà fait basculer ses t<span style="font-family: Verdana, sans-serif;">erminaux vers Windows 8 : </span><i>« Sur ces terminaux, nous avons néanmoins décidé d'ajouter un </i><a href="http://www.journaldunet.com/solutions/saas-logiciel/bouton-demarrer-de-windows-8-1.shtml" target="_blank"><i>bouton Démarrer </i></a><i>pour que les <a href="http://www.it-news.fr/wp-content/uploads/2013/11/windows-8.2-une-version-controversée.jpg"><img class=" wp-image-1440 alignright" title="Windows 8.1, une version déjà controversée" alt="windows 8.1 une version controversée" src="http://www.it-news.fr/wp-content/uploads/2013/11/windows-8.2-une-version-controversée.jpg" width="297" height="170" /></a>utilisateurs retrouvent leurs marques</i> ».</p>
<p style="text-align: justify;">Autre manque souvent pointé du doigt par les DSI : l'absence d'horloge immédiatement visible sur l'interface tactile de Windows 8. Détails ! Direz-vous, sauf que dans le monde de l’entreprise, c’est un must.</p>
<p style="text-align: justify;">Vous l’aurez compris, les attentes sont nombreuses pour les futures versions de Windows….</p>
<p style="text-align: justify;">Comment Aquastar Consulting peut vous aider ?</p>

<ul>
	<li style="text-align: justify;"><a href="http://www.aquastar-consulting.com/" target="_blank">Aquastar</a> est partenaire de <a href="http://www.aquastar-consulting.com/index.php/societe/partenaires/infrastructures/microsoft" target="_blank">Microsoft</a>.</li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1439</wp:post_id>
		<wp:post_date>2013-11-18 10:29:46</wp:post_date>
		<wp:post_date_gmt>2013-11-18 09:29:46</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>windows-8-1-une-version-controversee</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="dsi"><![CDATA[DSI]]></category>
		<category domain="category" nicename="erp"><![CDATA[ERP]]></category>
		<category domain="post_tag" nicename="windows"><![CDATA[Windows]]></category>
		<category domain="post_tag" nicename="windows-8"><![CDATA[Windows 8]]></category>
		<category domain="post_tag" nicename="windows-8-1"><![CDATA[Windows 8.1]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[95]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[windows]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Depuis le lancement de la version 8.1 de Windows, beaucoup d’encre a été versé. Pourtant certains DSI soulèvent des questions légitimes sur celle-ci.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[1441]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437596]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"169.47376074260023";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"61.72590617906861";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"927";s:5:"score";s:17:"46.25762847115702";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1626";s:5:"score";s:17:"41.93821742620098";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2424";s:5:"score";s:18:"39.866856499379885";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"38.640338191150065";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2444";s:5:"score";s:18:"36.522782663696105";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:17:"33.47748605726002";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:18:"31.284655741053935";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:18:"27.778616292743937";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"52.474178040656064";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:18:"23.294558659253305";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"14.333752070050167";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"11.80792138911669";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"11.736485224603708";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:17:"11.17101392677668";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"97.41217377377865";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1626";s:5:"score";s:17:"48.30020519810647";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"927";s:5:"score";s:18:"47.329189565911484";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:18:"39.386804111006285";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"24.660450579250927";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:17:"20.61700441775589";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1037";s:5:"score";s:18:"20.545570846874945";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:18:"19.553008497426898";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1441]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Partage de fichiers : les règles sont de plus en plus contournées</title>
		<link>http://www.it-news.fr/partage-de-fichiers-les-regles-sont-de-plus-en-plus-contournees/</link>
		<pubDate>Mon, 18 Nov 2013 10:13:48 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1444</guid>
		<description></description>
		<content:encoded><![CDATA[<div style="text-align: justify;">

<span style="font-size: 16px;"><a href="http://www.it-news.fr/wp-content/uploads/2013/11/dsi-victimes-de-mutineries.jpg"><img class="alignleft size-full wp-image-1547" title="Partage de fichiers: les règles sont de plus en plus contournées" alt="dsi-victimes-de-mutineries" src="http://www.it-news.fr/wp-content/uploads/2013/11/dsi-victimes-de-mutineries.jpg" width="250" height="200" /></a>Malgré les mises en gardes, les rappels à l’ordre et la mise en avant des chartes informatiques, une étude révèle que plus de 70% des salariés de continuent de stocker et partager des fichiers professionnels sur des services en ligne.</span>

&nbsp;
<p style="text-align: right;"><!--more Lire la suite--></p>

</div>
<p style="text-align: justify;">Selon une étude réalisée auprès de 5000 employés de grandes sociétés en Europe et aux Etats-Unis, parmi les 81% des salariés qui stockent leurs documents en ligne, <b>plus de </b><b>sept sur dix le font depuis un service gratuit sur lequel l’entreprise n’exerce aucun contrôle</b>. Et cela sans l’accord de la direction !</p>
<p style="text-align: justify;">Le <a href="file:///C:/Users/ecalliati/AppData/Local/Microsoft/Windows/Temporary%20Internet%20Files/Content.Outlook/ZDIDO3J1/fr.wikipedia.org/wiki/BYOD" target="_blank">BYOD</a> est pour beaucoup dans cette mutinerie. En effet, plus de 62% des salariés utilisent leur propre appareil informatique pour travailler. Ce phénomène ne doit pas être ignoré par les entreprises qui négligeraient la sécurité et la confidentialité des données éparpillées par les employés.</p>
<p style="text-align: justify;"><i>« D’ici 2015, la plupart des entreprises devront fournir des solutions plus structurées et formalisées pour les employés qui choisissent d’utiliser des appareils mobiles personnels pour le travail – y compris les</i> <a title="smartphones" href="http://www.silicon.fr/tag/smartphones" target="_blank"><i>Smartphones</i></a> <i>et les Tablettes »</i>, commente <b>Brownlee Thomas</b> l’analyste de <a href="http://www.forrester.com/home/" target="_blank">Forrester Research</a>, à propos de l’écosystème du BYOD. « <i>Dans un récent sondage, nous avons constaté que cela sera une priorité critique ou élevée au cours des 12 prochains mois pour 73% des grandes entreprises, ainsi que pour 67% des PME. »</i></p>
<p style="text-align: justify;">Comment Aquastar Consulting peut vous aider ?</p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls/netasq" target="_blank">Solution de sécurité : Netasq</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls/palo-alto" target="_blank">Solution de Sécurité : Palo Alto Networks</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/securite-des-donnees" target="_blank">Solution de chiffrement : Sophos Safe Guard</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1444</wp:post_id>
		<wp:post_date>2013-11-18 11:13:48</wp:post_date>
		<wp:post_date_gmt>2013-11-18 10:13:48</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>partage-de-fichiers-les-regles-sont-de-plus-en-plus-contournees</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="byod"><![CDATA[BYOD]]></category>
		<category domain="post_tag" nicename="donnees"><![CDATA[données]]></category>
		<category domain="post_tag" nicename="entreprises"><![CDATA[entreprises]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<category domain="post_tag" nicename="securite-informatique"><![CDATA[Sécurité informatique]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[74]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[1445]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[salariés]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Une étude dévoile que plus de 70% des salariés continuent d'emporter des fichiers professionnels sans l'accord préalables de leurs supérieurs mettant en danger la sécurité informatique de l'entreprise.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438737]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:16:"138.144224098167";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2266";s:5:"score";s:16:"99.9058270198324";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2354";s:5:"score";s:17:"78.85352071433297";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"880";s:5:"score";s:18:"51.546993239122514";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1506";s:5:"score";s:17:"46.84334553569787";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"46.508156319320584";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1257";s:5:"score";s:17:"37.79392495414996";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"820";s:5:"score";s:18:"35.873824540704405";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:3:"827";s:5:"score";s:17:"34.39564750643576";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1454";s:5:"score";s:18:"32.573946977690376";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"43.434555042732896";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2266";s:5:"score";s:18:"29.740707767509136";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"21.638554540579456";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"14.971003334129934";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:18:"13.995817265076948";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"11.646100442419803";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:17:"79.44944546120624";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2266";s:5:"score";s:17:"56.40110518864695";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"880";s:5:"score";s:18:"54.084079810069476";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1506";s:5:"score";s:17:"49.61551557974158";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1257";s:5:"score";s:17:"43.18489867086702";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"820";s:5:"score";s:17:"42.21154605166994";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"827";s:5:"score";s:18:"39.197343440616464";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1454";s:5:"score";s:18:"38.805561375634944";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:comment>
			<wp:comment_id>1123</wp:comment_id>
			<wp:comment_author><![CDATA[[BLOCKED BY STBV] La sécurité informatique est toujours sous-estimée - L&#039;actualité pour décideurs informatiques]]></wp:comment_author>
			<wp:comment_author_email></wp:comment_author_email>
			<wp:comment_author_url>http://www.it-news.fr/la-securite-informatique-est-toujours-sous-estimee/</wp:comment_author_url>
			<wp:comment_author_IP>37.187.41.26</wp:comment_author_IP>
			<wp:comment_date>2013-12-05 11:13:20</wp:comment_date>
			<wp:comment_date_gmt>2013-12-05 10:13:20</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[[&#8230;] des incidents ayant une origine interne sont ainsi attribués à des employés peu vigilants, 27% à des anciens collaborateurs et 16% à [&#8230;]]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type>pingback</wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
		<wp:comment>
			<wp:comment_id>1128</wp:comment_id>
			<wp:comment_author><![CDATA[[BLOCKED BY STBV] Cloud et virtualisation se battent pour plus de sécurité - L&#039;actualité pour décideurs informatiques]]></wp:comment_author>
			<wp:comment_author_email></wp:comment_author_email>
			<wp:comment_author_url>http://www.it-news.fr/cloud-et-virtualisation-se-battent-pour-plus-de-securite/</wp:comment_author_url>
			<wp:comment_author_IP>37.187.41.26</wp:comment_author_IP>
			<wp:comment_date>2013-12-12 10:00:37</wp:comment_date>
			<wp:comment_date_gmt>2013-12-12 09:00:37</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[[&#8230;] politiques de sécurité des entreprises sont en train de changer même si les grands principes restent les [&#8230;]]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type>pingback</wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
	</item>
	<item>
		<title>Big Data et cloud computing</title>
		<link>http://www.it-news.fr/big-data-et-cloud-computing/</link>
		<pubDate>Mon, 18 Nov 2013 10:46:40 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1448</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: left;"><a href="http://www.it-news.fr/wp-content/uploads/2013/11/big-data-et-cloud.jpg"><img class="alignleft size-full wp-image-1528" alt="big-data-et-cloud" src="http://www.it-news.fr/wp-content/uploads/2013/11/big-data-et-cloud.jpg" width="250" height="200" /></a>Le <a href="http://fr.wikipedia.org/wiki/Big_data" target="_blank">Big Data</a> désigne un ensemble de données enregistré au fil des ans.</p>
<p style="text-align: justify;">Son principal enjeu est le stockage et l’analyse de l’information, tant les données accumulées sont importantes.</p>
<p style="text-align: right;"><!--more Lire la suite--></p>

<h3 style="text-align: justify;"><span style="color: #000000; font-size: 1.4em; line-height: 1.5em;">La faute à qui, direz-vous ?</span></h3>
<p style="text-align: justify;">Certains estiment que c’est principalement la faute des mobinautes (internautes qui se connectent avec leurs mobiles), qui génèrent en temps réel des données, notamment en raison de leurs appareils photos intégrés et des accès internet.</p>

<h3 style="text-align: justify;">Selon une étude réalisée par EMC, les données numériques seraient passées de 1,2 <a href="http://fr.wiktionary.org/wiki/zettaoctet" target="_blank">zettaoctets</a> par an en 2010 à 1,8 zettaoctets en 2011, puis à 2,8 zettaoctets en 2012. Elles s’élèveront à 40 zettaoctets en 2020. Pour exemple, Twitter générait début 2013 7 téraoctets de données <b><span style="text-decoration: underline;">chaque jour</span></b> et Facebook 10 téraoctets.</h3>
<h3 style="text-align: justify;"><a href="http://www.egilia.com/fr/articles/55287-les-5-tendances-cloud-computing-ici-2015-etude-gartner.html" target="_blank">Gartner</a> prévoit que, d’ici 2015, 36% des particuliers hébergeront leurs données dans le Cloud, sachant qu’en 2011, le taux est de 11%.</h3>
<h3 style="text-align: justify;">La problématique est donc évidente : Comment stocker une telle volumétrie de <a href="http://www.it-news.fr/wp-content/uploads/2013/11/Big-Data-et-cloud-computing1.jpg"><img class="wp-image-1451 alignright" title="Big Data et Cloud Computing: Comment stocker une telle volumétrie de données?" alt="Big Data et cloud computing" src="http://www.it-news.fr/wp-content/uploads/2013/11/Big-Data-et-cloud-computing1.jpg" width="150" height="225" /></a>données ?</h3>
<p style="text-align: justify;">Pour les opérateurs télécoms, il s’agit de gérer la quantité de données qu’ils doivent stocker à un rythme qui s’accélère. Ils sont donc mis au défi sur leur rapidité à stocker, à traiter et à faire circuler les informations entre les datacenters.</p>

<h3 style="text-align: justify;">La question est maintenant de savoir ce qu’il faut faire du <a href="http://fr.wikipedia.org/wiki/Big_data" target="_blank">Big Data </a>?</h3>
<p style="text-align: justify;">Aujourd’hui, le stockage ne coûte pas cher. Les opérateurs ont donc tendance à ne rien supprimer, nécessitant d’avoir une bonne capacité d’analyse de l’ensemble des données stockées. Concrètement, un ‘<a href="http://fr.wiktionary.org/wiki/cluster" target="_blank">cluster</a>’ sert à traiter l’information, sa taille change aussi vite qu’il est généré.</p>
<p style="text-align: justify;">Il faut donc une forte capacité de calcul pour l’analyser et seul un dispatch dans plusieurs datacenters pour des calculs parallèles le permet, d’où l’importance du Cloud.</p>
<p style="text-align: justify;">Les fournisseurs d’infrastructure et les opérateurs apportent leur pierre à l’édifice du Big Data en permettant notamment d’alléger les coûts. L’analyse qualifiée est ce qui donne son impulsion actuelle au Big Data et certains analystes affirment que le Big Data est ce qui stimulera l’économie dans le futur.</p>
<p style="text-align: justify;">Une analyse qualifiée sur les grandes quantités de données réparties entre plusieurs sites doit être proposée à des tarifs accessibles, ce qui implique un accès à l’information à un coût raisonnable, un domaine dans lequel la virtualisation des datacenters a son rôle à jouer.</p>

<h2 style="text-align: justify;">Comment Aquastar Consulting peut vous aider ?</h2>
<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/systemes/virtualisation-serveurs/vmware" target="_blank">Solution de Virtualisation : VMware</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/systemes/virtualisation-serveurs/windows-server" target="_blank">Solution de Virtualisation : Windows Server</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/systemes/sauvegarde" target="_blank">Solution de Sauvegarde : CA technologies ARCserve</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1448</wp:post_id>
		<wp:post_date>2013-11-18 11:46:40</wp:post_date>
		<wp:post_date_gmt>2013-11-18 10:46:40</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>big-data-et-cloud-computing</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="big-data"><![CDATA[big data]]></category>
		<category domain="post_tag" nicename="cloud-computing"><![CDATA[Cloud computing]]></category>
		<category domain="category" nicename="erp"><![CDATA[ERP]]></category>
		<category domain="category" nicename="reseaux-et-mobilite"><![CDATA[Réseaux et mobilité]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[94]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[1449]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[big data]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Le Big Data désigne un ensemble de données enregistré au fil des ans. Son principal enjeu est le stockage et l’analyse de l’information, tant les données accumulées sont importantes.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_old_slug</wp:meta_key>
			<wp:meta_value><![CDATA[big-data-e]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426436835]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"55.49970566470936";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2444";s:5:"score";s:17:"49.00634037672182";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"46.00650384317385";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"43.79060957563282";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2424";s:5:"score";s:17:"41.75381647981983";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:18:"37.324836413708574";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:17:"31.73263380383873";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2400";s:5:"score";s:18:"28.900846442971933";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:17:"28.66283283327985";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"21.757555220759745";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"20.57039845344589";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"17.94104014554737";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"17.130109929463394";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:18:"13.404936781405176";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:17:"11.37892551319376";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"11.077208604841426";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:18:"36.040865076024716";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"29.72269794360635";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"28.501171345133162";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1789";s:5:"score";s:18:"25.603756479046368";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:18:"22.417153502424185";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"789";s:5:"score";s:18:"21.285722645211138";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1127";s:5:"score";s:18:"20.821968183195544";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:17:"19.66971425703153";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Le CYOD c’est du BYOD mais sans les inconvénients</title>
		<link>http://www.it-news.fr/le-cyod-cest-du-byod-mais-sans-les-inconvenients/</link>
		<pubDate>Mon, 25 Nov 2013 09:00:12 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1454</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;"><a href="http://www.it-news.fr/wp-content/uploads/2013/11/qu-est-ce-que-le-cyod.jpg"><img class="alignleft size-full wp-image-1663" title="LE CYOD c’est du BYOD mais sans les inconvénients" alt="qu-est-ce-que-le-cyod" src="http://www.it-news.fr/wp-content/uploads/2013/11/qu-est-ce-que-le-cyod.jpg" width="320" height="210" /></a>LE BYOD, Bring Your Own Device, est un concept désignant le fait d’apporter son propre matériel informatique sur son lieu de travail. </span></p>
<p style="text-align: justify;"><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;"> </span><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;">Le CYOD est son alternative…</span></p>
<p style="text-align: right;"><!--more Lire la Suite--></p>
<p style="text-align: justify;"><span style="font-size: 16px;">En effet, pour prévenir les failles de sécurité </span><span style="font-size: 16px;">et juridiques du <a href="http://fr.wikipedia.org/wiki/BYOD" target="_blank">BYOD</a>, certaines entreprises proposent à leurs employés  de leur fournir le matériel correspondant à leurs besoins, d’où le «C» de « Choose » du CYOD. </span></p>

<h2 style="text-align: justify;"><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;">Ce n’est pas du BYOD!</span></h2>
<p style="text-align: justify;"><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;">En effet, le « CYOD » n’est pas du « BYOD », la grande différence réside dans le fait que l’employé n’apporte pas SON propre appareil informatique à son travail. </span></p>
<p style="text-align: justify;"><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;">Concrètement, il s’agit  donc d’un fonctionnement classique où l’entreprise fournit du matériel à ses employés. Il n’y a donc pas, pour l’entreprise, plus d’avantages économiques liés à l’investissement de matériels. </span></p>
<p style="text-align: justify;"><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;">Le réel avantage pour l’entreprise réside dans le contrôle de ses appareils mobiles (Smartphones, tablettes ou PC). Ainsi, la direction se prémunit de tous problèmes juridiques ou de sécurité et surtout cela résout les problématiques liées à la vie privée. </span></p>

<h2 style="text-align: justify;"><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;">Et l’employé là dedans ? </span></h2>
<p style="text-align: justify;"><span style="font-size: 16px;">Ce concept est également intéressant pour l’employé car  d’une part il n’utilise pas son propre matériel informatique et donc préserve sa vie privée ; et d’autre part il possède des outils performants et sécurisés. Enfin, selon le bon vouloir de la direction, vous aurez le choix dans l’appareil et la technologie qui correspond le mieux à vos besoins … C’est votre choix ! </span></p>
<p style="text-align: justify;"><span style="font-size: 16px;">Comment Aquastar Consulting peut vous aider : </span></p>

<ul>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls" target="_blank">Solution de sécurité internet -  Netasq et Palo Alto </a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/reseau-mobilite/wifi-hotspot" target="_blank">Solution Wifi d’Aruba Networks </a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/systemes/materiels" target="_blank">Solution Matériels Dell ou HP </a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1454</wp:post_id>
		<wp:post_date>2013-11-25 10:00:12</wp:post_date>
		<wp:post_date_gmt>2013-11-25 09:00:12</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>le-cyod-cest-du-byod-mais-sans-les-inconvenients</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="bring-your-own-device"><![CDATA[bring your own device]]></category>
		<category domain="post_tag" nicename="byod"><![CDATA[BYOD]]></category>
		<category domain="post_tag" nicename="cyod"><![CDATA[cyod]]></category>
		<category domain="post_tag" nicename="mobile"><![CDATA[mobile]]></category>
		<category domain="category" nicename="reseaux-et-mobilite"><![CDATA[Réseaux et mobilité]]></category>
		<category domain="category" nicename="systemes"><![CDATA[Systèmes]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[63]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[1455]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[cyod, byod, bring your own device, mobile]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[Le CYOD c’est du BYOD mais sans les inconvénients]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Le CYOD, pour Choose Your Own Device, est l'alternative choisie par les entreprises pour les employés adeptes du BYOD (Bring Your Own Device).]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438111]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2354";s:5:"score";s:16:"220.065980273219";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2266";s:5:"score";s:18:"117.74088053154776";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2362";s:5:"score";s:17:"93.50054651857997";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"223";s:5:"score";s:16:"67.3885354619799";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"43.27380221042624";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"43.16112429122042";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:16:"42.8063007583966";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"789";s:5:"score";s:17:"42.63974899073712";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"1180";s:5:"score";s:17:"37.65625708275937";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1722";s:5:"score";s:17:"36.44935690616856";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2266";s:5:"score";s:17:"34.88758695199728";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"15.487071674656038";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"14.701551932018674";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:18:"14.519608375518985";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1955";s:5:"score";s:18:"12.003548009323342";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"11.877408572418164";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2354";s:5:"score";s:17:"86.22252776289386";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"223";s:5:"score";s:17:"76.56566521855659";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2266";s:5:"score";s:17:"66.68901435317109";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"789";s:5:"score";s:17:"49.13652645369871";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1789";s:5:"score";s:18:"44.731125952529354";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1180";s:5:"score";s:17:"43.68540680052659";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1722";s:5:"score";s:18:"42.718079145566115";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1444";s:5:"score";s:18:"38.937575057138595";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1455]]></wp:meta_value>
		</wp:postmeta>
		<wp:comment>
			<wp:comment_id>1156</wp:comment_id>
			<wp:comment_author><![CDATA[[BLOCKED BY STBV] La mobilité en entreprise : un réel facteur de productivité | L&#039;actualité pour décideurs informatiquesL&#039;actualité pour décideurs informatiques]]></wp:comment_author>
			<wp:comment_author_email></wp:comment_author_email>
			<wp:comment_author_url>http://www.it-news.fr/mobilite-en-entreprise-reel-facteur-productivite/</wp:comment_author_url>
			<wp:comment_author_IP>37.187.41.26</wp:comment_author_IP>
			<wp:comment_date>2014-04-24 07:43:39</wp:comment_date>
			<wp:comment_date_gmt>2014-04-24 06:43:39</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[[&#8230;] BYOD (Bring Your Own Device), le CYOD (Choose Your Own Device) ou les MEAP (Mobile Enterprise Application Platform) sont des innovations [&#8230;]]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type>pingback</wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
	</item>
	<item>
		<title>Vers une déclaration unique de TVA en Union Européenne</title>
		<link>http://www.it-news.fr/vers-une-declaration-unique-de-tva-en-union-europeenne/</link>
		<pubDate>Fri, 22 Nov 2013 09:00:37 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1459</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><span style="font-size: 16px;"><a href="http://www.it-news.fr/wp-content/uploads/2013/11/tva-unique-2.jpg"><img class="alignleft size-full wp-image-1665" alt="tva-unique-2" src="http://www.it-news.fr/wp-content/uploads/2013/11/tva-unique-2.jpg" width="320" height="210" /></a>La </span><a style="font-size: 16px;" href="http://ec.europa.eu/index_fr.htm" target="_blank">commission européenne</a><span style="font-size: 16px;"> a annoncé, fin octobre, une proposition de </span><b style="font-size: 16px;">déclaration unique de TVA</b><span style="font-size: 16px;"> qui faciliterait les échanges commerciaux entre les pays membres.</span></p>
<p style="text-align: justify;">Cette formalité unique mettrait fin à toutes les déclarations nationales et...</p>
<p style="text-align: right;"><!--more Lire la Suite--></p>
<p style="text-align: justify;"><span style="font-size: 16px; text-align: justify;">Cette formalité unique mettrait fin à toutes les déclarations nationales et simplifierait grandement les démarches administratives des entreprises ayant une clientèle européenne et/ou  internationale.</span></p>
<p style="text-align: justify;">Il faut savoir que la déclaration de <a href="http://www.impots.gouv.fr/portal/dgi/public/professionnels.impot?pageId=prof_tva&amp;paf_dm=popup&amp;paf_gm=content&amp;typePage=cpr02&amp;sfid=503&amp;espId=2&amp;communaute=2&amp;impot=TVA&amp;paf_gear_id=500018&amp;temNvlPopUp=true" target="_blank">TVA</a> est différente pour chacun des pays membres et peut intégrer jusqu’à 100 cases à remplir !</p>
<p style="text-align: justify;">Le projet de <b>déclaration unique de TVA</b>, posé par la commission européenne, se composerait de  5 à 26 cases maximum obligatoires à renseigner.</p>
<p style="text-align: justify;">La <b>déclaration de TVA en ligne</b>, ou <a href="http://vosdroits.service-public.fr/professionnels-entreprises/F23566.xhtml#Slf" target="_blank">télédéclaration</a>, sera bien entendu toujours privilégiée,  puisque elle sera envoyée chaque mois par voie électronique. A l’exception des micro-entreprises qui pourront envoyer leur déclaration chaque trimestre.</p>
<p style="text-align: justify;">La déclaration annuelle récapitulative, obligatoire dans certains pays membres, sera, quant à elle, définitivement supprimée.</p>

<h1 style="text-align: justify;">Une économie pour les entreprises… et pour les États membres !</h1>
<p style="text-align: justify;">Si l’avantage administratif est indéniable pour les entreprises et pour les Etats, cette <b>déclaration unique de TVA</b> représenterai également un fort avantage économique : jusqu’à 15 milliards d’euros par an selon la commission européenne.</p>
<p style="text-align: justify;">Les Etats membres en profiteront  aussi, puisque cette déclaration unique de TVA est un outil assurant le respect des obligations et permettra ainsi d’augmenter les recettes publiques.</p>
<p style="text-align: justify;"> Si cette proposition est validée par le <a href="http://www.european-council.europa.eu/home-page.aspx?lang=fr" target="_blank">Conseil Européen</a>, cette déclaration unique de TVA pour tous échanges commerciaux dans l’Union sera appliquée au plus tard le 31 décembre 2016.</p>
<p style="text-align: justify;"><b>Comment Aquastar Consulting peut vous aider ? </b></p>

<ul style="text-align: justify;">
	<li>Nous vous proposons de réaliser une analyse de votre système de gestion Sage en  rapport à cette échéance. Si vous êtes intéressé, <a href="mailto:polegestion@aquastar-consulting.com?subject=Je%20souhaite%20planifier%20une%20analyse%20de%20ma%20solution%20de%20gestion" target="_blank">cliquez-ici</a>.</li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1459</wp:post_id>
		<wp:post_date>2013-11-22 10:00:37</wp:post_date>
		<wp:post_date_gmt>2013-11-22 09:00:37</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>vers-une-declaration-unique-de-tva-en-union-europeenne</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="erp"><![CDATA[ERP]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[79]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[déclaration unique de TVA]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[La commission européenne a annoncé une proposition de déclaration unique de TVA qui faciliterait les échanges commerciaux entre les pays membres.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_post_restored_from</wp:meta_key>
			<wp:meta_value><![CDATA[a:3:{s:20:"restored_revision_id";i:1464;s:16:"restored_by_user";i:37;s:13:"restored_time";i:1384962524;}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[1460]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438463]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"45.80012621574372";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2444";s:5:"score";s:17:"39.96285854787625";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2424";s:5:"score";s:17:"34.35009466180779";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"27.62525696474293";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:17:"25.31873869313999";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"19.773561247799677";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:18:"16.945248430225984";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:18:"16.945248430225984";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"16.945248430225984";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1439";s:5:"score";s:18:"15.908794931864772";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:18:"16.467324937507843";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"9.834263799751387";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:17:"9.760882240036903";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"8.345662719243304";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"7.974995504163172";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:17:"7.974995504163172";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:18:"28.335245453425323";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1076";s:5:"score";s:18:"19.313461287992297";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1439";s:5:"score";s:18:"18.786081998005642";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1448";s:5:"score";s:18:"17.402438397659278";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2444";s:5:"score";s:18:"17.335091968108355";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"16.729428772534078";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"15.841242743581033";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1037";s:5:"score";s:18:"14.627655587148393";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:12:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"45.54534570019512";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2444";s:5:"score";s:17:"39.79290213318062";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2424";s:5:"score";s:17:"34.15900927514634";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"27.523344758523493";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"25.244998449387147";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"19.699821004907584";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"16.84333622389554";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:17:"16.84333622389554";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"16.84333622389554";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1439";s:5:"score";s:17:"15.81962175138414";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:4:"1076";s:5:"score";s:17:"15.81962175138414";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"2491";s:5:"score";s:18:"13.264300711060207";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:comment>
			<wp:comment_id>1119</wp:comment_id>
			<wp:comment_author><![CDATA[Bruno]]></wp:comment_author>
			<wp:comment_author_email>contact@rethel-web.fr</wp:comment_author_email>
			<wp:comment_author_url>http://multi-annonces.fr/ping</wp:comment_author_url>
			<wp:comment_author_IP>77.198.99.105</wp:comment_author_IP>
			<wp:comment_date>2013-11-25 14:21:25</wp:comment_date>
			<wp:comment_date_gmt>2013-11-25 13:21:25</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[Bonjour,

Si cette mesure simplifie réellement la vie des entreprise et qu'elle permet surtout d'enrayer la fraude à la TVA qui grangrène l'Union Européenne, alors je suis pour, mais la plupart des mesures de simplifications envers les entreprises ne font souvent que compliquer les choses et ajouter des formalités supplémentaires, alors je demande à voir!
C'est malheureux à dire, mais le premier percepteur de l'Etat est devenu depuis longtemps l'entreprise et le nombre de salariés qui sont dédiés à cette tâche sont bien plus nombreux dans les entreprises françaises que dans les effectif du Fisc, cherchez l'erreur!

Amicalement,

Bruno]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type></wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
			<wp:commentmeta>
				<wp:meta_key>akismet_result</wp:meta_key>
				<wp:meta_value><![CDATA[false]]></wp:meta_value>
			</wp:commentmeta>
			<wp:commentmeta>
				<wp:meta_key>akismet_history</wp:meta_key>
				<wp:meta_value><![CDATA[a:4:{s:4:"time";d:1385385685.97474;s:7:"message";s:47:"Akismet a revérifié et validé ce commentaire";s:5:"event";s:9:"check-ham";s:4:"user";s:0:"";}]]></wp:meta_value>
			</wp:commentmeta>
			<wp:commentmeta>
				<wp:meta_key>akismet_as_submitted</wp:meta_key>
				<wp:meta_value><![CDATA[a:61:{s:15:"comment_post_ID";i:1459;s:14:"comment_author";s:5:"Bruno";s:20:"comment_author_email";s:21:"contact@rethel-web.fr";s:18:"comment_author_url";s:29:"http://multi-annonces.fr/ping";s:15:"comment_content";s:663:"Bonjour,

Si cette mesure simplifie réellement la vie des entreprise et qu'elle permet surtout d'enrayer la fraude à la TVA qui grangrène l'Union Européenne, alors je suis pour, mais la plupart des mesures de simplifications envers les entreprises ne font souvent que compliquer les choses et ajouter des formalités supplémentaires, alors je demande à voir!
C'est malheureux à dire, mais le premier percepteur de l'Etat est devenu depuis longtemps l'entreprise et le nombre de salariés qui sont dédiés à cette tâche sont bien plus nombreux dans les entreprises françaises que dans les effectif du Fisc, cherchez l'erreur!

Amicalement,

Bruno";s:12:"comment_type";s:0:"";s:14:"comment_parent";i:0;s:7:"user_ID";i:0;s:7:"user_ip";s:13:"77.198.99.105";s:10:"user_agent";s:101:"Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.57 Safari/537.36";s:8:"referrer";s:77:"http://www.it-news.fr/vers-une-declaration-unique-de-tva-en-union-europeenne/";s:4:"blog";s:21:"http://www.it-news.fr";s:9:"blog_lang";s:5:"fr_FR";s:12:"blog_charset";s:5:"UTF-8";s:9:"permalink";s:77:"http://www.it-news.fr/vers-une-declaration-unique-de-tva-en-union-europeenne/";s:21:"akismet_comment_nonce";s:6:"passed";s:11:"POST_author";s:5:"Bruno";s:10:"POST_email";s:21:"contact@rethel-web.fr";s:8:"POST_url";s:29:"http://multi-annonces.fr/ping";s:16:"POST_si_code_com";s:16:"XfhtwPmTSl4ok42h";s:17:"POST_captcha_code";s:4:"gW8N";s:12:"POST_comment";s:663:"Bonjour,

Si cette mesure simplifie réellement la vie des entreprise et qu'elle permet surtout d'enrayer la fraude à la TVA qui grangrène l'Union Européenne, alors je suis pour, mais la plupart des mesures de simplifications envers les entreprises ne font souvent que compliquer les choses et ajouter des formalités supplémentaires, alors je demande à voir!
C'est malheureux à dire, mais le premier percepteur de l'Etat est devenu depuis longtemps l'entreprise et le nombre de salariés qui sont dédiés à cette tâche sont bien plus nombreux dans les entreprises françaises que dans les effectif du Fisc, cherchez l'erreur!

Amicalement,

Bruno";s:11:"POST_submit";s:22:"Laisser un commentaire";s:20:"POST_comment_post_ID";s:4:"1459";s:19:"POST_comment_parent";s:1:"0";s:26:"POST_akismet_comment_nonce";s:10:"6f4bb149eb";s:14:"POST_eventDate";s:0:"";s:18:"POST_bb2_screener_";s:24:"1385385358 77.198.99.105";s:15:"SERVER_SOFTWARE";s:22:"Apache/2.2.22 (Ubuntu)";s:11:"REQUEST_URI";s:21:"/wp-comments-post.php";s:8:"W3TC_ENC";s:5:"_gzip";s:9:"HTTP_HOST";s:14:"www.it-news.fr";s:15:"HTTP_CONNECTION";s:10:"keep-alive";s:14:"CONTENT_LENGTH";s:4:"1070";s:18:"HTTP_CACHE_CONTROL";s:9:"max-age=0";s:11:"HTTP_ACCEPT";s:74:"text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8";s:11:"HTTP_ORIGIN";s:21:"http://www.it-news.fr";s:15:"HTTP_USER_AGENT";s:101:"Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.57 Safari/537.36";s:12:"CONTENT_TYPE";s:33:"application/x-www-form-urlencoded";s:12:"HTTP_REFERER";s:77:"http://www.it-news.fr/vers-une-declaration-unique-de-tva-en-union-europeenne/";s:20:"HTTP_ACCEPT_ENCODING";s:17:"gzip,deflate,sdch";s:20:"HTTP_ACCEPT_LANGUAGE";s:35:"fr-FR,fr;q=0.8,en-US;q=0.6,en;q=0.4";s:11:"HTTP_COOKIE";s:0:"";s:4:"PATH";s:28:"/usr/local/bin:/usr/bin:/bin";s:16:"SERVER_SIGNATURE";s:75:"<address>Apache/2.2.22 (Ubuntu) Server at www.it-news.fr Port 80</address>
";s:11:"SERVER_NAME";s:14:"www.it-news.fr";s:11:"SERVER_ADDR";s:12:"37.187.41.26";s:11:"SERVER_PORT";s:2:"80";s:11:"REMOTE_ADDR";s:13:"77.198.99.105";s:13:"DOCUMENT_ROOT";s:18:"/home/it-news/www/";s:12:"SERVER_ADMIN";s:18:"[no address given]";s:15:"SCRIPT_FILENAME";s:38:"/home/it-news/www/wp-comments-post.php";s:11:"REMOTE_PORT";s:4:"1902";s:17:"GATEWAY_INTERFACE";s:7:"CGI/1.1";s:15:"SERVER_PROTOCOL";s:8:"HTTP/1.1";s:14:"REQUEST_METHOD";s:4:"POST";s:12:"QUERY_STRING";s:0:"";s:11:"SCRIPT_NAME";s:21:"/wp-comments-post.php";s:8:"PHP_SELF";s:21:"/wp-comments-post.php";s:12:"REQUEST_TIME";s:10:"1385385684";s:25:"comment_post_modified_gmt";s:19:"2013-11-25 09:17:01";}]]></wp:meta_value>
			</wp:commentmeta>
			<wp:commentmeta>
				<wp:meta_key>akismet_history</wp:meta_key>
				<wp:meta_value><![CDATA[a:4:{s:4:"time";d:1385386231.0878079;s:7:"message";s:55:"aquastar a changé le statut du commentaire en approved";s:5:"event";s:15:"status-approved";s:4:"user";s:8:"aquastar";}]]></wp:meta_value>
			</wp:commentmeta>
		</wp:comment>
	</item>
	<item>
		<title>Yahoo va se mettre au chiffrement</title>
		<link>http://www.it-news.fr/yahoo-va-se-mettre-au-chiffrement/</link>
		<pubDate>Thu, 21 Nov 2013 09:00:25 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1465</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><span style="font-size: 16px;"><a href="http://www.it-news.fr/wp-content/uploads/2013/11/yahoo-va-se-mettre-au-chiffrement2.jpg"><img class="alignleft size-full wp-image-1531" alt="yahoo-va-se-mettre-au-chiffrement" src="http://www.it-news.fr/wp-content/uploads/2013/11/yahoo-va-se-mettre-au-chiffrement2.jpg" width="250" height="200" /></a>Depuis les premiers scandales dévoilés par </span><a style="font-size: 16px;" href="http://fr.wikipedia.org/wiki/Edward_Snowden" target="_blank">l’affaire Snowden</a><span style="font-size: 16px;"> sur les écoutes de la NSA, les géants du web sont confrontés à un problème majeur : comment maintenir la confiance de leurs millions d’utilisateurs ?</span></p>
&nbsp;
<p style="text-align: right;"><!--more Lire la Suite--></p>
<p style="text-align: justify;">Ce n’est que depuis le mois dernier que nous avons la « certitude » que Yahoo ou Googlen’ont pas délibérément contribué à la surveillance intensive des données de la NSA.</p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/espionnage-de-la-nsa-un-nouveau-programme-revele-muscular/" target="_blank">Muscular</a> est un programme  visant, entre autres, à intercepter des données stockées dans le Cloud de grandes entreprises du web.</p>
<p style="text-align: justify;">Dans ce contexte de méfiance générale, Google, Microsoft et de nombreux autres ont fait preuve d’une rare transparence sur les demandes des agences gouvernementales.</p>
<p style="text-align: justify;">Mais c’est Yahoo, qui vient de franchir un nouveau cap  en marchant sur les traces encore fraîches de Google, son rival, qui a déjà commencé à chiffrer la plupart du trafic sur ses sites.</p>
<p style="text-align: justify;"><a href="http://fr.wikipedia.org/wiki/Marissa_Mayer" target="_blank">Marissa Meyer</a>, Directrice Générale de Yahoo a annoncé dans un récent communiqué : <em>« Nous avons travaillé dur au fil des années pour gagner la confiance de nos utilisateurs et nous nous battons ardemment pour la conserver ». </em><em></em></p>
<p style="text-align: justify;">D’ailleurs, elle insiste de nouveau sur le fait que Yahoo n’a jamais donné accès à ses datacenters à quelconque agence gouvernementale.</p>
<p style="text-align: justify;">Elle déclare également, que Yahoo va commencer à chiffrer les données échangées sur ses services en ligne pour les protéger contre tout piratage.</p>
<p style="text-align: justify;">Sur le blog du groupe, Marissa Mayer a précisé que d’ici avril 2014, Yahoo aura mis en place un système de chiffrement des plus performants. <em></em></p>
<p style="text-align: justify;"><em><b>Comment Aquastar Consulting peut vous aider ? </b></em></p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/securite-des-donnees" target="_blank">Solution de chiffrement – Sophos Safe Guard</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1465</wp:post_id>
		<wp:post_date>2013-11-21 10:00:25</wp:post_date>
		<wp:post_date_gmt>2013-11-21 09:00:25</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>yahoo-va-se-mettre-au-chiffrement</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="non-classe"><![CDATA[Non classé]]></category>
		<category domain="category" nicename="reseaux-et-mobilite"><![CDATA[Réseaux et mobilité]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[85]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[yahoo]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437421]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"60.47043907730903";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:17:"49.79495045434553";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2411";s:5:"score";s:17:"49.64617129576579";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:17:"43.82896772956428";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"38.98649560040465";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1741";s:5:"score";s:17:"34.67023887111729";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"31.559750169130943";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:18:"28.689297427605215";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"1794";s:5:"score";s:18:"28.079684675067252";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1933";s:5:"score";s:17:"27.68068306723952";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1531]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"24.24725550125987";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1933";s:5:"score";s:18:"21.036372836481227";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"16.572819628864252";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1924";s:5:"score";s:17:"15.77543333557168";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"15.635287618919365";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:18:"13.087310140196092";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"39.35237245671603";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1741";s:5:"score";s:17:"38.74355337797159";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1794";s:5:"score";s:17:"35.55346199024648";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1933";s:5:"score";s:17:"34.70413145113984";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:18:"30.138350955159687";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"27.810885191087927";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"26.772632619696807";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1789";s:5:"score";s:17:"24.68161584066508";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Le FBI (encore) victime des Anonymous</title>
		<link>http://www.it-news.fr/le-fbi-encore-victime-des-anonymous/</link>
		<pubDate>Tue, 26 Nov 2013 09:00:41 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1476</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><b><a href="http://www.it-news.fr/wp-content/uploads/2013/11/Le-FBI-victime-des-Anonymous1.jpg"><img class="alignleft size-full wp-image-1661" title="Le FBI (encore) victime des Anonymous" alt="Le-FBI-victime-des-Anonymous" src="http://www.it-news.fr/wp-content/uploads/2013/11/Le-FBI-victime-des-Anonymous1.jpg" width="320" height="210" /></a></b>Le FBI a annoncé, la semaine dernière, avoir été victime d’attaques malveillantes menées par des hackers probablement liés aux Anonymous.</p>
<p style="text-align: justify;">Les enquêteurs soupçonnent une connexion avec Lari Love...</p>
<p style="text-align: right;"><!--more Lire la Suite--></p>
<p style="text-align: justify;">Selon le FBI, les pirates se seraient introduits via une faille de sécurité causée par le logiciel <a href="http://www.adobe.com/fr/products/coldfusion-enterprise.html" target="_blank">Adobe ColdFusion</a>.</p>
<p style="text-align: justify;">L’attaque a particulièrement touché les départements de l’Armée, de l’Energie et de la Santé.</p>
<p style="text-align: justify;">Cette faille aurait causé le vol de données personnelles (incluant les comptes bancaires) de plus de 100 000 employés, de leurs familles, de sous–traitants et de toutes autres personnes associées aux départements du gouvernement.</p>
<p style="text-align: justify;">Adobe ColdFusion fait partie des quelques logiciels dont le code source a directement été dérobé sur les propres serveurs d’Adobe.</p>
<p style="text-align: justify;">Cette attaque a été détectée et reconnue par l’éditeur qui à demander à ses clients de faire preuve de la plus grande vigilance.</p>
<p style="text-align: justify;"><b>Comment Aquastar Consulting peut vous aider ? </b></p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls" target="_blank">Solution de sécurité internet -  Palo Alto Networks et Netasq</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/securite-des-donnees" target="_blank">Solution de Chiffrement - Sophos Safe Guard</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/securite-des-donnees" target="_blank">Solution d’Authentification - Imprivata</a></li>
</ul>
<p style="text-align: justify;"></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1476</wp:post_id>
		<wp:post_date>2013-11-26 10:00:41</wp:post_date>
		<wp:post_date_gmt>2013-11-26 09:00:41</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>le-fbi-encore-victime-des-anonymous</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="adobe"><![CDATA[Adobe]]></category>
		<category domain="post_tag" nicename="anonymous"><![CDATA[Anonymous]]></category>
		<category domain="post_tag" nicename="cyberattaque"><![CDATA[Cyberattaque]]></category>
		<category domain="post_tag" nicename="fbi"><![CDATA[FBI]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[75]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Anonymous]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Le FBI a (de nouveau) été victime de cyberattaques de la part des Anonymous. Il se serait introduit via un logiciel d'Adobe, Adobe ColdFusion.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[1477]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437493]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:18:"124.87500300704758";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1172";s:5:"score";s:17:"90.94640695515052";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1773";s:5:"score";s:17:"83.91915766825954";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1719";s:5:"score";s:17:"83.65212498136616";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:16:"54.3076659020044";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:17:"46.42944872650815";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:17:"32.22982991491098";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:18:"25.213365999345953";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"24.160924000871912";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:18:"24.129739023491712";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:17:"39.70209934311363";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:18:"20.913359024242588";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"19.927797873553878";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:18:"18.801253675846155";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:18:"16.306182544922798";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1940";s:5:"score";s:18:"14.909433377531146";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1172";s:5:"score";s:17:"96.61086048079771";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1773";s:5:"score";s:17:"95.48542496956166";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1719";s:5:"score";s:17:"87.06161003078789";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:17:"70.34403631145628";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:17:"35.01108826607319";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"31.843635652182734";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:18:"30.006185511671895";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:16:"24.7778690052739";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Wifi on Board, la commission européenne dit oui! </title>
		<link>http://www.it-news.fr/restez-connecte-bord-de-votre/</link>
		<pubDate>Wed, 27 Nov 2013 09:00:25 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1480</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;"><a href="http://www.it-news.fr/wp-content/uploads/2013/11/wifi-onboard-v2.jpg"><img class="alignleft size-full wp-image-1658" title="Wifi on Board, la commission européenne dit oui! " alt="wifi-onboard-v2" src="http://www.it-news.fr/wp-content/uploads/2013/11/wifi-onboard-v2.jpg" width="320" height="210" /></a>La commission européenne autorise la 3G et la 4G Haut débit à bord des avions. </span></p>
<p style="text-align: justify;"><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;">La semaine dernière, la <a href="http://europa.eu/index_fr.htm" target="_blank">commission européenne</a> a adopté de nouvelles règles autorisant les passagers à utiliser les dernières technologies de communication sans-fil à bord d’avions survolant l’Union Européenne. </span></p>
<p style="text-align: right;"><!--more Lire la Suite--></p>
<p style="text-align: justify;"><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;">Il sera donc désormais possible d’utiliser les bandes de fréquences pour les communications <a href="http://fr.wikipedia.org/wiki/3G" target="_blank">3G</a> et <a href="http://fr.wikipedia.org/wiki/4G" target="_blank">4G </a>à une altitude supérieure à 3000 mètres. </span></p>
<p style="text-align: justify;"><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;">Auparavant seuls les systèmes de communication <a href="http://fr.wikipedia.org/wiki/2G" target="_blank">2G </a>y étaient autorisés. Celle-ci ne permettant pas la transmission de gros volumes de données (téléchargement de livres électroniques, visionnage de vidéos…) </span></p>
<p style="text-align: justify;"><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;">Cette décision de l’UE donne donc la possibilité aux compagnies aériennes d’autoriser l’utilisation des Smartphones et des tablettes. </span></p>
<p style="text-align: justify;"><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;">Toutefois, pour que cela soit techniquement possible les compagnies aériennes devront équiper leurs avions de matériels spécifiques. </span></p>
<p style="text-align: justify;"><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;">Les principaux avantages pour ces compagnies sont, d’une part, pouvoir satisfaire l’une des demandes les plus fréquentes de leurs passagers et, d’autre part, proposer de nouveaux services payants. </span></p>
<p style="text-align: justify;"><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;">Les usagers pourront rester connecter tout le long de leur vol et ceux même à une altitude de plus de 3000 mètres. </span></p>
<p style="text-align: justify;"><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;">Comment Aquastar Consulting peut vous aider ? </span></p>

<ul>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/reseau-mobilite/wifi-hotspot#" target="_blank">Solution Wifi d’Aruba Networks</a></li>
</ul>
<p style="text-align: justify;"></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1480</wp:post_id>
		<wp:post_date>2013-11-27 10:00:25</wp:post_date>
		<wp:post_date_gmt>2013-11-27 09:00:25</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>restez-connecte-bord-de-votre</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="commission-europeenne"><![CDATA[Commission européenne]]></category>
		<category domain="category" nicename="mobilite"><![CDATA[Mobilité]]></category>
		<category domain="post_tag" nicename="wifi"><![CDATA[wifi]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[63]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[wifi avion,]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[Wifi on Board, la commission européenne dit oui!]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[La commission européenne autorise la 3G et la 4G Haut débit à bord des avions. La semaine dernière, la commission européenne a adopté de nouvelles règles autorisant les passagers à utiliser les dernières technologies de communication sans-fil à bord d’avions survolant l’Union Européenne.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437020]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"127.56431269395773";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"53.092985133725946";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"45.737302683629814";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"900";s:5:"score";s:18:"39.104531855758744";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"760";s:5:"score";s:18:"37.265611243234716";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"36.38922485648515";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:17:"31.93045974224011";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"31.93045974224011";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2266";s:5:"score";s:18:"29.033542406389024";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:18:"29.033542406389024";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1658]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:17:"37.28909752712018";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"22.22153611943648";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"19.060635368373603";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"16.020983860884776";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:18:"14.599290345389614";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:18:"12.860083109821904";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:17:"70.69126712210672";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"900";s:5:"score";s:17:"43.78597928320352";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"760";s:5:"score";s:17:"41.19185282861962";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"35.28582248380535";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"30.097569574637554";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:18:"27.001701209954135";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"24.849381471696116";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1571";s:5:"score";s:17:"24.76202818987968";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>La consommation énergétique d&#039;un Data Center fait innover</title>
		<link>http://www.it-news.fr/consommation-energetique-dun-data-center/</link>
		<pubDate>Thu, 28 Nov 2013 09:00:33 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1495</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/11/consommation-energie-datacenter.jpg"><img class="alignleft size-full wp-image-1656" title="Lorsque la consommation énergétique d'un Data Center fait innover" alt="consommation-energie-datacenter" src="http://www.it-news.fr/wp-content/uploads/2013/11/consommation-energie-datacenter.jpg" width="320" height="210" /></a>Le 29 octobre dernier, une association regroupant 830 entreprises high–tech de la Sillicon Valley, le « <a href="http://svlg.org/" target="_blank">Sillicon Valley Leadership Group </a>» a dédié son séminaire annuel à l’optimisation de la consommation électrique des data-centers.</p>
<p style="text-align: right;"><!--more Lire la Suite--></p>
<p style="text-align: justify;"><span style="font-size: 16px;">Les </span><a style="font-size: 16px;" href="http://fr.wikipedia.org/wiki/Centre_de_traitement_de_donn%C3%A9es" target="_blank">datas<span style="color: #ff4b33;">c</span>enters</a><span style="font-size: 16px;"> sont devenus de grands consommateurs d’énergies, absorbant 2 à 3% de l’électricité produite dans le monde. Selon le ministère de l’énergie américain, à peine 45% de cette énergie est consommée par les data centers, le reste est utilisé pour la climatisation (45%) et la conversion ou le transport de l’électricité.</span></p>

<h2 style="text-align: justify;">Le problème des datacenters est le matériel</h2>
<p style="text-align: justify;">C’est au niveau du matériel lui-même qu’il faudrait que cela change. Même si plusieurs constructeurs travaillent sur la température maximale que leur machine peut supporter, il semble qu’ils sont encore loin du compte<i>. </i>« <i>En France, la plupart des data centers fonctionnent à 22 °C</i> »,<i> </i>explique Michel Brignano, directeur général de la filiale française d'<a href="http://www.equinix.fr/" target="_blank">Equinix</a><i>, </i>« <i>un degré de plus en température de fonctionnement, c'est jusqu'à 4 % d'économies sur les coûts opérationnels de la climatisation</i>,<i> </i>calcule Jay Kyathsandra, chef de produit efficience des datacenters chez <a href="http://www.intel.fr/content/www/fr/fr/homepage.html" target="_blank">Intel</a><i>, Dans notre plus récent data center, situé à Santa Clara, au coeur de la Silicon Valley, les serveurs ont été conçus pour fonctionner à une température ambiante de 32°. »</i></p>

<h2 style="text-align: justify;">Que changer dans les data centers ?</h2>
<p style="text-align: justify;">Intel travaille sur le <b>câblage en fibre optique</b>, sachant qu’une seule fibre optique <a href="http://www.it-news.fr/wp-content/uploads/2013/11/cable-fibre-optique.jpg"><img class=" wp-image-1496 alignright" title="La fibre optique une solution pour les data centers" alt="cable fibre optique" src="http://www.it-news.fr/wp-content/uploads/2013/11/cable-fibre-optique.jpg" width="237" height="148" /></a>remplace jusqu’à dix câbles en cuivre, la climatisation circulerai plus facilement s’il y a moins d’obstacles. De plus, grâce à la vitesse de retransmission des données offerte par la fibre optique, l’organisation des data centers pourrait être revue.</p>
<p style="text-align: justify;">Pour <a href="http://www.ovh.com/%E2%80%8E" target="_blank">OVH</a>, il faut repenser <b>l’alimentation électrique</b>, <i>« Le courant alternatif qui alimente un data center subit trois transformations avant d'arriver dans les serveurs sous forme de courant continu. A chaque conversion, 2 % de l'électricité partent en chaleur »,</i> détaille Germain Masse, directeur des « data centers » chez OVH. <i>. « Alimenter directement en courant continu un "data center" permettrait de faire des économies et de connecter plus facilement des sources d'énergies renouvelables comme des panneaux solaires », </i>confirme Henry Coles, spécialiste de l'efficacité énergétique des bâtiments, au <a href="http://www.lbl.gov/" target="_blank">LBNL</a> (Lawrence Berkeley National Laboratory).</p>
<p style="text-align: justify;">Enfin, une autre piste serait de repenser la climatisation. Le plus souvent, il s’agit d’un système classique de refroidissement à air pulsé sur les serveurs. Et là où le climat le permet, de plus en plus de data centers ont recours au « <a href="http://fr.wikipedia.org/wiki/Free_cooling" target="_blank">freecooling </a>» ou refroidissement gratuit. Il s’agit simplement d’utiliser l’air extérieur pour refroidir les serveurs.</p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/11/watercooling.jpg"><img class="alignleft  wp-image-1498" title="Le watercooling une solution pour diminuer la consommation énergétique des data centers" alt="watercooling" src="http://www.it-news.fr/wp-content/uploads/2013/11/watercooling.jpg" width="300" height="168" /></a>Dans certains centres, une nouvelle technologie est apparue, le « <a href="http://fr.wikipedia.org/wiki/Watercooling" target="_blank">Watercooling </a>». Il s’agit de refroidir les composants électriques avec de l’eau (l’eau est déminéralisée et y on y rajouté des additifs) qui circule dans un circuit étanche.  « <i>Voilà onze ans que nous avons commencé à produire nos propres serveurs équipés du "watercooling" et aujourd'hui 70 % de la chaleur dégagée par nos 150.000 serveurs dans le monde sont évacués ainsi ; un système de ventilation se charge des 30 % restants </i>», affirme Henryk Klaba, président d'OVH. « <i>Avec le "watercooling", on peut réduire de 30 % les besoins en climatisation</i> », estime Kevin Polizzi, <a title="Définition de PDG" href="http://www.lesechos.fr/finance-marches/vernimmen/definition_president-directeur-general.html#xtor=SEC-3168" target="_blank">PDG</a> de <a href="http://www.jaguar-network.com/%E2%80%8E" target="_blank">Jaguar Network</a>, un hébergeur français qui espère passer à ce système au cours des deux prochaines années.</p>
<p style="text-align: justify;">Une autre technologie, un peu plus spectaculaire est apparue dans les rangs  l’ « Open <a href="http://www.it-news.fr/wp-content/uploads/2013/11/open-bath-cooling.jpg"><img class=" wp-image-1497 alignright" title="Une nouvelle technique de diminution de la consommation électrique des data centers: le &quot;open bath immersion&quot;" alt="open bath immersion" src="http://www.it-news.fr/wp-content/uploads/2013/11/open-bath-cooling.jpg" width="237" height="213" /></a>bath immersion » ou l’immersion à bain ouvert. Encore sous la forme de recherche, <a href="http://www.leeds.ac.uk/" target="_blank">l’université de Leeds</a>, (nord de l’Angleterre), teste un supercalculateur immergé dans du Novec, un liquide diélectrique (qui ne conduit pas le courant) et sans impact sur l’homme et l’environnement. Le premier data centers à utilisé cette technique a été dévoilé cette semaine à Hong Kong.</p>
<p style="text-align: justify;">Le refroidissement des serveurs ne représentera alors plus qu'une part minime de la consommation électrique des « data centers ».</p>
<p style="text-align: justify;">Comment Aquastar Consulting peut vous aider ?</p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/systemes/virtualisation-serveurs" target="_blank">Solution de Virtualisation – VMWare et Windows Server</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1495</wp:post_id>
		<wp:post_date>2013-11-28 10:00:33</wp:post_date>
		<wp:post_date_gmt>2013-11-28 09:00:33</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>consommation-energetique-dun-data-center</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="alimentation"><![CDATA[alimentation]]></category>
		<category domain="post_tag" nicename="consommation"><![CDATA[consommation]]></category>
		<category domain="post_tag" nicename="datacenter"><![CDATA[datacenter]]></category>
		<category domain="post_tag" nicename="electrique"><![CDATA[électrique]]></category>
		<category domain="post_tag" nicename="eleectrique"><![CDATA[éléectrique]]></category>
		<category domain="category" nicename="infrastructures"><![CDATA[Infrastructures]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[63]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[datacenter, alimentation, éléectrique, consommation]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[La consommation énergétique d'un Data Center fait innover]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Le 29 octobre dernier, une association regroupant 830 entreprises high–tech de la Sillicon Valley, le « Sillicon Valley Leadership Group » a dédié son séminaire annuel à l’optimisation de la consommation électrique des data-centers.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"182.71391860300307";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:17:"41.89054268807211";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:17:"27.62525696474293";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"25.033165956182934";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"24.92048803697712";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:17:"22.74915745707485";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2438";s:5:"score";s:18:"22.543450449844137";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:18:"22.161505157057775";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"20.186304842442794";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:18:"19.230731621158764";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"55.357588665767175";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"11.652365987016616";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"11.364737469459344";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:17:"10.39952735632951";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"10.015745340135773";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:17:"9.862999383243096";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1656]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437821]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"102.93344580164984";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:18:"29.282187477561738";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:18:"24.885146820714798";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1789";s:5:"score";s:18:"19.139471576523885";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"17.798372789823784";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"17.553398290429538";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1283";s:5:"score";s:17:"16.94645275963803";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"16.800358475158372";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>La sécurité informatique est toujours sous-estimée</title>
		<link>http://www.it-news.fr/la-securite-informatique-est-toujours-sous-estimee/</link>
		<pubDate>Fri, 29 Nov 2013 09:00:38 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1506</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/11/securite-informatique.jpg"><img class="alignleft size-full wp-image-1651" title="La sécurité informatique est toujours sous-estimée" alt="securite-informatique" src="http://www.it-news.fr/wp-content/uploads/2013/11/securite-informatique.jpg" width="320" height="210" /></a>Price Waterhouse Coopers « PwC », cabinet d'audit international, souligne une hausse de 25% des incidents de sécurité informatique dans les entreprises par rapport à l'an dernier.</p>
<p style="text-align: justify;">Même si les attaques venaient de l'extérieur les failles, elles, sont créées dans l'entreprise elle-même...</p>
<p style="text-align: right;"><!--more Lire la Suite--></p>
<p style="text-align: justify;">La 15ème édition de cette rencontre annuelle sur la sécurité informatique a été menée auprès de cadres  de 115 pays et met en avant un paradoxe: si les entreprises ont augmenté leur budget de sécurité de 51% en moyenne par rapport à l'an dernier, le nombre d'incidents à aussi augmenté (25%).</p>
<p style="text-align: justify;">Selon <a href="http://www.pwc.fr/" target="_blank">PwC</a>, cette situation est dûe aux  investissements encore trop limités, à une<a href="http://www.it-news.fr/wp-content/uploads/2013/11/Les-menaces-viennent-de-lintérieur.jpg"><img class="alignleft size-medium wp-image-1509" title="Les menaces informatiques sont causées par les employés" alt="Les menaces viennent de l'intérieur" src="http://www.it-news.fr/wp-content/uploads/2013/11/Les-menaces-viennent-de-lintérieur-300x172.jpg" width="300" height="172" /></a> stratégie peu ou mal adaptée, à des outils obsolètes qui doivent pourtant faire face à des menaces externes ET internes toujours plus créatives et efficaces.</p>
<p style="text-align: justify;">D'après les dirigeants interrogés, les menaces proviendraient en majorité de l'extérieur (32%) même si elles se trouvent souvent proches de l'entreprise.</p>
<p style="text-align: justify;">31% des incidents ayant <a href="http://www.it-news.fr/partage-de-fichiers-les-regles-sont-de-plus-en-plus-contournees/" target="_blank">une origine interne</a> sont ainsi attribués à des employés peu vigilants, 27% à des anciens collaborateurs et 16% à des prestataires de services.</p>
<p style="text-align: justify;">Alors que cela fait quelques années que les pays d’Asie-Pacifique investissent massivement en matière de <a href="http://www.it-news.fr/byod-et-securite/" target="_blank">sécurité informatique</a>, l’Europe, quant à elle,  connaît un retard important dans ce domaine, plus particulièrement sur les aspects suivants :</p>

<ul style="text-align: justify;">
	<li>Mise en place de place de continuité d’activité (<a href="http://www.aquastar-consulting.com/index.php/solutions/systemes/pra-pca" target="_blank">PRA - PCA</a>),</li>
	<li>Formations des collaborateurs,</li>
	<li>Politique de sécurité liée à l’usage des mobiles (<a href="http://www.it-news.fr/wp-admin/post.php?post=1454&amp;action=edit" target="_blank">BYOD – CYOD</a>)</li>
</ul>
<p style="text-align: justify;"> Comment Aquastar Consulting peut vous aider ?</p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls" target="_blank">Solution en sécurité internet – Palo Alto Networks et Netasq</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/systemes/pra-pca" target="_blank">Solution de Plan de Reprise d’Activité</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1506</wp:post_id>
		<wp:post_date>2013-11-29 10:00:38</wp:post_date>
		<wp:post_date_gmt>2013-11-29 09:00:38</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>la-securite-informatique-est-toujours-sous-estimee</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="entreprises-francaises"><![CDATA[entreprises françaises]]></category>
		<category domain="post_tag" nicename="menaces-informatiques"><![CDATA[menaces informatiques]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<category domain="post_tag" nicename="securite-informatique"><![CDATA[Sécurité informatique]]></category>
		<category domain="post_tag" nicename="statistique"><![CDATA[statistique]]></category>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[80]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[1508]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[La sécurité informatique]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Malgré les multiples mises en gardes, les entreprises françaises ont encore du chemin à faire par rapport à la sécurité informatique.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1425534107]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:18:"183.11738867363474";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"147.47227579149916";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"123.00918454264999";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1444";s:5:"score";s:17:"46.84334553569787";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"37.44422540959468";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:17:"33.76813869999634";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:17:"20.07915322553525";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:17:"20.07915322553525";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2444";s:5:"score";s:18:"18.125090214542784";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:17:"18.10770389986494";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1508]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:16:"62.4564206619377";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"53.20748936488157";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"44.72919219979068";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:18:"15.467295694829359";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"14.557823380435286";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:17:"13.49072396734353";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:18:"110.35626905755593";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"91.50152962403305";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"76.98926194789571";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1444";s:5:"score";s:17:"49.97823168585384";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"24.075905390424577";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:18:"23.539449496346393";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1779";s:5:"score";s:18:"23.288538745032618";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:17:"18.57391875904265";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:12:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:18:"182.36464560383556";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"146.72506366253253";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"122.5401709308112";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1444";s:5:"score";s:18:"46.697659199765326";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"37.336658480183445";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:18:"33.542863057771115";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:17:"20.03414087552335";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:17:"20.03414087552335";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2444";s:5:"score";s:18:"18.079066623863913";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"17.971965007718374";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"17.732684297909103";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:18:"17.732684297909103";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:comment>
			<wp:comment_id>1125</wp:comment_id>
			<wp:comment_author><![CDATA[LBS]]></wp:comment_author>
			<wp:comment_author_email>webmaster@lbsecurite.fr</wp:comment_author_email>
			<wp:comment_author_url>http://lbsecurite.fr</wp:comment_author_url>
			<wp:comment_author_IP>80.14.33.143</wp:comment_author_IP>
			<wp:comment_date>2013-12-05 14:07:38</wp:comment_date>
			<wp:comment_date_gmt>2013-12-05 13:07:38</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[Bon article !]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type></wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
		<wp:comment>
			<wp:comment_id>1126</wp:comment_id>
			<wp:comment_author><![CDATA[L'équipe IT News]]></wp:comment_author>
			<wp:comment_author_email>saljundi@aquastar-consulting.com</wp:comment_author_email>
			<wp:comment_author_url>http://www.it-news.fr</wp:comment_author_url>
			<wp:comment_author_IP>217.128.24.85</wp:comment_author_IP>
			<wp:comment_date>2013-12-05 14:14:11</wp:comment_date>
			<wp:comment_date_gmt>2013-12-05 13:14:11</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[Merci :) 
L'équipe d'IT News reste à votre disposition pour toute information complémentaire.]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type></wp:comment_type>
			<wp:comment_parent>1125</wp:comment_parent>
			<wp:comment_user_id>37</wp:comment_user_id>
		</wp:comment>
		<wp:comment>
			<wp:comment_id>1151</wp:comment_id>
			<wp:comment_author><![CDATA[[BLOCKED BY STBV] Les tendances IT pour 2014 | L&#039;actualité pour décideurs informatiquesL&#039;actualité pour décideurs informatiques]]></wp:comment_author>
			<wp:comment_author_email></wp:comment_author_email>
			<wp:comment_author_url>http://www.it-news.fr/les-tendances-pour-2014/</wp:comment_author_url>
			<wp:comment_author_IP>37.187.41.26</wp:comment_author_IP>
			<wp:comment_date>2014-03-03 10:18:55</wp:comment_date>
			<wp:comment_date_gmt>2014-03-03 09:18:55</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[[&#8230;] d’Information de plus en plus externalisé, les DSI éprouvent certaines  difficultés à maintenir une sécurité stable au sein de leur entreprise. En effet, les collaborateurs veulent pouvoir accéder aux données [&#8230;]]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type>pingback</wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
	</item>
	<item>
		<title>Palo Alto Networks lauréat au Technology Fast 500 de Deloitte </title>
		<link>http://www.it-news.fr/palo-alto-networks-nommee-dans-le-technology-fast-500-de-deloitte/</link>
		<pubDate>Mon, 02 Dec 2013 09:00:36 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1571</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;"><a href="http://www.it-news.fr/wp-content/uploads/2013/12/deloitte-fast-500-v2.jpg"><img class="alignleft size-full wp-image-1648" title="Palo Alto Networks lauréat au Technology Fast 500 de Deloitte " alt="deloitte-fast-500-v2" src="http://www.it-news.fr/wp-content/uploads/2013/12/deloitte-fast-500-v2.jpg" width="320" height="210" /></a>Palo Alto Networks, éditeur de solutions de sécurité informatique, a été nommé dans le classement Deloitte des 500 entreprises IT ayant connu la croissance la plus rapide, également appelé le « Technology Fast 500 ». </span></p>
<p style="text-align: justify;"><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;">Les autres lauréats sont des entreprises issues des télécommunications, des medias...</span></p>
<p style="text-align: right;"><!--more Lire la Suite--></p>
<p style="text-align: justify;"><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;">D’après le classement, qui se base sur l’écart fiscal sur le revenu de 2008 à 2012, <a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls/palo-alto" target="_blank">Palo Alto Networks</a> a connu une croissance de 8,1%. </span></p>

<h2 style="text-align: justify;"><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;">Qu’est-ce que le Technology Fast 500 ?</span></h2>
<p style="text-align: justify;"><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;">« Le classement 2013 du <a href="http://www.deloitte.com/fast500" target="_blank">Technology Fast 500 de Deloitte</a> met en avant des cas vraiment exemplaires qui poussent à innover dans le contexte difficile que nous traversons. La liste de cette année, incluant Palo Alto Networks, est un panel d’entreprises qui travaillent sur des produits et des services parmi les plus innovants et les plus enthousiasmants du monde technologique. Nous félicitons les lauréats de cette année et attendons avec impatience leurs produits/services dans un futur proche». Eric Openshaw, vice-président, chez Deloitte LLP et dirigeant du service des Technologies, Media et Télécommunication aux Etats-Unis.</span></p>
<p style="text-align: justify;"><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;">« Les entreprises ayant connu la croissance la plus forte aux Etats-Unis sont celles qui portent les innovations et opèrent avec le plus d’agilité pour rester leader dans un marché en constante évolution. Les fournisseurs de logiciels, de biotechnologies-pharmaceutiques et de solutions réseaux demeurent toujours au premier plan. Les <a href="http://www.it-news.fr/wp-content/uploads/2013/11/palo-alto-networks-150x90.jpg"><img class="size-full wp-image-1573 alignright" title="Logo Palo Alto Networks" alt="palo alto networks 150x90" src="http://www.it-news.fr/wp-content/uploads/2013/11/palo-alto-networks-150x90.jpg" width="150" height="90" /></a>entreprises, comme Palo Alto Networks, qui excellent dans leur secteur, ont toujours la mentalité d’une startup  leur permettant d’être plus flexible et de s’adapter plus rapidement aux demandes de leurs clients, raison pour laquelle elle connaît une croissance si rapide chaque année. » <a href="http://www.deloitte.com/view/en_US/us/Services/audit-enterprise-risk-services/Financial-Statement-Internal-Control-Audit/Venture-Capital-Services/4fa09d169d748310VgnVCM1000001956f00aRCRD.htm" target="_blank">Jim Atwell</a>, associé directeur national des entreprises émergentes à fort potentiel, chez Deloitte Services LP.</span></p>
<p style="text-align: justify;"><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;">«<a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls/palo-alto" target="_blank">Palo Alto Networks</a> s’est développée de façon significative par rapport à ses concurrents ; nous attribuons cette croissance à l’unicité de notre plateforme de sécurité de nouvelle génération, qui attaque de front les menaces informatiques de plus en plus sophistiquées auxquelles les entreprises, les gouvernements et les prestataires de services font face aujourd’hui. De par cette innovation, nous pouvons aujourd’hui compter plus de 13 000 sociétés clientes, dont plus de 4800 qui nous ont rejoints cette année. D’ailleurs, c’est la deuxième année consécutive que Palo Alto Networks est nommée parmi les 500 entreprises les plus innovantes du classement de Deloitte. » René Bonvanie, Directeur Marketing, chez <a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls/palo-alto" target="_blank">Palo Alto Networks</a>.</span></p>

<h2 style="text-align: justify;"><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;">A propos du « Technology Fast 500 » 2013 de Deloitte :</span></h2>
<p style="text-align: justify;"><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;"><a href="http://www.it-news.fr/wp-content/uploads/2013/11/Deloitte-Technology-Fast-500.jpg"><img class="alignleft size-medium wp-image-1575" alt="Deloitte Technology Fast 500" src="http://www.it-news.fr/wp-content/uploads/2013/11/Deloitte-Technology-Fast-500-300x163.jpg" width="300" height="163" /></a>Le « Technology Fast 500 », créé par <a href="http://www.deloitte.com/view/en_US/us/index.htm" target="_blank">Deloitte LLP</a>, fournit un classement des entreprises, privées ou publiques, situées en Amérique du Nord et ayant la croissance la plus rapide dans le secteur des technologies, des média, des télécommunications, des sciences de la vie et des énergies propres. Les gagnants de cette année ont été choisis selon le pourcentage de croissance de leur chiffre d'affaires de 2008 à 2012.</span></p>
<p style="text-align: justify;"><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;">Pour être éligibles, les entreprises doivent posséder un brevet ou une technologie vendu comme produit à des clients et contribuant majoritairement à leur chiffre d’affaires. Elles doivent aussi avoir un revenu annuel minimum de 50 000$ et un revenu d’au moins 5 millions de dollars américains ou canadiens sur cette année fiscale. De plus, les entreprises doivent exister depuis au moins 5 ans et avoir leur siège social en Amérique du Nord. </span></p>

<h2 style="text-align: justify;"><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;">A propos de Palo Alto Networks </span></h2>
<p style="text-align: justify;"><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;">Créée en 2005, Palo Alto Networks positionne le firewall au cœur de la sécurité de l'entreprise en créant des firewalls de nouvelle génération permettant une visibilité et un contrôle sans précédent des applications, des utilisateurs et du contenu des flux au sein du réseau de l'entreprise, le tout sans impacter les performances (plus de 20Gbps). </span></p>
<p style="text-align: justify;"><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;">Palo Alto Networks est un visionnaire dans le domaine de la sécurité réseau.</span></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1571</wp:post_id>
		<wp:post_date>2013-12-02 10:00:36</wp:post_date>
		<wp:post_date_gmt>2013-12-02 09:00:36</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>palo-alto-networks-nommee-dans-le-technology-fast-500-de-deloitte</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="laureat"><![CDATA[Lauréat]]></category>
		<category domain="post_tag" nicename="palo-alto-networks"><![CDATA[Palo Alto Networks]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<category domain="post_tag" nicename="technology-fast-500"><![CDATA[Technology Fast 500]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[85]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[1574]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[technology fast 500]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Palo Alto Networks, éditeur de solutions de sécurité informatique, a été nommé dans le classement Deloitte des 500 entreprises IT ayant connu la croissance la plus rapide, le « Technology Fast 500 ».]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_meta-robots-adv</wp:meta_key>
			<wp:meta_value><![CDATA[noydir]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438747]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:17:"46.54334497928343";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1108";s:5:"score";s:17:"42.17670415883141";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1731";s:5:"score";s:17:"41.97720335491754";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:17:"25.67699131701034";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"24.766310182149063";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1480";s:5:"score";s:17:"24.57314435763891";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1305";s:5:"score";s:18:"23.283988918728074";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1454";s:5:"score";s:18:"21.146113811186382";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"1779";s:5:"score";s:18:"20.986023367726546";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1236";s:5:"score";s:18:"20.918443527471062";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:17:"32.01548286699518";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1940";s:5:"score";s:18:"13.424388973798926";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"13.349816294114207";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"11.992719532601328";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:17:"9.859337386354353";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:17:"9.224267316224958";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:18:"53.015439054424775";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1108";s:5:"score";s:18:"43.639515078232314";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1731";s:5:"score";s:16:"42.6751996209227";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1779";s:5:"score";s:16:"25.5713522163048";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1305";s:5:"score";s:18:"24.752137595601404";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1480";s:5:"score";s:16:"24.7085162847661";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1454";s:5:"score";s:18:"22.684514443718882";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1236";s:5:"score";s:17:"21.92128665746906";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:comment>
			<wp:comment_id>1137</wp:comment_id>
			<wp:comment_author><![CDATA[[BLOCKED BY STBV] Les tendances de la Cybersécurité en 2014 | L&#039;actualité pour décideurs informatiquesL&#039;actualité pour décideurs informatiques]]></wp:comment_author>
			<wp:comment_author_email></wp:comment_author_email>
			<wp:comment_author_url>http://www.it-news.fr/les-tendances-de-la-cybersecurite-en-2014/</wp:comment_author_url>
			<wp:comment_author_IP>37.187.41.26</wp:comment_author_IP>
			<wp:comment_date>2014-01-29 10:03:20</wp:comment_date>
			<wp:comment_date_gmt>2014-01-29 09:03:20</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[[&#8230;] Dumont, Directrice Marketing de la division Industrie de Palo Alto Networks a prédit quelles seraient les tendances de la cybersécurité en 2014.  D’ailleurs, vous pouvez [&#8230;]]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type>pingback</wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
	</item>
	<item>
		<title>La dématérialisation: une option sous-estimée par les PME</title>
		<link>http://www.it-news.fr/impots-des-entreprises-le-fichier-des-ecritures-comptables-devient-obligatoire-partir-du-1er-janvier-2014/</link>
		<pubDate>Tue, 03 Dec 2013 11:39:15 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1588</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><span style="font-size: 16px;"><a href="http://www.it-news.fr/wp-content/uploads/2013/12/la-dematerialisation.jpg"><img class="alignleft size-full wp-image-1646" title="La dématérialisation: une option sous-estimée par les PME" alt="la-dematerialisation" src="http://www.it-news.fr/wp-content/uploads/2013/12/la-dematerialisation.jpg" width="320" height="210" /></a>Le ministère de l’économie et des finances pousse les entreprises vers la dématérialisation des échanges. </span></p>
<p style="text-align: justify;"><span style="font-size: 16px;">Que ce soit pour les impôts, la TVA ou la comptabilité, il s’agit de rentrer dans l’ère du numérique!</span></p>
<p style="text-align: right;"><!--more Lire la Suite--></p>
<p style="text-align: justify;"><span style="font-size: 16px;">La dématérialisation promet des économies de traitements, des rentrées de fonds plus rapides et des contrôles facilités par croisement de données.</span></p>
<p style="text-align: justify;">Il est même prédit qu’en 2050, le papier sera une antiquité et très rarement utilisé dans les échanges avec  l’administration. En attendant, en 2013, nous en sommes très loin !</p>
<p style="text-align: justify;">Malgré tout, les déclarations fiscales version papier commencent déjà à désencombrer la poste, notamment grâce à la <a href="http://www.impots.gouv.fr/" target="_blank">télédéclaration</a>, qui permet au ministère de l’économie et des finances d’envoyer automatiquement un avis d’impôt numérisé via Internet.</p>
<p style="text-align: justify;">Voulant forcer un peu la dématérialisation, <a href="http://fr.wikipedia.org/wiki/Minist%C3%A8re_de_l%27%C3%89conomie,_des_Finances_et_de_l%27Industrie" target="_blank">Bercy</a> a joué un tour aux citoyens. En effet, pour continuer de recevoir son avis d’imposition version papier, il fallait décocher une case. 13.5 millions de foyers fiscaux se sont donc étonnés de ne pas recevoir leur avis d’imposition alors que celui-ci les attendait patiemment sur leur compte personnel en ligne.</p>
<p style="text-align: justify;">Cette anecdote est toute aussi vrai pour les entrepreneurs, qui malgré la constante insistance du gouvernement, ont du mal à se tourner vers le numérique et malgré les économies financières qui en découlent.</p>
<p style="text-align: justify;">C’est ainsi, que moins de 10% des 2 milliards de <a href="http://fr.wikipedia.org/wiki/Facture_%C3%A9lectronique" target="_blank">factures</a> échangées en France entre entreprises sont envoyées électroniquement !</p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/12/facture-electronique-dematerialisation.jpg"><img class="aligncenter size-full wp-image-1759" title="facture électronique dematerialisée" alt="facture-electronique-dematerialisation" src="http://www.it-news.fr/wp-content/uploads/2013/12/facture-electronique-dematerialisation.jpg" width="300" height="316" /></a>Une des raisons qui expliquerait une évolution aussi lente serait que la dématérialisation demande un équipement des entreprises en <a href="http://www.aquastar-consulting.com/index.php/solutions/gestion-metier" target="_blank">progiciel de gestion</a> et une capacité du système informatique à s’interfacer avec des plateformes d’échange.</p>
<p style="text-align: justify;">La principale raison serait qu’en modifiant les procédures de saisie, de stockage ou d’échange, la dématérialisation modifie les repères. Dans les entreprises, ces repères sont les habitudes d'exécution de tâches parfois ancrées depuis plusieurs décennies. Au contraire de la <a href="http://fr.wikipedia.org/wiki/D%C3%A9mat%C3%A9rialisation" target="_blank">dématérialisation</a> de la gestion qui n’est, véritablement entrée dans les PME qu’il y a 30 ans.</p>
<p style="text-align: justify;">Par conséquent, les entreprises ne sont équipées que du strict minimum alors que la dématérialisation propose des solutions plus efficaces et plus rapides pour améliorer les performances des PME.</p>
<p style="text-align: justify;">Par exemple, en améliorant la traçabilité, la facture électronique permet d’optimiser la relation client-fournisseur et le respect des délais de paiement, ce qui a un effet direct sur la trésorerie.</p>
<p style="text-align: justify;">Actuellement, 28% des PME évoluant dans le B-to-B émettent déjà des factures électroniques, 83% utilisent un PDF et 5% <a href="http://fr.wikipedia.org/wiki/%C3%89change_de_donn%C3%A9es_informatis%C3%A9" target="_blank">l’EDI</a> (Echange de Données Informatisées) selon le baromètre "<a href="http://www.sage.fr/fr/decouvrez-sage/presse/communiques-presse/resultats-du-1er-barometre-annuel-sage-pme-facture-electronique" target="_blank">Les PME et la facture électronique</a>" établi par Sage en 2013.</p>
<p style="text-align: justify;">Comment Aquastar Consulting peut vous aider :</p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/gestion-metier/gestion-commerciale/efacture" target="_blank">Solution de e-facture : Sage</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1588</wp:post_id>
		<wp:post_date>2013-12-03 12:39:15</wp:post_date>
		<wp:post_date_gmt>2013-12-03 11:39:15</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>impots-des-entreprises-le-fichier-des-ecritures-comptables-devient-obligatoire-partir-du-1er-janvier-2014</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="comptabilite-finances"><![CDATA[Comptabilité - Finances]]></category>
		<category domain="post_tag" nicename="dematerialisation"><![CDATA[dématérialisation]]></category>
		<category domain="post_tag" nicename="edi"><![CDATA[edi]]></category>
		<category domain="post_tag" nicename="efacture"><![CDATA[efacture]]></category>
		<category domain="post_tag" nicename="facture-electronique"><![CDATA[facture electronique]]></category>
		<category domain="post_tag" nicename="facture-numerique"><![CDATA[facture numérique]]></category>
		<category domain="post_tag" nicename="teledeclaration"><![CDATA[télédéclaration]]></category>
		<category domain="post_tag" nicename="virtualisation"><![CDATA[Virtualisation]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[68]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[dématérialisation, edi, télédéclaration, facture electronique, efacture]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[La dématérialisation: une option sous-estimée par les PME]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[La dématérialisation promet des économies de traitements, des rentrées de fonds plus rapides et des contrôles facilités par croisement de données.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1728";s:5:"score";s:18:"155.35374623741166";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"140.09055790356427";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"126";s:5:"score";s:17:"75.60539873819297";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"336";s:5:"score";s:17:"69.70783411646188";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1681";s:5:"score";s:17:"67.82374765964798";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2406";s:5:"score";s:17:"67.23992684379121";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2438";s:5:"score";s:17:"63.85544959700481";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"62.21763581740026";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:17:"51.54800351106207";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:16:"46.3158323067951";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1646]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"44.943405024569266";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"25.94705518032645";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:18:"20.850302733367826";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"18.860435015378343";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:16:"17.2594443361632";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"11.698471589341139";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1728";s:5:"score";s:18:"155.36835970490947";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:17:"81.05304991062538";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"126";s:5:"score";s:17:"75.82667769104431";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"336";s:5:"score";s:17:"70.29127325294829";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1681";s:5:"score";s:16:"67.5626423442794";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2406";s:5:"score";s:17:"66.78619574087875";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"41.417151073226606";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1731";s:5:"score";s:17:"35.37388409559739";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426439093]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:12:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1728";s:5:"score";s:18:"154.25364877071104";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"138.63020578711786";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"126";s:5:"score";s:17:"75.04126526464842";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"336";s:5:"score";s:17:"69.14370064266893";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1681";s:5:"score";s:16:"67.2766355662594";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2406";s:5:"score";s:17:"66.72707823139129";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2438";s:5:"score";s:17:"63.44842651918782";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"61.88007782501643";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:17:"51.50804648772609";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"46.18341375964809";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"36.296906477987534";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"1731";s:5:"score";s:17:"31.45998186845127";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>La gestion de la Paie : Véritable casse-tête pour les entreprises</title>
		<link>http://www.it-news.fr/la-gestion-de-la-paie-veritable-casse-tete-pour-les-entreprises/</link>
		<pubDate>Wed, 04 Dec 2013 09:00:11 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1595</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><span style="font-size: 16px;"><a href="http://www.it-news.fr/wp-content/uploads/2013/12/gestion-de-la-paie-2014.jpg"><img class="alignleft size-full wp-image-1644" title="La gestion de la Paie : Véritable casse-tête pour les entreprises" alt="gestion-de-la-paie-2014" src="http://www.it-news.fr/wp-content/uploads/2013/12/gestion-de-la-paie-2014.jpg" width="320" height="210" /></a>Payer ces employés devient de plus en plus compliqué pour les entreprises, qui depuis les années 2000 croulent sous les nouvelles législations. </span></p>
<p style="text-align: justify;"><span style="font-size: 16px;">Et 2013, n’est pas une exception !</span></p>
<p style="text-align: right;"><!--more Lire la Suite--></p>
<p style="text-align: justify;">Les personnes chargées d’établir la paie, ont dû ou devront faire face à des dispositions, à appliquer parfois dans l’urgence.</p>

<h2 style="text-align: justify;">Une nouvelle disposition : le CICE</h2>
<p style="text-align: justify;">Le <a href="http://www.it-news.fr/objectifs-cice-soulager-tresorerie/" target="_blank">CICE (Crédit d’Impôt Compétitivité Emploi)</a>  est instauré au titre des rémunérations versées à compter du 1<sup>er</sup> Janvier 2013.</p>
<p style="text-align: justify;">Il s’agit de bénéficier d’un crédit d’impôt sur le montant brut des rémunérations<a href="http://www.it-news.fr/wp-content/uploads/2013/12/une-nouvelle-disposition-le-cice.jpg"><img class="alignright size-full wp-image-1602" alt="une-nouvelle-disposition-le-cice" src="http://www.it-news.fr/wp-content/uploads/2013/12/une-nouvelle-disposition-le-cice.jpg" width="140" height="125" /></a> n’excédant pas 2.5 fois le SMIC pour les entreprises imposées d’après leur bénéfice réel. Le taux est fixé à 4% pour les rémunérations versées à compter du 1<sup>er</sup> Janvier 2013 et à 6% pour celles versées à compter de janvier 2014.</p>
<p style="text-align: justify;">Les objectifs de cette nouvelle disposition sont de redonner aux entreprises les moyens d’un repositionnement offensif durable dans la concurrence internationale et concourir à la compétitivité de l’économie nationale par la modération des coûts engagés.</p>
<p style="text-align: justify;">Les informaticiens ont ainsi dû paramétrer le CICE au cours du second trimestre 2013 pour une disposition applicable depuis le début de l’année.</p>

<h2 style="text-align: justify;">Une nouvelle disposition sur la santé à venir</h2>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/12/une-nouvelle-disposition-sur-la-santé-2.jpg"><img class="alignleft  wp-image-1603" title="Une nouvelle disposition sur la santé à venir" alt="une-nouvelle-disposition-sur-la-santé-2" src="http://www.it-news.fr/wp-content/uploads/2013/12/une-nouvelle-disposition-sur-la-santé-2.jpg" width="188" height="137" /></a>Si <a href="http://www.economie.gouv.fr/projet-de-loi-de-financement-de-la-securite-sociale-pour-2014" target="_blank">le projet de loi de finance pour 2014</a> est définitivement voté,  les règles fiscales des dépenses des frais de santé devront être modifiées depuis le 1er janvier 2013. Cette dernière disposition serait particulièrement délicate à mettre en place sur la <a href="http://fr.wikipedia.org/wiki/N4DS" target="_blank">N4DS</a> (déclaration des données sociales des entreprises à destination notamment de l’administration fiscale) à réaliser avant le 31 janvier 2014.</p>

<h2 style="text-align: justify;">Les entreprises et la Gestion de paie dans tout ça ?</h2>
<p style="text-align: justify;">Les entreprises doivent s’adapter pour pouvoir appliquer au plus vite ces nouvelles dispositions. Et pour se faire, il faut qu’elles investissent dans <a href="http://www.aquastar-consulting.com/index.php/solutions/gestion-metier/paye-rh" target="_blank">un logiciel de paie performant</a> et dans une équipe qui comprend les mécanismes de la paie.</p>
<img class="size-full wp-image-1597 alignright" title="Gestionnaire de paie" alt="gestionnaire de paie" src="http://www.it-news.fr/wp-content/uploads/2013/12/gestionnaire-de-paie1.jpg" width="250" height="200" />
<p style="text-align: justify;">La plupart des professionnels de la gestion de la paie sont souvent formés sur « le tas » et sont par conséquent, confrontés aux nombreuses conventions collectives, règles et particularités des employeurs. Par ailleurs, ils sont confrontés à une date butoir pouvant les mettre ainsi sous pression, augmentant le risque d’erreurs... Ce sont principalement pour ces raisons que de nombreuses entreprises, PME ou de plus grandes organisations, préfèrent externaliser leur  gestion de la paie.</p>

<h2 style="text-align: justify;">Une révolution pour 2016 pour la gestion de paie !</h2>
<p style="text-align: justify;">A partir de 2016, la gestion de la paie va connaître un véritable revirement de situation avec <a href="http://fr.wikipedia.org/wiki/D%C3%A9claration_sociale_nominative" target="_blank">la DNS (Déclaration Sociale Nominative)</a>. Les employeurs devront déclarer les données sociales tous les mois et non plus annuellement. La DSN a pour but de se substituer à la quasi-totalité des déclarations sociales.</p>

<h2 style="text-align: justify;">Comment Aquastar Consulting peut vous aider ?</h2>
<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/gestion-metier/paye-rh/paie-rh" target="_blank">Solution de gestion de la paie : Sage</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1595</wp:post_id>
		<wp:post_date>2013-12-04 10:00:11</wp:post_date>
		<wp:post_date_gmt>2013-12-04 09:00:11</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>la-gestion-de-la-paie-veritable-casse-tete-pour-les-entreprises</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="cice"><![CDATA[CICE]]></category>
		<category domain="category" nicename="comptabilite-finances"><![CDATA[Comptabilité - Finances]]></category>
		<category domain="post_tag" nicename="paie"><![CDATA[Paie]]></category>
		<category domain="post_tag" nicename="projet-de-loi-de-finance"><![CDATA[projet de loi de finance]]></category>
		<category domain="post_tag" nicename="salaire"><![CDATA[salaire]]></category>
		<category domain="category" nicename="solutions-de-gestion"><![CDATA[Solutions de gestion]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[65]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[paie, cice, projet de loi de finance]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[La gestion de la Paie : Véritable casse-tête pour les entreprises]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Les personnes chargées d’établir la paie, ont dû ou devront faire face à des dispositions, à appliquer parfois dans l’urgence.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438727]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"182.9423002209408";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:17:"68.20889243960364";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"58.27490486283415";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"342";s:5:"score";s:17:"50.70861529795184";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"578";s:5:"score";s:17:"47.75448779838521";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"953";s:5:"score";s:18:"40.625237517309756";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"39.25815683969826";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"34.850595470798645";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"33.93991433593737";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"32.40263428816571";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1644]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"59.30360785306948";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:17:"25.39749784555059";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"24.542631464278497";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"18.99865157173091";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:18:"17.101203462875507";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"16.568184424241558";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"106.47264956790937";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"578";s:5:"score";s:18:"56.930563695785935";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"342";s:5:"score";s:17:"53.80827589071564";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"953";s:5:"score";s:18:"47.517774968487615";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:17:"42.66923543119556";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:16:"39.4033999088466";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"29.028059060417462";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:17:"27.89982093818916";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Impôts des entreprises : le fichier des écritures comptables devient obligatoire à partir du 1er janvier 2014</title>
		<link>http://www.it-news.fr/impots-des-entreprises-le-fichier-des-ecritures-comptables-devient-obligatoire-partir-du-1er-janvier-2014-2/</link>
		<pubDate>Fri, 06 Dec 2013 09:00:38 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1605</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><span style="font-size: 16px;"><a href="http://www.it-news.fr/wp-content/uploads/2013/12/ecriture-comptable-change-en-2014.jpg"><img class="alignleft size-full wp-image-1701" title="Impôt des entreprises: le fichier des écritures comptables devient obligatoire en 2014" alt="ecriture-comptable-change-en-2014" src="http://www.it-news.fr/wp-content/uploads/2013/12/ecriture-comptable-change-en-2014.jpg" width="320" height="210" /></a>À compter du 1er janvier 2014, les entreprises tenant leur comptabilité générale au moyen de systèmes informatisés (1) devront obligatoirement la remettre au vérificateur de l’administration fiscale sous la forme d’un fichier des écritures comptables (FEC) en cas de contrôle fiscal.</span></p>
<p style="text-align: right;"><!--more Lire la Suite--></p>
<p style="text-align: justify;">C’est ce qu’indique le nouvel <a href="http://www.legifrance.gouv.fr/affichCodeArticle.do?idArticle=LEGIARTI000018567134&amp;cidTexte=LEGITEXT000006069583" target="_blank">article A47 A-1 du Livre des Procédures Fiscales </a>: «<em>L’ensemble des données comptables et des écritures retracées dans tous les journaux comptables au titre d’un exercice est remis dans un fichier unique, dénommé fichier des écritures comptables, dans lequel celles-ci sont classées par ordre chronologique de validation</em> ».</p>
<p style="text-align: justify;">Le défaut de présentation de ce <a href="http://www.impots.gouv.fr/portal/dgi/public/popup?espId=2&amp;typePage=cpr02&amp;docOid=documentstandard_6619" target="_blank">FEC </a>sera passible d’une amende égale à 0,5 % du chiffre d’affaires déclaré ou rehaussé par exercice soumis à contrôle avec un minimum de 1500€. De plus, la présentation d’un fichier incomplet et/ou inexploitable pourra entraîner l’application de la procédure d’évaluation d’office (2), et le doute quant à la fiabilité ou la sincérité de celui-ci pourrait conduire au rejet de la comptabilité.</p>
<p style="text-align: justify;">Cette nouvelle disposition émane de la volonté de l’Administration Fiscale de continuer à<a href="http://www.it-news.fr/wp-content/uploads/2013/12/centre-des-impots1.jpg"><img class=" wp-image-1614 alignright" title="centre des impôts" alt="centre-des-impots" src="http://www.it-news.fr/wp-content/uploads/2013/12/centre-des-impots1.jpg" width="216" height="119" /></a> intégrer les progrès de l’informatique de gestion dans ses pratiques de contrôle fiscal externe. Ainsi, elle s’est une nouvelle fois appuyée sur les exigences du droit commercial pour les transposer dans le champ d’application fiscal, prolongeant ainsi une pratique plus que trentenaire (3).</p>
<p style="text-align: justify;">En effet, l’<a href="http://www.legifrance.gouv.fr/affichCodeArticle.do?cidTexte=LEGITEXT000005634379&amp;idArticle=LEGIARTI000006257931&amp;dateTexte=&amp;categorieLien=cid" target="_blank">article R123-173 du Code de Commerce</a> impose aux commerçants de tenir un livre journal, un grand livre et un livre d’inventaire.<strong> </strong>Il précise également que des documents sous forme électronique peuvent tenir lieu de livre journal et de livre inventaire, à condition qu’ils soient identifiés, numérotés et datés dès leur élaboration par des moyens offrant toute garantie en matière de preuve. Car, conformément à l’article 410-3 du plan comptable général, «<em>les comptabilités informatisées doivent permettre de reconstituer à partir des pièces justificatives, appuyant les données entrées, les éléments des comptes, états et renseignements, soumis à la vérification, ou, à partir de ces comptes, états et renseignements, de retrouver ces données et les pièces justificatives</em> ».</p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/12/fichier-decritures-comptables.jpg"><img class="alignleft  wp-image-1611" title="Fichier d'écritures comptables" alt="fichier-decritures-comptables" src="http://www.it-news.fr/wp-content/uploads/2013/12/fichier-decritures-comptables.jpg" width="259" height="195" /></a>Avec le FEC, le vérificateur pourra mieux orienter les axes de contrôle et cibler efficacement les demandes de traitement dans le cadre d’un contrôle fiscal informatisé. Ce document sera conservé aussi longtemps que sera exigée la présentation des documents comptables auxquels il se rapporte.</p>
<p style="text-align: justify;">Quant à l’entreprise pour s’éviter, en cas de doutes de l’Administration Fiscale, une procédure de rejet de comptabilité, il lui faudra être capable de démontrer que les modalités de constitution du FEC sont compatibles avec les exigences du droit commercial<b><strong>,</strong></b> qu’il a été constitué à une date proche de la clôture de l’exercice auquel il correspond et que son contenu n’a pas été altéré depuis son établissement.</p>
<p style="text-align: justify;">L’<a href="http://www.legifrance.gouv.fr/affichTexte.do?cidTexte=JORFTEXT000027788276&amp;dateTexte=&amp;categorieLien=id" target="_blank">arrêté du 29 juillet 2013 publié au JO le 1er août 2013 </a>a défini le format informatique des écritures comptables ainsi que les mentions obligatoires qui devront figurer dans ce fichier. Ce FEC devra être constitué des « écritures » de l’entreprise (opérations d’inventaire, reprise des soldes de l’exercice antérieur, etc.) classées par ordre chronologique de validation, qui correspondent à 18 champs au contenu clairement défini et décrits dans les textes, dont 3 correspondant aux dates.</p>
<p style="text-align: justify;">Sur ce point, et biens d’autres, de nombreuses questions sont posées et un exemple peut simplement en illustrer les différences :<strong> </strong>un commerçant a reçu le 3 octobre une facture d’un fournisseur établie le 28 septembre, mais il souhaite la comptabiliser sur la période de septembre non encore clôturée. Dans le FEC, il indiquera la date du 30 septembre sur le champ n°4, correspondant à la date de comptabilisation de l’écriture comptable. Le champ n°10, correspondant à la date de la pièce justificative, sera rempli avec la date du 28 septembre. Enfin, le champ n°16, correspondant à la date de validation de l’écriture comptable, sera rempli avec la date du 3 octobre. Le FEC devra être élaboré en fichier structuré, de type « txt » ou « xml », et non pas en « pdf », afin de permettre à l’Administration Fiscale de l’intégrer dans son logiciel d’analyse. Enfin, il est fortement recommandé de faire de l’établissement de ce FEC le dernier acte de la procédure de clôture d’exercice d’une entreprise.</p>
<p style="text-align: justify;">En élaborant ce FEC, l’entreprise satisfera donc à ses obligations de présentation de la comptabilité lors des contrôles, sans être obligée de fournir une documentation papier. Des aménagements et précisions sur ce fichier des écritures comptables seront apportés dans un prochain <a href="http://bofip.impots.gouv.fr/bofip/1-PGP.html" target="_blank">Bulletin Officiel des Finances Publiques.</a>
À noter toutefois : cette nouvelle disposition fiscale n’exempte pas les entreprises de satisfaire aux obligations du code de commerce (4) en matière de conservation des trois livres cités précédemment, registres comptables et pièces justificatives (bon de commande, de livraison ou de réception, facture client et fournisseur...) durant 10 ans.</p>
<p style="text-align: justify;">Comment Aquastar Consulting peut vous aider?</p>

<ul>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/gestion-metier/comptabilite-finances#" target="_blank">Solution de gestion  comptabilité-finance - Sage</a></li>
</ul>
<p style="text-align: justify;">-------------------------
1) cf. <a href="http://www.legifrance.gouv.fr/affichCodeArticle.do?idArticle=LEGIARTI000026949130&amp;cidTexte=LEGITEXT000006069583" target="_blank">Article L 47 A I nouveau du Livre des procédures fiscales</a> (article 14 de la 3ème Loi de Finances Rectificative pour 2012).
2) Prévue au second alinéa de l’<a href="http://www.legifrance.gouv.fr/affichCodeArticle.do;jsessionid=022686C0BB86906330E70BE15E4E82AA.tpdjo08v_1?idArticle=LEGIARTI000006315059&amp;cidTexte=LEGITEXT000006069583&amp;dateTexte=20080121" target="_blank">article L 74 du Livre des Procédures Fiscales</a>.
3) Depuis l’<a href="http://legifrance.gouv.fr/affichTexte.do?cidTexte=JORFTEXT000000515870" target="_blank">article 97-I de la Loi de Finances 1982</a> (création du contrôle des comptabilités informatisées).
4) <a href="http://legifrance.gouv.fr/affichCodeArticle.do?cidTexte=LEGITEXT000005634379&amp;idArticle=LEGIARTI000006219327" target="_blank">Article L 123-22 du code de commerce</a>.</p>
<p style="text-align: justify;">-----------
<a href="http://www.journaldunet.com/management/expert/55841/impots--des-entreprises---le-fichier-des-ecritures-comptables-devient-obligatoire-a-partir-du-1er-janvier-2014.shtml" target="_blank">Chronique co-rédigée avec Pascal SEGUIN, Avocat Associé, Taj, société d’avocats, membre de Deloitte Touche Tohmatsu Limited.</a></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1605</wp:post_id>
		<wp:post_date>2013-12-06 10:00:38</wp:post_date>
		<wp:post_date_gmt>2013-12-06 09:00:38</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>impots-des-entreprises-le-fichier-des-ecritures-comptables-devient-obligatoire-partir-du-1er-janvier-2014-2</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="comptabilite"><![CDATA[comptabilité]]></category>
		<category domain="category" nicename="comptabilite-finances"><![CDATA[Comptabilité - Finances]]></category>
		<category domain="category" nicename="decisionnel"><![CDATA[Décisionnel]]></category>
		<category domain="post_tag" nicename="ecritures-comptables"><![CDATA[écritures comptables]]></category>
		<category domain="category" nicename="paie-rh"><![CDATA[Paie - RH]]></category>
		<category domain="post_tag" nicename="procedure-fiscale"><![CDATA[procédure fiscale]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[63]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[écritures comptables, comptabilité, procédure fiscale]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[Le fichier des écritures comptables devient obligatoire à partir du 1er janvier 2014]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[À compter du 1er janvier 2014, les entreprises tenant leur comptabilité générale au moyen de systèmes informatisés (1) devront obligatoirement la remettre au vérificateur de l’administration fiscale sous la forme d’un fichier des écritures comptables (FEC) en cas de contrôle fiscal.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1425523357]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"239.6119263859338";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:18:"168.69053910414974";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2438";s:5:"score";s:18:"106.35918297835985";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:17:"74.19778460052838";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"70.94834824777949";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"63.53827382027584";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:17:"58.85620807821488";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2371";s:5:"score";s:17:"55.04983603865469";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2465";s:5:"score";s:17:"53.16448366260061";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2319";s:5:"score";s:17:"47.25413812943009";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1606]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"89.11273086480891";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:17:"63.81679988405644";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"33.141789869853696";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"24.72084623459775";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:18:"22.697644411505493";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"19.33018250912819";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"151.59179668568174";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:18:"107.10616748594256";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:17:"55.09132228036411";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"51.14894025218506";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2438";s:5:"score";s:17:"45.16327998115099";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"342";s:5:"score";s:17:"44.38808173038085";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"40.64958704187951";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:17:"37.32409966909465";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:12:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"238.80390139915914";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:17:"167.7785137340597";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2438";s:5:"score";s:18:"106.18368722523083";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:17:"73.54053974410309";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"70.96913442355722";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"63.711928306253874";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:16:"59.0756341849679";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2371";s:5:"score";s:17:"54.59123111180305";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2465";s:5:"score";s:18:"52.671550020036264";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2319";s:5:"score";s:17:"46.83763864135798";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:17:"36.56569928634052";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"33.77020106984789";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>La fin de Windows XP se rapproche!</title>
		<link>http://www.it-news.fr/la-fin-de-windows-xp-se-rapproche/</link>
		<pubDate>Thu, 05 Dec 2013 09:00:10 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1626</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/12/fin-du-support-Windows-XP.jpg"><img class="alignleft size-full wp-image-1642" title="La fin de Windows XP se rapproche!" alt="fin-du-support-Windows-XP" src="http://www.it-news.fr/wp-content/uploads/2013/12/fin-du-support-Windows-XP.jpg" width="320" height="210" /></a>C’est fini ! Dans un peu moins de 6 mois, le support Windows XP prendra fin.</p>
<p style="text-align: justify;">La conséquence directe est qu’il n’y aura plus de mises à jour, et donc plus de corrections si jamais il y avait de nouvelles failles de sécurité.</p>
<p style="text-align: right;"><!--more Lire la Suite--></p>
<p style="text-align: justify;"><span style="font-size: 16px;">Pour faire simple, votre ordinateur aura des brèches évidentes de sécurité qui feront que celui-ci sera de plus en plus victime de </span><a style="font-size: 16px;" href="http://fr.wikipedia.org/wiki/Malware" target="_blank">malwares</a><span style="font-size: 16px;"> exploitants justement ces failles. Et comme les éditeurs d’anti-virus ne considèrent plus les malwares comme des virus, votre système sera de plus en plus vulnérable.</span></p>
<p style="text-align: justify;">Plusieurs options s’offrent à vous.</p>
<p style="text-align: justify;"><b>Option n°1</b> : vous changez d’ordinateur, la plupart sont sous la dernière version de Windows.
<b>Option n°2</b> : vous gardez votre ordinateur et envisagez une migration vers <a href="http://windows.microsoft.com/fr-fr/windows-8/meet" target="_blank">Windows 8.</a> Il y a des conditions pour pouvoir effectuer cette migration :</p>

<ol style="text-align: justify;">
	<li> Un <a href="http://fr.wikipedia.org/wiki/Processeur_double_c%C5%93ur">processeur double-cœur</a> à 1GHz</li>
	<li> 1 ou 2 Mo de <a href="http://fr.wikipedia.org/wiki/M%C3%A9moire_vive">RAM</a></li>
	<li> Au minimum 20 Go de disque dur</li>
</ol>
<p style="text-align: justify;"><b>Option n°3</b> : Vous migrez vers <a href="http://www.ubuntu-fr.org/">Ubuntu</a>. Il faut savoir que le changement Windows-Linux est difficile et rares sont les personnes qui choisissent cette option.</p>
<p style="text-align: justify;"><span style="text-align: justify;">L’enjeu sera plus important pour les grandes entreprises que pour les particuliers, car moins de la moitié des grands comptes ont migré vers Windows 7 ou 8. La raison est principalement dûe au fait que les responsables informatiques supportent mal le changement et surtout exigent un système d’exploitation plus sûr et plus efficace.</span></p>
<span style="text-align: justify;">Comment Aquastar Consulting peut vous aider ?</span>
<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/systemes/materiels#" target="_blank">Aquastar Consulting vous accompagne dans ces changements</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1626</wp:post_id>
		<wp:post_date>2013-12-05 10:00:10</wp:post_date>
		<wp:post_date_gmt>2013-12-05 09:00:10</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>la-fin-de-windows-xp-se-rapproche</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="support"><![CDATA[support]]></category>
		<category domain="category" nicename="systemes"><![CDATA[Systèmes]]></category>
		<category domain="post_tag" nicename="windows-8"><![CDATA[Windows 8]]></category>
		<category domain="post_tag" nicename="windows-xp"><![CDATA[windows xp]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[81]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[windows xp]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[La fin de Windows XP se rapproche!]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Dans un peu moins de 6 mois, le support Windows XP prendra fin. Pour faire simple, si il est découvert sur votre ordinateur des brèches de sécurité, votre fournisseur ne fera rien pour les corriger.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"333.65421026450196";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:18:"186.24366918289158";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:18:"47.856442716894136";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1439";s:5:"score";s:17:"41.93821742620098";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"38.33977018159966";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1719";s:5:"score";s:17:"34.80629393586892";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"25.318738693848857";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2376";s:5:"score";s:18:"23.963781459082984";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"23.890584525879937";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:18:"22.432012071123232";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1642]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437410]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"103.0219554640701";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"60.66110309171221";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:18:"17.315224431262635";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"14.716658462913877";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"10.612386282022975";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:18:"10.075451265920428";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"190.33499146643277";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:18:"109.26414293657984";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1439";s:5:"score";s:17:"47.96878701751306";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1719";s:5:"score";s:17:"41.40165346942628";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:17:"28.33590882627346";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"24.217431157226677";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1066";s:5:"score";s:17:"16.79052349457483";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"16.612590636783807";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>2014 ou une année riche en Cyberattaque </title>
		<link>http://www.it-news.fr/2014-ou-une-annee-riche-en-cyberattaque/</link>
		<pubDate>Mon, 09 Dec 2013 09:00:48 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1719</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/12/La-securite-informatique-en-2014.jpg"><img class="alignleft size-full wp-image-1753" alt="La-securite-informatique-en-2014" src="http://www.it-news.fr/wp-content/uploads/2013/12/La-securite-informatique-en-2014.jpg" width="320" height="210" /></a>2014 sera une année riche en cyber-attaques (notamment sous Windows XP), en logiciels malveillants, mais aussi en innovations et en appareils « wearables » !</p>
<p style="text-align: justify;">C’est ce que prédit Fortinet, spécialiste en sécurité réseau haute performance. Il dévoile ses 5 principales prédictions pour 2014…</p>
<p style="text-align: right;"><!--more Lire la Suite--></p>
<b>
<strong>1. L’internet des objets et les systèmes de contrôle industriels seront les cibles de logiciels malveillants.</strong></b>
<p style="text-align: justify;">Plusieurs géants technologiques prévoient une stagnation des ventes de téléphones mobiles. Pour contrer ce phénomène, certains d’entre eux investissent dans de nouveaux marchés, comme celui des tablettes, des consoles de jeux, des appareils « <a href="http://www.linguee.fr/anglais-francais/traduction/wearable+devices.html" target="_blank">wearables </a>» - qui se portent sur soi -, des  équipements domotiques…</p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/12/internet-des-objets.jpg"><img class="aligncenter size-full wp-image-1747" alt="internet-des-objets" src="http://www.it-news.fr/wp-content/uploads/2013/12/internet-des-objets.jpg" width="600" height="360" /></a></p>
<p style="text-align: justify;"><a href="http://www.fortiguard.com/" target="_blank">FortiGuard</a> prédit que l’année prochaine, nous verrons les premiers exemples de logiciels malveillants sur ces nouveaux types d’appareils.</p>
<p style="text-align: justify;"><strong>2. La guerre pour le </strong><a href="http://fr.wikipedia.org/wiki/Web_profond" target="_blank">web profond</a></p>
Cette année 2013, nous avons pu être les témoins des actions du FBI contre les cybercriminels, notamment concernant <a href="http://fr.wikipedia.org/wiki/Tor_(r%C3%A9seau)" target="_blank">TOR</a> ou les services <a href="http://fr.wikipedia.org/wiki/Pair_%C3%A0_pair" target="_blank">P2P</a>.
<p style="text-align: justify;">Tor est l'acronyme de "The Onion Router", « le routeur oignon » en français. Il permet à son utilisateur de surfer sur internet de manière anonyme (quel que soit le navigateur utilisé). Pour ce faire, il utilise <a href="http://rebellyon.info/?L-anonymat-sur-Internet-grace-a-la" target="_blank">la technique du routage de l’oignon</a> (d’où son nom).</p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/12/deep-web.jpg"><img class="aligncenter size-full wp-image-1748" alt="deep-web" src="http://www.it-news.fr/wp-content/uploads/2013/12/deep-web.jpg" width="566" height="438" /></a></p>
<p style="text-align: justify;">En 2014, nous pouvons prédire que la surveillance plus minutieuse de ces services “anonymes” entraînera de nouvelles versions plus difficiles à infiltrer ou à démanteler.</p>
<strong>3. Les fournisseurs de sécurité réseau contraints de devenir plus transparents</strong>

La <a href="file:///C:/Users/ecalliati/AppData/Local/Microsoft/Windows/Temporary%20Internet%20Files/Content.Outlook/ZDIDO3J1/Federal%20Trade%20Commission" target="_blank">Federal Trade Commission</a> a récemment fait parler d’elle en sanctionnant pour la première fois une entreprise spécialisée dans les systèmes d’interconnexion, qui commercialisait une solution de vidéosurveillance censée être sécurisée et qui, preuve à l’appui, ne l’était pas.

<a href="http://www.it-news.fr/wp-content/uploads/2013/12/federal-trade-commission.jpg"><img class="aligncenter size-full wp-image-1749" alt="federal-trade-commission" src="http://www.it-news.fr/wp-content/uploads/2013/12/federal-trade-commission.jpg" width="225" height="225" /></a>
<p style="text-align: justify;">Ainsi, l’an prochain, FortiGuard prédit une plus grande transparence au niveau des fournisseurs de sécurité réseau. Notamment parce que les consommateurs n’accepteront plus, sans preuve, le discours marketing axé sur un « OS propriétaire doté d’une sécurité renforcée …». Ils exigeront des explications valides lorsqu’ils seront exposés à des risques injustifiés.</p>
<strong>4. Une augmentation des attaques ciblant Windows XP</strong>

Microsoft ne fournira plus de support à <a href="http://www.it-news.fr/la-fin-de-windows-xp-se-rapproche/" target="_blank">Windows XP à partir du 8 Avril 2014</a>. Par conséquent, si une vulnérabilité de Windows XP est découverte après cette date, Microsoft ne la corrigera pas.
<p style="text-align: justify;">FortiGuard prédit que les hackers, déjà en possession « d’exploits <a href="http://fr.wikipedia.org/wiki/Vuln%C3%A9rabilit%C3%A9_zero-day" target="_blank">zero day</a> », attendront le 8 avril pour les vendre au plus offrant.</p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/12/rip.jpg"><img class="aligncenter size-full wp-image-1750" alt="rip" src="http://www.it-news.fr/wp-content/uploads/2013/12/rip.jpg" width="256" height="256" /></a></p>
<p style="text-align: justify;">En raison des prix élevés espérés, ces « zero days » seront probablement utilisés pour lancer des attaques ciblées contre les entreprises et particuliers à grande échelle, plutôt que pour les faire mettre en œuvre par des cybercriminels lambda, le but étant de propager des infections massives.</p>
<strong>5. Les solutions d’authentification </strong><a href="http://www.biometrie-online.net/" target="_blank">biométrique</a>s<strong> augmenteront</strong>

Cette année, Apple a devancé les attentes en intégrant une authentification par empreinte digitale sur ses iPhones 5S. Il importe peu pour les Apple-lovers que celle-ci ait été piratée seulement quelques jours après sa commercialisation.
<p style="text-align: justify;">Du coup, les utilisateurs de smartphones ont commencé à parler de l’importance d’une authentification à deux facteurs dans un monde où la connexion par <a href="http://www.it-news.fr/mot-passe-proteger-du-piratage/?preview=true&amp;preview_id=940&amp;preview_nonce=0ec81fbac8&amp;post_format=standard" target="_blank">un seul mot de passe</a> ne suffit plus pour éloigner les cyber-voleurs.</p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/12/solution-biométrique.jpg"><img class="aligncenter size-full wp-image-1751" alt="solution-biométrique" src="http://www.it-news.fr/wp-content/uploads/2013/12/solution-biométrique.jpg" width="800" height="495" /></a></p>
<p style="text-align: justify;">2014 serait donc une année où nous verrons plus d’appareils mobiles incluant un deuxième facteur d’authentification. Nous verrons également une augmentation de nouvelles formes d’authentification, telles que les tatouages, scans de l’iris et reconnaissances faciales.</p>
<p style="text-align: justify;"><strong>Comment Aquastar Consulting peut vous aider ?</strong></p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls">Solution de sécurité internet </a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/securite-des-donnees" target="_blank">Solution de Chiffrement - Sophos</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1719</wp:post_id>
		<wp:post_date>2013-12-09 10:00:48</wp:post_date>
		<wp:post_date_gmt>2013-12-09 09:00:48</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>2014-ou-une-annee-riche-en-cyberattaque</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="2014"><![CDATA[2014]]></category>
		<category domain="post_tag" nicename="anonymous"><![CDATA[Anonymous]]></category>
		<category domain="post_tag" nicename="authentification"><![CDATA[authentification]]></category>
		<category domain="post_tag" nicename="cyberattaque"><![CDATA[Cyberattaque]]></category>
		<category domain="category" nicename="decisionnel"><![CDATA[Décisionnel]]></category>
		<category domain="post_tag" nicename="deepweb"><![CDATA[deepweb]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<category domain="post_tag" nicename="virus"><![CDATA[virus]]></category>
		<category domain="post_tag" nicename="windows-xp"><![CDATA[windows xp]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[67]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[2014, cyberattaque, virus, anonymous, windows XP, deepweb, authentification]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[2014 ou une année riche en Cyberattaque]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[C’est ce que prédit Fortinet, spécialiste en sécurité réseau haute performance. Il dévoile les 5 principales prédictions pour 2014 …]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437703]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:16:"148.781362063433";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:18:"148.13457062642945";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:18:"127.84598081196194";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:18:"124.87500300704758";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:18:"110.16601180051589";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:16:"99.9058270198324";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1476";s:5:"score";s:17:"83.65212498136616";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1773";s:5:"score";s:17:"62.43750150352379";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:3:"736";s:5:"score";s:17:"46.25952471984109";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:17:"44.76902603160515";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1753]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:17:"58.46979273045518";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"54.563260761418505";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:18:"44.124306374012356";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:17:"43.39412181489656";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:18:"41.162686301754455";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"35.98545615514418";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:17:"96.90633756405147";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"93.46083842954295";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1476";s:5:"score";s:16:"86.8890189637078";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"77.31342020119406";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:17:"71.32925055369452";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:17:"71.32925055369452";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1773";s:5:"score";s:17:"70.26643789102917";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"61.402617588770525";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:12:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"147.91510831091182";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:18:"147.17878012765954";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:18:"127.24688303078608";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:18:"124.32608434962685";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:18:"109.61709314538341";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"99.39626599152001";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1476";s:5:"score";s:17:"83.36202700768182";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1773";s:5:"score";s:18:"62.163042174813434";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:3:"736";s:5:"score";s:17:"46.12229505536176";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:17:"44.41233331028049";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"40.48671967789472";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"1626";s:5:"score";s:17:"34.62794757516147";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:comment>
			<wp:comment_id>1138</wp:comment_id>
			<wp:comment_author><![CDATA[[BLOCKED BY STBV] Les tendances de la Cybersécurité en 2014 | L'actualité pour décideurs informatiquesL'actualité pour décideurs informatiques]]></wp:comment_author>
			<wp:comment_author_email></wp:comment_author_email>
			<wp:comment_author_url>http://www.it-news.fr/les-tendances-de-la-cybersecurite-en-2014/</wp:comment_author_url>
			<wp:comment_author_IP>37.187.41.26</wp:comment_author_IP>
			<wp:comment_date>2014-01-30 08:38:35</wp:comment_date>
			<wp:comment_date_gmt>2014-01-30 07:38:35</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[[&#8230;] entreprises, quelles que soient leurs activités, reconnaissent l’importance de la cybersécurité, ainsi que les risques qui y sont liés. Elles admettent également, qu’elles ont encore beaucoup [&#8230;]]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type>pingback</wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
	</item>
	<item>
		<title>La France, championne européenne du BYOD</title>
		<link>http://www.it-news.fr/la-france-championne-europeenne-du-byod/</link>
		<pubDate>Tue, 10 Dec 2013 09:00:54 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1722</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/12/drapeau-francais.jpg"><img class="alignleft size-full wp-image-1726" alt="drapeau-francais" src="http://www.it-news.fr/wp-content/uploads/2013/12/drapeau-francais.jpg" width="320" height="210" /></a></p>
<p style="text-align: justify;">La France, championne européenne du BYOD</p>
<p style="text-align: justify;">Les entreprises françaises sont parmi les premières en Europe à encourager leurs employés à utiliser leurs propres matériels. C’est ce que l’on appelle le <a href="http://fr.wikipedia.org/wiki/BYOD">BYOD</a> (Bring Your Own Device).</p>
<p style="text-align: right;"><!--more Lire la Suite--></p>
<p style="text-align: justify;">Au niveau international, c’est la Chine qui remporte la première place.</p>
<p style="text-align: justify;">D’après l’étude sur la gestion de la mobilité menée par <a href="http://www.vansonbourne.com/">Vanson Bourne</a> pour <a href="http://www.citrix.fr/">Citrix</a>, 29% des employés dans le monde utiliseraient même leurs propres applications mobiles pour travailler.</p>
<p style="text-align: justify;">Contrairement à ce que l’on pourrait croire, les employés ne vont pas porter leur attention en priorité sur la messagerie instantanée, les réseaux sociaux ou les outils de partages, mais sur les applications dédiées à la vente, à la gestion de la relation client ou encore à l’accès aux bases de données.</p>
<p style="text-align: justify;">Les bénéfices attendus de cette tendance à l’« entreprise mobile » sont à la fois individuels et collectifs. 45 % des sondés français avancent une exécution plus rapide des tâches et 49 % une meilleure motivation des employés.</p>
<p style="text-align: justify;">L’obstacle majeur à la mise en place de politiques de mobilité est l’hétérogénéité des systèmes d’exploitation mobiles.</p>
<p style="text-align: justify;">En France, 60% des entreprises déclarent supporter les plateformes mobiles <a href="http://fr.wikipedia.org/wiki/Android">Android</a>, et 34% les plateformes <a href="http://fr.wikipedia.org/wiki/IOS_(Cisco)">iOS</a>. Les moyennes mondiales, elles, sont plus élevées : 72% pour Android et 54% pour iOS.</p>
<p style="text-align: justify;">Comment Aquastar Consulting peut vous aider ?</p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/reseau-mobilite/byod-mdm#" target="_blank">Solution BYOD - Aruba Networks</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls#" target="_blank">Solution de sécurité Internet - Palo Alto Networks et Netasq</a></li>
</ul>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/12/france-championne-en-matière-de-byod.png"><img class="size-full wp-image-1724 aligncenter" title="La France, championne en matière de BYOD" alt="france-championne-en-matière-de-byod" src="http://www.it-news.fr/wp-content/uploads/2013/12/france-championne-en-matière-de-byod.png" width="640" height="2253" /></a></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1722</wp:post_id>
		<wp:post_date>2013-12-10 10:00:54</wp:post_date>
		<wp:post_date_gmt>2013-12-10 09:00:54</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>la-france-championne-europeenne-du-byod</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="byod"><![CDATA[BYOD]]></category>
		<category domain="category" nicename="reseaux-et-mobilite"><![CDATA[Réseaux et mobilité]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[81]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[byod]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[La France, championne européenne du BYOD]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[La France, championne européenne du BYOD. Les entreprises françaises sont parmi les premières en Europe à encourager leurs employés à utiliser leurs propres matériels.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2266";s:5:"score";s:18:"117.74088053154776";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2354";s:5:"score";s:17:"99.50449543484373";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"56.83780745043777";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"223";s:5:"score";s:18:"41.149953988394415";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1454";s:5:"score";s:17:"36.44935690616856";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"36.28381133480688";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2465";s:5:"score";s:17:"33.77765238689787";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"820";s:5:"score";s:17:"33.20430253814372";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2400";s:5:"score";s:18:"32.971513564634094";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"30.391830356553598";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1726]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437738]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"18.889151839410413";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"13.53576697341503";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"12.527842614818283";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1789";s:5:"score";s:18:"10.591858402486736";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:17:"9.251543078374382";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1868";s:5:"score";s:17:"8.644263686185148";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2266";s:5:"score";s:17:"66.37112891163375";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"223";s:5:"score";s:18:"47.438752056095694";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1454";s:5:"score";s:17:"42.48583686537275";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2354";s:5:"score";s:17:"39.18393870277078";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"820";s:5:"score";s:17:"37.66165759952982";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1444";s:5:"score";s:17:"36.08274387780178";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"34.51719405212151";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1257";s:5:"score";s:16:"34.0165953435402";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:comment>
			<wp:comment_id>1148</wp:comment_id>
			<wp:comment_author><![CDATA[[BLOCKED BY STBV] Les tendances IT pour 2014 | L&#039;actualité pour décideurs informatiquesL&#039;actualité pour décideurs informatiques]]></wp:comment_author>
			<wp:comment_author_email></wp:comment_author_email>
			<wp:comment_author_url>http://www.it-news.fr/les-tendances-pour-2014/</wp:comment_author_url>
			<wp:comment_author_IP>37.187.41.26</wp:comment_author_IP>
			<wp:comment_date>2014-03-03 10:17:57</wp:comment_date>
			<wp:comment_date_gmt>2014-03-03 09:17:57</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[[&#8230;] Pour la plus grande majorité, ils ont déjà réussi à intégrer les services de Cloud et à gérer la multiplication des terminaux mobiles (BYOD). [&#8230;]]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type>pingback</wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
		<wp:comment>
			<wp:comment_id>1154</wp:comment_id>
			<wp:comment_author><![CDATA[[BLOCKED BY STBV] Sécurité informatique : les entreprises sous-estiment leurs employés | L&#039;actualité pour décideurs informatiquesL&#039;actualité pour décideurs informatiques]]></wp:comment_author>
			<wp:comment_author_email></wp:comment_author_email>
			<wp:comment_author_url>http://www.it-news.fr/securite-informatique-les-entreprises-estiment-leurs-employes/</wp:comment_author_url>
			<wp:comment_author_IP>37.187.41.26</wp:comment_author_IP>
			<wp:comment_date>2014-03-28 10:16:27</wp:comment_date>
			<wp:comment_date_gmt>2014-03-28 09:16:27</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[[&#8230;] l’essor du BYOD, ce ne sont pas les appareils mobiles qui sont concernés par ces attaques. D’après l’étude, [&#8230;]]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type>pingback</wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
	</item>
	<item>
		<title>Les 4 critères pour choisir sa solution de dématérialisation </title>
		<link>http://www.it-news.fr/les-4-criteres-pour-choisir-sa-solution-de-dematerialisation/</link>
		<pubDate>Wed, 11 Dec 2013 09:00:40 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1728</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/12/les-4-criteres-pour-choisir-sa-solution-de-dematerialisation.jpg"><img class="alignleft size-full wp-image-1729" title="Les 4 critères pour choisir sa solution de dématérialisation " alt="les-4-criteres-pour-choisir-sa-solution-de-dematerialisation" src="http://www.it-news.fr/wp-content/uploads/2013/12/les-4-criteres-pour-choisir-sa-solution-de-dematerialisation.jpg" width="320" height="210" /></a></p>
<p style="text-align: justify;">Le Baromètre Dématérialisation Finance 2013 a, pour la cinquième année consécutive, discuté des problématiques et des nouvelles tendances liées à la dématérialisation des processus Achats-Fournisseurs.</p>
<p style="text-align: right;"><!--more Lire la Suite--></p>
<p style="text-align: justify;">Il met en avant 4 critères à prendre en compte avant de choisir <a href="http://www.it-news.fr/impots-des-entreprises-le-fichier-des-ecritures-comptables-devient-obligatoire-partir-du-1er-janvier-2014/">une solution de dématérialisation</a> : l’interopérabilité, la présence de tableaux de bord, d’une version mobile et d’un portail fournisseurs.</p>
<a href="http://www.aquastar-consulting.com/index.php/solutions/gestion-metier/gestion-commerciale/pilotage" target="_blank"><strong>L’aide au pilotage grâce au reporting</strong></a>
<p style="text-align: justify;">Initialement axés sur l’expertise comptable et financière, les DAF évoluent de plus en plus vers la maîtrise des risques et l’optimisation des coûts.</p>
<p style="text-align: justify;">Ainsi, 84% des personnes interrogées estiment impératif que la solution de dématérialisation ait la capacité de fournir des tableaux de bord avec des indicateurs de performance.</p>
<strong>L’agilité avec des outils interopérables.</strong>
<p style="text-align: justify;">Le besoin d’outils pour piloter la performance est indissociable du besoin de prendre en compte des données provenant de systèmes hétérogènes.</p>
<p style="text-align: justify;">82% des sondés considèrent d'ailleurs comme important que la solution de dématérialisation soit suffisamment agile pour <strong>gérer des applicatifs hétérogènes</strong>, mais aussi pour s’adapter à des changements organisationnels rapides.</p>
<strong>Des portails pour collaborer avec les fournisseurs.</strong>
<p style="text-align: justify;">Les DAF se servent de plus en plus d’outils comme les <a href="http://fr.wikipedia.org/wiki/Workflow" target="_blank">workflows</a> et les portails fournisseurs. 64% d’entre eux estiment qu’il est important pour les relations commerciales que les fournisseurs aient un accès sécurisé et instantané à leurs factures et à leurs statuts via un portail dédié.</p>
<strong>Des solutions adaptées pour les mobiles.</strong>
<ul>
	<li>
<div style="text-align: justify;">30% des directeurs financiers sont équipés d’appareils mobiles (smartphones, tablettes…).</div></li>
	<li>
<div style="text-align: justify;">30% d’entre eux s’en servent pour piloter leur activité, 23% pour consulter des documents,</div></li>
	<li>
<div style="text-align: justify;">19% pour leurs processus collaboratifs.</div></li>
	<li>
<div style="text-align: justify;">Par conséquent, 42% des DAF pensent à la nécessité d’avoir des solutions adaptées aux terminaux mobiles, pour  pouvoir consulter ou valider leurs demandes d’achats ou de  factures.</div></li>
</ul>
<p style="text-align: justify;"><span style="color: #ff6600;"><strong>Comment Aquastar Consulting peut vous aider ?</strong></span></p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/gestion-metier/gestion-commerciale/efacture" target="_blank">Solution de dématérialisation des factures – Sage</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1728</wp:post_id>
		<wp:post_date>2013-12-11 10:00:40</wp:post_date>
		<wp:post_date_gmt>2013-12-11 09:00:40</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>les-4-criteres-pour-choisir-sa-solution-de-dematerialisation</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="dematerialisation"><![CDATA[dématérialisation]]></category>
		<category domain="post_tag" nicename="edi"><![CDATA[edi]]></category>
		<category domain="category" nicename="edi-ged"><![CDATA[EDI - GED]]></category>
		<category domain="post_tag" nicename="efacture"><![CDATA[efacture]]></category>
		<category domain="post_tag" nicename="facture-electronique"><![CDATA[facture electronique]]></category>
		<category domain="post_tag" nicename="mobilite"><![CDATA[Mobilité]]></category>
		<category domain="post_tag" nicename="pilotage"><![CDATA[pilotage]]></category>
		<category domain="post_tag" nicename="reporting"><![CDATA[reporting]]></category>
		<category domain="category" nicename="reseaux-et-mobilite"><![CDATA[Réseaux et mobilité]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[84]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[dématérialisation]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[Les 4 critères pour choisir sa solution de dématérialisation]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Il met en avant 4 critères à prendre en compte avant de choisir une solution de dématérialisation : l’interopérabilité, la présence de tableaux de bord, d’une version mobile et d’un portail fournisseurs.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1588";s:5:"score";s:18:"155.35374623741166";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2266";s:5:"score";s:18:"124.66739535810663";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:17:"85.33880276333622";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"336";s:5:"score";s:17:"85.09808596576732";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2406";s:5:"score";s:17:"82.38336458424217";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"126";s:5:"score";s:17:"74.41477397756388";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1681";s:5:"score";s:17:"71.18303200290066";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:16:"52.7016170498143";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"41.30421052147588";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:16:"40.9320503937132";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438694]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2266";s:5:"score";s:17:"35.33686564708234";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:18:"30.263534528847664";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"20.556818727706467";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"15.742454269638756";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"13.959873601896243";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"13.039753070024014";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1729]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1588";s:5:"score";s:17:"155.6740086693029";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"336";s:5:"score";s:17:"87.61394117528523";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2406";s:5:"score";s:17:"84.26439827252075";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"126";s:5:"score";s:17:"74.94086042828584";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1681";s:5:"score";s:17:"70.89035157811324";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2266";s:5:"score";s:17:"68.15683848761648";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:17:"51.17929636360152";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"789";s:5:"score";s:17:"45.50894011923866";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Cloud et virtualisation se battent pour plus de sécurité</title>
		<link>http://www.it-news.fr/cloud-et-virtualisation-se-battent-pour-plus-de-securite/</link>
		<pubDate>Thu, 12 Dec 2013 09:00:14 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1731</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/12/cloud-et-virtualisation-se-battent-pour-plus-de-sécurité.jpg"><img class="alignleft size-full wp-image-1737" alt="cloud-et-virtualisation-se-battent-pour-plus-de-sécurité" src="http://www.it-news.fr/wp-content/uploads/2013/12/cloud-et-virtualisation-se-battent-pour-plus-de-sécurité.jpg" width="320" height="210" /></a>Nous le savons tous, le temps passe très vite,  les innovations arrivent tellement rapidement que l’on n’a pas le temps de s’habituer à une version qu’une autre, plus performante, arrive sur le marché.</p>
<p style="text-align: justify;">Le gouvernement non plus n’y échappe pas et doit aussi s’adapter…</p>
<p style="text-align: right;"><!--more Lire la Suite--></p>
<p style="text-align: justify;">Les législations en matière de sécurité informatique doivent sans cesse être renouvelées. Les techniques évoluent si vite qu’il devient très difficile de faire face aux menaces toujours de plus en plus innovantes et nombreuses.</p>
<p style="text-align: justify;">Les <a href="http://www.it-news.fr/partage-de-fichiers-les-regles-sont-de-plus-en-plus-contournees/">politiques de sécurité</a> des entreprises sont en train de changer même si les grands principes restent les mêmes.</p>
<p style="text-align: justify;">Lors de la récente <a href="http://www.mcafeesecuritysummit.fr/">conférence organisée par McAfee</a>, un des principaux éditeurs de sécurité informatique, dont la thématique principale était « <i>La permanente évolution des risques</i> », Gert-Jan Schenk – directeur Europe chez <a href="http://www.mcafee.com/fr/">McAfee</a> – a expliqué que « <i>si la nature des attaques se modifiait en permanence, la législation, elle aussi, ne cessait d’évoluer avec de nouvelles obligations concernant tous les secteurs d’activités (banques, assurances, commerce international) remettant sans cesse en cause les objectifs de sécurité et de conformités, en particulier celle de la virtualisation.</i> »</p>
<p style="text-align: justify;">Du côté des entreprises et des hébergeurs, la <a href="http://www.it-news.fr/lorsque-cloud-fait-peur-aux-entreprises/">sécurité informatique</a> est devenue une véritable obsession pour les DSI. Notamment en ce qui concerne les solutions de Cloud, qui suscite encore une grande méfiance et ceux malgré le renforcement de la sécurité des données.</p>
<p style="text-align: justify;">C’est pourquoi de plus en plus d’entreprises qui investissent dans des solutions en SaaS investissent également dans un <a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls">pare-feu</a> (firewall) de dernière génération.</p>
<p style="text-align: justify;">En effet, selon <a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls/palo-alto">Palo Alto Networks</a>, éditeur international de solutions de firewall, <b>le point majeur à surveiller est le renforcement des contrôles d’accès</b>.</p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/12/palo-alto-firewall.png"><img class="aligncenter size-full wp-image-1767" alt="palo-alto-firewall" src="http://www.it-news.fr/wp-content/uploads/2013/12/palo-alto-firewall.png" width="351" height="199" /></a></p>
<p style="text-align: justify;">Toujours selon l’éditeur, l’une des meilleures pratiques serait d’établir une segmentation des ressources du serveur selon des niveaux de confiance et de réserver des espaces et des canaux de communications spécifiques.</p>
<p style="text-align: justify;">Toutefois, pour arriver à ce niveau de détail, seuls les firewalls de dernière génération peuvent le faire car ils vous assurent une protection périmétrique du même type que ceux des « <i>châteaux forts</i> ».</p>
<p style="text-align: justify;">En résumé, Cloud et Virtualisation sont toujours au centre des débats et des mêmes problématiques de sécurité.</p>
<p style="text-align: justify;">Le risque ne peut diminuer que s’il y a segmentation et isolation des différents processus et en les réservant à des utilisateurs bien identifiés. Toutefois, cela n’empêchera pas les cybercriminels de s’attaquer directement à vos espaces de stockages et/ou à vos différents points d’entrée pour s’infiltrer dans vos systèmes d’informations.</p>
<p style="text-align: justify;"><strong>Soyez vigilant, et faites appel à un prestataire informatique reconnu dans le domaine de la sécurité informatique !</strong></p>
<p style="text-align: justify;"><span style="color: #ff6600;"><strong>Comment Aquastar Consulting peut vous aider ?</strong></span></p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securte/firewalls">Solution de sécurité internet – Palo Alto Networks</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1731</wp:post_id>
		<wp:post_date>2013-12-12 10:00:14</wp:post_date>
		<wp:post_date_gmt>2013-12-12 09:00:14</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cloud-et-virtualisation-se-battent-pour-plus-de-securite</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="legislation"><![CDATA[législation]]></category>
		<category domain="post_tag" nicename="mcafee"><![CDATA[mcafee]]></category>
		<category domain="post_tag" nicename="palo-alto-networks"><![CDATA[Palo Alto Networks]]></category>
		<category domain="category" nicename="reseaux-et-mobilite"><![CDATA[Réseaux et mobilité]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<category domain="post_tag" nicename="securite-2"><![CDATA[sécurité]]></category>
		<category domain="post_tag" nicename="virtualisation"><![CDATA[Virtualisation]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[83]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[cloud et virtualisation]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[Cloud et virtualisation se battent pour plus de sécurité]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Nous le savons tous, le temps passe très vite, les innovations arrivent tellement rapidement que l’on n’a pas le temps de s’habituer à une version qu’une autre, plus performante, arrive sur le marché.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"127.00267862153376";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1741";s:5:"score";s:17:"79.78561391202986";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"70.53459365251629";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"55.34739375355367";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:17:"51.71458806838707";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1108";s:5:"score";s:17:"48.76366984448384";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"880";s:5:"score";s:18:"48.470833918694346";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1434";s:5:"score";s:18:"42.416018854741175";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"1571";s:5:"score";s:17:"41.97720335491754";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:3:"820";s:5:"score";s:17:"41.74766390858415";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438518]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:15:"38.107782695697";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"24.584172369811196";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"22.74664431140126";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"19.286433286607032";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"16.767233282023252";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:17:"16.13066317376378";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1737]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1741";s:5:"score";s:17:"81.68218960140902";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:17:"70.74776819119478";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"880";s:5:"score";s:18:"52.145150597578066";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1108";s:5:"score";s:17:"51.24440818376249";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1434";s:5:"score";s:17:"45.56673196865386";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"820";s:5:"score";s:17:"43.92340761007323";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"42.841013629958525";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1571";s:5:"score";s:17:"42.77516666192995";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Vos données sont-elles bien cryptées ?</title>
		<link>http://www.it-news.fr/vos-donnees-sont-elles-bien-cryptees/</link>
		<pubDate>Fri, 13 Dec 2013 09:00:41 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1741</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/12/vos-donnees-sont-elles-cryptees.jpg"><img class="alignleft size-full wp-image-1742" title="Vos données sont-elles cryptées?" alt="vos-donnees-sont-elles-cryptees" src="http://www.it-news.fr/wp-content/uploads/2013/12/vos-donnees-sont-elles-cryptees.jpg" width="320" height="210" /></a>Voici une cartographie qui risque de vous intéresser si vous avez des données personnelles (compte, mot de passe, adresse…) chez certains géants technologiques comme Apple, Amazon, Google, Facebook, Dropbox, Yahoo, Twitter, etc.</p>
<p style="text-align: right;"><!--more Lire la Suite--></p>
<p style="text-align: justify;">L’<a href="https://www.eff.org/" target="_blank">Electronic Frontier Foundation</a> a étudié 18 des géants technologiques pour dresser un bilan sur leur façon de crypter les données de leurs utilisateurs et découvrir comment ils les protègent.</p>
<p style="text-align: justify;">Vous serez surpris de découvrir les mauvais élèves dans ce classement (comme par exemple <a href="http://www.microsoft.com/fr-fr/default.aspx" target="_blank">Microsoft</a>).</p>
<p style="text-align: justify;">A vous de juger !</p>
<p style="text-align: justify;"><span style="color: #ff6600;"><strong>Comment Aquastar Consulting peut vous aider ?</strong></span></p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/securite-des-donnees" target="_blank">Solution de chiffrement des données – Sophos</a></li>
</ul>
<p style="text-align: center;"><a href="http://www.it-news.fr/wp-content/uploads/2013/12/infographie-cryptage-des-données-chez-les-geants-informatiques.jpg"><img class="aligncenter size-full wp-image-1743" title="Infographie cryptage des données chez les géants informatiques" alt="infographie-cryptage-des-données-chez-les-geants-informatiques" src="http://www.it-news.fr/wp-content/uploads/2013/12/infographie-cryptage-des-données-chez-les-geants-informatiques.jpg" width="640" height="1263" /></a></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1741</wp:post_id>
		<wp:post_date>2013-12-13 10:00:41</wp:post_date>
		<wp:post_date_gmt>2013-12-13 09:00:41</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>vos-donnees-sont-elles-bien-cryptees</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="chiffrement"><![CDATA[chiffrement]]></category>
		<category domain="post_tag" nicename="cryptage"><![CDATA[cryptage]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<category domain="post_tag" nicename="securite-2"><![CDATA[sécurité]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[69]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[données]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[Vos données sont-elles bien cryptées ?]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Voici une cartographie qui risque de vous intéresser si vous avez des données personnelles (compte, mot de passe, adresse…) chez certains géants technologiques comme Apple, Amazon, Google, Facebook, Dropbox, Yahoo, Twitter, etc.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1731";s:5:"score";s:17:"39.89280695601493";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"880";s:5:"score";s:17:"39.28137754478841";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"820";s:5:"score";s:17:"36.14920260203453";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1434";s:5:"score";s:17:"35.04573154931809";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"29.971446609355088";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1391";s:5:"score";s:18:"23.568489203463987";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:18:"22.378366273296027";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2125";s:5:"score";s:18:"21.878203416837763";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"21.878203416837763";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"19.388301626787335";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1425086164]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"12.329017598219453";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:18:"11.357649462471933";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:17:"10.62129192598444";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2125";s:5:"score";s:17:"9.024276533563603";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:17:"9.024276533563603";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:17:"8.369799411891538";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1742]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:3:"880";s:5:"score";s:18:"41.177873336362666";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1731";s:5:"score";s:17:"41.06626365457767";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"820";s:5:"score";s:17:"37.56786394440652";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1434";s:5:"score";s:17:"36.52889657115146";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1391";s:5:"score";s:18:"25.990890612813992";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"19.778042331482098";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1465";s:5:"score";s:18:"19.526648509603866";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:17:"17.49010627705406";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:12:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1731";s:5:"score";s:17:"39.72700537604487";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"880";s:5:"score";s:18:"39.112197585834814";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"820";s:5:"score";s:17:"36.00550069438409";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1434";s:5:"score";s:17:"34.90540802093016";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"29.75410868091324";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1391";s:5:"score";s:17:"23.47574339879587";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:18:"22.224720984155965";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2125";s:5:"score";s:17:"21.72455812866427";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:17:"21.72455812866427";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"19.286389420458843";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:4:"1465";s:5:"score";s:18:"17.267851682471523";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"16.82715825961863";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Le botnet Pony compromet 2 millions de mots de passe</title>
		<link>http://www.it-news.fr/le-botnet-pony-compromet-2-millions-de-mots-de-passe/</link>
		<pubDate>Wed, 18 Dec 2013 09:00:10 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1773</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/12/pony-botnet.jpg"><img class="size-full wp-image-1774 alignleft" title="Le botnet Pony compromet 2 millions de mots de passe" alt="pony-botnet" src="http://www.it-news.fr/wp-content/uploads/2013/12/pony-botnet.jpg" width="320" height="210" /></a>Un <a href="http://fr.wikipedia.org/wiki/Botnet">botnet</a> est un réseau étendu de machines fantômes, généralement utilisé pour des usages malveillants (envoi de spams, virus …).</p>
<p style="text-align: justify;">« Pony », un botnet créé par des cybercriminels, a réussi à collecter plus de 2 millions de mots de passes issus des réseaux sociaux, de service en ligne, et du logiciel de paie ADP.</p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;">C’est ainsi que des chercheurs en sécurité de <a href="http://spideruci.org/" target="_blank">SpiderLab</a> ont découvert une importante fuite de base de données composée majoritairement d’identifiants et de mots de passe volés.</p>
<p style="text-align: justify;">Des accès aux comptes de la solution de paie ADP se trouvent sur cette base de données. De même que des comptes FTP ou remote desktop.</p>
<p style="text-align: justify;">Selon SpiderLab, le vol renfermerait 1.58 millions d’identifiants de sites Web et 320 000 pour des webmails.</p>
<p style="text-align: justify;"><span style="color: #ff6600;"><strong>Comment Aquastar Consulting peut vous aider ?</strong></span></p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls" target="_blank">Solution de sécurité internet : Palo Alto Networks et Netasq    </a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/securite-des-donnees" target="_blank">Solution de chiffrement : Sophos Guard</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/authentification" target="_blank">Solution d’authentification : Imprivat</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1773</wp:post_id>
		<wp:post_date>2013-12-18 10:00:10</wp:post_date>
		<wp:post_date_gmt>2013-12-18 09:00:10</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>le-botnet-pony-compromet-2-millions-de-mots-de-passe</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="cyberattaque"><![CDATA[Cyberattaque]]></category>
		<category domain="post_tag" nicename="pony"><![CDATA[pony]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[74]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[botnet]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[Le botnet Pony compromet 2 millions de mots de passe]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[« Pony », un botnet créé par des cybercriminels, a réussi à collecter plus de deux millions de mots de passes issus des réseaux sociaux, des services en ligne, et du logiciel de paie ADP.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:18:"124.87500300704758";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:16:"65.7742325734606";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1476";s:5:"score";s:17:"41.95957883412977";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1172";s:5:"score";s:17:"41.73190855041446";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:17:"40.92915219092688";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2330";s:5:"score";s:18:"35.075728897768855";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1719";s:5:"score";s:18:"31.218750751761895";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"26.16668451029003";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"1940";s:5:"score";s:18:"18.798516318411032";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2376";s:5:"score";s:18:"17.663524492942003";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1423931311]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:17:"39.47910846986034";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:17:"24.83944557771973";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:17:"16.31948717869515";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1940";s:5:"score";s:18:"15.135385049880497";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:18:"13.173726544357045";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1786";s:5:"score";s:18:"11.627346767890081";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1774]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:17:"70.47872917055813";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1476";s:5:"score";s:18:"47.742712484780824";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1172";s:5:"score";s:18:"46.985839612678085";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:17:"40.33933834475191";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1719";s:5:"score";s:17:"35.23936458527906";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"26.515722838238904";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1779";s:5:"score";s:17:"24.33920281162927";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1940";s:5:"score";s:18:"23.464249782177873";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:12:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:18:"124.32608434962685";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:17:"65.51753701714837";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1476";s:5:"score";s:18:"41.759558016227146";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1172";s:5:"score";s:17:"41.52879386847663";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:17:"40.68597015277406";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2330";s:5:"score";s:17:"34.84855562490148";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1719";s:5:"score";s:18:"31.081521087406717";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"26.064772304171857";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"1940";s:5:"score";s:18:"18.721124643415905";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2376";s:5:"score";s:18:"17.557572118921836";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:4:"1779";s:5:"score";s:18:"17.099264209752477";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:18:"16.520939296508047";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:comment>
			<wp:comment_id>1145</wp:comment_id>
			<wp:comment_author><![CDATA[[BLOCKED BY STBV] Livre blanc de Sophos sur la cybersécurité en 2014 | L&#039;actualité pour décideurs informatiquesL&#039;actualité pour décideurs informatiques]]></wp:comment_author>
			<wp:comment_author_email></wp:comment_author_email>
			<wp:comment_author_url>http://www.it-news.fr/livre-blanc-de-sophos-sur-la-cybersecurite-en-2014/</wp:comment_author_url>
			<wp:comment_author_IP>37.187.41.26</wp:comment_author_IP>
			<wp:comment_date>2014-02-17 11:42:31</wp:comment_date>
			<wp:comment_date_gmt>2014-02-17 10:42:31</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[[&#8230;] Les botnets (contraction de l’anglais, « robots » et « réseaux ») sont des systèmes informatiques fantômes connectés dans le but d’introduire des spams, virus ou des attaques informatiques par déni de service (DDoS). [&#8230;]]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type>pingback</wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
	</item>
	<item>
		<title>NSA et les écoutes téléphoniques...</title>
		<link>http://www.it-news.fr/la-nsa-recolte-massivement-des-donnees-par-les-ecoutes-telephoniques/</link>
		<pubDate>Thu, 19 Dec 2013 09:00:34 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1776</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/12/la-nsa-recolte-massivement-des-donnees-par-les-ecoutes-telephoniques.jpg"><img class="alignleft size-full wp-image-1777" title="La NSA récolte massivement des données par les écoutes téléphoniques" alt="la-nsa-recolte-massivement-des-donnees-par-les-ecoutes-telephoniques" src="http://www.it-news.fr/wp-content/uploads/2013/12/la-nsa-recolte-massivement-des-donnees-par-les-ecoutes-telephoniques.jpg" width="320" height="210" /></a>D’après le Washington Post, <strong>la NSA aurait intercepté</strong> <b>5 milliards de données chaque jour</b>.</p>
<p style="text-align: justify;">Il était déjà connu du grand public que la <a href="http://fr.wikipedia.org/wiki/National_Security_Agency" target="_blank">NSA </a>avait intercepté de grandes quantités de données informatiques et téléphoniques.</p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;">Maintenant, une nouvelle information relayée par Edouard Snowden nous indique que l’agence a également géolocalisé des téléphones portables.</p>
<p style="text-align: justify;">«<i> Nous obtenons de grands volumes de données un peu partout dans le </i>monde » confirme un haut responsable de cette collecte.</p>
<p style="text-align: justify;">Pour récolter ces informations, la NSA se connecte directement aux câbles qui relient les différents réseaux web dans le monde, puis collecte des données de géolocalisations de citoyens américains. Le but de cette collecte serait de « <i>retracer les mouvements et de mettre en lumière des relations cachées entre des personnes </i>» explique le quotidien.</p>
<p style="text-align: justify;">Malgré tout, la NSA n’arrive pas à tout analyser et stocker. En effet, le volume de cette collecte est estimé à 27 téraoctets, le double du volume de l’ensemble du contenu de la bibliothèque du congrès américain, qui jusqu’à maintenant était la plus importante du monde.</p>
<p style="text-align: justify;"> «<i>Les capacités de la NSA pour géolocaliser des individus sont ahurissantes  rendant quasiment inutile tout effort de sécurisation des réseaux</i>», écrit encore le Washington Post.</p>
<p style="text-align: justify;"><span style="color: #ff6600;"><strong>Comment Aquastar Consulting peut vous aider ?</strong></span></p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls#" target="_blank">Solution en sécurité informatique – Palo Alto Networks et Netasq</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/securite-des-donnees#" target="_blank">Solution en chiffrement – Sophos Safe Guard</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1776</wp:post_id>
		<wp:post_date>2013-12-19 10:00:34</wp:post_date>
		<wp:post_date_gmt>2013-12-19 09:00:34</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>la-nsa-recolte-massivement-des-donnees-par-les-ecoutes-telephoniques</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="ecoute-telephonique"><![CDATA[écoute téléphonique]]></category>
		<category domain="post_tag" nicename="espionnage"><![CDATA[espionnage]]></category>
		<category domain="post_tag" nicename="nsa"><![CDATA[NSA]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[60]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[NSA, écoute téléphonique, espionnage]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[NSA et les écoutes téléphoniques...]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[D’après le Washington Post, la NSA aurait intercepté 5 milliards de données chaque jour.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[1777]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1024";s:5:"score";s:17:"42.70143268888032";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"32.06933198681928";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:16:"27.1337125518628";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"23.517395664195952";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"21.182548293225395";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:16:"21.1190703067841";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"19.143410301663433";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"17.862812569880276";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2424";s:5:"score";s:17:"16.14268085135239";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:17:"15.52752930645315";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438866]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:15:"16.742334448353";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1924";s:5:"score";s:18:"13.904977468651516";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:17:"13.18954704890708";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"12.742158432236366";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"12.165770233083807";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"11.66933329973631";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1024";s:5:"score";s:18:"44.108826406361764";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"24.041096081608124";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1924";s:5:"score";s:18:"19.334373433109747";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"18.882640049246778";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1283";s:5:"score";s:18:"18.508211856081385";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"18.318717602422243";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"110";s:5:"score";s:17:"18.19123690553142";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1786";s:5:"score";s:17:"17.08646784208032";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Le « simple » mot de passe ne suffit plus à vous protéger.</title>
		<link>http://www.it-news.fr/le-simple-mot-de-passe-ne-suffit-plus-vous-proteger/</link>
		<pubDate>Fri, 20 Dec 2013 09:00:01 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1779</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/12/cloud-et-virtualisation-se-battent-pour-plus-de-sécurité1.jpg"><img class="alignleft size-full wp-image-1780" title="Le « simple » mot de passe ne suffit plus à vous protéger." alt="cloud-et-virtualisation-se-battent-pour-plus-de-sécurité" src="http://www.it-news.fr/wp-content/uploads/2013/12/cloud-et-virtualisation-se-battent-pour-plus-de-sécurité1.jpg" width="320" height="210" /></a>D’après le cabinet d’audit Deloitte &amp; Touch dans son rapport annuel sur la sécurité informatique, les mots de passe pourraient tous être cassés.</p>
<p style="text-align: justify;">Plus de 90% des accès générés par les utilisateurs  seront susceptible d’être craqués.</p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;">La faute serait attribuée aux utilisateurs eux-mêmes. Selon le rapport de Deloitte, sur 6 millions de mots de passes, il n’en faut que 10 000 pour accéder à 98,1% des comptes censés être protégés par ces derniers. En effet, <b>un utilisateur a en moyenne 26 comptes protégés par 5 mots de passe différents</b>. Les raisons données par Deloitte sont nombreuses.</p>
<p style="text-align: justify;"><b>La première serait qu’un individu ne peut se souvenir que de 5 mots de passe différents.</b></p>
<p style="text-align: justify;">Cela inciterait les utilisateurs à n’en utiliser qu’un pour une multitude d’application facilitant grandement le travail du cybercriminel. Par ailleurs, ces utilisateurs n’utilisent qu’une demi-douzaine des caractères alors qu’un clavier en compte 32.</p>
<p style="text-align: justify;"><b>La seconde raison mentionnée est la mobilité. </b></p>
<p style="text-align: justify;">Les claviers étant de plus en plus tactile, les utilisateurs ont l’impression que devoir taper un long mot de passe pour accéder à leurs données est une perte de temps. Ainsi, ils optent pour un mot de passe moins complexe. Aussi, les avancés technologiques en matière de hardware rendent les attaques du type « <a href="http://fr.wikipedia.org/wiki/Attaque_par_force_brute" target="_blank">brute-force</a> » plus efficaces.</p>
<p style="text-align: justify;">Deloitte mentionne également que les techniques de hacking ont grandement évolué. Auparavant, les hackers investissaient dans une machine superpuissante qui permettait de casser un mot de passe de 8 caractères en un peu moins de 6 heures. Cette machine coutait 30 000$ en 2012.</p>
<p style="text-align: justify;">Aujourd’hui, les pirates n’investissent plus une telle somme, il utilise la méthode beaucoup plus rapide du « <a href="http://fr.wikipedia.org/wiki/Hacking" target="_blank">crowd-hacking</a> » qui consiste à réunir plusieurs milliers d’ordinateurs connectés pour casser les mots de passe.</p>
<p style="text-align: justify;"><span style="color: #ff6600;"><strong>Comment Aquastar Consulting peut vous aider ?</strong></span></p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls#" target="_blank">Solution de sécurité informatique – Palo Alto Network et Netasq</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1779</wp:post_id>
		<wp:post_date>2013-12-20 10:00:01</wp:post_date>
		<wp:post_date_gmt>2013-12-20 09:00:01</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>le-simple-mot-de-passe-ne-suffit-plus-vous-proteger</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="deloitte"><![CDATA[deloitte]]></category>
		<category domain="post_tag" nicename="faille"><![CDATA[faille]]></category>
		<category domain="post_tag" nicename="hacker"><![CDATA[hacker]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<category domain="post_tag" nicename="vulnerable"><![CDATA[vulnérable]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[74]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Mot de passe]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[Le « simple » mot de passe ne suffit plus à vous protéger.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Plus de 90% des mots de passe générés par les utilisateurs (même ceux considérés comme forts par les services informatiques) seront susceptible d’être craqués.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1434";s:5:"score";s:18:"42.561024170774324";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:17:"39.03804196580544";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"27.006222290271737";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2330";s:5:"score";s:18:"25.107342990339486";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:18:"23.787735138732224";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"23.787735138732224";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"22.521588110730686";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2319";s:5:"score";s:18:"22.470405171127545";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:17:"19.01838503472622";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"18.10770389986494";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438414]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"16.387598056617946";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"13.652615587760238";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:18:"13.149986730389603";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"12.265336385184606";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"11.91942877273625";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1955";s:5:"score";s:18:"11.641309853512134";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1780]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1434";s:5:"score";s:17:"44.45074516764767";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"25.370012298374192";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1773";s:5:"score";s:18:"24.006889744970227";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:17:"19.41351488428504";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:17:"18.45137370732166";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"18.27403162684992";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1955";s:5:"score";s:18:"17.354509774075193";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"17.272354930932174";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:comment>
			<wp:comment_id>1141</wp:comment_id>
			<wp:comment_author><![CDATA[[BLOCKED BY STBV] Journée de la sécurité sur Internet | L&#039;actualité pour décideurs informatiquesL&#039;actualité pour décideurs informatiques]]></wp:comment_author>
			<wp:comment_author_email></wp:comment_author_email>
			<wp:comment_author_url>http://www.it-news.fr/journee-de-la-securite-sur-internet/</wp:comment_author_url>
			<wp:comment_author_IP>37.187.41.26</wp:comment_author_IP>
			<wp:comment_date>2014-02-11 13:59:00</wp:comment_date>
			<wp:comment_date_gmt>2014-02-11 12:59:00</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[[&#8230;] Vos accès sont confidentiels et servent à vous protéger contre des utilisateurs malveillants. Il est conseillé donc de choisir son mot de passe de manière intelligente : [&#8230;]]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type>pingback</wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
	</item>
	<item>
		<title> TOR – The Onion Router – en passe de devenir la norme ?</title>
		<link>http://www.it-news.fr/tor-onion-router-en-passe-de-devenir-la-norme/</link>
		<pubDate>Mon, 23 Dec 2013 09:00:36 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1786</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><span style="font-size: 16px;"><a href="http://www.it-news.fr/wp-content/uploads/2013/12/TOR-onion-router.jpg"><img class="alignleft size-full wp-image-1787" alt="TOR-onion-router" src="http://www.it-news.fr/wp-content/uploads/2013/12/TOR-onion-router.jpg" width="320" height="210" /></a>TOR, l’acronyme de <a href="http://fr.wikipedia.org/wiki/Tor_(réseau)" target="_blank">The Onion Router</a>, est un réseau informatique mondial qui permet de naviguer sur internet anonymement et ce, grâce à un système de routeurs organisés en couches.</span></p>
<p style="text-align: justify;">Le routage en oignon fut conçu pour pallier certaines carences des systèmes existants</p>
<p style="text-align: right;"><span style="font-size: 16px;"><!--more Lire la Suite--></span></p>
<p style="text-align: justify;">Refroidis par <a style="font-size: 16px;" href="http://www.it-news.fr/espionnage-de-la-nsa-un-nouveau-programme-revele-muscular/" target="_blank">l’affaire PRISM</a><span style="font-size: 16px;">, les ingénieurs de l’IETF (</span><a style="font-size: 16px;" href="http://www.ietf.org/" target="_blank">The Internet Engineering Task Force</a><span style="font-size: 16px;">) envisagent fortement d’adopter TOR pour permettre une navigation plus sécurisée et anonyme.</span></p>
<p style="text-align: justify;">L’IETF est un groupe international informel d’ingénieurs qui décide des nouveaux standards du web. Si l’IETF choisit d’adopter TOR, la diffusion du logiciel pourrait être considérée comme un standard et son adoption par les navigateurs décuplée.</p>
<p style="text-align: justify;">Par ailleurs, le groupe envisage la mise en place du protocole HTTPS (navigation sécurisée) pour toutes les pages internet. Ce protocole est déjà utilisé pour les sites de e-commerce, les banques et les réseaux sociaux.</p>
<p style="text-align: justify;">TOR serait donc plus un complément qui servirait à renforcer la protection de la vie privée de chaque individu. Toutefois, ses créateurs craignent un revirement de situation. Dans la mesure où TOR est un logiciel libre, ils pourraient perdre le contrôle de leur routeur.</p>
<p style="text-align: justify;">Malgré l’opportunité qu’apporte l’IETF pour TOR, les fondateurs restent donc méfiants.</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1786</wp:post_id>
		<wp:post_date>2013-12-23 10:00:36</wp:post_date>
		<wp:post_date_gmt>2013-12-23 09:00:36</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>tor-onion-router-en-passe-de-devenir-la-norme</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="ietf"><![CDATA[IETF]]></category>
		<category domain="post_tag" nicename="navigation-securisee"><![CDATA[navigation sécurisée]]></category>
		<category domain="post_tag" nicename="reseau"><![CDATA[réseau]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<category domain="post_tag" nicename="the-onion-router"><![CDATA[The Onion Router]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[79]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[TOR]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[TOR – The Onion Router – en passe de devenir la norme ?]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Refroidis par l’affaire PRISM, les ingénieurs de l’IETF envisagent fortement d’adopter TOR pour permettre une navigation plus sécurisée et anonyme.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:17:"44.00173802200541";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:17:"35.74944019102919";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2376";s:5:"score";s:18:"31.039814626728532";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:17:"28.09523829239887";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:18:"26.134517617366072";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2436";s:5:"score";s:17:"24.62618930410346";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"22.378366273296027";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2330";s:5:"score";s:18:"16.980513641796044";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:18:"15.076329621027106";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"14.737546977990545";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437905]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"17.191188814291642";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:18:"16.413091575104783";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"14.235319190074078";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:18:"13.577134930691603";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1955";s:5:"score";s:18:"11.138680996332674";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"10.520912435774965";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1787]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:18:"25.859121287270618";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"25.845730610338794";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:16:"20.2255778576238";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:18:"19.836264479941548";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1776";s:5:"score";s:17:"17.08646784208032";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1773";s:5:"score";s:18:"17.031547072912712";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1955";s:5:"score";s:18:"16.124056752723074";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1779";s:5:"score";s:18:"15.982090014882747";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Le loi de programmation militaire revient au Sénat.</title>
		<link>http://www.it-news.fr/le-projet-de-loi-de-programmation-militaire-revient-au-senat/</link>
		<pubDate>Tue, 24 Dec 2013 09:00:40 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1789</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><span style="font-size: 16px;"><a href="http://www.it-news.fr/wp-content/uploads/2013/12/programmation-militaite-2014.jpg"><img class="alignleft size-full wp-image-1791" title="Le projet de la Loi de programmation militaire revient au Sénat." alt="loi-de-la-programmation-militaire-2014" src="http://www.it-news.fr/wp-content/uploads/2013/12/programmation-militaite-2014.jpg" width="320" height="210" /></a>Le projet de Loi de programmation militaire (LPM) est en ce moment en deuxième lecture au Sénat. </span></p>
<p style="text-align: justify;"><span style="font-size: 16px;">Ce projet a pour but de définir les orientations de la politique de défense sur la période 2014-2019. L’article 13, entre autres, se retrouve en pleine controverse.</span></p>
<p style="text-align: right;"><!--more Lire la Suite--></p>
<p style="text-align: justify;"><b style="font-size: 16px;">L’article 13 a pour but de clarifier le régime juridique de la géolocalisation en temps réel</b><span style="font-size: 16px;"><strong> d’un quelconque appareil informatique</strong>.</span></p>
<p style="text-align: justify;">Rédigé dans le but de pouvoir lutter plus efficacement contre le terrorisme et la criminalité organisée, l'article 13 suscite de vives inquiétudes, car il ne semble pas faire grand cas de la protection des libertés et des droits individuels.</p>
<p style="text-align: justify;"><a href="https://www.google.fr/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=17&amp;cad=rja&amp;ved=0CGoQFjAGOAo&amp;url=http%3A%2F%2Fwww.defense.gouv.fr%2Fcontent%2Fdownload%2F216924%2F2413458%2Ffile%2FLPM%25202014-2019%2520-%2520Texte%2520de%2520loi.pdf&amp;ei=vruyUtWpA-Ol0AWiv4GwDw&amp;usg=AFQjCNH3DHeL7njujRbIY2HUxYzX6vuj8g&amp;sig2=I46YYPIaWyOF8X3thg620Q" target="_blank">L’article 13</a> prévoit que la police, la gendarmerie et, de façon générale, les personnels relevant des ministères de l’économie et du budget, de la sécurité intérieure et de la défense puissent accéder à ces données de connexions sans recours préalable au juge (sans mandat), sur simple requête administrative, dans le cadre d’affaires relatives à la lutte contre le terrorisme, la délinquance organisée ou la préservation du potentiel scientifique et économique de la France.</p>
<p style="text-align: justify;">Les données concernées sont nombreuses. Cela va des informations liées aux échanges (numéros de téléphone, destinataires, durées d'appels, date, adresses IP) aux contenus des documents échangés.</p>
<p style="text-align: justify;">Un modérateur est prévu, puisque les requêtes devront être validées par une « <i>personnalité qualifiée placée auprès du premier ministre</i> ».</p>
<p style="text-align: justify;">Le sénateur Jean-Pierre Sueur, président de la commission des lois, a tenu à rassurer les citoyens : « <i>l’article 13 encadre la pratique actuelle dans laquelle les services de renseignement pouvaient faire plusieurs dizaines de milliers de demandes de données de connexions par an sans que l’encadrement juridique de cette faculté soit aussi précis qu’il est nécessaire en matière de liberté publique</i> ». Ce qui veut dire que ce projet de loi a pour but d’encadrer des procédures déjà autorisées.</p>
<p style="text-align: justify;">Ce projet de loi, souvent assimilé à un « Patriot Act à la française », est vu comme un risque pour le monde numérique. Par ailleurs, la <a href="http://www.cnil.fr/linstitution/actualite/article/article/loi-de-programmation-militaire-la-cnil-deplore-de-ne-pas-avoir-ete-saisie-des-dispositions-rel/" target="_blank">CNIL a déclaré officiellement</a> qu’elle regrette de ne pas avoir été consultée sur ce dossier de la plus haute importance.</p>
<p style="text-align: justify;"><span style="color: #ff6600;"><strong>Comment Aquastar Consulting peut vous aider ?</strong></span></p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls#" target="_blank">Sécurité internet : Palo Alo et Netasq</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1789</wp:post_id>
		<wp:post_date>2013-12-24 10:00:40</wp:post_date>
		<wp:post_date_gmt>2013-12-24 09:00:40</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>le-projet-de-loi-de-programmation-militaire-revient-au-senat</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="article-13"><![CDATA[article 13]]></category>
		<category domain="post_tag" nicename="liberte-informatique"><![CDATA[Liberté informatique]]></category>
		<category domain="category" nicename="reseaux-et-mobilite"><![CDATA[Réseaux et mobilité]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[79]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Loi de programmation militaire]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Rédigé dans le but de pouvoir lutter efficacement contre le terrorisme et la criminalité organisée, l'article 13 de la Loi de programmation militaire suscite de vives inquiétudes.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:16:"42.8063007583966";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"38.48423404049478";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"31.559750169130943";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2400";s:5:"score";s:18:"28.900846442971933";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2424";s:5:"score";s:17:"27.10516935334351";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"25.957632972930845";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:18:"25.399158397135874";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"25.10562026516687";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"24.24894862241411";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:17:"20.07431901099715";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438658]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"15.838991859849028";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"15.565516972743833";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:17:"12.81478639137865";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"12.559668541059079";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"12.047669469676121";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1940";s:5:"score";s:18:"11.984572754308457";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1791]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"27.081598963752107";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"25.81576803307385";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1454";s:5:"score";s:16:"22.1985178536609";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"21.107410863446418";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:17:"20.09087092091832";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1398";s:5:"score";s:17:"19.14145153729416";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"19.016295883170486";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1940";s:5:"score";s:18:"18.481081147696283";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>La souris a 45 ans !</title>
		<link>http://www.it-news.fr/la-souris-45-ans/</link>
		<pubDate>Wed, 25 Dec 2013 09:00:54 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1794</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><span style="font-size: 16px;"><a href="http://www.it-news.fr/?p=1794"><img class="alignleft size-full wp-image-1795" title="Créateur de la souris informatique" alt="inventeur-souris" src="http://www.it-news.fr/wp-content/uploads/2013/12/inventeur-souris.jpg" width="320" height="210" /></a>C’est le 9 Décembre 1968 qu’est née la souris. Son créateur, <a href="http://fr.wikipedia.org/wiki/Douglas_Engelbart" target="_blank">M.Engelbart</a>, a travaillé sur ce projet pendant 4 ans.</span></p>
<p style="text-align: justify;"><span style="font-size: 16px;">La première était un accessoire volumineux en bois. </span>Le 1er ordinateur à en être doté était une station de travail de Xerox, en 1981.</p>
<p style="text-align: right;"><!--more Lire la Suite--></p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/12/ordinateur-xerox.jpg"><img class="alignright  wp-image-1797" title="le premier ordinateur xerox qui a proposé une souris à la vente" alt="ordinateur xerox" src="http://www.it-news.fr/wp-content/uploads/2013/12/ordinateur-xerox.jpg" width="230" height="288" /></a> C’est Apple qui va la populariser en 1984 avec le fameux Macintosh.</p>
<p style="text-align: justify;">Malgré l’importance du tactile aujourd’hui, la souris tient bon et se décline pour toute sorte d’utilisateurs. On peut citer la souris classique, du joueur et la tactile.</p>
<p style="text-align: justify;">Douglas Engelbart n’a quant à lui pas pu voir le 45<sup>ème</sup> anniversaire de sa création, puisqu’il est décédé le 2 Juillet dernier, à l’âge de 88 ans.</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1794</wp:post_id>
		<wp:post_date>2013-12-25 10:00:54</wp:post_date>
		<wp:post_date_gmt>2013-12-25 09:00:54</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>la-souris-45-ans</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="douglas-engelbart"><![CDATA[Douglas Engelbart]]></category>
		<category domain="post_tag" nicename="informatique"><![CDATA[informatique]]></category>
		<category domain="category" nicename="non-classe"><![CDATA[Non classé]]></category>
		<category domain="post_tag" nicename="souris"><![CDATA[souris]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[78]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[souris]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[La souris a 45 ans ! - L'actualité pour décideurs informatiques]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[La première souris était un accessoire volumineux en bois. Aujourd’hui, la souris tient bon et se décline pour toute sorte d’utilisateurs.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2411";s:5:"score";s:17:"39.26382815956661";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1933";s:5:"score";s:17:"35.75297344802332";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1099";s:5:"score";s:17:"24.27718845021101";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:18:"23.993903313155165";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2438";s:5:"score";s:18:"21.256991221505583";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"21.216967822148572";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:18:"20.028734836814223";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2125";s:5:"score";s:18:"20.028734836814223";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"19.355355351637954";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1924";s:5:"score";s:18:"18.517486313954276";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426435317]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1933";s:5:"score";s:17:"23.99216589805782";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1924";s:5:"score";s:18:"13.842063701287426";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1902";s:5:"score";s:18:"13.347374786720739";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:18:"11.632474322692712";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2125";s:5:"score";s:18:"10.292158998409818";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:17:"9.166857615536259";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1795]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1933";s:5:"score";s:17:"41.96046902387269";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1099";s:5:"score";s:18:"26.780342729660898";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1924";s:5:"score";s:18:"22.564830250729464";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1902";s:5:"score";s:18:"20.520848580463905";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1465";s:5:"score";s:17:"17.80391348277066";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:18:"17.644357911021675";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"980";s:5:"score";s:17:"16.58107262508731";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1257";s:5:"score";s:18:"16.482771463447147";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>2014 : cap sur l’innovation pour les hôpitaux français.</title>
		<link>http://www.it-news.fr/2014-cap-sur-linnovation-pour-les-hopitaux-francais/</link>
		<pubDate>Thu, 26 Dec 2013 09:18:18 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1819</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/?p=1819"><img class="size-full wp-image-1820 alignleft" title="2014: Cap sur l'innovation pour les hôpitaux français" alt="2014-cap-vers-linnovation-pour-les-hôpitaux-français" src="http://www.it-news.fr/wp-content/uploads/2013/12/2014-cap-vers-linnovation-en-milieu-hospitalier.jpg" width="320" height="210" /></a>L’innovation dans la santé semble être devenue la priorité pour le gouvernement qui a mobilisé 400 M€ sur 5 ans pour le programme « <a href="http://www.sante.gouv.fr/le-programme-hopital-numerique.htm" target="_blank">hôpital numérique</a> ».</p>
<p style="text-align: justify;">Cette innovation ne concerne pas que l’amélioration des soins, elle vise l'organisation  elle-même des hôpitaux.</p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;"><a href="http://www.marisoltouraine.fr/" target="_blank">Marisol Touraine</a>, la Ministre des Affaires Sociales et de la Santé, a déclaré « <em>les hôpitaux français de demain doivent <a href="http://www.it-news.fr/wp-content/uploads/2013/12/hopital-numerique.jpg"><img class="alignright size-full wp-image-1821" title="Hôpital numérique" alt="hopital-numerique" src="http://www.it-news.fr/wp-content/uploads/2013/12/hopital-numerique.jpg" width="108" height="144" /></a>saisir dès aujourd'hui les opportunités offertes par les nouvelles technologies de l’information</em>».</p>
<p style="text-align: justify;">Ce programme a pour but d’améliorer la qualité des soins, d’optimiser la satisfaction des clients, de réduire les coûts opérationnels mais aussi d’assurer aux établissements de santé un accès sécurisé aux données et aux applications dont le personnel a besoin.</p>
<p style="text-align: justify;">51% des hôpitaux français interrogés ont conscience de l’importante augmentation de leur budget informatique.</p>
<p style="text-align: justify;">Malheureusement, seul 18.5% de ce budget sera consacré à l’amélioration des infrastructures, 19% à l’innovation et 46% à la maintenance des systèmes.</p>
<p style="text-align: justify;">En Europe de l'Ouest, les responsables des hôpitaux envisagent d'ailleurs d'investir en masse dans des <a href="http://www.aquastar-consulting.com/index.php/solutions/gestion-metier#" target="_blank">solutions de gestion électroniques des documents</a> au cours des 12 mois qui viennent et devraient aussi logiquement s'équiper de dispositifs d'enregistrement électroniques des données de santé.</p>
<p style="text-align: justify;">L'enjeu majeur des hôpitaux français est désormais dans la capacité à collecter et exploiter les données récoltées par les médecins, chercheurs.  Mais cette nouvelle approche, au croisement de l'informatique et de la médecine, implique désormais de faire rapidement porter les efforts sur l'infrastructure et les ressources informatiques.</p>
Les Systèmes d'information de santé actuels ne sont pas conçus pour gérer seuls ce type de données et il est indispensable de procéder à leur adaptation et de garantir une meilleure interopérabilité afin d'organiser le stockage et l'exploitation des données à grande échelle.
<p style="text-align: justify;"><span style="color: #ff6600;"><strong>Aquastar Consulting est reconnue comme un acteur de référence dans la santé dans le Nord Pas-de-Calais, découvrez nos références clients :</strong></span></p>

<ul>
	<li><a href="http://www.aquastar-consulting.com/index.php/references-clients?resetfilters=1&amp;clearordering=0&amp;clearfilters=0&amp;reference_client___secteur_activite=sante" target="_blank">Nos références clients - Santé</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1819</wp:post_id>
		<wp:post_date>2013-12-26 10:18:18</wp:post_date>
		<wp:post_date_gmt>2013-12-26 09:18:18</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>2014-cap-sur-linnovation-pour-les-hopitaux-francais</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="budget-informatique"><![CDATA[budget informatique]]></category>
		<category domain="post_tag" nicename="hopital"><![CDATA[hopital]]></category>
		<category domain="category" nicename="infrastructures"><![CDATA[Infrastructures]]></category>
		<category domain="post_tag" nicename="numerique"><![CDATA[Numérique]]></category>
		<category domain="post_tag" nicename="sante"><![CDATA[Santé]]></category>
		<category domain="category" nicename="solutions-de-gestion"><![CDATA[Solutions de gestion]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[80]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[hôpitaux français]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[L’innovation dans le secteur de la santé est devenue la priorité pour le gouvernement mobilisant 400 millions d’euros sur 5 ans pour l'hôpital numérique.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[2014 : cap sur l’innovation pour les hôpitaux français]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2436";s:5:"score";s:18:"104.32483960230567";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"69.69540602913854";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"58.127359794602775";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2371";s:5:"score";s:17:"57.34046829057593";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"907";s:5:"score";s:17:"49.54838632929039";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:16:"40.9527088996549";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"36.01851528337598";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:17:"35.58073951357461";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"34.850595470798645";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2465";s:5:"score";s:17:"33.82786188507286";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438402]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"24.327855251686053";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"21.715594313268657";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"16.23462726566012";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"15.982046803978456";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"14.93555051612378";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"14.904706136482048";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1820]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:3:"907";s:5:"score";s:17:"54.70530514922452";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2436";s:5:"score";s:17:"39.66856667207088";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:16:"39.5394975083884";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"39.49907722341425";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"26.202921907353655";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"25.23250144932554";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:17:"24.15831417897008";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"24.060848961528205";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>L’Activité partielle : Le gouvernement fait le point</title>
		<link>http://www.it-news.fr/lactivite-partielle-le-gouvernement-fait-le-point/</link>
		<pubDate>Tue, 31 Dec 2013 09:00:59 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1868</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><span style="font-size: 16px;"><a href="http://www.it-news.fr/?p=1868"><img class="alignleft size-full wp-image-1871" title="L'activité partielle, le gouvernement fait le point" alt="Temps-partiel" src="http://www.it-news.fr/wp-content/uploads/2013/12/Temps-partiel.jpg" width="320" height="210" /></a>Le 3 décembre dernier, le comité de suivi et de mobilisation pour l’emploi  a fait un premier bilan de l’ activité partielle (ou chômage partiel), et plus particulièrement sur l’impact du dispositif depuis sa mise en place le 1</span><sup>er</sup><span style="font-size: 16px;"> Juillet dernier.</span></p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;">Le 1<sup>er</sup> Juillet 2013 est la date à partir de laquelle les demandes d’accès au dispositif d’<a href="http://www.emploi.gouv.fr/thematiques/activite-partielle">activité partielle</a> ont été ouvertes. Ce dispositif remplace ainsi les dispositifs précédents:</p>

<ul style="text-align: justify;">
	<li>Activité Partielle Longue Durée (APLD),</li>
	<li>Chômage Partiel Classique,</li>
	<li>Convention de chômage partiel classique.</li>
</ul>
<h2 style="text-align: justify;">Activité partielle – Chômage partiel : Le Bilan du 1<sup>er</sup> semestre</h2>
<p style="text-align: justify;">Au cours du 1er semestre 2013, 22 millions d’heures d’activité partielle ont été consommées (soit une augmentation de plus de 64% par rapport à 2012).</p>
<p style="text-align: justify;">Près de 40% des heures consommées l’ont été dans le cadre d’une convention d’APLD (contre 1/3 aux premiers semestres 2012 et 2011).</p>
<p style="text-align: justify;">Depuis le 1<sup>er</sup> Juillet 2013, les autorisations accordées concernent :</p>

<ul style="text-align: justify;">
	<li>6000 établissements,</li>
	<li>153 500 salariés, dont 80% sont des employés de l’industrie manufacturière,</li>
	<li>Au total, les 7 200 autorisations accordées correspondent à 33.2 millions d’heures.</li>
</ul>
<p style="text-align: justify;">Le compte rendu du Comité de Suivi-Mobilisation pour l’emploi constate qu’en 2013:</p>

<ul style="text-align: justify;">
	<li>Le volume d’heures autorisées à être « chômées » a été multiplié par 2.5 par rapport à 2012,</li>
	<li>Le nombre des demandes de recours à l’activité partielle a augmenté de 67%</li>
	<li>La période d’activité partielle s’est allongée : 100 jours en moyenne par autorisation en 2013, contre 80 jours en 2012.</li>
</ul>
<h2 style="text-align: justify;">Les PME sont les plus concernées</h2>
<p style="text-align: justify;">Le compte rendu notifie qu’en 2013, une augmentation des demandes a été ressentie de la part des entreprises de moins de 50 salariés.</p>

<ul style="text-align: justify;">
	<li>80% des autorisations sont au bénéfice d’entreprises de moins de 50 salariés en 2013, contre 77% en 2012,</li>
	<li>9% des autorisations sont au bénéfice d’entreprises de plus de 250 salariés en 2013, contre 11% en 2012.</li>
</ul>
<h2 style="text-align: justify;">Les objectifs pour 2014</h2>
<p style="text-align: justify;">Le compte rendu du comité dégage plusieurs objectifs à atteindre pour 2014 :</p>

<ol>
	<li>Dématérialiser le dispositif unique,</li>
	<li>Poursuivre l’information sur le dispositif réformé,</li>
	<li>Accroître le recours à la formation pendant la période d’activité partielle.</li>
</ol>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1868</wp:post_id>
		<wp:post_date>2013-12-31 10:00:59</wp:post_date>
		<wp:post_date_gmt>2013-12-31 09:00:59</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>lactivite-partielle-le-gouvernement-fait-le-point</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="solutions-de-gestion"><![CDATA[Solutions de gestion]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[85]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[activité partielle]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Le 1er Juillet 2013 est la date à partir de laquelle les demandes d’accès au dispositif d’ activité partielle ont été ouvertes.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438188]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:18:"19.880050107689378";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:18:"16.799699160980417";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"16.777773325410784";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1902";s:5:"score";s:18:"13.347374786720739";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"13.106676189271013";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:18:"13.106676189271013";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1871]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:18:"28.640116366032462";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:18:"25.447160222970545";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"24.943073747412125";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:18:"22.379634526289806";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1902";s:5:"score";s:18:"20.749482236168067";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"20.12364896333161";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:17:"20.12364896333161";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:18:"19.820324351717577";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:17:"39.31331614503288";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:18:"37.253864192179414";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"34.91858092875229";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:18:"28.991926325653687";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"27.494913020702512";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:18:"26.584231885841234";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"26.584231885841234";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2438";s:5:"score";s:18:"26.021005334099854";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:17:"25.76350085524674";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2371";s:5:"score";s:18:"25.590433284822623";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Les cookies : Recommandations de la CNIL</title>
		<link>http://www.it-news.fr/les-cookies-recommandations-de-la-cnil/</link>
		<pubDate>Thu, 02 Jan 2014 09:00:35 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1876</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><span style="font-size: 16px;"><a href="http://www.it-news.fr/?p=1876"><img class="alignleft size-full wp-image-1870" title="Les cookies: recommandations de la CNIL" alt="cookies-cnil" src="http://www.it-news.fr/wp-content/uploads/2013/12/cookies-cnil.jpg" width="320" height="210" /></a>B</span><span style="font-size: 16px;">ien loin du biscuit américain, le <a href="http://fr.wikipedia.org/wiki/Cookie_(informatique)" target="_blank">cookie</a> est une information déposée sur le disque dur d’un internaute par le serveur du site qu’il visite. </span></p>
<p style="text-align: justify;"><span style="font-size: 16px;">Il contient de nombreuses données comme le nom du serveur qui l’a déposé, un identifiant et éventuellement une date d’expiration.</span></p>
<p style="text-align: right;"><!--more Lire la suite--></p>

<h2 style="text-align: justify;">Qu’est ce qu’un cookie ? La réponse de la CNIL</h2>
<p style="text-align: justify;">« <i>Lorsque les internautes naviguent sur le web ou utilisent des applications mobiles, différents acteurs (éditeurs de service, régies publicitaires, réseaux sociaux, etc.) analysent leur navigation, leurs déplacements et leurs habitudes de consultation et de consommation, afin notamment de leur proposer des publicités ciblées ou des services personnalisés. Ce <strong>traçage</strong> est réalisé par l’intermédiaire de différentes technologies, dont la plus répandue est aujourd’hui le cookie. <strong>La réglementation prévoit que l’internaute soit informé</strong> et consente préalablement au dépôt de certains cookies. A la suite d’une concertation approfondie avec les principaux acteurs de la publicité en ligne, la CNIL publie également aux internautes une vidéo pédagogique et des conseils pour limiter leurs traces lors de leur navigation. Enfin, elle met à disposition un outil développé par son laboratoire, pour visualiser en temps réel l’apparition de cookies. »</i></p>

<h2 style="text-align: justify;">A quoi servent les cookies ?</h2>
<p style="text-align: justify;">Les cookies ont différents rôles. Un cookie peut :</p>

<ul>
	<li>permettre à celui qui l’a déposé de reconnaître un internaute grâce à un identifiant unique,</li>
	<li>stocker le contenu d’un panier d’achat,</li>
	<li>Enregistrer les paramètres de langue d’un site,</li>
	<li>Permettre de faire de la publicité ciblée.</li>
</ul>
<h2 style="text-align: justify;">Que dit la loi à ce sujet ?</h2>
<p style="text-align: justify;">Les législateurs ont modifié l’article 5 de la <a href="http://www.google.fr/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;frm=1&amp;source=web&amp;cd=1&amp;cad=rja&amp;ved=0CDIQFjAA&amp;url=http%3A%2F%2Feur-lex.europa.eu%2FLexUriServ%2FLexUriServ.do%3Furi%3DOJ%3AL%3A2002%3A201%3A0037%3A0047%3Afr%3APDF&amp;ei=IjvFUtzBB4a40QW8q4CYBw&amp;usg=AFQjCNF5d6fORkjIODGYHrul5W6CLLMnpQ&amp;sig2=D7D5ym62S4kC0P3_E_-PqQ&amp;bvm=bv.58187178,d.d2k" target="_blank">directive 2002/58/CE</a> par l’adoption de <strong>la directive 2009/136/CE</strong> pour pouvoir poser le principe selon lequel «  le <i>stockage d’informations sur l’équipement d’un utilisateur et l’accès à des informations déjà stockées ne doivent être mis en œuvre qu’avec le consentement préalable de l’utilisateur, sauf si ces actions sont strictement nécessaires au fournisseur pour la délivrance d’un service expressément demandé par l’abonné ou l’utilisateur. </i>»</p>
<p style="text-align: justify;">Le recueil du consentement préalable s’impose aux éditeurs de site, de systèmes d’exploitation et d’applications, aux régies publicitaires, aux réseaux sociaux et aux éditeurs de solutions de mesure d’audience.</p>
<p style="text-align: justify;">Les cookies qui nécessitent l’accord préalable des utilisateurs sont :</p>

<ul style="text-align: justify;">
	<li>Les cookies liés aux opérations de la publicité ciblée,</li>
	<li>Les cookies des réseaux sociaux, notamment ceux générés par les boutons de partage (uniquement dans le cas où ils collectent des données personnelles concernant les utilisateurs),</li>
	<li>Certains cookies de mesures d’audiences.</li>
</ul>
<p style="text-align: justify;">Les cookies exemptés de consentement sont ceux qui ont pour finalité exclusive de permettre ou de faciliter la communication par voie électronique et sont strictement nécessaires à la  fourniture d’un service expressément demandé par l’utilisateur. Par exemple :</p>

<ul style="text-align: justify;">
	<li>Les cookies de « panier d’achat »,</li>
	<li>Les cookies « identifiants de session »,</li>
	<li>Les cookies d’authentification de l’internaute,</li>
	<li>Les cookies persistants de personnalisation de l’interface utilisateur…</li>
</ul>
<h2 style="text-align: justify;">Les recommandations de la CNIL</h2>
<p style="text-align: justify;">La CNIL a mis en ligne une vidéo qui explique ce que sont <a href="http://www.cnil.fr/vos-droits/vos-traces/les-cookies/" target="_blank">les cookies </a>et à quoi ils servent. Elle propose aussi <a href="http://www.cnil.fr/vos-droits/vos-traces/les-cookies/conseils-aux-internautes/#c5547" target="_blank">6 fiches conseils</a> pour limiter la traçabilité de sa navigation web.</p>
<p style="text-align: justify;"><b>Conseil n°1</b> : Comment bloquer les cookies tiers ?</p>
<p style="text-align: justify;"><b>Conseil n°2</b> : Comment empêcher l’installation des traceurs les plus répandus ?</p>
<p style="text-align: justify;"><b>Conseil n°3</b> : Comment partager sur les réseaux sociaux ?</p>
<p style="text-align: justify;"><b>Conseil n°4</b> : Comment limiter le traçage dans Adobe Flash ?</p>
<p style="text-align: justify;"><b>Conseil n°5</b> : Comment bloquer le chargement de ressources en provenance d’autres sites ?</p>
<p style="text-align: justify;"><b>Conseil n°6</b> : Comment bloquer toutes les publicités avec AdBlockPlus ?</p>
<span style="color: #ff8c00;"><strong>Comment Aquastar Consulting peut vous aider ?</strong></span>
<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls" target="_blank">Solution de sécurité internet</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/securite-des-donnees" target="_blank">Solution de chiffrement – Sophos Safe Guard</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1876</wp:post_id>
		<wp:post_date>2014-01-02 10:00:35</wp:post_date>
		<wp:post_date_gmt>2014-01-02 09:00:35</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>les-cookies-recommandations-de-la-cnil</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="bonnes-pratiques"><![CDATA[bonnes pratiques]]></category>
		<category domain="post_tag" nicename="cnil"><![CDATA[CNIL]]></category>
		<category domain="post_tag" nicename="conseil"><![CDATA[conseil]]></category>
		<category domain="post_tag" nicename="reglementations"><![CDATA[réglementations]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[97]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[cookies]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Les cookies est une technologie qui peut tracer l'activité d'un utilisateur, le reconnaître, stocker le contenu d'un panier achat...]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_title</wp:meta_key>
			<wp:meta_value><![CDATA[Les cookies : Recommandations de la CNIL]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437675]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1955";s:5:"score";s:18:"19.489944107847943";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1924";s:5:"score";s:18:"17.950903789835372";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"17.663282727209527";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"16.18733912451975";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"14.053956978272776";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:18:"11.577047296484782";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1870]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1108";s:5:"score";s:17:"45.23023849713144";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1955";s:5:"score";s:18:"29.765940825686343";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1924";s:5:"score";s:18:"27.853797623914346";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:17:"27.39334639476566";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"25.24087533166967";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:17:"20.10539250907484";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:18:"17.573508102072136";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"17.102826316858756";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1108";s:5:"score";s:17:"43.28017521154785";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:17:"39.79045497684172";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"36.80117289454183";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"27.711151458086615";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2376";s:5:"score";s:17:"24.88736131946724";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"23.093050708731734";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1955";s:5:"score";s:18:"22.682407714255138";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1924";s:5:"score";s:18:"22.283406106427407";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:18:"19.668188554866394";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2330";s:5:"score";s:17:"17.98434887325684";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>SMIC 2014 : Revalorisation de +1,1%</title>
		<link>http://www.it-news.fr/smic-2014-revalorisation-de-11/</link>
		<pubDate>Fri, 03 Jan 2014 14:26:59 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1902</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/?p=1902"><img class="alignleft size-full wp-image-1909" title="SMIC 2014: Revalorisation de +1.1%" alt="smic-2014" src="http://www.it-news.fr/wp-content/uploads/2014/01/smic-2014.jpg" width="320" height="210" /></a>C’est confirmé !</p>
<p style="text-align: justify;">Le SMIC (Salaire Mensuel Interprofessionnel de Croissance) va augmenter de 1.1% dès le 1<sup>er</sup> Janvier 2014 sans aucun « coup de pouce » supplémentaire.</p>
<p style="text-align: right;"><!--more Lire la Suite--></p>
<p style="text-align: justify;">En effet, le premier ministre a annoncé, la semaine dernière, la valeur retenue pour le <a href="http://fr.wikipedia.org/wiki/Salaire_minimum_interprofessionnel_de_croissance" target="_blank">SMIC</a> en 2014,  qui sera de 1 445,38€.</p>
<p style="text-align: justify;">Le gouvernement suit les recommandations du groupe d’experts sur le SMIC qui se justifie en évoquant la situation économique de la France.</p>

<h2 style="text-align: justify;">Valeur du SMIC mensuel : 1 445.38€</h2>
<p style="text-align: justify;">La conséquence pour un salarié travaillant les <a href="http://fr.wikipedia.org/wiki/Loi_des_35_heures" target="_blank">35h règlementaires</a>, le SMIC mensuel brut qu’il recevra sera de 1.445,38€ soit une augmentation d’un peu plus de 11 euros.</p>
<p style="text-align: justify;">Le SMIC mensuel Net sera déterminé comme ci-dessous :</p>
<p style="text-align: center;"><a href="http://www.it-news.fr/wp-content/uploads/2014/01/salaire-brut-au-1er-janvier-2014.png"><img class="aligncenter size-full wp-image-1903" title="salaire brut au 1er Janvier 2014" alt="salaire-brut-au-1er-janvier-2014" src="http://www.it-news.fr/wp-content/uploads/2014/01/salaire-brut-au-1er-janvier-2014.png" width="367" height="150" /></a></p>

<h2 style="text-align: justify;">Valeur du SMIC 2014 horaire : 9.53€</h2>
Le SMIC horaire brut sera valorisé de 10 centimes.
<p style="text-align: justify;">Il atteindra 9.53 euros par heure, contre 9.43 euros par heure précédemment.</p>
<p style="text-align: justify;">Ci-dessous, un graphique illustrant l’évolution du Smic horaire Brut depuis 2005.</p>
<p style="text-align: center;"><a href="http://www.it-news.fr/wp-content/uploads/2014/01/evolution-du-smic-horaire-brut1.jpg"><img class="aligncenter size-full wp-image-1905" title="Evolution du smic horaire brut" alt="evolution-du-smic-horaire-brut" src="http://www.it-news.fr/wp-content/uploads/2014/01/evolution-du-smic-horaire-brut1.jpg" width="479" height="289" /></a></p>

<h2 style="text-align: justify;">Valeur du SMIC net : 1 116,88€</h2>
<p style="text-align: justify;">Le SMIC net évolue également. En 2013, le SMIC net, après retenues, était de 1 116.88€. En 2014 il sera de 1 128.70€ d’où une augmentation mensuelle de 11.82€.</p>
<p style="text-align: justify;">Le SMIC net par heure passera donc de 7.36€ à 7,44€. Ce chiffre ne peut être qu’indicatif, le montant des cotisations sociales pouvant varier.</p>
<p style="text-align: justify;">Au 1<sup>er</sup> Janvier 2013, 1,9 millions de salariés (hors apprentis et intermédiaires) étaient payés au Smic, ce qui représente 13% des employés. Mais si l’on prend en compte l’ensemble des salariés en France (y compris dans l’administration et les associations), cette augmentation concernerait 3,1 millions de personnes !</p>
<p style="text-align: justify;"><strong><span style="color: #ff6600;">Comment Aquastar Consulting peut vous aider ?</span></strong></p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/gestion-metier/paye-rh" target="_blank">Solution de gestion de Paie - Sage</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1902</wp:post_id>
		<wp:post_date>2014-01-03 15:26:59</wp:post_date>
		<wp:post_date_gmt>2014-01-03 14:26:59</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>smic-2014-revalorisation-de-11</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="1er-janvier-2014"><![CDATA[1er janvier 2014]]></category>
		<category domain="post_tag" nicename="augmentation-du-smic"><![CDATA[augmentation du smic]]></category>
		<category domain="category" nicename="comptabilite-finances"><![CDATA[Comptabilité - Finances]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[85]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[SMIC 2014]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Le SMIC en 2014 (Salaire Mensuel Interprofessionnel de Croissance) va augmenter de 1.1% dès le 1er Janvier 2014 sans aucun « coup de pouce » supplémentaire.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[1909]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437133]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"24.89486898853289";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"19.86534976276047";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"17.722736087878314";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:17:"17.51537922847275";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:18:"17.315224430777338";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:17:"12.97439779091798";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"40.87822069705264";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"32.16853289723915";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"29.904432205930057";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:18:"29.251131982290193";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:18:"27.546583402881062";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1868";s:5:"score";s:18:"20.656792725183095";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1794";s:5:"score";s:17:"20.42815907000997";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:17:"19.96617612156249";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"63.852039526717284";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"49.10228586144716";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:18:"47.977706690034715";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:16:"46.3158323067951";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:18:"42.913962568327754";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2438";s:5:"score";s:17:"37.62790275149073";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:17:"30.73676442115852";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2371";s:5:"score";s:17:"22.59369718356782";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"16.785013971543847";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2509";s:5:"score";s:17:"16.46262402859886";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Target victime d’une cyberattaque</title>
		<link>http://www.it-news.fr/target-victime-dune-cyberattaque/</link>
		<pubDate>Wed, 15 Jan 2014 09:00:07 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1924</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/?p=1924"><img class="alignleft size-full wp-image-1925" title="Target victime d'une cyberattaque " alt="target-victime-cyberattaque" src="http://www.it-news.fr/wp-content/uploads/2014/01/target-victime-cyberattaque.jpg" width="320" height="210" /></a>La chaîne de distribution américaine Target avait révélé dans un communiqué de presse en Décembre que les coordonnées bancaires et personnelles de 40 millions de personnes pouvaient avoir été volées.</p>
<p style="text-align: justify;"> <!--more Lire la suite-->Hors la semaine dernière, Target annonce un autre vol, celui-ci concernerait plus de 70 millions de personnes, soit un total de 110 millions de victimes,  le tiers de la population américaine. Ce qui deviendrait le plus gros piratage de données de l’histoire des Etats-Unis.</p>

<h2 style="text-align: justify;"> Target réagit à la cyberattaque</h2>
<p style="text-align: justify;">«<i> Ce vol n'est pas une nouvelle attaque dans le système de Target mais il a été découvert pendant l'enquête en cours, […] et il a été déterminé que les informations volées comprenaient les noms, les adresses postales, les numéros de téléphones et les adresses e-mails de plus de 70 millions de personnes.</i> <i>Les 70 millions de personnes concernées par ce nouveau vol sont distinctes des 40 millions qui avaient été précédemment annoncé</i> », a précisé à l'AFP un porte-parole de <a href="http://www.target.com/" target="_blank">Target</a>.</p>
<p style="text-align: justify;">Le groupe va « <i>tenter de contacter les clients touchés</i> » par ce vol de données. « <i>Je sais qu'il est frustrant pour nos clients de savoir que ces informations ont été volées et je suis véritablement désolé qu'ils aient à subir cela </i>», a déclaré <a href="http://www.en.wikipedia.org/wiki/Gregg_Steinhafel" target="_blank">Gregg Steinhafel</a>, PDG de Target, ajoutant que la société assumerait la responsabilité financière de toutes les dépenses frauduleuses qui apparaîtraient sur leur compte.</p>

<h2 style="text-align: justify;">Réaction du gouvernement face à cette cyberattaque</h2>
<p style="text-align: justify;">Le ministre de la Justice de l’Etat de New York <a href="http://www.en.wikipedia.org/wiki/Eric_Schneiderman" target="_blank">Eric Schneiderman</a> a déclaré dans un communiqué, qu’il était « <i>profondément perturbant d’apprendre que Target avait découvert une attaque informatique impliquant 70 millions de clients</i> ».</p>
<p style="text-align: justify;">Il a ajouté que son équipe participait à « <i>une enquête d’ampleur nationale</i> » sur cette cyberattaque. Il précise que Target va offrir un an de surveillance de crédit et de protection contre le vol d’identité électronique à tous ses clients ayant fait des achats aux Etats-Unis.</p>
<p style="text-align: justify;">Parallèlement, Target annonce, « <i>après avoir étudié avec attention leurs performances financières </i>» la fermeture de huit magasins aux Etats-Unis.</p>
<p style="text-align: justify;"><span style="color: #f4661b;"><b>Comment Aquastar peut vous aider ? </b></span></p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls#" target="_blank">Solution en sécurité internet – Palo Alto et Netasq</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/authentification" target="_blank">Solution d’authentification – Imprivata</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1924</wp:post_id>
		<wp:post_date>2014-01-15 10:00:07</wp:post_date>
		<wp:post_date_gmt>2014-01-15 09:00:07</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>target-victime-dune-cyberattaque</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="coordonnees-bancaires"><![CDATA[coordonnées bancaires]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<category domain="post_tag" nicename="target"><![CDATA[Target]]></category>
		<category domain="post_tag" nicename="vol"><![CDATA[vol]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[86]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[cyberattaque]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Target annonce un autre vol, celui-ci concernerait plus de 70 millions de personnes, soit un total de 110 millions de victimes, le tiers de la population américaine.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437262]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1955";s:5:"score";s:17:"27.31819621952426";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"15.79052774600421";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:18:"15.741877954032859";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:16:"12.9228339441045";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"12.165770233083807";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"11.48205037098306";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1925]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1955";s:5:"score";s:18:"44.125906639426596";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1876";s:5:"score";s:18:"27.853797623914346";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:18:"23.792420692384418";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"22.513125074556033";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1794";s:5:"score";s:18:"22.510131188869146";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:17:"19.41294482298132";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1776";s:5:"score";s:18:"19.334373433109747";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:16:"17.8382348735895";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1955";s:5:"score";s:17:"37.54449325672441";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:17:"35.94856029696518";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"30.548310277517267";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:17:"26.99617464694344";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"26.51932032623201";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2376";s:5:"score";s:17:"24.20435046832128";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:18:"22.285218962638425";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1876";s:5:"score";s:18:"22.283406106427407";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2411";s:5:"score";s:16:"21.8094505069418";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:16:"21.1190703067841";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Des mots de passe sécurisés composés d&#039;images et d&#039;idées ?</title>
		<link>http://www.it-news.fr/des-mots-de-passe-securises-composes-dimages-didees/</link>
		<pubDate>Mon, 27 Jan 2014 11:30:55 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1933</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2014/01/un-mot-de-passse-securise-compose-dimage-et-didee.jpg"><img class="alignleft size-full wp-image-1934" title="Un mot de passe sécurisée composé d'image et d'idée" alt="un-mot-de-passse-securise-compose-dimage-et-didee" src="http://www.it-news.fr/wp-content/uploads/2014/01/un-mot-de-passse-securise-compose-dimage-et-didee.jpg" width="320" height="210" /></a>Il est de notoriété publique que le problème majeur de la sécurité informatique est la gestion des mots de passe.</p>
<p style="text-align: justify;">En créer un sécurisé n’est pas un problème en soi, c’est le fait d’en trouver plusieurs sécurisés ET de les mémoriser qui se révèle plus compliqué. Alors comment faire ?</p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;">Trois chercheurs de <a href="http://www.cs.cmu.edu/" target="_blank">l’université de Carnegie Mellon</a>, Jeremiah Blocki, Manuel Blum et Anupam Datta, ont conçu une application basée sur des études cognitives.</p>
<p style="text-align: justify;">Ce système pourrait permettre aux internautes de créer et de mémoriser plus de 100 mots de passe sécurisés. Inspiré du concept <a href="http://books.google.fr/books?id=kVpkAQAAQBAJ&amp;pg=PA107&amp;lpg=PA107&amp;dq=%22Personne-Action-Objet%22&amp;source=bl&amp;ots=cNC5CMTZOO&amp;sig=uGYEkdAplqCvarQzVVF5bERuI3E&amp;hl=fr&amp;sa=X&amp;ei=tu3cUqTgB6Wu7AbpmYHYCA&amp;ved=0CEQQ6AEwAw#v=onepage&amp;q=%22Personne-Action-Objet%22&amp;f=false" target="_blank">« Personne-Action-Objet </a>» ou « PAO », il s’appuie sur le lien étroit qui existe entre la capacité de mémorisation et la fréquence à laquelle les souvenirs sont répétés.</p>

<h2 style="text-align: justify;">Une méthode efficace  pour créer et se souvenir de mots de passe sécurisés</h2>
<p style="text-align: justify;">L’utilisateur doit dans un premier temps choisir la photo d’une personne et l’associer à une photo d’une scène évocatrice. Ensuite, l’ordinateur va sélectionner aléatoirement l’image d’un objet et celle d’une action.</p>
<p style="text-align: justify;">Ainsi, l’internaute peut créer une histoire « P-A-O » originale et, en prenant par exemple la première lettre de chaque mot ou les trois premières lettres des deux premiers mots, obtenir un mot de passe unique, et donc sécurisé.</p>
<p style="text-align: justify;">L’intérêt premier est que, si l’utilisateur oublie son mot de passe, il peut s’en souvenir facilement en regardant les images mémorisées dans l’application. De plus, selon <a href="http://www.andrew.cmu.edu/user/danupam/" target="_blank">Anupam Datta</a>, si un hacker venait à décrypter un mot de passe, les autres ne seraient pas compromis, puisque l’histoire et les  images sont propres à chaque internaute.</p>
<p style="text-align: justify;">Les études sur le processus d’identification pullulent sur le web. De nombreuses entreprises proposent déjà une identification par analyse oculaire et/ou reconnaissance faciale. Dans le même temps, des chercheurs ont imaginé un système de dessins pour générer des mots de passe plus sécurisés.</p>
<p style="text-align: justify;">Malgré tout, l’étude de Carnegie Mellon est différente. Il ne s’agit pas de changer les processus d’identification, mais de trouver une méthode simple pour aider les internautes à mémoriser leurs mots de passe les plus complexes.</p>
<p style="text-align: justify;">Le 15 décembre 2013 à <a href="http://www.iacr.org/conferences/asiacrypt2013/" target="_blank">l’Asiacrypt</a>, Jeremiah Blocki a présenté ses recherches qui devraient bientôt donner naissance à une application mobile.</p>
<p style="text-align: justify;"><strong><span style="color: #ff6600;">Comment Aquastar Consulting peut vous aider ?</span></strong></p>
<p style="text-align: justify;"><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls/palo-alto" target="_blank">Solution de sécurité internet – Palo Alto Networks</a></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1933</wp:post_id>
		<wp:post_date>2014-01-27 12:30:55</wp:post_date>
		<wp:post_date_gmt>2014-01-27 11:30:55</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>des-mots-de-passe-securises-composes-dimages-didees</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="non-classe"><![CDATA[Non classé]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[76]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[2]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[mots de passe sécurisés]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Trois chercheurs de l’université de Carnegie Mellon, Jeremiah Blocki, Manuel Blum et Anupam Datta ont conçu une application basée sur des études cognitives.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438396]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"13.495831353218925";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1940";s:5:"score";s:17:"8.696102856136052";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"7.611006081294157";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:17:"6.437524418228699";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:17:"6.253909319781277";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1924";s:5:"score";s:17:"6.253909319781277";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1934]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1794";s:5:"score";s:18:"41.906104048140406";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:16:"20.2668003764994";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1868";s:5:"score";s:18:"18.892388927173883";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2411";s:5:"score";s:18:"17.830886773379415";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1465";s:5:"score";s:17:"17.35206572556992";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1099";s:5:"score";s:18:"15.963821696815426";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1257";s:5:"score";s:17:"15.48699964980543";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1940";s:5:"score";s:18:"13.920962355503766";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2411";s:5:"score";s:17:"44.57567128099553";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1794";s:5:"score";s:17:"35.75297344802332";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"28.222961254402858";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2438";s:5:"score";s:18:"18.018781104346214";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2491";s:5:"score";s:18:"15.582786427627948";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1465";s:5:"score";s:17:"13.84034153361976";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1868";s:5:"score";s:17:"13.63550293537501";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2501";s:5:"score";s:17:"13.61267124990444";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"1099";s:5:"score";s:17:"13.47226273179845";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1257";s:5:"score";s:18:"13.116112199656989";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Les tendances de la Cybersécurité en 2014</title>
		<link>http://www.it-news.fr/les-tendances-de-la-cybersecurite-en-2014/</link>
		<pubDate>Wed, 29 Jan 2014 09:00:30 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1940</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><span style="font-size: 16px;"><a href="http://www.it-news.fr/les-tendances-de-la-cybersecurite-en-2014/"><img class="alignleft  wp-image-1942" title="Les tendances de la cybersécurité en 2014" alt="tendance-de-la-cybersecurite-en-2014" src="http://www.it-news.fr/wp-content/uploads/2014/01/tendance-de-la-cybersecurite-en-2014.jpg" width="341" height="228" /></a>Aujourd’hui, la cybersécurité n’est plus le domaine exclusif des équipes techniques ou de sécurité réseau.</span></p>
<p style="text-align: justify;">Toute l’entreprise est désormais concernée, car il existe un réel impact sur son business, sa réputation, son chiffre d'affaires et ses clients.</p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;">Isabelle Dumont, Directrice Marketing de la division Industrie de <a href="http://www.it-news.fr/palo-alto-networks-nommee-dans-le-technology-fast-500-de-deloitte/" target="_blank">Palo Alto Networks</a>, a prédit quelles seraient les tendances de la cybersécurité en 2014.  D’ailleurs, vous avez pu retrouver Palo Alto au <a href="http://www.it-news.fr/event/forum-international-cybersecurite-2014-lille/" target="_blank">Forum International de la Cybersécurité</a>, à Lille Grand Palais, les 21 et 22 Janvier prochains.</p>

<h2 style="text-align: justify;">En 2014, les dirigeants vont suivre de près leurs projets de sécurité interne</h2>
<p style="text-align: justify;">Les entreprises, quelles que soient leurs activités, reconnaissent l’importance de la <a href="http://www.it-news.fr/2014-ou-une-annee-riche-en-cyberattaque/" target="_blank">cybersécurité</a>, ainsi que les risques qui y sont liés. Elles admettent également qu’elles ont encore beaucoup de progrès à faire pour en évaluer les coûts.</p>
<p style="text-align: justify;">Étant donné le lien étroit entre l’image de l’entreprise, ses revenus et la cybersécurité, les dirigeants souhaitent prendre la main sur ces sujets sensibles, jusqu’ici exclusivement réservés au service informatique.</p>
<p style="text-align: justify;">Il est donc recommandé aux responsables de la sécurité, pour 2014, de se préparer à de nombreux débats et questions de la part de leurs directions.</p>

<h2 style="text-align: justify;">Le partage des informations inter-entreprises va devenir crucial !</h2>
<p style="text-align: justify;">Chaque année, le volume de trafic sur les réseaux augmente. Il en est par conséquent de même pour les problèmes de sécurité. Or, les outils traditionnels nécessitent de nombreuses actions manuelles  et sont donc pour la plupart déjà dépassés.<a href="http://www.it-news.fr/wp-content/uploads/2014/01/isabelle-dumont.jpg"><img class="alignright  wp-image-1943" title="Isabelle Dumont" alt="isabelle-dumont" src="http://www.it-news.fr/wp-content/uploads/2014/01/isabelle-dumont.jpg" width="190" height="266" /></a></p>
<p style="text-align: justify;">La sécurité réseau est aujourd’hui basée sur un modèle où des processus de recherche automatisés, le renforcement de l’intelligence sur les nouvelles cyberattaques et le partage de cette connaissance deviennent essentiels.</p>
<p style="text-align: justify;">Les secteurs d’activité les plus menacés, car les plus sensibles, tels que le gouvernement, l’éducation, la santé et les services publics, vont devoir partager leur savoir pour lutter plus efficacement contre des cybercriminels devenus de plus en plus efficaces et dangereux.</p>

<h2 style="text-align: justify;">Les systèmes périphériques dans les datacenters seront de plus en plus visés !</h2>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2014/01/les-systemes-peripheriques-dans-les-datascenters-seront-de-plus-en-plus-vise.jpg"><img class="size-full wp-image-1941 alignleft" title="Les systèmes périphériques dans les datacenters seront de plus en plus visés !" alt="les-systemes-peripheriques-dans-les-datascenters-seront-de-plus-en-plus-vise" src="http://www.it-news.fr/wp-content/uploads/2014/01/les-systemes-peripheriques-dans-les-datascenters-seront-de-plus-en-plus-vise.jpg" width="150" height="225" /></a>Depuis plusieurs années, les entreprises ont pris des mesures de plus en plus strictes pour renforcer la protection de leurs datacenters. Toutefois, elles ont négligé les systèmes périphériques qui contribuent à son bon fonctionnement, rendant l’ensemble vulnérable.</p>
<p style="text-align: justify;">Or, il faut que tous ces éléments soient bien protégés pour rendre efficace, fiable et opérationnel un datacenter (depuis les serveurs de stockage jusqu'à l’alimentation électrique, en passant par l’air conditionné).</p>
<p style="text-align: justify;">L’exemple de Google en est la preuve même ! Rappelez-vous, en Australie, en début d’année 2013, ils ont vu leur datacenter local piraté car les hackers étaient passés par les systèmes de contrôle du bâtiment.</p>
<p style="text-align: justify;">Il est donc attendu, en 2014, une augmentation de ce type d’attaque. En effet, les pirates le savent bien : il est plus facile de passer par la « petite porte », moins sécurisée, à laquelle personne ne pense, pour s’approcher des données sensibles.</p>

<h2 style="text-align: justify;">En 2014, les organismes reconnus de la cybersécurité valideront les systèmes mis en place.</h2>
<p style="text-align: justify;"> L’objectif premier est de rassurer les entreprises quant à leurs systèmes de sécurité. En effet, elles devront obtenir en amont la validation d’organismes nationaux comme <a href="http://www.ssi.gouv.fr/fr/anssi/" target="_blank">l’ANSSI (Agence Nationale de la Sécurité des Systèmes d’Informations)</a> et la <a href="http://www.ssi.gouv.fr/fr/certification-qualification/cspn/" target="_blank">certification CSPN</a> (certification de sécurité de premier niveau) pour la France.</p>

<h2 style="text-align: justify;">Les prédictions 2014 de sécurité par Palo Alto Networks :</h2>
<ul style="text-align: justify;">
	<li>La sécurité des mobiles va devenir un enjeu majeur et sera intimement liée à la sécurisation des réseaux ;</li>
	<li>Il faut s’attendre à une forte croissance du nombre de projets de Cloud hybrides (publics ou privés) ;</li>
	<li>Les entreprises vont repenser leurs systèmes de sécurité interne (surtout ceux qui sont dans le Cloud) ;</li>
	<li>Les détections d’intrusion frauduleuse ou de piratage seront de plus en plus rapides ;</li>
	<li>Les dirigeants vont de plus en plus s’investir dans la sécurité interne de leur entreprise ;</li>
	<li>Le marché de l’emploi dans le domaine de la sécurité va exploser ;</li>
	<li>Suite aux différentes affaires de piratage de la NSA, les projets de chiffrement et de sécurisation SSL augmenteront inévitablement ;</li>
	<li>De plus en plus de malwares évolués apparaîtront, financés pour la plupart par des cybercriminels de plus en plus organisés ;</li>
	<li>La validation des systèmes de sécurité par des organismes nationaux renforcera la confiance des entreprises.</li>
</ul>
<p style="text-align: justify;"><span style="color: #ff6600;"><b>Comment Aquastar Consulting peut vous aider ?</b></span></p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls/palo-alto">Solution de sécurité internet – Palo Alto Networks</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1940</wp:post_id>
		<wp:post_date>2014-01-29 10:00:30</wp:post_date>
		<wp:post_date_gmt>2014-01-29 09:00:30</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>les-tendances-de-la-cybersecurite-en-2014</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<category domain="post_tag" nicename="securite-interne"><![CDATA[sécurité interne]]></category>
		<category domain="post_tag" nicename="tendances"><![CDATA[tendances]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[72]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[cybersécurité]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Isabelle Dumont, directrice Marketing de la division Industrie de Palo Alto Networks a isabelle-dumont prédit quelles seraient les tendances de la cybersécurité en 2014]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[1942]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438237]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"16.833885159393425";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:18:"13.424388973798926";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"12.457903355482523";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:18:"12.457903355482523";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"10.591109484833451";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"10.310549219232913";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:17:"26.46775968077855";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1773";s:5:"score";s:18:"23.185270837787748";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:17:"20.10591163397884";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1789";s:5:"score";s:18:"18.401548851573196";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"17.423824507770707";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:18:"17.423824507770707";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:17:"16.03695680123444";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"15.213339397154684";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:17:"39.82394948237148";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:17:"26.49396373112911";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"25.844160206482606";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"22.922963645272816";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"22.157754172973867";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:18:"22.157754172973867";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1773";s:5:"score";s:18:"18.798516318411032";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:17:"17.74386996210812";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2436";s:5:"score";s:18:"17.243070491343484";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:17:"16.59157421297816";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:comment>
			<wp:comment_id>1139</wp:comment_id>
			<wp:comment_author><![CDATA[[BLOCKED BY STBV] Palo Alto Networks certifiée par l’ANSSI en France | L&#039;actualité pour décideurs informatiquesL&#039;actualité pour décideurs informatiques]]></wp:comment_author>
			<wp:comment_author_email></wp:comment_author_email>
			<wp:comment_author_url>http://www.it-news.fr/palo-alto-networks-certifiee-par-lanssi-en-france/</wp:comment_author_url>
			<wp:comment_author_IP>37.187.41.26</wp:comment_author_IP>
			<wp:comment_date>2014-02-03 11:31:44</wp:comment_date>
			<wp:comment_date_gmt>2014-02-03 10:31:44</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[[&#8230;] ajoute que  « La cyber sécurité fait partie des principales priorités pour l’Etat français. En effet, sur le marché [&#8230;]]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type>pingback</wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
	</item>
	<item>
		<title>Orange victime de piratage informatique : 800 000 victimes de vols de données</title>
		<link>http://www.it-news.fr/orange-victime-de-piratage-informatique-800-000-victimes-de-vols-de-donnees/</link>
		<pubDate>Mon, 03 Feb 2014 09:08:11 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1955</guid>
		<description></description>
		<content:encoded><![CDATA[<a href="http://www.it-news.fr/orange-victime-de-piratage-informatique-800-000-victimes-de-vols-de-donnees/"><img class="alignleft  wp-image-1956" title="Orange victime de piratage informatique : 800 000 victimes de vols de données" alt="orange-piratage-informatique" src="http://www.it-news.fr/wp-content/uploads/2014/02/orange-piratage-informatique.jpg" width="341" height="228" /></a>
<p style="text-align: justify;"><span style="font-size: 16px;">Une 1ère rumeur de piratage informatique s’est répandue via le site </span><a style="font-size: 16px;" href="http://www.pcinpact.com/" target="_blank">PCInpact</a><span style="font-size: 16px;">, la semaine dernière. Ce n’est pourtant que ce dimanche 2 Février qu’Orange a envoyé un email informant ses clients d’un piratage…</span></p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;">« <a href="http://www.orange.fr/"><i>Orange</i></a><i> a été la cible d'une intrusion informatique le 16 janvier 2014 depuis la page 'Mon Compte' de l'Espace Client du site <a href="http://www.orange.fr/" target="_blank">www.orange.fr</a> </i>» explique l'opérateur estime pouvoir récupérer un certain nombre de données personnelles dérobées.</p>
<p style="text-align: justify;">Un porte-parole de l’entreprise a déclaré devant l’<a href="http://www.afp.fr/" target="_blank">AFP (Agence France Presse</a>) que le piratage informatique concernait  environ 800 000 clients, et comprend les noms, prénoms, emails et adresses postales de ces derniers. Les mots de passe n’ont, quant à eux, pas été volés.</p>

<h2 style="text-align: justify;">Un piratage informatique suivant la méthode du « Phishing ».</h2>
<p style="text-align: justify;">Selon l’opérateur, les données recueillies peuvent être suffisantes pour lancer des campagnes de « <a href="http://fr.wikipedia.org/wiki/Hame%C3%A7onnage" target="_blank">phishing </a>». Les informations dérobées s'avèrent suffisantes pour composer une base de données pour des campagnes de phishing ou faciliter l'usurpation d'identité en ligne par le biais de courriels trompeurs.</p>
<p style="text-align: justify;">Cette technique de piratage vise à recueillir des informations confidentielles (codes d’accès par exemple) via l’envoi d’e-mails censés provenir de banques ou opérateurs.  La victime, ne pouvant savoir si l’e-mail est légitime, fournit elle-même ses données personnelles.</p>
<p style="text-align: justify;">Malgré tout, seul 3% des clients de l’opérateur a été touché par ce piratage informatique. Ces derniers ont tous reçu un email d’alerte pour les prévenir d’éventuels emails frauduleux.</p>
<p style="text-align: justify;"><span style="color: #ff6600;"><b>Comment Aquastar Consulting peut vous aider ?</b></span></p>

<ul style="text-align: justify;">
	<li>Solution de sécurité informatique :
<ul>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls/netasq" target="_blank">Firewalls et Antivirus Netasq</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls/palo-alto" target="_blank">Firewalls et Antivirus Palo Alto</a></li>
</ul>
</li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1955</wp:post_id>
		<wp:post_date>2014-02-03 10:08:11</wp:post_date>
		<wp:post_date_gmt>2014-02-03 09:08:11</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>orange-victime-de-piratage-informatique-800-000-victimes-de-vols-de-donnees</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="operateur"><![CDATA[opérateur]]></category>
		<category domain="post_tag" nicename="orange"><![CDATA[Orange]]></category>
		<category domain="post_tag" nicename="phishing"><![CDATA[phishing]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[87]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[1956]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[piratage informatique]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Une 1ère rumeur de piratage informatique s’est répandue via le site PCInpact, la semaine dernière.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426436607]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1924";s:5:"score";s:18:"27.051499258216623";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1876";s:5:"score";s:18:"19.388690508986876";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"12.769599258692812";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"12.622332837408244";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:16:"9.37101385851868";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:17:"9.275757762075056";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1924";s:5:"score";s:18:"44.026508226197166";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1876";s:5:"score";s:18:"29.736542030538086";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"20.766931895990762";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"18.844345021118393";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1779";s:5:"score";s:18:"17.354509774075193";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1786";s:5:"score";s:17:"16.20378148488552";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1776";s:5:"score";s:18:"14.783422300618266";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"14.438438548132545";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1924";s:5:"score";s:17:"37.54449325672441";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"34.278153720703216";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:17:"24.44449518211317";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2376";s:5:"score";s:17:"24.20435046832128";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1876";s:5:"score";s:18:"22.682407714255138";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"21.639379712197275";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2354";s:5:"score";s:18:"21.471299717345907";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2330";s:5:"score";s:18:"18.405574427574813";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:16:"16.6119584113056";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:16:"15.9847966178816";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:comment>
			<wp:comment_id>1142</wp:comment_id>
			<wp:comment_author><![CDATA[[BLOCKED BY STBV] Journée de la sécurité sur Internet | L&#039;actualité pour décideurs informatiquesL&#039;actualité pour décideurs informatiques]]></wp:comment_author>
			<wp:comment_author_email></wp:comment_author_email>
			<wp:comment_author_url>http://www.it-news.fr/journee-de-la-securite-sur-internet/</wp:comment_author_url>
			<wp:comment_author_IP>37.187.41.26</wp:comment_author_IP>
			<wp:comment_date>2014-02-11 14:00:06</wp:comment_date>
			<wp:comment_date_gmt>2014-02-11 13:00:06</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[[&#8230;] personnelles (code d’accès, adresse personnelle…) en envoyant des emails censés provenir d’organisations diverses et variées telles que les banques, ou opérateurs téléphoniques. La victime, dans [&#8230;]]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type>pingback</wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
	</item>
	<item>
		<title>L&#039;ANSSI certifie les firewalls de Palo Alto Networks</title>
		<link>http://www.it-news.fr/palo-alto-networks-certifiee-par-lanssi-en-france/</link>
		<pubDate>Mon, 03 Feb 2014 10:31:37 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1963</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><span style="font-size: 16px;"><a href="http://www.it-news.fr/palo-alto-networks-certifiee-par-lanssi-en-france/"><img class="alignleft  wp-image-1964" title="Palo Alto Networks, certifiée par l’ANSSI en France" alt="Palo-Alto-certifie-ANSSI" src="http://www.it-news.fr/wp-content/uploads/2014/02/Palo-Alto-certifie-ANSSI.jpg" width="341" height="228" /></a>Acteur leader de la sécurité informatique pour entreprise, Palo Alto Networks a obtenu la certification de 1</span><sup>er</sup><span style="font-size: 16px;"> niveau (</span><a style="font-size: 16px;" href="http://www.ssi.gouv.fr/fr/certification-qualification/cspn/" target="_blank">CSPN</a><span style="font-size: 16px;">) de l’Agence Nationale de la Sécurité des Systèmes d’Information (</span><a style="font-size: 16px;" href="http://www.ssi.gouv.fr/" target="_blank">ANSSI</a><span style="font-size: 16px;">).</span></p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;"> Ce n’est qu’après être passée par un processus d’évaluation et de tests rigoureux soumis par le centre d’Evaluation de la Sécurité des Technologies de l’Information (<a href="http://fr.wikipedia.org/wiki/Centre_d'%C3%A9valuation_de_la_s%C3%A9curit%C3%A9_des_technologies_de_l'information" target="_blank">CESTI</a>), et l’<a href="http://www.amossys.fr/" target="_blank">AMOSSYS</a> (société de conseil et expertise en sécurité IT) que la société <a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls/palo-alto" target="_blank">Palo Alto Networks</a> est devenue la 1<sup>ère</sup> solution de sécurité certifiée par l’ANSSI sur les critères de firewalls « Next-Generation ».</p>

<h2>Le commentaire de Danilo Labovic sur la certification de Palo Alto Networks par l’ANSSI</h2>
<p style="text-align: justify;">Danilo Labovic, Vice-Président Europe du Sud chez <a href="https://paloaltonetworks.com/" target="_blank">Palo Alto Networks</a> déclare :   <i>«Avec cette certification, l’ANSSI reconnait la valeur ajoutée de notre approche de la cyber sécurité, proactive et systématique, ainsi que le leadership technologique de notre plateforme basée sur les moteurs AppID</i> (le filtrage applicatif)<i>, UserID </i>(pour le filtrage et la gestion des utilisateurs) <i>et ContentID </i>(pour le filtrage des attaques)<i> »</i>.</p>
<p style="text-align: center;"><img class="aligncenter  wp-image-1965" title="Palo Alto Networks certifiée par l’ANSSI" alt="Palo-Alto-Technologie" src="http://www.it-news.fr/wp-content/uploads/2014/02/Palo-Alto-Technologie.jpg" width="600" height="329" /></p>
<p style="text-align: justify;">Il ajoute que <i> </i><i>« La <a href="http://www.it-news.fr/les-tendances-de-la-cybersecurite-en-2014/" target="_blank">cyber sécurité</a> fait partie des principales priorités pour l’Etat français. En effet, sur le marché Français, nous collaborons déjà avec des ministères et acteurs de tout premier plan du secteur de la Défense. Avec cette certification, nous comptons aller bien plus loin ; nous pourrons activement participer à l’effort national visant à garantir la sécurité du cyberespace, de l’écosystème public/privé de Défense, des réseaux et systèmes d’information critiques de la France ».</i></p>
<p style="text-align: justify;">Cette certification, d’une organisation dépendante, est un vrai facteur différenciant dans le choix des solutions du marché. C’est non seulement un gage de conformité par rapport aux normes de sécurité, mais également de reconnaissance de qualité de ces produits<i>. </i></p>
<p style="text-align: justify;"><span style="color: #ff6600;"><b> </b><b>Comment Aquastar Consulting peut vous aider ?</b><b> </b></span></p>
<p style="text-align: justify;">En tant que partenaire de Palo Alto Networks, nous répondrons à vos questions et vous aiderons à sécuriser votre entreprise.</p>
<p style="text-align: justify;">Vous souhaitez, plus d’informations sur les solutions de sécurité de Palo Alto, <a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls/palo-alto" target="_blank">cliquez ici.</a></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1963</wp:post_id>
		<wp:post_date>2014-02-03 11:31:37</wp:post_date>
		<wp:post_date_gmt>2014-02-03 10:31:37</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>palo-alto-networks-certifiee-par-lanssi-en-france</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="anssi"><![CDATA[anssi]]></category>
		<category domain="post_tag" nicename="palo-alto-certifiee-par-lanssi"><![CDATA[Palo Alto certifiée par l'ANSSI]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[76]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[l'ANSSI]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Acteur leader de la sécurité informatique pour entreprise, Palo Alto Networks certifiée par l'ANSSI.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438206]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:17:"25.54153639521419";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1940";s:5:"score";s:18:"13.306022932062628";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"11.726483112774664";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1876";s:5:"score";s:18:"11.460716081467343";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:17:"11.24910832959555";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"10.753436000763134";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[1964]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:17:"42.61175269684907";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1571";s:5:"score";s:18:"26.799102820044936";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1940";s:5:"score";s:18:"20.449467640853563";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1773";s:5:"score";s:18:"20.449467640853563";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"19.347835319797746";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1876";s:5:"score";s:18:"17.771720839361308";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1741";s:5:"score";s:17:"17.49010627705406";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1172";s:5:"score";s:18:"16.662485470163183";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:16:"71.2319774540877";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"32.58885882802367";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"24.766310182149063";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1571";s:5:"score";s:17:"23.27167248964172";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"22.550060847058553";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1940";s:5:"score";s:17:"16.59157421297816";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1773";s:5:"score";s:17:"16.59157421297816";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1172";s:5:"score";s:17:"15.42071816658791";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:17:"15.41680653632684";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2251";s:5:"score";s:18:"15.076329621027106";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Augmentation des dépenses IT en 2014</title>
		<link>http://www.it-news.fr/augmentation-des-depenses-en-2014/</link>
		<pubDate>Tue, 04 Feb 2014 10:01:45 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1979</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><span style="font-size: 16px;"><a href="http://www.it-news.fr/?p=1979"><img class="alignleft  wp-image-1981" title="Augmentation des dépenses IT en 2014." alt="Gartner-depenses-IT-2014" src="http://www.it-news.fr/wp-content/uploads/2014/02/Gartner-depenses-IT-2014.jpg" width="341" height="228" /></a>Gartner a annoncé une croissance des dépenses IT en 2014 de +3.1%. Ce budget  est légèrement supérieur à celui de 2013 (+0.4% par rapport à 2012) mais est sensiblement inférieur aux prévisions faites par les autres cabinets d’études qui prévoyaient +3.6%. Découvrez les secteurs les plus favorisés.</span></p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;"><span style="font-size: 16px;">Selon </span><a style="font-size: 16px;" href="http://www.gartner.com/technology/home.jsp" target="_blank">Gartner</a><span style="font-size: 16px;">, les dépenses IT mondiales de 2014 représenteront  3 777 Milliards de dollars alors qu’en 2013 les dépenses s’élevaient à 3 666 Milliards de dollars.</span></p>
<p style="text-align: justify;">Revenant sur ses prévisions publiées lors du quatrième trimestre de 2013, Gartner avait prévu une augmentation des dépenses IT en 2014 de 3.6% soit un demi-point de moins.</p>

<h2 style="text-align: justify;">Division des dépenses IT en 2014</h2>
<p style="text-align: justify;">Les achats en matière d’informatique et de télécoms seront plus important cette année, avec une progression prévue à 0.4%.</p>
<p style="text-align: justify;">Les dépenses en <a href="http://fr.wikipedia.org/wiki/Terminal_informatique" target="_blank">terminaux</a> (PC, mobiles, tablettes, etc.) qui avaient affiché une progression de 1.2% en 2013, augmenteront de  4.3% en 2014.</p>
<p style="text-align: justify;">Pour ce qui est des logiciels pour entreprises, une augmentation des achats de 6.8% est attendue en 2014. Répondant à un véritable besoin des entreprises pour analyser leurs clientèles et améliorer leurs processus de vente, <b>les revenus obtenus par la vente de ces logiciels augmenteront de 10.8% en 2014</b>.</p>
<p style="text-align: justify;">Ci-dessous une représentation de la division des <b>dépenses IT en 2014</b> selon Gartner.</p>
<p style="text-align: center;"><img class="aligncenter  wp-image-1980" title="Division des dépenses IT en 2014" alt="division-des-depenses-it-en-2014" src="http://www.it-news.fr/wp-content/uploads/2014/02/division-des-depenses-it-en-2014.png" width="507" height="300" /></p>
<p style="text-align: justify;"> Malgré l’augmentation des dépenses IT en 2014, ces chiffres ont été revus à la baisse par Gartner.</p>
<p style="text-align: justify;"><a href="http://www.gartner.com/AnalystBiography?authorId=8361" target="_blank">Richard Gordon</a>, directeur de recherche chez Gartner, explique cette diminution par la baisse des prix des services VoIP en Chine et des revenus par utilisateur en Europe.</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1979</wp:post_id>
		<wp:post_date>2014-02-04 11:01:45</wp:post_date>
		<wp:post_date_gmt>2014-02-04 10:01:45</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>augmentation-des-depenses-en-2014</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="2014"><![CDATA[2014]]></category>
		<category domain="post_tag" nicename="budget-it"><![CDATA[budget IT]]></category>
		<category domain="category" nicename="decisionnel"><![CDATA[Décisionnel]]></category>
		<category domain="post_tag" nicename="gartner"><![CDATA[Gartner]]></category>
		<category domain="post_tag" nicename="previsions-it-2014"><![CDATA[prévisions IT 2014]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[81]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[dépenses IT en 2014]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Gartner a annoncé une croissance des dépenses IT en 2014 de +3.1%. Ce budget est légèrement supérieur à celui de 2013]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[1981]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437352]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"41.44952971338265";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:16:"36.9620405269443";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"32.21047964399909";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"19.185312761025816";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"18.390899695256923";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"18.24396859592433";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"71.07497664243049";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:17:"63.21052521720405";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2444";s:5:"score";s:18:"55.707762761686226";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"49.139665764706976";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1719";s:5:"score";s:17:"48.45681555044749";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:17:"33.31161164819697";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:18:"28.782418264335774";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"28.11353286746897";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2444";s:5:"score";s:18:"131.96945731574132";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"114.9821566408595";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:18:"100.81650815469368";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"69.77984957249451";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:17:"50.99772520486926";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"42.15510185670256";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"37.61848302277015";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1719";s:5:"score";s:17:"37.03364265660737";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:17:"36.94406255500983";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:17:"34.79080567116404";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Déclaration et utilisation du CICE en 2014</title>
		<link>http://www.it-news.fr/declaration-utilisation-du-cice-en-2014/</link>
		<pubDate>Wed, 05 Feb 2014 13:01:20 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=1988</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/?p=1988"><img class=" wp-image-1991 alignleft" title="Déclaration et Utilisation du CICE en 2014" alt="CICE-2014" src="http://www.it-news.fr/wp-content/uploads/2014/02/CICE-2014.jpg" width="341" height="228" /></a>Le ministère de l’Economie et des Finances a apporté des précisions importantes autour des modalités de déclaration et d’utilisation du CICE en 2014.</p>
<p style="text-align: right;"><!--more Lire la suite--></p>

<h2 style="text-align: justify;"> Qu’est-ce que le CICE ?</h2>
<p style="text-align: justify;">Appliqué depuis Janvier 2014,  le Crédit d’Impôt pour la Compétitivité et l’Emploi (CICE) est un avantage fiscal pour les entreprises qui emploient des salariés, qui sont soumises à un régime réel d’imposition, et ce quels que soient la forme ou le régime d’imposition. Ce qui, par conséquent, exclut les micro-entreprises et les auto-entrepreneurs.</p>

<h2 style="text-align: justify;">Comment déclarer le CICE en 2014 ?</h2>
<p style="text-align: justify;">Afin de bénéficier du CICE, les entreprises doivent déposer <a href="http://www.impots.gouv.fr/portal/deploiement/p1/fichedescriptiveformulaire_8944/fichedescriptiveformulaire_8944.pdf" target="_blank">une déclaration spéciale n°2079-CICE</a> auprès des services fiscaux.</p>
<p style="text-align: justify;">Celle-ci doit être déposée au moment du dépôt du relevé de solde de l’IS, c’est-à-dire soit le 15 du 4<sup>ème</sup> mois suivant la date de  clôture de l’exercice, soit le 15 mai pour les entreprises qui clôturent leur exercice fiscal le 31 décembre.</p>
<p style="text-align: justify;">Depuis le 2 Janvier 2014, il est possible pour les entreprises de télé-déclarer leur déclaration n°2079-CICE-SD.</p>
<p style="text-align: justify;">Par ailleurs, la méthode de déclaration diffère selon le régime d’imposition :</p>

<ul style="text-align: justify;">
	<li><b><i>Pour les entreprises qui sont soumises à l’impôt sur les sociétés</i></b></li>
</ul>
<p style="text-align: justify;">Dans ce cas-ci, la déclaration doit être déposée lors du dépôt du relevé de solde de l’IS, c'est-à-dire le 15 du 4<sup>ème</sup> mois suivant la date de l’exercice ou le 15 mai pour les entreprises qui clôturent leur exercice fiscal le 31 décembre.</p>
<p style="text-align: justify;">Par exemple, pour une entreprise qui clôture son exercice le 31 décembre 2013, la déclaration du CICE au titre de l’année 2013 devra être effectuée le 15 mai 2014 au plus tard.</p>

<ul style="text-align: justify;">
	<li><b><i>Pour les entreprises qui sont soumises à l’impôt sur les revenus</i></b></li>
</ul>
<p style="text-align: justify;">Pour ce cas-ci, l’entreprise doit déposer sa déclaration au moment du dépôt de sa déclaration de résultats et de sa liasse fiscale, soit le 2<sup>ème</sup> jour ouvré suivant le 1<sup>er</sup> mai. Par conséquent, le montant du CICE sera reporté sur <a href="http://www.impots.gouv.fr/portal/dgi/public/popup;jsessionid=OIGT4WTCTHZWTQFIEIPSFFA?espId=1&amp;action=openImprime&amp;docOid=ficheformulaire_3508&amp;typePage=ifi01">la déclaration de revenus n°2042</a>.</p>
<p style="text-align: justify;">Ci-dessous, un extrait de la publication du communiqué de presse de la direction des Finances publiques.</p>
<p style="text-align: justify;"><img class="aligncenter  wp-image-1995" title="extrait de la publication de la déclaration du CICE en 2014" alt="extrait-de-la-publication-de-la-déclaration-du-CICE" src="http://www.it-news.fr/wp-content/uploads/2014/02/extrait-de-la-publication-de-la-déclaration-du-CICE.png" width="637" height="367" /></p>

<h2 style="text-align: justify;"> Les principes de base de la déclaration du CICE en 2014</h2>
<p style="text-align: justify;">Les principes de base de la déclaration du CICE en 2014 sont rappelés dans le communiqué de presse du ministère de l’Economie et des Finances dont l’extrait se trouve ci-dessous.</p>
<p style="text-align: justify;"><img class="aligncenter  wp-image-1994" title="les principes de base de la déclaration du CICE en 2014" alt="les-principes-de-base-de-la-declaration-du-cice-en-2014" src="http://www.it-news.fr/wp-content/uploads/2014/02/les-principes-de-base-de-la-declaration-du-cice-en-2014.png" width="638" height="371" /></p>
<p style="text-align: justify;"><span style="color: #000000; font-size: 1.8em; line-height: 1.5em;">Qui est éligible à la restitution de l'excédent du crédit d'impôt?</span></p>
<p style="text-align: justify;">Les entreprises éligibles à la restitution de l’excédent du crédit d’impôt sont :</p>

<ul style="text-align: justify;">
	<li>Les PME</li>
	<li>Les jeunes entreprises, sous certaines conditions</li>
	<li>Les jeunes entreprises innovantes (voir <a href="http://www.legifrance.gouv.fr/affichCodeArticle.do;jsessionid=7A62AC577F35B1AF0AD06E82C2369F9F.tpdjo07v_2?cidTexte=LEGITEXT000006069577&amp;idArticle=LEGIARTI000006302407&amp;dateTexte=&amp;categorieLien=cid" target="_blank">l’article 44 sexies-0 A du CGI</a>)</li>
	<li>Les entreprises faisant l’objet d’une procédure de conciliation, de sauvegarde, de redressement ou de liquidation judiciaire.</li>
</ul>
<p style="text-align: justify;"><img class="aligncenter  wp-image-1993" title="Qui est éligible à la restitution de l'excédent du crédit d'impôt? " alt="qui-est-eligible-a-la-restitution-de-lexcedent-du-credit-dimpot" src="http://www.it-news.fr/wp-content/uploads/2014/02/qui-est-eligible-a-la-restitution-de-lexcedent-du-credit-dimpot.png" width="636" height="376" /></p>
<p style="text-align: justify;"><span style="color: #000000; font-size: 1.8em; line-height: 1.5em;">Rappels sur les PME éligibles au CICE 2014 :</span></p>
<p style="text-align: justify;">Les PME au sens de la règlementation communautaire sont les entreprises qui remplissent la définition de petites et moyennes entreprises (pour plus de précisions, se référer à la <a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2008:214:0003:0047:fr:PDF" target="_blank">réglementation (CE) n° 800/2008 de la commission Européenne du 6 août 2008</a>).</p>
<p style="text-align: justify;">Pour qu’une entreprise soit considérée comme une PME communautaire, elle doit remplir deux critères :</p>

<ul style="text-align: justify;">
	<li>L’effectif de l’entreprise doit être inférieur à 250 personnes</li>
	<li>Le chiffre d’affaire annuel ne doit pas être supérieur à 50 millions d’euros ou le total du bilan annuel ne doit pas excéder 43 millions d’euros</li>
</ul>
<p style="text-align: justify;"><span style="color: #ff6600;"><b>Comment Aquastar Consulting peut vous aider ? </b></span></p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/gestion-metier/paye-rh#" target="_blank">Solution de Gestion – Sage</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1988</wp:post_id>
		<wp:post_date>2014-02-05 14:01:20</wp:post_date>
		<wp:post_date_gmt>2014-02-05 13:01:20</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>declaration-utilisation-du-cice-en-2014</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="2014"><![CDATA[2014]]></category>
		<category domain="post_tag" nicename="cice"><![CDATA[CICE]]></category>
		<category domain="category" nicename="comptabilite-finances"><![CDATA[Comptabilité - Finances]]></category>
		<category domain="post_tag" nicename="pme"><![CDATA[PME]]></category>
		<category domain="category" nicename="solutions-de-gestion"><![CDATA[Solutions de gestion]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[90]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[CICE en 2014]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Le ministère de l’Economie et des Finances a apporté des précisions importantes autour des modalités de déclarations et d’utilisation du CICE en 2014.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[1991]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437759]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:17:"41.44952971338265";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:17:"37.18627512286013";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"32.49681401532267";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:17:"26.19575235466496";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"20.15342797386138";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1902";s:5:"score";s:17:"20.15342797386138";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:17:"70.72912929274004";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:17:"63.19820430236062";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"58.59894553592207";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:16:"54.3585475230269";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1595";s:5:"score";s:18:"53.381492763866646";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"953";s:5:"score";s:17:"51.38070678603593";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2406";s:5:"score";s:18:"50.795567860919434";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"578";s:5:"score";s:17:"42.81362002408997";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:17:"114.9821566408595";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:18:"100.70383023548786";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"94.18179327572444";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"84.11096380644724";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2475";s:5:"score";s:17:"83.94378369120442";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:17:"65.98399146989075";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:18:"62.853553989320496";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2438";s:5:"score";s:17:"55.21328010163849";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"49.10228586144716";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1595";s:5:"score";s:18:"45.735575055235195";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Le Big Data : principal objectif des entreprises.</title>
		<link>http://www.it-news.fr/le-big-data-principal-objectif-des-entreprises/</link>
		<pubDate>Thu, 06 Feb 2014 10:43:07 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2001</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/le-big-data-principal-objectif-des-entreprises"><img class="alignleft  wp-image-2003" title="Le Big Data : principal objectif des entreprises" alt="big-data-2014" src="http://www.it-news.fr/wp-content/uploads/2014/02/big-data-2014.jpg" width="341" height="228" /></a>Le Big Data est devenu incontournable dans les entreprises ; plus de deux sociétés sur trois estiment que son exploitation est cruciale au bon développement d’une entreprise.</p>
<p style="text-align: right;"><!--more Lire la Suite--></p>
<p style="text-align: justify;">Selon une étude réalisée par KPMG <a href="http://www.kpmg.com/Global/en/IssuesAndInsights/ArticlesPublications/Documents/going-beyond-data-and-analytics-v4.pdf" target="_blank">« Going beyond the data : Achieving actionable insight with data and analytics</a>, » les chefs d’entreprises sont conscients du potentiel de l’exploitation des données. Par conséquent, la majorité d’entre eux (56%) ont modifié leur stratégie pour intégrer le Big Data au cœur des préoccupations de l’entreprise.</p>

<h2 style="text-align: justify;">Qu’est-ce que le Big Data ?</h2>
<p style="text-align: justify;">Le Big Data ou « données massives » désigne un ensemble très important de données. Cet ensemble représentant une énorme accumulation d’informations ; il est souvent nécessaire de repenser les facteurs liés au Big Data, comme la récupération, le stockage, l’analyse et la virtualisation des données.</p>
<p style="text-align: justify;">Or, les technologies récentes ne permettent pas encore d’exploiter et de gérer correctement ce Big Data.</p>
<p style="text-align: justify;">Malgré tout, nombreuses sont les entreprises qui se sont lancées dans l’aventure et qui ont décidé d’intégrer des technologies d’exploitation liées au big data dans leur système déjà existant.<a href="http://www.it-news.fr/wp-content/uploads/2014/02/big-data-2014-big.jpg" target="_blank"><img class="aligncenter size-full wp-image-2011" title="Qu'est-ce que le Big Data? " alt="big-data-2014-small" src="http://www.it-news.fr/wp-content/uploads/2014/02/big-data-2014-small.jpg" width="400" height="253" /></a></p>

<h2 style="text-align: justify;">Le Big Data, un véritable enjeu pour les entreprises</h2>
<p style="text-align: justify;">Pour les entreprises qui ont pris la décision de modifier leur stratégie pour y intégrer le data, la priorité a été d’acquérir des systèmes d’analyses et d’investir dans du personnel compétent et d’affiner les paramètres de collecte des données.</p>

<h3 style="text-align: justify;">A quoi servent les systèmes d’analyse de données ?</h3>
<p style="text-align: justify;">Ces systèmes d’analyse vont, en premier lieu, exploiter les données plus rapidement que les systèmes dit de <a href="http://fr.wikipedia.org/wiki/Informatique_d%C3%A9cisionnelle">Business Intelligence (BI)</a> puis ils résolvent des problématiques existantes, identifient des sujets qui n’auraient pas été soulevée, et enfin permettent significativement de réduire les coûts.</p>

<h3 style="text-align: justify;">Pour quelles raisons les entreprises se lancent dans le big data ?</h3>
<p style="text-align: justify;">Pour la plupart des entreprises, se lancer dans le big data permet de remplir deux principaux objectifs :</p>

<ul style="text-align: justify;">
	<li>Améliorer les opérations,</li>
	<li>Développer l’innovation.</li>
</ul>
<h3 style="text-align: justify;">Les résultats obtenus après l’intégration du big data</h3>
<p style="text-align: justify;">Les résultats observés après l’intégration du big data dans une entreprise sont entre autres, une réduction des coûts au niveau de la gestion des ressources et une meilleure coordination entre les différents métiers.</p>
<p style="text-align: center;"><img class="aligncenter  wp-image-2008" title="Le Big Data, un véritable enjeu pour les entreprises" alt="Big-Data3-EMC-IDC-460" src="http://www.it-news.fr/wp-content/uploads/2014/02/Big-Data3-EMC-IDC-460.jpg" width="460" height="260" /></p>

<h2 style="text-align: justify;">Les défis du Big Data</h2>
<p style="text-align: justify;">L’acquisition d’un système d’analyse des données collectées par l’entreprise ne fait plus débat. Malgré tout, le principal défi semble être de sélectionner et de paramétrer la bonne solution qui va pouvoir analyser et interpréter correctement les données rassemblées.</p>
<p style="text-align: justify;">Il y a ensuite l’identification des risques, la réactivité face aux informations collectées et enfin et surtout savoir prendre la bonne décision face à l’interprétation des données par les outils d’analyses.</p>
<p style="text-align: justify;">En ce qui concerne les outils de systèmes d’analyse des données, la première difficulté et la plus importante est de savoir identifier les bonnes données à utiliser face à la masse d’autres données collectées.</p>
<p style="text-align: justify;">La seconde difficulté, en corrélation avec la première, est de mettre en place des solutions (manuelles ou automatiques) qui vont nettoyer, analyser et interpréter les données choisies.</p>
<p style="text-align: justify;">Selon KPMG, le Big Data est une formidable opportunité qui s’offre aux entreprises mais elle conclut en disant que « <i>le problème majeur est qu’il n’existe pas de solution unique dans l’exécution de cette stratégie</i> ».</p>
<p style="text-align: justify;">Par conséquent, les entreprises vont devoir prévoir différents scénaris et hypothèses qui vont leur permettre de définir une stratégie adaptée en fonction des évènements, incluant des scénaris imprévus.</p>
<p style="text-align: justify;"><strong><span style="color: #ff6600;">Comment Aquastar Consulting peut vous aider ?</span></strong></p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/systemes/virtualisation-serveurs" target="_blank">Solution en virtualisation – VMware &amp; Windows Server</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/systemes/sauvegarde" target="_blank">Solution de sauvegarde – CA technologies ARCserve</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2001</wp:post_id>
		<wp:post_date>2014-02-06 11:43:07</wp:post_date>
		<wp:post_date_gmt>2014-02-06 10:43:07</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>le-big-data-principal-objectif-des-entreprises</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="data"><![CDATA[data]]></category>
		<category domain="post_tag" nicename="entreprises"><![CDATA[entreprises]]></category>
		<category domain="post_tag" nicename="exploitation"><![CDATA[exploitation]]></category>
		<category domain="post_tag" nicename="outils-danalyse-des-donnees"><![CDATA[outils d'analyse des données]]></category>
		<category domain="category" nicename="reseaux-et-mobilite"><![CDATA[Réseaux et mobilité]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[89]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Big Data]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Selon une étude réalisée par KPMG, les chefs d’entreprise sont conscients du potentiel de l’exploitation des données et donc du Big Data.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_post_restored_from</wp:meta_key>
			<wp:meta_value><![CDATA[a:3:{s:20:"restored_revision_id";i:2007;s:16:"restored_by_user";i:37;s:13:"restored_time";i:1391691058;}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[2003]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438061]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"13.636711473530715";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1789";s:5:"score";s:18:"12.395058435228993";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"10.344060970344167";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1876";s:5:"score";s:18:"10.282517653382751";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:17:"9.251543078374382";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"9.177768400397118";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1444";s:5:"score";s:18:"39.661532984086136";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"827";s:5:"score";s:17:"37.79646690832164";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"24.043664017280307";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1789";s:5:"score";s:18:"21.107410863446418";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1876";s:5:"score";s:18:"17.102826316858756";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:17:"16.93848304366508";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"15.333976217466814";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:16:"14.4831224457931";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"39.66575515874095";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1444";s:5:"score";s:17:"34.53605602454175";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"827";s:5:"score";s:18:"33.811826690578975";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"27.145865958265198";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"24.24894862241411";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2400";s:5:"score";s:17:"21.49712462495989";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2475";s:5:"score";s:18:"21.459323668845368";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"19.830690747192584";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"19.490213831892852";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"19.490213831892852";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Solution Wi-Fi Aruba Networks</title>
		<link>http://www.it-news.fr/solution-wi-fi-aruba-networks/</link>
		<pubDate>Fri, 07 Feb 2014 08:47:16 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2030</guid>
		<description></description>
		<content:encoded><![CDATA[<iframe src="//www.youtube.com/embed/ZCu1pFymWYg?list=UUcFRvOTXG8X9mXb1hU6ho6Q" height="315" width="560" allowfullscreen="" frameborder="0"></iframe>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2030</wp:post_id>
		<wp:post_date>2014-02-07 09:47:16</wp:post_date>
		<wp:post_date_gmt>2014-02-07 08:47:16</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>solution-wi-fi-aruba-networks</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="aruba-networks"><![CDATA[Aruba networks]]></category>
		<category domain="post_tag" nicename="hotspot"><![CDATA[hotspot]]></category>
		<category domain="post_tag" nicename="internet"><![CDATA[internet]]></category>
		<category domain="post_tag" nicename="solution-wi-fi"><![CDATA[solution wi-fi]]></category>
		<category domain="category" nicename="videos"><![CDATA[Vidéos]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[44]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Wi-Fi]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Aruba Networks propose des points d'accès Wi-Fi sans-fils, qui offrent une large couverture du réseau internet dans vos bâtiments. Que vous soyez en déplacement temporairement ou pour une plus longue durée, Aruba Networks vous propose des solutions adaptés à vos besoins.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426436973]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:3:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2232";s:5:"score";s:18:"114.27996826713465";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2251";s:5:"score";s:16:"64.2313049705395";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:17:"5.843248602754384";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[empty]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2232";s:5:"score";s:17:"200.3625284433744";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2251";s:5:"score";s:18:"108.45517101418994";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2362";s:5:"score";s:17:"54.22758550709498";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"133";s:5:"score";s:18:"44.993674391761566";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"760";s:5:"score";s:18:"40.075812065044715";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"723";s:5:"score";s:17:"34.14442608412176";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:17:"9.835724653433696";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:2:"41";s:5:"score";s:16:"6.15594074355561";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2232";s:5:"score";s:18:"320.55489282247873";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2251";s:5:"score";s:18:"164.64131111067383";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2362";s:5:"score";s:18:"123.48098333300538";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"133";s:5:"score";s:16:"36.3875901662612";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"760";s:5:"score";s:17:"32.61850776100442";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2482";s:5:"score";s:17:"32.58334912563292";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"723";s:5:"score";s:17:"28.65370455659102";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2319";s:5:"score";s:18:"12.708936322669487";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2400";s:5:"score";s:17:"11.30724721577033";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:17:"7.538164810513553";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Quelle informatique aux JO de Sochi 2014 ?</title>
		<link>http://www.it-news.fr/quelle-informatique-aux-jo-de-sochi-2014/</link>
		<pubDate>Fri, 07 Feb 2014 14:07:54 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2033</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><img class="alignleft size-full wp-image-2039" title="Quelle informatique aux JO de Sochi?" alt="L-informatique-aux-JO-de-Sochi-2014" src="http://www.it-news.fr/wp-content/uploads/2014/02/L-informatique-aux-JO-de-Sochi-2014.jpg" width="341" height="228" />Alors que les Jeux Olympiques de Sochi vont commencer, Atos, Avaya et Samsung, fournisseurs IT de l’évènement, doivent faire face aux menaces pesant sur les différents systèmes d’informations et sur les installations informatiques, et ce sans avoir le droit à l’erreur...</p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;">Il aura fallu quatre années de préparation à <a href="http://fr.atos.net/fr-fr/accueil.html" target="_blank">Atos</a>, avec <b>plus de 3 000 employés sur place et plus de 100 000 heures de tests,</b> ainsi qu'un nombre impressionnant de matériels informatiques (plus de 500 PC et 400 serveurs…) pour installer un parc informatique digne de ce nom et des attentes du gouvernement russe.</p>
<p style="text-align: justify;">Pendant les 18 jours que vont durer les JO de Sochi, Atos va gérer tout le système informatique de la compétition, de l’accréditation des journalistes aux chronométrages des épreuves. Atos ne peut donc pas se permettre la moindre erreur !!</p>
<img class="alignright size-full wp-image-2035" title="Atos fournisseur officiel informatique aux JO de Sochi" alt="atos-fournisseur-informatique-aux-jo-de-sochi" src="http://www.it-news.fr/wp-content/uploads/2014/02/atos-fournisseur-informatique-aux-jo-de-sochi.jpg" width="150" height="100" />
<p style="text-align: justify;">Pourtant, la SSII Française est habituée à ce type de manifestation et de pression, puisque c’est elle qui s’est occupée de la mise en place des systèmes informatiques des Jeux Olympiques depuis 1992. Partenaire historique du <a href="http://fr.wikipedia.org/wiki/Comit%C3%A9_international_olympique" target="_blank">CIO (Comité International Olympique)</a>, Atos en est donc à sa septième Olympiades.</p>
<p style="text-align: justify;">Patrick Adiba, le Vice-Président d’Atos, a déclaré : « <i>On sait sept ans à l'avance à quelle heure, quelle minute, quelle seconde on doit démarrer</i>. <i>A nous de nous préparer à toutes les éventualités, à toutes les situations. Il s’agit d’assurer quoi qu'il arrive. » </i></p>

<h2 style="text-align: justify;">Droits de l’Homme et Informatique aux JO de Sochi</h2>
<p style="text-align: justify;"><img class="alignleft size-full wp-image-2036" title="Samsung, fournisseur officiel informatique aux JO de Sochi" alt="samsung-fournisseur-informatique-aux-jo-de-sochi" src="http://www.it-news.fr/wp-content/uploads/2014/02/samsunf-fournisseur-informatique-aux-jo-de-sochi.jpg" width="150" height="100" />Un courrier de la part d’<a href="http://www.hrw.org/fr" target="_blank">Human Rights Watch</a> détaillant les dérives commises par la Russie a été adressé aux dix multinationales partenaires du CIO. <a href="http://www.samsung.com/fr/" target="_blank">Samsung</a> (fournisseur du matériel informatique et de reprographie) a répondu, Atos non.</p>
<p style="text-align: justify;">Les dérives dénoncées parlent d’exploitations de travailleurs immigrés, d’expulsion des propriétaires immobiliers, des impacts environnementaux, des harcèlements de militants de la société civile et surtout des lois promulgués par Moscou contre la propagande gay.</p>
<p style="text-align: center;"><img class="aligncenter size-full wp-image-2046" title="JO Sochi et la question des droits de l'Homme" alt="jo-sochi-droit-de-l-homme" src="http://www.it-news.fr/wp-content/uploads/2014/02/jo-sochi-droit-de-l-homme.jpg" width="600" height="439" /></p>
<p style="text-align: justify;">De plus, <a href="http://www.change.org/fr/p%C3%A9titions/partenaires-et-fournisseurs-des-j-o-de-sotchi-d%C3%A9noncez-les-cons%C3%A9quences-des-lois-contre-la-propagande-gay-en-russie" target="_blank">une pétition en ligne</a>, qui  a déjà recueilli plus de 2 000 signatures, demande aux fournisseurs IT de dénoncer ces dérives contre les droits de l’Homme.</p>
<p style="text-align: justify;">En dépit d'inquiétudes concernant son image, Atos, représentée par Patrick Adiba, déclare que gérer l’informatique aux JO de Sochi représente une merveilleuse vitrine pour l’entreprise, tout en étant « <i>un accélérateur commercial qui permet de montrer à nos clients comment, dans des situations extrêmes, nous sommes capables d’appliquer toutes les disciplines de l’informatique</i> ».</p>

<h2 style="text-align: justify;">Les JO de Sochi, les jeux les plus connectés de l’histoire</h2>
<p style="text-align: justify;">Malgré le contexte géopolitique des JO, il ne faut pas oublier les innovations technologiques présentées tout au long de cet évènement. Du calendrier des compétitions, au classements en passant par les bulletins météo, toutes les informations pourront être accessibles sur toutes sortes de terminaux mobiles.</p>
<p style="text-align: justify;">Atos a aussi dû créer de nouveaux logiciels en raison de l’introduction de nouvelles épreuves, telles que le <a href="http://fr.wikipedia.org/wiki/Slopestyle" target="_blank">slopestyle</a>, <a href="http://fr.wikipedia.org/wiki/Half-pipe" target="_blank">l’half-pipe en skiqui</a>, qui n’existaient pas à l’époque des JO de Vancouver.</p>
<img class="size-full wp-image-2037 alignright" style="line-height: 24px; font-size: 16px; text-align: justify;" title="Avaya, fournisseur officiel informatique aux JO de Sochi" alt="avaya-fournisseur-it-aux-jo-de-sochi" src="http://www.it-news.fr/wp-content/uploads/2014/02/avaya-fournisseur-it-aux-jo-de-sochi.jpg" width="150" height="100" />
<p style="text-align: justify;">Concernant,  Avaya (un autre fournisseur IT officiel des JO) a mis en place l’infrastructure réseaux en commençant de zéro et ce, en un an et demi.</p>
<p style="text-align: justify;">Patrice Clair, Directeur avant-vente d’Avaya France déclare «  <em>Il n’y avait rien sur place. Il a fallu poser les équipements, la fibre, tout…. </em>» Il a également rappelé « <i>qu’à <em>Vancouver, l’iPhone 3GS était sorti peu de temps avant. Quatre ans plus tard, le nombre de terminaux mobiles a explosé. »</em></i><em></em></p>
<p style="text-align: justify;">Pour pouvoir assurer la charge très importante des connexions simultanées, l’équipementier a placé 2 500 points d’accès sur les onze sites de la compétition, distribués dans deux clusters séparés de quelques cinquante kilomètres.</p>
<p style="text-align: justify;">Avaya estime qu’il s’agira « <i>du plus vaste réseau public de ce genre, et un vrai environnement </i><a href="http://www.aquastar-consulting.com/index.php/solutions/reseau-mobilite/byod-mdm#" target="_blank"><i>BYOD (Bring Your Own Device).</i> »</a></p>


[caption id="attachment_2038" align="aligncenter" width="315"]<img class="size-full wp-image-2038" title="Vue olympique du village olympique de Sochi" alt="quelle-informatique-aux-ho-de-sochi" src="http://www.it-news.fr/wp-content/uploads/2014/02/quelle-informatique-aux-ho-de-sochi.jpg" width="315" height="160" /> Vue Satellite du village olympique de Sochi[/caption]
<p style="text-align: justify;">Autre innovation concernant l’informatique aux JO de Sochi, les compétitions seront diffusées pour la première fois sur <a href="http://fr.wikipedia.org/wiki/Internet_Protocol" target="_blank">IP</a>, et non par <a href="http://fr.wikipedia.org/wiki/C%C3%A2ble_coaxial" target="_blank">câbles coaxiaux</a>, de même que le réseau téléphonique, avec 6 500 postes déployés. Un chantier de l’envergure du déploiement d’une banque de 40 000 employés, compare Patrice Claire (Avaya). Il note également que la différence entre un projet classique et les JO de Sochi, est que le déploiement se fait progressivement dans le premier cas, et non immédiamment comme le chantier gigantesque des Jeux Olympiques Russes.</p>
<p style="text-align: justify;"><span style="color: #ff6600;"><b>Comment Aquastar Consulting peut vous aider ? </b></span></p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/reseau-mobilite/wifi-hotspot" target="_blank">Solution en Wi-Fi – Aruba Networks</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/reseau-mobilite/byod-mdm" target="_blank">Solution en BYOD – Aruba Networks</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2033</wp:post_id>
		<wp:post_date>2014-02-07 15:07:54</wp:post_date>
		<wp:post_date_gmt>2014-02-07 14:07:54</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>quelle-informatique-aux-jo-de-sochi-2014</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="innovation"><![CDATA[innovation]]></category>
		<category domain="post_tag" nicename="it"><![CDATA[IT]]></category>
		<category domain="post_tag" nicename="jeux-olympiques"><![CDATA[Jeux Olympiques]]></category>
		<category domain="category" nicename="reseaux-et-mobilite"><![CDATA[Réseaux et mobilité]]></category>
		<category domain="post_tag" nicename="sochi"><![CDATA[Sochi]]></category>
		<category domain="post_tag" nicename="wifi"><![CDATA[wifi]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[87]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[informatique aux JO de Sochi]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[2039]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Alors que les Jeux Olympiques de Sochi vont commencer, nous nous intéressons à l'informatique aux JO de Sochi.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_post_restored_from</wp:meta_key>
			<wp:meta_value><![CDATA[a:3:{s:20:"restored_revision_id";i:2043;s:16:"restored_by_user";i:37;s:13:"restored_time";i:1391783285;}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437789]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1789";s:5:"score";s:18:"15.033368551917548";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:18:"13.947339667785364";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"12.168773123602874";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"9.482568852835126";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:15:"9.3172081595361";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:17:"9.251543078374382";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:3:"927";s:5:"score";s:18:"48.289780008032594";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"900";s:5:"score";s:18:"47.526966488799125";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"760";s:5:"score";s:18:"47.526966488799125";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2436";s:5:"score";s:17:"37.07444021748698";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1480";s:5:"score";s:17:"35.34563356105337";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1789";s:5:"score";s:18:"27.081598963752107";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:18:"23.591022594122528";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"21.425421867674267";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2436";s:5:"score";s:17:"90.17761559155988";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"900";s:5:"score";s:17:"41.72801551101982";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"760";s:5:"score";s:17:"41.72801551101982";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"927";s:5:"score";s:18:"38.716592982109084";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:17:"34.79080567116404";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"32.64331493870001";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1480";s:5:"score";s:17:"31.89107817348943";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"27.145865958265198";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"26.584231885841234";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:17:"23.14411998155603";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>La cybercriminalité en entreprise en 2013 a provoqué 110 milliards d’euros de pertes financières</title>
		<link>http://www.it-news.fr/la-cybercriminalite-en-entreprise-en-2013-coute-110-milliards-deuros-de-pertes-financieres/</link>
		<pubDate>Wed, 12 Feb 2014 09:00:08 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2049</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/?p=2049"><img class="alignleft size-full wp-image-2051" title="La cybercriminalité en entreprise en 2013 a coûté 110 milliards d’euros de pertes financières" alt="cyber-criminalite-entreprise" src="http://www.it-news.fr/wp-content/uploads/2014/02/cyber-criminalite-entreprise.jpg" width="341" height="228" /></a>Steria et PAC ont mené une étude dans 4 pays européens montrant les inquiétudes des entreprises envers la cybersécurité.</p>
<p style="text-align: right;"><!--more Lire la Suite--></p>
<p style="text-align: justify;">Selon <a href="http://www.steria.com/fr/" target="_blank">Steria</a>, la cybercriminalité en entreprise serait la cause de pertes financières de 110 milliards d’euros dans le monde. Par ailleurs, les cyberattaques ont augmenté de 42% par rapport à 2012. Pourtant, malgré ces chiffres inquiétants, les entreprises se déclarent assez confiantes.</p>
<p style="text-align: justify;">Selon cette étude, 91% des entreprises s’estiment prêtes à réagir face à une cyberattaque et les budgets accordés à la sécurité informatique n’ont jamais été aussi importants, et ce, malgré la crise.</p>
<p style="text-align: justify;">Les entreprises estiment que les menaces informatiques extérieures (par exemple, le PRISM) sont mineures (moins de 20%) et donc concentrent leurs efforts sur les menaces internes. Cependant, les <a href="http://pro.01net.com/editorial/611588/apt-les-outils-destines-aux-menaces-persistantes-avancees-cassent-la-baraque/" target="_blank">APT (Advanced Persistent Threat ou Menaces Persistantes avancées)</a> ne font pas encore partie des menaces prioritaires à traiter.</p>

<h2 style="text-align: justify;">Le gouvernement invite les entreprises à se prémunir contre la cybercriminalité en entreprise</h2>
<p style="text-align: justify;">La création des <a href="http://www.ssi.gouv.fr/fr/anssi/organisation/centre-operationnel-de-la-securite-des-systemes-d-information-cossi.html" target="_blank">Centres Opérationnels de Sécurité (COS)</a>, entités aptes à détecter et à traiter les intrusions, est, sous l’impulsion gouvernementale, devenue prioritaire en France. Il s’agit d’un service proposé par le gouvernement pour diminuer la cybercriminalité en entreprise. Cette priorité est très disparate en fonction du pays interrogé, comme le précise le graphique ci-dessous.</p>
<p style="text-align: center;"><a href="http://www.it-news.fr/wp-content/uploads/2014/02/entreprises-ayant-le-projet-de-creer-un-cos-dans-les-3-ans.png"><img class="aligncenter size-full wp-image-2057" title="Les entreprises ayant le projet de créer un COS dans les 3 ans" alt="" src="http://www.it-news.fr/wp-content/uploads/2014/02/entreprises-ayant-le-projet-de-creer-un-cos-dans-les-3-ans.png" width="485" height="272" /></a></p>
<p style="text-align: justify;">Et le cas est similaire pour l’assurance des cyber-risques (une sorte d’externalisation des risques) : seulement 15% des entreprises interrogées sont couvertes.</p>
<p style="text-align: justify;">Vouloir externaliser ces risques et/ou ces systèmes devient un projet généralisé au sein des entreprises, la raison majeure est la volonté de réduire les coûts.</p>
<p style="text-align: justify;">2/3 des entreprises européennes pensent y recourir contre ¾ des entreprises françaises.</p>
<p style="text-align: justify;"><span style="color: #ff6600;"><strong>Comment Aquastar Consulting peut vous aider ?</strong></span></p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls">Solution en sécurité – Palo Alto Networks et Netasq</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/systemes/virtualisation-serveurs">Solution en virtualisation – Vmware et Windows serve</a><a href="http://www.aquastar-consulting.com/index.php/solutions/systemes/virtualisation-serveurs">r</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2049</wp:post_id>
		<wp:post_date>2014-02-12 10:00:08</wp:post_date>
		<wp:post_date_gmt>2014-02-12 09:00:08</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>la-cybercriminalite-en-entreprise-en-2013-coute-110-milliards-deuros-de-pertes-financieres</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="2013"><![CDATA[2013]]></category>
		<category domain="post_tag" nicename="cyberattaque"><![CDATA[Cyberattaque]]></category>
		<category domain="post_tag" nicename="entreprise"><![CDATA[entreprise]]></category>
		<category domain="post_tag" nicename="menaces-informatiques"><![CDATA[menaces informatiques]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[81]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[cybercriminalité en entreprise]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[a cybercriminalité en entreprise serait la cause de pertes financières de 110 milliards d’euros dans le monde. Par ailleurs, les cyberattaques ont augmenté de +42% par rapport à 2012.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426439063]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:17:"43.71948957837844";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"21.899459636906663";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"8.872250400967241";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1924";s:5:"score";s:17:"8.700852745500894";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1868";s:5:"score";s:16:"8.50760728720879";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:17:"8.336209631742442";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[2051]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1773";s:5:"score";s:17:"70.26643789102917";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:17:"69.19487498439348";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1506";s:5:"score";s:17:"54.62189807092126";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2354";s:5:"score";s:17:"46.94524159752884";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:2:"68";s:5:"score";s:18:"39.692852594304135";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1043";s:5:"score";s:17:"39.53197650003454";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"578";s:5:"score";s:17:"36.76212812435188";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1719";s:5:"score";s:17:"35.66462527684726";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2354";s:5:"score";s:17:"108.2292514152363";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"103.10753532753336";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1773";s:5:"score";s:17:"62.43750150352379";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"49.897833347898356";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1506";s:5:"score";s:17:"45.77934716840869";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:2:"68";s:5:"score";s:17:"36.49624835989524";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1043";s:5:"score";s:18:"34.228454084944985";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"578";s:5:"score";s:18:"32.118748457204745";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"1719";s:5:"score";s:18:"31.218750751761895";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1476";s:5:"score";s:18:"31.218750751761895";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>L’Internet mobile devient plus populaire en France</title>
		<link>http://www.it-news.fr/linternet-mobile-devient-plus-populaire-en-france/</link>
		<pubDate>Mon, 10 Feb 2014 11:32:56 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2059</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/?p=2059"><img class="alignleft  wp-image-2063" title="L’internet mobile devient plus populaire en France" alt="internet-mobile" src="http://www.it-news.fr/wp-content/uploads/2014/02/internet-mobile.jpg" width="341" height="228" /></a>Les français adoptent enfin l’Internet mobile, malgré quelques réticences notamment dûes à la protection de la vie privé.</p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;">Le dernier baromètre de <a href="http://www.mediametrie.fr/" target="_blank">Médiamétrie</a>, indique une adoption croissante de l’Internet mobile, avec une audience partagée entre l’utilisation des sites web et des applications.</p>
<p style="text-align: center;"><img class="aligncenter size-full wp-image-2066" title="Pourcentage de français ayant utilisé l'internet mobile au moins une fois dans la journée" alt="pourcentage-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee" src="http://www.it-news.fr/wp-content/uploads/2014/02/pourcentage-de-francais-ayant-utilise-l-internet-mobile-au-moins-une-fois-dans-la-journee.png" width="474" height="275" /></p>
<p style="text-align: justify;">Aujourd’hui, la France compte environ 27 millions de mobinautes, soit plus de la moitié des propriétaires de Smartphones. Bien que tout cible les « <a href="http://fr.wikipedia.org/wiki/Natif_num%C3%A9rique" target="_blank">digital natives </a>» (personnes nées après 1990), 25% des mobinautes auraient en fait plus de 50 ans (contre 20% en 2012).</p>
<p style="text-align: justify;">Au mois de décembre 2013, les utilisateurs de l’Internet mobile ont consulté en moyenne 5.9 applications et 34 sites différents. Toutefois, c’est le streaming (musique, vidéo), les réseaux sociaux, et les <a href="http://www.ces.ulg.ac.be/fr_FR/services/cles/dictionnaire/s---t---u/services-de-proximite-2" target="_blank">services de proximité</a> qui restent les plus utilisés, le e-Commerce n’est utilisé que pour la consultation de contenu.</p>
<p style="text-align: justify;">Ci-dessous, le partage de l’audience Internet mobile en France en décembre 2013.</p>
<p style="text-align: center;"><img class="size-full wp-image-2061 aligncenter" title="Le partage de l'audience internet mobile en France en décembre 2013" alt="partage-de-l-audience-internet-mobile-en-france-en-decembre-2013" src="http://www.it-news.fr/wp-content/uploads/2014/02/partage-de-l-audience-internet-mobile-en-france-en-decembre-2013.png" width="535" height="385" /></p>
<p style="text-align: justify;">Pour la plupart des utilisateurs l’Internet mobile est utilisé en semaine, le plus souvent entre 17h et 21h. En effet, 64,3% des mobinautes se connectent au moins une fois dans cette tranche horaire.</p>
<p style="text-align: center;"><img class="aligncenter  wp-image-2060" title="Part des mobinautes connectés par tranche horaire" alt="part-des-mobinautes-connectes-par-tranche-horaire" src="http://www.it-news.fr/wp-content/uploads/2014/02/part-des-mobinautes-connectes-par-tranche-horaire.png" width="565" height="272" /></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2059</wp:post_id>
		<wp:post_date>2014-02-10 12:32:56</wp:post_date>
		<wp:post_date_gmt>2014-02-10 11:32:56</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>linternet-mobile-devient-plus-populaire-en-france</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="mobilite"><![CDATA[Mobilité]]></category>
		<category domain="post_tag" nicename="mobinaute"><![CDATA[mobinaute]]></category>
		<category domain="post_tag" nicename="smartphone"><![CDATA[smartphone]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[84]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[internet mobile]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Les français adoptent enfin l’ internet mobile, malgré quelques réticences notamment dû à la protection de la vie privé]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[2063]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438286]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"17.72587944783217";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"17.09284420442403";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1786";s:5:"score";s:18:"16.166911304501152";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"14.838973897199315";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"13.672681327252267";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:17:"13.05307154742465";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:17:"28.09504846046906";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:18:"27.842210937817786";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:18:"26.482966386590878";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"26.374851698105868";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1786";s:5:"score";s:18:"25.859121287270618";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"20.832055913678694";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"19.769243251013336";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2266";s:5:"score";s:18:"19.661128562528326";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:17:"44.86030171219079";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2354";s:5:"score";s:17:"41.75877771418549";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2501";s:5:"score";s:17:"41.19277817572657";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:17:"38.90517149707174";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"38.73312185535467";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"38.73312185535467";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"29.23512449660104";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2266";s:5:"score";s:18:"29.033542406389024";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"29.033542406389024";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"29.033542406389024";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:comment>
			<wp:comment_id>1150</wp:comment_id>
			<wp:comment_author><![CDATA[[BLOCKED BY STBV] Les tendances IT pour 2014 | L&#039;actualité pour décideurs informatiquesL&#039;actualité pour décideurs informatiques]]></wp:comment_author>
			<wp:comment_author_email></wp:comment_author_email>
			<wp:comment_author_url>http://www.it-news.fr/les-tendances-pour-2014/</wp:comment_author_url>
			<wp:comment_author_IP>37.187.41.26</wp:comment_author_IP>
			<wp:comment_date>2014-03-03 10:18:32</wp:comment_date>
			<wp:comment_date_gmt>2014-03-03 09:18:32</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[[&#8230;] La tendance, en matière de sécurité informatique dans les entreprises, est de centrer la sécurité sur l’utilisateur. Et ce, surtout face aux nouveaux usages tels que le Cloud et le BYOD. [&#8230;]]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type>pingback</wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
	</item>
	<item>
		<title>Le Cloud en 2014 trouve enfin sa place en France.</title>
		<link>http://www.it-news.fr/le-cloud-en-2014-trouve-enfin-sa-place-en-france/</link>
		<pubDate>Thu, 13 Feb 2014 09:00:07 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2071</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/?p=2071"><img class="alignleft  wp-image-2074" title="Le Cloud en 2014 trouve enfin sa place en France" alt="cloud-computing-2014" src="http://www.it-news.fr/wp-content/uploads/2014/02/cloud-computing-2014.jpg" width="341" height="228" /></a>IDC vient de réaliser une étude sur le Cloud en France en 2014.</p>
<p style="text-align: justify;">Et, bonne nouvelle, ça décolle enfin !</p>
<p style="text-align: justify;"><!--more Lire la suite--></p>
<p style="text-align: justify;">Dirigée par <a href="http://www.idc.fr/" target="_blank">IDC</a>, pour <a href="http://www.aquastar-consulting.com/index.php/societe/partenaires/infrastructures/vmware" target="_blank">VMware</a> et <a href="http://www.accenture.com/fr-fr/Pages/index.aspx" target="_blank">Accenture</a>, l’étude montre que les entreprises Françaises commencent enfin à intégrer le Cloud dans leur stratégie informatique.</p>

<h2 style="text-align: justify;">Des statistiques montrent les préférences Cloud  des DSI</h2>
<p style="text-align: justify;">L’étude du Cloud en 2014 a rassemblé le témoignage  de 126 entreprises des principaux secteurs d’activité (banque/assurance, industrie, distribution…) dont 76 du public et 50 du privé.</p>
<p style="text-align: justify;">Cette étude constate que 63% d’entre elles utilisent déjà un ou plusieurs services en <a href="http://www.it-news.fr/saas-contre/" target="_blank">Cloud</a>, augmentation de 15% par rapport à 2012.</p>
<p style="text-align: justify;">Ci-dessous, deux graphiques indiquant le type de Cloud choisi par les entreprises et les objectifs du Cloud privé.</p>
<p style="text-align: center;"><a href="http://www.it-news.fr/wp-content/uploads/2014/02/idc-etude-cloud-index.png"><img class="aligncenter  wp-image-2075" title="Des statistiques montrent les préférences Cloud  des DSI" alt="idc-etude-cloud-index" src="http://www.it-news.fr/wp-content/uploads/2014/02/idc-etude-cloud-index.png" width="600" height="300" /></a></p>
<p style="text-align: justify;"> <a href="http://www.idc.fr/analysts/details/karim-bahloul.jsp" target="_blank">Karim Bahloul, directeur des études chez IDC France</a>, explique que «<i> les directions informatiques ont accéléré la transformation de leurs plateformes pour répondre plus rapidement aux demandes des entreprises (réduction du temps de déploiement des projets Cloud, réduction des coûts, augmentation des risques causés par le déplacement aléatoire des données…).</i> »</p>

<h2 style="text-align: justify;">Cloud en 2014, une solution pour alléger la pression des métiers :</h2>
<p style="text-align: justify;"> Le <a href="http://fr.wikipedia.org/wiki/Shadow_IT" target="_blank">Shadow IT</a> est l’utilisation de systèmes d’information et de communication dans l’entreprise sans l’approbation de la direction des systèmes d’informations.</p>
<p style="text-align: justify;">Considéré comme non existant en France, il vient de pair avec des silos en mode SaaS.  C’est ce qui a amené les DSI à proposer des catalogues de services pour les différents métiers existants dans une entreprise.</p>
<p style="text-align: center;"><a href="http://www.it-news.fr/wp-content/uploads/2014/02/shadow-it.jpg"><img class="aligncenter size-full wp-image-2073" title="Cloud en 2014, une solution pour alléger la pression des métiers" alt="shadow-it" src="http://www.it-news.fr/wp-content/uploads/2014/02/shadow-it.jpg" width="400" height="223" /></a></p>
<p style="text-align: justify;">Les entreprises françaises paraissent donc s’intéresser au Cloud, même si les budgets accordés sont encore faibles <b>: 6 à 7% du budget global</b> selon l’étude d’IDC.</p>
<p style="text-align: justify;">Selon l’étude, la croissance du Cloud en 2014 atteindra 30%.</p>
Toutefois, toujours selon l’étude, la plupart des DSI estiment encore que les offres de services cloud apportent trop peu de réponses aux objectifs posés.
<p style="text-align: justify;">Fin 2013, 73% des DSI ont répondu vouloir évaluer les offres du Cloud contre 54% en 2012.</p>
<p style="text-align: justify;"><b>Comment Aquastar Consulting peut vous aider ? </b></p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/systemes/virtualisation-serveurs" target="_blank">Solution en virtualisation – Vmware &amp; Windows Server</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2071</wp:post_id>
		<wp:post_date>2014-02-13 10:00:07</wp:post_date>
		<wp:post_date_gmt>2014-02-13 09:00:07</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>le-cloud-en-2014-trouve-enfin-sa-place-en-france</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="cloud"><![CDATA[cloud]]></category>
		<category domain="post_tag" nicename="entreprises-francaises"><![CDATA[entreprises françaises]]></category>
		<category domain="post_tag" nicename="metier"><![CDATA[métier]]></category>
		<category domain="post_tag" nicename="metiers"><![CDATA[métiers]]></category>
		<category domain="category" nicename="reseaux-et-mobilite"><![CDATA[Réseaux et mobilité]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[84]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Cloud en 2014]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[L’étude du Cloud en 2014 a rassemblé le témoignage de 126 entreprises des principaux secteurs d’activité dont 76 du public et 50 du privé.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_post_restored_from</wp:meta_key>
			<wp:meta_value><![CDATA[a:3:{s:20:"restored_revision_id";i:2077;s:16:"restored_by_user";i:37;s:13:"restored_time";i:1392112876;}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438144]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"81.91216964345566";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:16:"39.5767526430874";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:17:"34.29791661172554";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"21.23803698827642";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"17.713899610125655";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1789";s:5:"score";s:18:"12.250777697999304";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[2074]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"140.1784563244004";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"66.78348647288392";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"55.337870978346736";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1506";s:5:"score";s:18:"38.174566648633146";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1398";s:5:"score";s:18:"37.687631347110646";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"36.173166602976046";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"820";s:5:"score";s:18:"30.976714839263238";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"29.906658426970427";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"218.1606752345572";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"95.70598746188703";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:17:"76.17965132079098";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2444";s:5:"score";s:17:"71.87549264491165";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2424";s:5:"score";s:17:"62.05299791642374";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"56.69146947177813";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:16:"47.2565318857819";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:18:"37.376714465642955";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:17:"32.64331493870001";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1506";s:5:"score";s:18:"30.752296135662494";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:comment>
			<wp:comment_id>1146</wp:comment_id>
			<wp:comment_author><![CDATA[[BLOCKED BY STBV] En 2015, la CRM sera virtualisée | L&#039;actualité pour décideurs informatiquesL&#039;actualité pour décideurs informatiques]]></wp:comment_author>
			<wp:comment_author_email></wp:comment_author_email>
			<wp:comment_author_url>http://www.it-news.fr/en-2015-la-crm-sera-virtualisee/</wp:comment_author_url>
			<wp:comment_author_IP>37.187.41.26</wp:comment_author_IP>
			<wp:comment_date>2014-02-24 10:36:18</wp:comment_date>
			<wp:comment_date_gmt>2014-02-24 09:36:18</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[[&#8230;] d’entreprise (SAV, service client, marketing…), la mobilité avec notamment le m-commerce, le Cloud, et l’internet des [&#8230;]]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type>pingback</wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
		<wp:comment>
			<wp:comment_id>1149</wp:comment_id>
			<wp:comment_author><![CDATA[[BLOCKED BY STBV] Les tendances IT pour 2014 | L&#039;actualité pour décideurs informatiquesL&#039;actualité pour décideurs informatiques]]></wp:comment_author>
			<wp:comment_author_email></wp:comment_author_email>
			<wp:comment_author_url>http://www.it-news.fr/les-tendances-pour-2014/</wp:comment_author_url>
			<wp:comment_author_IP>37.187.41.26</wp:comment_author_IP>
			<wp:comment_date>2014-03-03 10:18:13</wp:comment_date>
			<wp:comment_date_gmt>2014-03-03 09:18:13</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[[&#8230;] comme on les appelle communément, promettent de trouver les meilleures offres du Cloud Computing (SaaS, PaaS, IaaS) aux meilleurs prix et à partir d&rsquo;un seul point d&rsquo;entrée. Ces derniers [&#8230;]]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type>pingback</wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
	</item>
	<item>
		<title>Journée mondiale de la sécurité sur Internet </title>
		<link>http://www.it-news.fr/journee-de-la-securite-sur-internet/</link>
		<pubDate>Tue, 11 Feb 2014 12:58:55 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2084</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/journee-de-la-securite-sur-internet/"><img class="alignleft  wp-image-2085" title="Journée de la sécurité sur Internet " alt="journee-internet-securite" src="http://www.it-news.fr/wp-content/uploads/2014/02/journee-internet-securite.jpg" width="341" height="228" /></a>Aujourd’hui, c’est la journée mondiale de la sécurité sur Internet. Par conséquent, quelques rappels s’imposent !</p>
<p style="text-align: right;"><!--more Lire la Suite--></p>

<h2 style="text-align: justify;">Choisissez un mot de passe complexe et original</h2>
<p style="text-align: justify;">Vos accès sont confidentiels et servent à vous protéger contre des utilisateurs malveillants. <a href="http://www.it-news.fr/wp-content/uploads/2014/02/mot-de-passe-complexe-et-original.jpg"><img class="alignright  wp-image-2100" title="Choisissez un mot de passe complexe et original" alt="mot-de-passe-complexe-et-original" src="http://www.it-news.fr/wp-content/uploads/2014/02/mot-de-passe-complexe-et-original.jpg" width="151" height="214" /></a>Il est conseillé donc de <a href="http://www.it-news.fr/le-simple-mot-de-passe-ne-suffit-plus-vous-proteger/" target="_blank">choisir son mot de passe de manière intelligente</a> :</p>
<p style="text-align: justify;">1-    Votre mot de passe doit être composé de lettres, de chiffres, de majuscules et de minuscules et de caractères spéciaux (exemples : !,./*+-).</p>
<p style="text-align: justify;">2-    Un mot de passe sert à protéger un accès, il faut donc avoir un mot de passe différent pour chacun de vos accès.</p>
<p style="text-align: justify;">3-    Il faut changer régulièrement vos mots de passe.</p>

<h2 style="text-align: justify;">Mettez votre système d’information à jour</h2>
<p style="text-align: justify;">Une attaque de votre ordinateur survient lorsqu’un ou plusieurs de vos logiciels présentent une faille. La plupart du temps, les hackers exploitent les failles des logiciels qui n’ont pas été mis à jour par leur utilisateur.</p>

<h2 style="text-align: justify;">Soyez plus vigilant ! (technique du phishing)</h2>
<p style="text-align: justify;">C’est une technique de piratage qui vise à recueillir des données personnelles (code <a href="http://www.it-news.fr/wp-content/uploads/2014/02/phishin.jpg"><img class="size-full wp-image-2104 alignleft" title="Soyez plus vigilent ! (technique du phishing)" alt="attention-au-phishing" src="http://www.it-news.fr/wp-content/uploads/2014/02/phishin.jpg" width="264" height="191" /></a>d’accès, adresse personnelle…) en envoyant des e-mails censés provenir <a href="http://www.it-news.fr/orange-victime-de-piratage-informatique-800-000-victimes-de-vols-de-donnees/" target="_blank">d’organisations diverses</a> et variées, telles que les banques, ou les opérateurs téléphoniques. La victime, dans l’incapacité de différencier le vrai du faux, fournit d'elle-même ses données personnelles.</p>
<p style="text-align: justify;">Pour savoir si le mail est légitime, contactez l’expéditeur de l’e-mail (votre banque par exemple).</p>

<h2 style="text-align: justify;">Devenez plus sélectif dans ce que vous relayez</h2>
<p style="text-align: justify;">Evitez de relayer les e-mails de type chaîne, lettres, porte-bonheur, appel à solidarité, alertes virales… Quel que soit l’expéditeur d’origine, rediffuser ce type de message risque d’induire des confusions et de saturer les réseaux.</p>

<h2 style="text-align: justify;">Faites attention aux réseaux sociaux<img class="alignright size-full wp-image-2106" title="Faîtes attentions aux réseaux sociaux!" alt="réseaux-sociaux-danger" src="http://www.it-news.fr/wp-content/uploads/2014/02/réseaux-sociaux-danger.jpg" width="275" height="183" /></h2>
<p style="text-align: justify;">Chaque individu (exemples : hacker, employeur…) peut avoir accès aux informations que vous postez sur <a href="http://www.it-news.fr/licenciement-facebook-nouveau-cas/" target="_blank">les réseaux sociaux</a>. Pour empêcher cela, il faut <a href="https://www.facebook.com/notes/facebook-france/param%C3%A8tres-de-confidentialit%C3%A9-sur-facebook-les-r%C3%A8gles-dor/515989341767420" target="_blank">modifier vos paramètres</a> et être plus vigilant.</p>
<p style="text-align: justify;"><b>Comment Aquastar Consulting peut vous aider ? </b></p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls" target="_blank">Solution de sécurité internet : Palo Alto Networks et Netasq</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2084</wp:post_id>
		<wp:post_date>2014-02-11 13:58:55</wp:post_date>
		<wp:post_date_gmt>2014-02-11 12:58:55</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>journee-de-la-securite-sur-internet</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="journee-mondiale-de-la-securite-sur-internet"><![CDATA[journée mondiale de la sécurité sur internet]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<category domain="post_tag" nicename="securite-sur-internet"><![CDATA[sécurité sur internet]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[75]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[2085]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Aujourd’hui, c’est la journée mondiale de la sécurité sur Internet. Par conséquent, quelques rappels s’imposent !]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[sécurité]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437502]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1786";s:5:"score";s:17:"16.99468223871913";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1955";s:5:"score";s:18:"12.769599258692812";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2125";s:5:"score";s:18:"11.932178588743884";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"9.952330703881549";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1794";s:5:"score";s:17:"9.166857615536259";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:17:"8.623958942993545";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1773";s:5:"score";s:18:"26.660937886504804";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1786";s:5:"score";s:18:"26.107124005658683";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1779";s:5:"score";s:17:"25.61148082852958";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:18:"22.185037952283146";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"20.82686817734278";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1955";s:5:"score";s:17:"18.98837645220986";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2125";s:5:"score";s:18:"18.151413869207936";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"16.20549766793762";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:18:"32.227586381741055";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2330";s:5:"score";s:17:"32.18654129393752";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"31.753104778054745";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2376";s:5:"score";s:18:"29.226129395187133";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2438";s:5:"score";s:16:"26.3407783842845";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"24.726773971455398";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2125";s:5:"score";s:16:"23.5868877673545";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1773";s:5:"score";s:18:"20.464576095463446";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"1779";s:5:"score";s:18:"19.519020982902727";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1786";s:5:"score";s:18:"17.874720095514594";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Seulement un quart des entreprises possèdent une sécurité informatique 24/7</title>
		<link>http://www.it-news.fr/seulement-%c2%bc-des-entreprises-possede-securite-informatique-247/</link>
		<pubDate>Tue, 11 Feb 2014 13:16:03 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2087</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><span style="font-size: 16px;"><a href="http://www.it-news.fr/?p=2087"><img class="alignleft  wp-image-2088" title="Seulement ¼ des entreprises possède une sécurité informatique 24/7." alt="etude-securite-internet" src="http://www.it-news.fr/wp-content/uploads/2014/02/etude-securite-internet.jpg" width="341" height="228" /></a>9 entreprises sur 10 se disent bien équipées en matière de sécurité informatique, mais elles ne  sont que 25% à répondre aux menaces informatiques en temps réel.</span></p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;"><span style="font-size: 16px;">D’après une étude réalisée par </span><a style="font-size: 16px;" href="https://www.pac-online.com/" target="_blank">Pierre Audoin Consultant</a><span style="font-size: 16px;"> (PAC) auprès de 270 décideurs de sécurité de PME et de grandes entreprises dans 4 pays différents (France, Allemagne, Royaume-Uni et Norvège), 91% des entreprises en Europe se disent prêtes à faire face aux crises liées à la sécurité informatique.</span></p>
<p style="text-align: justify;">Ce qui ressort de l’étude est que seulement 25% des PME européennes et 50% pour des grandes entreprises sondées sont réellement protégées par un service de sécurité 24/7.</p>
<p style="text-align: justify;">Seulement 14% des organisations de moins de 5 000 personnes ont recours à un <a href="http://fr.wikipedia.org/wiki/Centre_op%C3%A9rationnel_de_la_s%C3%A9curit%C3%A9_des_syst%C3%A8mes_d'information" target="_blank">centre opérationnel de sécurité</a> (COS), est un centre de détection et de réactivité face aux cyber-attaques.</p>

<h2 style="text-align: justify;">L’externalisation, une solution pour une meilleure sécurité informatique</h2>
<p style="text-align: justify;">Les français se montrent tout de même plus dynamiques en matière de sécurité. Ils sont 14% des décideurs interrogés à déclarer avoir un projet de COS dans les 3 ans à venir.</p>
<p style="text-align: justify;">Ci-dessous, le graphique des résultats obtenus en matière de projets COS dans 4 pays européens.</p>
<p style="text-align: center;"><img class="aligncenter  wp-image-2089" title="Statitiques des DSI déclarant avoir un projet COS pour les 3 ans à venir" alt="declaration-dun-projet-cos-dans-les-3-ans" src="http://www.it-news.fr/wp-content/uploads/2014/02/declaration-dun-projet-cos-dans-les-3-ans.png" width="629" height="364" /></p>
<p style="text-align: justify;">Deux tiers des entreprises interrogées déclarent vouloir externaliser une partie de leur sécurité et ce chiffre grimpe à trois quart pour les entreprises françaises !</p>
<p style="text-align: justify;">20% des entreprises se trouvent dans l’incapacité d’externaliser une partie de leurs services sécurité à cause d’un manque d’offres adaptées à leurs besoins.</p>
<p style="text-align: justify;">C’est une question qui doit être résolue par <a href="http://www.aquastar-consulting.com/" target="_blank">les SSII</a>, surtout sachant que, d’ici 5 ans, 1 entreprise sur 4 aura externalisé une partie de son service sécurité.</p>

<h2 style="text-align: justify;">La menace informatique est majoritairement interne</h2>
<p style="text-align: justify;">Les menaces informatiques internes sont considérées comme les plus graves.</p>
<p style="text-align: justify;">Selon la moitié des entreprises sondées, elles ne représentent que 20% des attaques informatiques.</p>
<p style="text-align: justify;">Toutefois, c’est oublier les <a href="http://www.it-news.fr/?p=2049" target="_blank">110 milliards d’euros de pertes financières</a> causées par les cyber-attaques en entreprises en 2013.</p>

<h2 style="text-align: justify;">Les entreprises sont conscientes des risques et donc le budget suit</h2>
<p style="text-align: justify;">Les entreprises sont conscientes des risques en jeu. Entre autres, la protection des avantages compétitifs (vol de données) reste au centre des préoccupations de 60%  des entreprises sondées.</p>
<p style="text-align: justify;">D’ailleurs, 85% des entreprises interrogées, et 90% en France, déclarent avoir mis en place un budget pour la sécurité informatique pour les 3 prochaines années.</p>

<h2 style="text-align: justify;">Ci-dessous, une infographie de la cybersécurité : Les entreprises sont-elles bien armées pour affronter les cyber-attaques ?</h2>
<p style="text-align: center;"><b><a href="http://www.it-news.fr/wp-content/uploads/2014/02/infographie-cybersecurtie-entreprises-francaises.png"><img class="aligncenter  wp-image-2090" title="Les entreprises sont-elles biens armées pour affronter les cyber-attaques" alt="infographie-cybersecurtie-entreprises-francaises" src="http://www.it-news.fr/wp-content/uploads/2014/02/infographie-cybersecurtie-entreprises-francaises.png" width="412" height="286" /></a><span style="color: #ff6600;">Comment Aquastar Consulting peut vous aider?</span></b></p>

<ul>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/securite-des-donnees" target="_blank">Solution de sécurité Internet - Palo Alto Networks et Netasq</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/securite-des-postes-de-travail#" target="_blank">Solution de sécurité Postes et messagerie - Sophos, SpamBlock et VadeRetro</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/securite-des-donnees" target="_blank">Solution de chiffrement - Sophos Safe Guard</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/authentification" target="_blank">Solution d'authentification - Imprivata</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/supervision#" target="_blank">Solution de supervision - Coservit et SecurActive</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/video-protection" target="_blank">Solution de vidéo protection - Mobotix </a></li>
</ul>
<p style="text-align: center;"></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2087</wp:post_id>
		<wp:post_date>2014-02-11 14:16:03</wp:post_date>
		<wp:post_date_gmt>2014-02-11 13:16:03</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>seulement-%c2%bc-des-entreprises-possede-securite-informatique-247</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="cyber-attaque"><![CDATA[cyber-attaque]]></category>
		<category domain="post_tag" nicename="externalisation"><![CDATA[externalisation]]></category>
		<category domain="post_tag" nicename="menaces"><![CDATA[menaces]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<category domain="post_tag" nicename="steria"><![CDATA[steria]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[79]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[sécurité informatique]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[9 entreprises sur 10 se disent bien équipées en matière de sécurité informatique, mais elles ne sont que 25% à répondre aux menaces informatiques en temps réel.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[2088]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438785]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:18:"21.751598967666535";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1776";s:5:"score";s:18:"13.145836183736336";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"12.400573003287377";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"11.390530305914478";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:18:"11.390530305914478";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:16:"11.3638185771181";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:17:"33.88017983155002";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"27.355112302410387";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"18.375931399019724";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1776";s:5:"score";s:18:"18.207230142801688";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:18:"17.942967485356533";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:17:"16.61753894148507";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1444";s:5:"score";s:17:"16.34564165636343";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:16:"16.1825946218514";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:12:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:17:"49.17774383635991";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:17:"35.39120595641489";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:18:"27.652017813575494";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"25.91043527081104";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:17:"24.07316941482911";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"20.46559957976567";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"20.00833226883829";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:17:"17.62569542449994";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:17:"17.62569542449994";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:18:"14.282965960605429";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:18:"12.148603497519492";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:18:"11.627469310205608";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:18:"49.897833347898356";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:17:"35.85157386197306";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:18:"28.062296702812866";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"26.457768084748782";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:18:"24.415362783690494";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"20.684242382660955";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"20.226975071232506";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:17:"17.74386996210812";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:17:"17.74386996210812";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:18:"14.625159329802177";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Livre blanc de Sophos sur la cybersécurité en 2014</title>
		<link>http://www.it-news.fr/livre-blanc-de-sophos-sur-la-cybersecurite-en-2014/</link>
		<pubDate>Mon, 17 Feb 2014 10:42:25 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2113</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/?p=2113"><img class="alignleft size-full wp-image-2116" title="Livre blanc de Sophos sur la cybersécurité en 2014" alt="sophos-securite-2014" src="http://www.it-news.fr/wp-content/uploads/2014/02/sophos-securite-2014.jpg" width="341" height="228" /></a>Les cyber-attaques ont été nombreuses en 2013 et le seront encore plus en 2014.</p>
<p style="text-align: justify;">Sophos, spécialiste et leader de la sécurité informatique, dévoile son rapport sur les cybermenaces en 2014.</p>
<p style="text-align: right;"><!--more Lire la Suite--></p>
<p style="text-align: justify;">Ce rapport souligne les évolutions significatives dans le comportement des cybercriminels et réalise des prédictions sur leurs méthodes favorites d'attaque en 2014.</p>

<h2 style="text-align: justify;">Des malwares et botnets de plus en plus évolués<b>
</b></h2>
<p style="text-align: justify;">Entre malwares, botnets et spams, les entreprises sont de plus en plus dépassées par les attaques dont  elles sont victimes.</p>
<p style="text-align: justify;">La plus forte tendance en 2013 a été l’utilisation de malwares cachés et donc plus difficiles à détecter. Les nouveaux malwares sont connus pour leur discrétion. L’une des menaces les plus dévastatrices du moment sont les APTs (menaces persistantes avancées), qui ciblent les données personnelles d’individus, d’entreprises et de gouvernements.</p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/le-botnet-pony-compromet-2-millions-de-mots-de-passe/?preview=true&amp;preview_id=1773&amp;preview_nonce=b0eb70c280&amp;post_format=standard" target="_blank">Les botnets</a> (contraction de l’anglais, « robots » et « réseaux ») sont des systèmes informatiques fantômes connectés dans le but d’introduire des spams, virus ou des <a href="http://fr.wikipedia.org/wiki/Attaque_par_d%C3%A9ni_de_service" target="_blank">attaques informatiques par déni de service (DDoS)</a>.</p>
<p style="text-align: justify;">A travers ce livre blanc, Sophos nous démontre qu’aucun système d’information quelle que soit la plateforme (Android, Windows, Mac OS X, Linux) n’est à l’abri de ce genres d’attaques.</p>
<p style="text-align: justify;"><a href="http://emailing.aquastar-consulting.com/2014/Infra/Sophos-livre-blanc/Livre-blanc-sophos-securite-2014.pdf" target="_blank"><img class="aligncenter size-full wp-image-2115" alt="bouton-livre-blanc" src="http://www.it-news.fr/wp-content/uploads/2014/02/bouton-livre-blanc.png" width="300" height="65" /></a></p>
<p style="text-align: justify;"><span style="color: #ff6600;"><b>Comment Aquastar Consulting peut vous aider ? </b></span></p>
<p style="text-align: justify;">Spécialiste dans le déploiement de sécurité informatique et partenaire historique de Sophos, Aquastar Consulting vous propose des solutions de :</p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls#" target="_blank">Sécurité Internet et Firewalls "Newt-generation"</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/securite-des-postes-de-travail/sophos" target="_blank">Sécurité des messageries</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/securite-des-donnees" target="_blank">Chiffrement des données</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2113</wp:post_id>
		<wp:post_date>2014-02-17 11:42:25</wp:post_date>
		<wp:post_date_gmt>2014-02-17 10:42:25</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>livre-blanc-de-sophos-sur-la-cybersecurite-en-2014</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="2014"><![CDATA[2014]]></category>
		<category domain="post_tag" nicename="botnet"><![CDATA[botnet]]></category>
		<category domain="post_tag" nicename="cybersecurite"><![CDATA[cybersécurité]]></category>
		<category domain="post_tag" nicename="livre-blanc"><![CDATA[Livre Blanc]]></category>
		<category domain="post_tag" nicename="malware"><![CDATA[malware]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<category domain="post_tag" nicename="sophos"><![CDATA[Sophos]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[65]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[cybersécurité en 2014]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[2116]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[La cybersécurité en 2014 est une question que toutes les entreprises, organisations et même les particuliers se pose. Sophos détaille dans un livre blanc, les enjeux de la cybersécurité en 2014.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438304]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2125";s:5:"score";s:18:"50.401119219840844";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"37.18627512286013";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:16:"36.9620405269443";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:17:"13.59530557763695";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1940";s:5:"score";s:16:"12.4290130076899";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"11.522826694285762";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2125";s:5:"score";s:17:"83.60976630190001";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:16:"63.5008079861328";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:17:"63.21052521720405";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1773";s:5:"score";s:17:"40.33933834475191";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1719";s:5:"score";s:17:"35.76674387526572";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"25.016823830510937";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"18.653660086341716";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1940";s:5:"score";s:18:"17.598901506368406";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2125";s:5:"score";s:18:"130.38432765022418";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:18:"100.81650815469368";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"100.70383023548786";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"35.73121417242446";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1773";s:5:"score";s:18:"32.887116286730304";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1719";s:5:"score";s:18:"27.541502950128972";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2266";s:5:"score";s:18:"23.865227930777046";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"22.157754172973867";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2436";s:5:"score";s:17:"19.18043421097034";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"18.541873177763588";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Les cybermenaces - Comment protéger votre entreprise?</title>
		<link>http://www.it-news.fr/les-cybermenaces-comment-proteger-votre-entreprise/</link>
		<pubDate>Mon, 17 Feb 2014 15:21:27 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2125</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/les-cybermenaces-comment-proteger-votre-entreprise/petit-dejeuner-cybermenace/" rel="attachment wp-att-2129"><img class="alignleft size-full wp-image-2129" alt="petit-dejeuner-cybermenace" src="http://www.it-news.fr/wp-content/uploads/2014/02/petit-dejeuner-cybermenace.jpg" width="341" height="228" /></a>Aquastar Consulting et <strong><span style="color: #ff6600;">la Gendarmerie Nationale</span></strong> du Nord Pas-de-Calais organisent, le Jeudi 20 Mars prochain à la Cité des Echanges de Marcq-en-Baroeul, un petit-déjeuner sur :</p>
<p style="text-align: justify;"><strong>Les</strong> <b>Cybermenaces – Comment protéger votre entreprise ?</b></p>
<p style="text-align: justify;"><span style="color: #ffffff;">-</span><span style="color: #ffffff;">-</span></p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;"><img class="alignleft size-full wp-image-2128" title="Gendarmerie Nationale du Nord-Pas-de-Calais " alt="gendarmerie" src="http://www.it-news.fr/wp-content/uploads/2014/02/gendaremerie.jpg" width="109" height="150" />L’objectif de cet évènement est de vous <strong>sensibiliser</strong> sur les risques qui menacent  vos systèmes d’informations et parc informatique.</p>
<p style="text-align: justify;">Le lieutenant-Colonel Pascal Leplongeon, responsable de la sécurité économique du Nord Pas-de-Calais fera une présentation sur les risques encourus liés à une cyberattaque.</p>
 Il évoquera les sujets suivants :
<ul>
	<li>Les risques économiques, juridiques et en termes d’image</li>
	<li>Les bons réflexes à avoir face à une cybermenace</li>
	<li>Les bonnes pratiques préventives</li>
	<li>Les réseaux mafieux d'aujourd’hui et leurs actions.</li>
</ul>
<p style="text-align: center;"><a href="http://www.aquastar-consulting.com/index.php/conference-cybersecurite-2014/"><img class="aligncenter size-full wp-image-2126" title="Inscrivez-vous!" alt="bouton-inscription" src="http://www.it-news.fr/wp-content/uploads/2014/02/bouton-inscription.jpg" width="200" height="75" /></a></p>
<span style="text-align: justify;">Lieu : Cité des Echanges de Marcq-en-Barœul</span>
<p style="text-align: justify;">Date : Jeudi 20 Mars de 8h30 à 10h</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2125</wp:post_id>
		<wp:post_date>2014-02-17 16:21:27</wp:post_date>
		<wp:post_date_gmt>2014-02-17 15:21:27</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>les-cybermenaces-comment-proteger-votre-entreprise</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="cybersecurite"><![CDATA[cybersécurité]]></category>
		<category domain="post_tag" nicename="evenement"><![CDATA[événement]]></category>
		<category domain="category" nicename="evenements"><![CDATA[Evénements]]></category>
		<category domain="post_tag" nicename="petit-dejeuner"><![CDATA[petit déjeuner]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[61]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[2]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[2129]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Cybermenaces]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Aquastar Consulting et la Gendarmerie Nationale du Nord Pas-de-Calais organisent, le 20 Mars prochain, un petit-déjeuner sur les Cybermenaces – Comment protéger votre entreprise ?]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438322]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:18:"108.12231205372771";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:17:"50.91671551061539";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:17:"11.92041361308905";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:17:"8.086568388724928";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:17:"7.364541697341444";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:17:"7.182598140841755";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:18:"187.62876214556232";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"644";s:5:"score";s:17:"88.96378335522118";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:17:"83.81691001438298";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:2:"68";s:5:"score";s:18:"20.798681993676986";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"18.151413869207936";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"653";s:5:"score";s:18:"17.188672601720835";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"963";s:5:"score";s:18:"16.160605258025317";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1794";s:5:"score";s:18:"14.616157738232701";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:12:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:17:"304.9283428696159";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:17:"129.7896373716838";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"644";s:5:"score";s:17:"75.24216196493148";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"23.399846314698685";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"18.218138280078048";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:2:"68";s:5:"score";s:18:"18.146827118057324";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"653";s:5:"score";s:18:"15.040130226606594";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"963";s:5:"score";s:18:"14.852072327848504";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"13.349844156804963";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"13.179019160835281";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"10.973058748895761";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"1741";s:5:"score";s:18:"10.862279064332133";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:17:"306.3383307969186";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:18:"130.38432765022418";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"644";s:5:"score";s:16:"75.5830217963869";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:16:"23.5868877673545";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"18.320050486297486";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:2:"68";s:5:"score";s:18:"18.247443203403407";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"653";s:5:"score";s:17:"15.11526826064952";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"963";s:5:"score";s:18:"14.915767456735654";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"13.439380905876813";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"13.326702986671002";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Microsoft offre un sursis à Windows 7 Pro</title>
		<link>http://www.it-news.fr/microsoft-offre-sursis-windows-7-pro/</link>
		<pubDate>Tue, 18 Feb 2014 09:39:27 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2142</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/microsoft-offre-sursis-windows-7-pro/" rel="attachment wp-att-2144"><img class="size-full wp-image-2144 alignleft" title="Microsoft offre un sursis à Windows 7 Pro" alt="windows7" src="http://www.it-news.fr/wp-content/uploads/2014/02/windows7.jpg" width="341" height="228" /></a>Nombreux sont ceux encore récalcitrants à l’utilisation de Windows 8. Pourtant dans peu de temps, les distributeurs ne vendront plus d’appareils intégrant Windows 7 pour les particuliers.</p>
<p style="text-align: justify;">Pour les professionnels, c'est une autre histoire…</p>
<p style="text-align: right;"><!--more Lire la Suite--></p>
<p style="text-align: justify;">Microsoft avait annoncé dans un précédent communiqué de presse, la fin de la commercialisation d'ordinateurs sous Windows 7 en octobre 2014.</p>
<p style="text-align: justify;">Revenue depuis sur cette annonce, l'entreprise a déclaré que l’arrêt des ventes de PC préinstallé <b>d'un Windows 7 Pro </b>était finalement reporté.</p>
<p style="text-align: justify;">Ainsi, au mois d'octobre, la fin des ventes de PC incluant Windows 7 ne concernera que les particuliers.</p>
<p style="text-align: justify;">Microsoft a, par ailleurs, déjà arrêté la vente de Windows 7 Home Basic, Home Premium et Ultimate le 30 octobre 2013.</p>
<p style="text-align: justify;">Ci-dessous <a href="http://windows.microsoft.com/en-US/windows/products/lifecycle" target="_blank">le tableau fourni par Microsoft</a> détaillant les cycles de vie de ses différents supports.</p>
<p style="text-align: justify;"><img class="aligncenter size-full wp-image-2143" alt="tableau-explicatif-fin-de-vente-windows" src="http://www.it-news.fr/wp-content/uploads/2014/02/tableau-explicatif-fin-de-vente-windows.png" width="773" height="474" /></p>

<h2 style="text-align: justify;">Les entreprises misent en cause</h2>
<p style="text-align: justify;">Les professionnels eux-même sont sûrement l'une des raison de ce revirement.</p>
<p style="text-align: justify;">En effet, ils sont une grande majorité à être encore équipés d'un Windows XP (<a href="http://www.it-news.fr/?p=1626">dont la fin des mises à jour est programmée le 8 avril 2014</a>), et encore plus nombreux à vouloir migrer vers Windows 7 Professionnel.</p>
<p style="text-align: justify;"><span style="color: #ff6600;"><b>Comment Aquastar Consulting peut vous aider? </b></span></p>
<p style="text-align: justify;"><a href="http://www.aquastar-consulting.com/" target="_blank">Aquastar Consulting,</a> partenaire de Microsoft, peut vous accompagner lors de la migration de vos systèmes d'informations.</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2142</wp:post_id>
		<wp:post_date>2014-02-18 10:39:27</wp:post_date>
		<wp:post_date_gmt>2014-02-18 09:39:27</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>microsoft-offre-sursis-windows-7-pro</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="2015"><![CDATA[2015]]></category>
		<category domain="post_tag" nicename="microsoft"><![CDATA[Microsoft]]></category>
		<category domain="category" nicename="systemes"><![CDATA[Systèmes]]></category>
		<category domain="post_tag" nicename="windows-7-home-basic"><![CDATA[windows 7 Home basic]]></category>
		<category domain="post_tag" nicename="windows-7-pro"><![CDATA[windows 7 pro]]></category>
		<category domain="post_tag" nicename="windows-xp"><![CDATA[windows xp]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[74]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Windows 7 Pro]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Microsoft offre un sursis indéterminé au Windows 7 Pro. De plus, elle déclare qu'il y aura un préavis d'un an avant la fin de sa distribution repoussant ainsi l'arrêt du Windows 7 pro à l'année 2015.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[2144]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437570]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"96.84676457302726";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"44.98348714976213";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"8.054664605077193";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:17:"8.054664605077193";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"7.9828787582583045";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:17:"7.880641850911886";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"172.04335363845627";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"75.13632074670008";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:17:"64.54227174517075";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1626";s:5:"score";s:17:"54.75470508004835";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1434";s:5:"score";s:17:"41.20076152946505";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1719";s:5:"score";s:17:"38.65671010059703";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1099";s:5:"score";s:17:"31.68567219701019";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1059";s:5:"score";s:18:"12.929420028268746";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"286.7095260560613";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:16:"119.084267877603";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:18:"101.63868466695791";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1626";s:5:"score";s:16:"46.5609172957229";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1434";s:5:"score";s:18:"32.800612342553876";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1719";s:5:"score";s:17:"31.96149520299048";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1099";s:5:"score";s:17:"25.40967116673948";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2376";s:5:"score";s:17:"24.14650265693641";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:18:"16.945248430225984";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"16.945248430225984";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>En 2014, PC et tablettes se partageront le marché IT</title>
		<link>http://www.it-news.fr/en-2014-pc-tablettes-se-partageront-le-marche/</link>
		<pubDate>Tue, 18 Feb 2014 13:14:18 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2149</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/?p=2149" rel="attachment wp-att-2152"><img class="alignleft size-full wp-image-2152" alt="marche-des-pc-tablettes-2014" src="http://www.it-news.fr/wp-content/uploads/2014/02/marche-des-pc-tablettes-2014.jpg" width="341" height="228" /></a>C'est pendant les <a href="http://www.it-news.fr/event/techdays/" target="_blank">Microsoft TechDays</a> que GfK a présenté les résultats de son étude du marché IT Français en 2013.</p>
<p style="text-align: justify;">Il indiquait notamment qu'en décembre 2013, plus de 35% des PCs vendus étaient tactiles.</p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;">Cette étude nous révèle également que 5% des possesseurs de tablettes n'ont pas de PC. "<i>L'impact des tablettes sur le marché des notebooks se révèle encore marginal. Une tablette ne remplace pas le PC,</i> " déclare <a href="http://www.gfk.com/Pages/default.aspx" target="_blank">le cabinet GFK</a>.</p>
<p style="text-align: justify;">Effectivement, pour 71% des consommateurs interrogés, une tablette ne remplace pas non plus un PC. Et 74% préfèrent encore utiliser leur PC pour travailler. En effet, pour les personnes interrogées, la tablette est perçue pour une utilisation mobile à domicile et le PC comme un outil plus productif.</p>
<p style="text-align: justify;">Toutefois, le marché IT est innovant et devient de plus en plus dynamique. Notamment <img class="alignright size-thumbnail wp-image-2153" title="Marché Français des PC et Tablettes en 2014" alt="tablet-pc" src="http://www.it-news.fr/wp-content/uploads/2014/02/tablet-pc-150x150.png" width="150" height="150" />avec la création du notebook, du notebook tactile ou encore  de la Tablet-PC (une machine hybride réunissant la mobilité de la tablette et la productivité du PC).</p>
<p style="text-align: justify;">Malgré tout, et quel que soit le support utilisé, le tactile est en forte progression dans le marché IT français. En effet, alors que sur l'ensemble de l'année 2013, 7.5% des ordinateurs vendus disposaient d'un écran tactile, ce chiffre est monté à 15.5% sur le seul mois de décembre 2013!</p>
<p style="text-align: justify;">D’ailleurs, les systèmes hybrides sont de plus en plus recherchés. En 2013, 130 000 Tablet-PC ont été vendues en France et, selon les estimations, ce chiffre atteindra les 450 000 unités en 2014.</p>
<p style="text-align: justify;">Ci-dessous, une estimation du volume des ventes en 2014 par type d’appareil.</p>
<p style="text-align: center;"><img class="aligncenter size-full wp-image-2150" title="estimation du volume des ventes en 2014 par type d’appareil" alt="estimation-du-volume-de-ventes-selon-le-terminal-choisi" src="http://www.it-news.fr/wp-content/uploads/2014/02/estimation-du-volume-de-ventes-selon-le-terminal-choisi.png" width="481" height="289" /></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2149</wp:post_id>
		<wp:post_date>2014-02-18 14:14:18</wp:post_date>
		<wp:post_date_gmt>2014-02-18 13:14:18</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>en-2014-pc-tablettes-se-partageront-le-marche</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="erp"><![CDATA[ERP]]></category>
		<category domain="category" nicename="mobilite"><![CDATA[Mobilité]]></category>
		<category domain="post_tag" nicename="notebook"><![CDATA[Notebook]]></category>
		<category domain="post_tag" nicename="ordinateur-tactile"><![CDATA[ordinateur tactile]]></category>
		<category domain="post_tag" nicename="pc"><![CDATA[PC]]></category>
		<category domain="post_tag" nicename="tablette"><![CDATA[tablette]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[75]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Marché IT]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[C'est pendant les Microsoft TechDays que GfK a présenté les résultats de son étude du marché IT Français en 2013.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[2152]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437971]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"21.401508264350177";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"18.500665038128965";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:18:"18.298031932756192";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:18:"17.772220738765352";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"13.70357852610508";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1794";s:5:"score";s:18:"11.652923423100873";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:3:"223";s:5:"score";s:16:"74.6535831740846";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"344";s:5:"score";s:17:"47.37970332144711";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2362";s:5:"score";s:18:"37.448569896769804";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:18:"32.734635690805156";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"31.930480969592423";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:18:"28.782418264335774";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"28.116313899483217";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:17:"26.60256815527773";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:12:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2362";s:5:"score";s:17:"92.77719332975178";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"223";s:5:"score";s:17:"63.64751149636679";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2444";s:5:"score";s:17:"48.75523178879064";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:17:"45.32600890449382";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:17:"45.20150191621711";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:17:"41.86174069511588";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"39.299485725988234";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:17:"38.37642913498619";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:3:"344";s:5:"score";s:17:"38.12042158268741";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2424";s:5:"score";s:17:"34.15900927514634";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:4:"2354";s:5:"score";s:17:"31.49754429532858";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"2266";s:5:"score";s:18:"28.778761891080613";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2362";s:5:"score";s:16:"93.2357982564973";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"223";s:5:"score";s:17:"63.90950509648246";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2444";s:5:"score";s:17:"49.03510899217042";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:17:"45.75732558536937";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"45.603966258482295";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:17:"42.15510185670256";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"39.643802990215946";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:17:"38.73312185535467";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:3:"344";s:5:"score";s:17:"38.33698502042969";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2424";s:5:"score";s:17:"34.35009466180779";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Sophos rachète Cyberoam</title>
		<link>http://www.it-news.fr/sophos-rachete-cyberoam/</link>
		<pubDate>Wed, 19 Feb 2014 08:35:07 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2161</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/2161/"><img class="alignleft size-full wp-image-2163" title="Sophos rachète Cyberoam" alt="sophos-rachete-cyberoam" src="http://www.it-news.fr/wp-content/uploads/2014/02/sophos-rachete-cyberoam1.jpg" width="341" height="228" /></a>Dans sa volonté de rester leader sur le marché de la sécurité, Sophos a annoncé le rachat de <a href="http://www.cyberoam.com/fr/" target="_blank">Cyberoam</a>, un constructeur indien spécialisé dans l’appliance physique et virtuelle.</p>
<p style="text-align: right;"><!--more Lire la Suite--></p>
<p style="text-align: justify;">C’est dans un communiqué de presse que <a href="http://www.sophos.com/fr-fr/company/management/kris-hagerman.aspx" target="_blank">Kris Hagerman</a>, PDG de <a href="http://www.aquastar-consulting.com/index.php/solutions/securite/securite-des-donnees" target="_blank">Sophos</a>, a annoncé ce rachat.</p>
<p style="text-align: justify;">Il explique que cette opération permettra de dynamiser les projets de sécurité réseaux. Il permettra également de « <i>renforcer notre présence sur le marché de l’UTM, de protection avancée contre les menaces, le sans fil, et les firewalls de nouvelle génération </i>».</p>
<p style="text-align: justify;">Grâce au rachat de Cyberoam, Sophos complète son offre <i>« combinant des technologies de sécurité leader sur le poste client, le mobile, le chiffrement, et la protection des données, l’e-mail, le Web, les serveurs et le réseau </i>» et s’assure une place de leader dans le marché de la sécurité réseaux.</p>
<p style="text-align: justify;"><a href="http://www.cyberoam.com/" target="_blank">Cyberoam</a>, entreprise indienne principalement présente en Inde, au Moyen-Orient et en Afrique ; elle intègre un réseau de plus de 5 000 partenaires commercialisant ses solutions.</p>
<p style="text-align: justify;">Hernal Patel, CEO de Cyberoam, déclare «  <i>Notre activité en sécurité réseaux se développe significativement plus vite que le marché, et l’association de nos forces nous permettra d’accélérer encore notre capacité d’innovation et de création de valeur</i> ».</p>
<p style="text-align: justify;">Dans le plus récent <a href="http://www.gartner.com/technology/research/methodologies/research_mq.jsp" target="_blank">Magic Quadrant de Gartner</a>, Sophos est considérée comme leader et Cyberoam comme une entreprise visionnaire. La rapprochement des deux à un bel avenir !</p>
<p style="text-align: justify;"><b>Comment Aquastar Consulting peut vous aider ? </b></p>
<p style="text-align: justify;">Aquastar Consulting est partenaire historique de Sophos et peut vous aider dans le déploiement et l’intégration de vos projets de sécurité informatique.</p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/securite-des-donnees#" target="_blank">Solution de chiffrement – Sophos</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/securite-des-postes-de-travail/sophos" target="_blank">Sécurité des messageries - Sophos</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2161</wp:post_id>
		<wp:post_date>2014-02-19 09:35:07</wp:post_date>
		<wp:post_date_gmt>2014-02-19 08:35:07</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>sophos-rachete-cyberoam</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="acquisition"><![CDATA[acquisition]]></category>
		<category domain="post_tag" nicename="rachat"><![CDATA[rachat]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<category domain="post_tag" nicename="securite-reseaux"><![CDATA[sécurité réseaux]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[85]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[sophos]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[2163]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426436391]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:18:"25.531113525747728";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"19.06286825381376";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1876";s:5:"score";s:18:"17.486434245755866";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:18:"14.979933692032706";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:18:"13.557296063480402";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:18:"13.064104147835742";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:17:"42.28190109969564";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"28.98434972252117";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1876";s:5:"score";s:17:"27.39334639476566";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:17:"24.15831417897008";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"22.132552637927688";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1786";s:5:"score";s:16:"20.2255778576238";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:18:"19.138293353608056";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:18:"18.633059347951143";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:12:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"41.72218928060651";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:17:"35.44344160414399";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:17:"27.33080854924701";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"27.330351541814686";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"23.082755194098446";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:17:"22.13305499172482";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2376";s:5:"score";s:18:"20.965476344403633";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1876";s:5:"score";s:17:"19.76687971068928";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"19.715265023609586";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2436";s:5:"score";s:18:"19.626041280291894";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"19.424084981907125";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"18.032580978953327";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"41.82157208121083";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:17:"35.61598872704385";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:18:"27.534632960681016";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"27.443449411073768";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:17:"23.14411998155603";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:18:"22.157754172973867";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2376";s:5:"score";s:18:"21.071428719299153";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1876";s:5:"score";s:17:"19.89522748842086";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"19.830690747192584";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2436";s:5:"score";s:18:"19.576062822504582";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Augmentation des dépenses IT pour 2014</title>
		<link>http://www.it-news.fr/augmentation-des-depenses-pour-2014/</link>
		<pubDate>Wed, 19 Feb 2014 13:21:56 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2172</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/augmentation-des-depenses-pour-2014/"><img class="alignleft size-full wp-image-2176" title="Augmentation des dépenses IT pour 2014" alt="idc-prevoit-une-augmentation-du-budget-it" src="http://www.it-news.fr/wp-content/uploads/2014/02/idc-prevoit-une-augmentation-du-budget-it.jpg" width="341" height="228" /></a>Quelles sont les grandes tendances pour 2014 du marché IT Français ?</p>
<p style="text-align: justify;">Didier Krainc, Directeur d’IDC France, explique les évolutions majeures de ce marché en pleine croissance.</p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;">Le cabinet <a href="http://www.idc.fr/" target="_blank">IDC</a>  prévoit une augmentation de 2% des dépenses IT des entreprises Françaises en 2014.</p>
<p style="text-align: justify;">Cette dépense ne tient pas compte des ventes liées aux terminaux informatiques tels que les Smartphones, tablettes ou PC.</p>

<h2 style="text-align: justify;">Le matériel informatique à l’honneur</h2>
<p style="text-align: justify;">Le matériel joue un rôle important dans cette augmentation des dépenses. IDC a prévu, dans ce secteur, une croissance de près de 3% en 2014, compensant les 2.6% de pertes enregistrés en 2013.</p>
<p style="text-align: justify;">Une opportunité d’évolution également pour les déploiements de solutions d’infrastructures, pour l’équipement de solutions de sécurité et de sauvegarde.</p>
<p style="text-align: justify;">Par conséquent, les services proposés par les SSII Françaises devraient également augmenter (+1.4%) par rapport à 2013 (-0.5%).<img class="alignright size-full wp-image-2175" title="Didier Krainc directeur d'IDC France" alt="didier-krainc-idc" src="http://www.it-news.fr/wp-content/uploads/2014/02/didier-krainc-idc.jpg" width="211" height="239" /></p>
<p style="text-align: justify;">La tendance actuelle de migration des logiciels vers une <a href="http://fr.wikipedia.org/wiki/Logiciel_en_tant_que_service" target="_blank">solution en SaaS</a>, avait alimenté 100% de la croissance des dépenses IT en 2013. Aussi important qu’est ce taux de croissance, <a href="http://fr.linkedin.com/pub/didier-krainc/0/1b/6a0" target="_blank">Didier Krainc</a> explique que la tendance globale du logiciel SaaS actuelle est « saine ».</p>
<p style="text-align: justify;">Le cabinet IDC prévoit une croissance annuelle moyenne de 20% à plus de 50% pour le taux d’équipement des entreprises Françaises de plus de 500 salariés entre 2014 et 2017.</p>

<h2 style="text-align: justify;"><b></b><a href="http://www.lemondeinformatique.fr/actualites/lire-les-logiciels-dedies-aux-smac-social-mobile-analytics-cloud-seduisent-les-entreprises-56071.html" target="_blank">Les SMACs</a> représenteront 90% de la croissance des dépenses IT en 2014</h2>
<p style="text-align: justify;">En effet, IDC prévoit une évolution des dépenses consacrées au domaine de « l’héritage » et à la transformation du numérique (Social – Mobile – Analytics - Cloud). C’est ce qu’il appelle les <a href="http://thoughtsoncloud.com/2013/04/the-space-between-where-is-the-real-value-in-smac/" target="_blank">SMACs</a> et qui devrait supporter environ 90% de la croissance des dépenses IT en 2014.</p>
<p style="text-align: justify;">Le cabinet envisage une croissance annuelle moyenne de 27% pour le <b>Big Data</b> entre 2014 et 2017, et de 36% pour le marché du <b>Cloud</b>.</p>
<p style="text-align: justify;">D’ailleurs, le Cloud représente déjà 5% des dépenses IT des entreprises Françaises. Leurs choix s’étalant entre Cloud privé (86%), Cloud public (32%) et Cloud hybride (16%).</p>

<h2 style="text-align: justify;">Le Cloud public, une réalité pour les entreprises</h2>
<p style="text-align: justify;">Dider Krainc a déclaré que « <i>le Cloud public est devenu une réalité dans les entreprises sous l’impulsion des métiers. Du coup, les entreprises n’ont d’autre choix que d’engager une réflexion sur la criticité et la sécurité de la donnée, ce qui favorise l’émergence du Cloud hybride</i>. »</p>
<p style="text-align: justify;">Pour 2014, IDC prévoit une augmentation de 20% du Cloud privé sur site, et une croissance de 34% pour le Cloud public.</p>
<p style="text-align: justify;"><b>Pour le Cloud privé, la plus forte croissance proviendra du Cloud privé hébergé par un prestataire (54%). </b></p>
<p style="text-align: justify;">Par ailleurs, la mobilité rencontre encore beaucoup de réfractaire auprès des DSI des grandes entreprises (75%), surtout concernant l’utilisation d’outil informatique mobile personne pour un but professionnel.</p>
<p style="text-align: justify;">Malgré tout, 80% d’entre eux ont dû effectuer une évaluation des besoins (demandée, pour la majorité des cas, par les directions générales) et 33% des entreprises ont des projets de mobilité notifiés dans leur politique globale.</p>
<p style="text-align: justify;"><b>Comment Aquastar Consulting peut vous aider ? </b></p>
<p style="text-align: justify;"><a href="http://www.aquastar-consulting.com/" target="_blank">Aquastar Consulting</a> est un intégrateur spécialisé dans le déploiement de solutions informatiques : Gestion / Hébergement / SaaS / Sécurité / Sauvegarde… Pour tout projet ou informations complémentaires, n’hésitez pas à <a href="http://www.aquastar-consulting.com/index.php/contact" target="_blank">nous contacter</a>.</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2172</wp:post_id>
		<wp:post_date>2014-02-19 14:21:56</wp:post_date>
		<wp:post_date_gmt>2014-02-19 13:21:56</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>augmentation-des-depenses-pour-2014</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="cloud"><![CDATA[cloud]]></category>
		<category domain="category" nicename="comptabilite-finances"><![CDATA[Comptabilité - Finances]]></category>
		<category domain="category" nicename="decisionnel"><![CDATA[Décisionnel]]></category>
		<category domain="post_tag" nicename="entreprises-francaises"><![CDATA[entreprises françaises]]></category>
		<category domain="post_tag" nicename="idc"><![CDATA[IDC]]></category>
		<category domain="post_tag" nicename="materiel"><![CDATA[matériel]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[79]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Dépenses IT]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[2176]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Le cabinet IDC prévoit une augmentation de 2% des dépenses IT des entreprises Françaises en 2014.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437521]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"81.91216964345566";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:17:"42.37000669432432";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"32.87002309067371";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:17:"32.21047964399909";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"27.16846644754981";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1902";s:5:"score";s:18:"25.267882596596635";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"140.1784563244004";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:17:"68.40453693289827";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"54.87050629489103";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:16:"49.2883749929479";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1506";s:5:"score";s:17:"45.48561436937925";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"41.55451370588272";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1902";s:5:"score";s:17:"40.87822069705264";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"32.16853289723915";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"218.1606752345572";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:17:"94.28735522065593";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"77.71693136856265";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2444";s:5:"score";s:17:"70.53823955806831";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:17:"69.77984957249451";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2424";s:5:"score";s:17:"67.16215509263193";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"55.87201862675238";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"49.10228586144716";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:17:"37.37359169278549";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1506";s:5:"score";s:17:"36.86806894787479";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Le FEC… Contrainte ou opportunité ?</title>
		<link>http://www.it-news.fr/le-fec-contrainte-ou-opportunite/</link>
		<pubDate>Fri, 21 Feb 2014 13:14:09 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2181</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/le-fec-contrainte-ou-opportunite/"><img class="alignleft size-full wp-image-2183" title="le FEC...contrainte ou ooportunité?" alt="fec" src="http://www.it-news.fr/wp-content/uploads/2014/02/fec.jpg" width="341" height="228" /></a>Le FEC ou le Fichier des Ecritures Comptables est un fichier informatique formaté pour être lisible par le logiciel officiel de l’administration fiscale « Le code », avec comme objectif : <b>mieux cibler les entreprises à contrôler</b>.</p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;">Avant 2008, <a href="http://www.it-news.fr/impots-des-entreprises-le-fichier-des-ecritures-comptables-devient-obligatoire-partir-du-1er-janvier-2014-2/" target="_blank">le FEC</a> n’existait que sous format papier ;  de 2008 à 2013, les entreprises avaient le choix entre papier ou le format électronique et seulement 15% des entreprises avaient opté pour le format électronique.</p>
<p style="text-align: justify;"><b>Depuis le 1<sup>er</sup> Janvier 2014, les entreprises sont dans l’obligation de fournir le <a href="http://www.it-news.fr/impots-des-entreprises-le-fichier-des-ecritures-comptables-devient-obligatoire-partir-du-1er-janvier-2014-2/" target="_blank">FEC</a></b><b> en cas de demande de l’administration fiscale.</b> Les services fiscaux laissent une petite période d’adaptation pour les entreprises mais peuvent légalement sanctionner les organismes qui ne fournissent pas un fichier conforme (dans la forme et le fond) et dans les temps. Les amendes peuvent aller de 1500€ à 0.5% du chiffre d’affaire.</p>

<h2 style="text-align: justify;">Les problématiques du FEC</h2>
<p style="text-align: justify;">Dû à sa nouveauté et au format imposé, le Fichier des Ecritures Comptables peut poser plusieurs problématiques aux entreprises qui doivent le fournir :</p>

<h3 style="text-align: justify;">Conformité du format par les ERP</h3>
<p style="text-align: justify;">Si la majorité des logiciels de gestion permettent l’exportation des données comptables,  seulement très peu d’entre eux sont capables de le faire au format exigé par les services fiscaux.</p>
<p style="text-align: justify;">Voici une liste non exhaustive des modifications effectuées sur le FEC conforme aux demandes des administrations :</p>

<ul>
	<li>Format</li>
	<li>Taille</li>
	<li>Ordre des champs</li>
	<li>Numérotation chronologique et continue des écritures</li>
	<li>Ecriture de soldes d’ouverture en début de fichier</li>
	<li>…</li>
</ul>
<h3>Le <a href="http://www.aquastar-consulting.com/index.php/solutions/systemes/sauvegarde" target="_blank">stockage</a> des données</h3>
<p style="text-align: justify;">Le FEC, selon la talle de l’entreprise et son volume d’activité, peut peser jusqu’à atteindre plusieurs téraoctets de données. A ce moment là, les administrations acceptent des fichiers sectionnés. C’est aux entreprises de faire attention aux partitions des données.</p>
<p style="text-align: justify;">De plus, d’ajoute la contrainte de la durée de la conservation des données qui est de 6 ans. Les entreprises devront, dès lors, anticiper un espace mémoire suffisamment important pour supporter les fichiers des écritures comptables qui vont s’accumuler durant cette période.</p>

<h3 style="text-align: justify;">Les normes applicables</h3>
<p style="text-align: justify;">Beaucoup d’entreprises, filiales de groupes étrangers, codifient leur système d’information selon les codes usuels du groupe et, durant les déclarations fiscales, retranscrivent leurs données conformément aux normes françaises. Dans ce cas-là, l’export des données ne pourra pas être envisagé.</p>
<p style="text-align: justify;">Pour les entreprises qui souhaitent fournir un fichier conforme aux demandes des administrations fiscales devront anticiper ces problématiques, contrôler leur capacité à fournir un FEC et auditer leur contenu. Ils peuvent dès lors, soit effectuer ces changements en interne, soit se rapprocher <a href="http://www.aquastar-consulting.com/">d’un prestataire spécialisé</a> pour les accompagner dans leur démarche.</p>

<h2 style="text-align: justify;">Le FEC, une opportunité non négligeable</h2>
<p style="text-align: justify;">Le FEC souvent perçu comme une contrainte, peut aussi être une source d’information pour l’entreprise.</p>
<p style="text-align: justify;">En effet, avoir un FEC conforme aux demandes du service des impôts, peut permettre à l’entreprise de pousser l’analyse de ces données comptables, de renforcer les processus de contrôle interne et, par conséquence,  d’optimiser le contrôle des risques fiscaux.</p>
<p style="text-align: justify;"><span style="color: #ff6600;"><b>Comment Aquastar Consulting peut vous aider ? </b></span></p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/gestion-metier/comptabilite-finances" target="_blank">Solution de gestion comptabilité et finances – Sage</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2181</wp:post_id>
		<wp:post_date>2014-02-21 14:14:09</wp:post_date>
		<wp:post_date_gmt>2014-02-21 13:14:09</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>le-fec-contrainte-ou-opportunite</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="administrations-fiscales"><![CDATA[administrations fiscales]]></category>
		<category domain="post_tag" nicename="comptabilite"><![CDATA[comptabilité]]></category>
		<category domain="category" nicename="paie-rh"><![CDATA[Paie - RH]]></category>
		<category domain="post_tag" nicename="risques"><![CDATA[risques]]></category>
		<category domain="post_tag" nicename="service-des-impots"><![CDATA[service des impôts]]></category>
		<category domain="category" nicename="solutions-de-gestion"><![CDATA[Solutions de gestion]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[86]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[FEC]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437233]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"56.714378604474334";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"26.19575235466496";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1868";s:5:"score";s:18:"19.880050107689378";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:18:"13.471319303029466";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"12.561219142802344";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"12.399396108566803";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[2183]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"95.31087994377233";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:17:"84.13293744339006";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1605";s:5:"score";s:17:"53.55308374297128";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:17:"48.10583233661311";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"41.293360691596945";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"342";s:5:"score";s:18:"40.449615317771965";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2438";s:5:"score";s:17:"39.19894175074303";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1868";s:5:"score";s:18:"28.475412341772547";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"149.38171247016015";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:18:"132.33105522365054";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2438";s:5:"score";s:17:"91.48164773321622";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:17:"66.95686417358203";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"62.853553989320496";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2371";s:5:"score";s:18:"55.861522212761855";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2319";s:5:"score";s:18:"45.022230344089024";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1605";s:5:"score";s:17:"42.17263477603744";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:17:"35.90694536339262";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2465";s:5:"score";s:17:"32.62105378725117";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:comment>
			<wp:comment_id>1152</wp:comment_id>
			<wp:comment_author><![CDATA[[BLOCKED BY STBV] Le contrôle fiscal : entre obligation et conformité | L&#039;actualité pour décideurs informatiquesL&#039;actualité pour décideurs informatiques]]></wp:comment_author>
			<wp:comment_author_email></wp:comment_author_email>
			<wp:comment_author_url>http://www.it-news.fr/le-controle-fiscal-obligation-conformite/</wp:comment_author_url>
			<wp:comment_author_IP>37.187.41.26</wp:comment_author_IP>
			<wp:comment_date>2014-03-07 08:33:53</wp:comment_date>
			<wp:comment_date_gmt>2014-03-07 07:33:53</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[[&#8230;] de fournir vos données comptables au format numérique, autrement dit fournir le « FEC » ou Fichier des Ecritures Comptable , le format papier ne sera désormais plus [&#8230;]]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type>pingback</wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
	</item>
	<item>
		<title>En 2015, la CRM sera virtualisée </title>
		<link>http://www.it-news.fr/en-2015-la-crm-sera-virtualisee/</link>
		<pubDate>Mon, 24 Feb 2014 09:36:11 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2186</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/en-2015-la-crm-sera-virtualisee/"><img class="alignleft size-full wp-image-2188" title="En 2015, la CRM sera virtualisée " alt="crm-cloud" src="http://www.it-news.fr/wp-content/uploads/2014/02/crm-cloud.jpg" width="341" height="228" /></a>Déjà un outil important dans l’organisation de l’entreprise, les dirigeants ont pour projet d’améliorer la CRM en la virtualisant.</p>
<p style="text-align: right;"><!--more Lire la Suite--></p>
<p style="text-align: justify;">Le cabinet d’étude <a href="http://www.gartner.com/technology/home.jsp" target="_blank">Gartner</a> a prévu que la moitié des déploiements CRM seront virtualisés en 2015, contre 40% en2014.</p>
<p style="text-align: justify;">Les solutions CRM jouent un rôle majeur dans l’amélioration de la relation client. Par conséquent, il est légitime qu’elles deviennent l’outil incontournable des projets numériques.</p>
<p style="text-align: justify;">Toujours selon Gartner, chaque métier a différentes attentes des solutions de CRM :</p>
<p style="text-align: justify;">Les responsables des services clients s’intéressent davantage aux analyses des données clients (Big Data) et aux communautés dans le but de proposer des solutions adaptées aux besoins des clients.</p>
<p style="text-align: justify;">Du côté des dirigeants d’entreprises, les attentes résident dans les solutions pour améliorer l’expérience des clients, la profitabilité et les ventes. Le cabinet rappelle que « <i>cette initiative exige une collaboration étroite entre le marketing et l’IT </i>».</p>
<p style="text-align: justify;">Gartner explique que la virtualisation du CRM est clairement devenue une tendance à suivre pour les entreprises.</p>
<p style="text-align: justify;">De plus, les revenus du cloud (en mode SaaS) dans la CRM devraient représenter 49% du marché mondial en 2014. Si la croissance du CRM est importante, Gartner rappelle que celle-ci reste une des priorités des entreprises en terme d’investissement.</p>
<p style="text-align: justify;">Cette tendance est notamment suivie par d’autres qui deviennent plus importantes pour les entreprises, comme  les réseaux sociaux d’entreprise (SAV, service client, marketing…), la mobilité avec notamment le <a href="http://fr.wikipedia.org/wiki/M-Commerce" target="_blank">m-commerce</a>, le <a href="http://www.it-news.fr/le-cloud-en-2014-trouve-enfin-sa-place-en-france/" target="_blank">Cloud</a> et l’<a href="http://fr.wikipedia.org/wiki/Internet_des_objets" target="_blank">internet des objets</a>.</p>
<p style="text-align: justify;">Comment Aquastar peut vous aider ?</p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/gestion-metier/crm" target="_blank">Solution en CRM - Sage</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/systemes/virtualisation-serveurs" target="_blank">Solution en virtualisation – VMware et Windows Server</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2186</wp:post_id>
		<wp:post_date>2014-02-24 10:36:11</wp:post_date>
		<wp:post_date_gmt>2014-02-24 09:36:11</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>en-2015-la-crm-sera-virtualisee</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="cloud"><![CDATA[cloud]]></category>
		<category domain="post_tag" nicename="entreprise"><![CDATA[entreprise]]></category>
		<category domain="post_tag" nicename="gestion-client"><![CDATA[gestion client]]></category>
		<category domain="post_tag" nicename="logiciels-de-gestion-clients"><![CDATA[logiciels de gestion clients]]></category>
		<category domain="category" nicename="mobilite"><![CDATA[Mobilité]]></category>
		<category domain="post_tag" nicename="saas"><![CDATA[SaaS]]></category>
		<category domain="post_tag" nicename="virtualisation"><![CDATA[Virtualisation]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[88]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[crm]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Déjà un outil important dans l’organisation de l’entreprise, les dirigeants ont pour projet d’améliorer la CRM en la virtualisant.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_post_restored_from</wp:meta_key>
			<wp:meta_value><![CDATA[a:3:{s:20:"restored_revision_id";i:2190;s:16:"restored_by_user";i:37;s:13:"restored_time";i:1393404603;}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437193]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"45.69772472354454";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:18:"44.062649989738574";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"42.78930919358612";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"34.635477630071655";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:16:"21.6376470528048";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:18:"21.163307606108695";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[2188]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:18:"109.22362504079122";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"74.53163485741935";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:17:"69.19487498439348";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"68.40453693289827";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"55.337870978346736";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2354";s:5:"score";s:18:"46.160519977747555";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1588";s:5:"score";s:17:"40.52652495531269";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1731";s:5:"score";s:17:"35.37388409559739";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:18:"171.90571134078525";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"106.75047377495167";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:18:"103.10753532753336";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2354";s:5:"score";s:18:"101.45577315975373";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"94.28735522065593";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2444";s:5:"score";s:17:"82.49282054753867";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"76.17965132079098";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2424";s:5:"score";s:17:"58.28769852642199";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"48.072585947056936";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:18:"45.603966258482295";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Sage lance 2 applications pour la mobilité et le pilotage</title>
		<link>http://www.it-news.fr/sage-lance-2-applications-pour-la-mobilite-le-pilotage/</link>
		<pubDate>Wed, 26 Feb 2014 08:03:53 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2191</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/?p=2191"><img class="alignleft size-medium wp-image-2195" title="Sage lance 2 applications pour la mobilité et le pilotage" alt="sage-lance-deux-applications" src="http://www.it-news.fr/wp-content/uploads/2014/02/sage-lance-deux-applications-300x200.jpg" width="300" height="200" /></a>Deux nouvelles applications ont été créées par Sage  l’éditeur de solutions de gestion: Sage Reports et Sage Customer View.</p>
<p style="text-align: justify;">Elles ont pour but de répondre aux problématiques liées à la mobilité et au pilotage des PME.</p>
<p style="text-align: right;"><!--more Lire la Suite--></p>
<p style="text-align: justify;"><a href="http://www.aquastar-consulting.com/index.php/solutions/gestion-metier#">Sage</a> assure qu’avec ces deux applications, les données de l’entreprise seront accessibles depuis une tablette ou un ordinateur en mode offline, tout en bénéficiant des avantages du Cloud : mobilité, flexibilité, sécurité et espace de travail libre de tout serveur.</p>
<p style="text-align: justify;"><a href="http://www.sage.fr/fr/decouvrez-sage/presse/communiques-presse/sage-lance-application-sage-reports-extra-occasion-ouverture-office-store-microsoft" target="_blank">Sage Report</a> est une application de <a href="http://fr.wikipedia.org/wiki/Informatique_d%C3%A9cisionnelle" target="_blank">business intelligence</a> sous la forme d’un add-on qui pourrait se rajouter sur la barre de menu d’un fichier Excel. Elle permet de créer et de personnaliser des tableaux de bord en choisissant les paramètres désirés. Par ailleurs, il sera possible de commencer avec un catalogue d’états métier de bases et de réutiliser des rapports déjà enregistrés.</p>
<p style="text-align: center;"><a href="http://www.it-news.fr/wp-content/uploads/2014/02/sage-reports.jpg"><img class="aligncenter size-full wp-image-2206" alt="sage-reports" src="http://www.it-news.fr/wp-content/uploads/2014/02/sage-reports.jpg" width="500" height="281" /></a></p>
<p style="text-align: justify;">Sage Customer View, une application réservée aux outils tactiles qui permet de visualiser l’état global du portefeuille clients et des indicateurs de pilotage de l’entreprise. L’application offre un accès aux informations importantes de chaqe client et permet de les analyser de manière plus efficace et plus pertinente. Et bien entendu, cette application est accessible en mode offline.</p>
<p style="text-align: center;"><img class="size-full wp-image-2205 aligncenter" title="Sage Customer View" alt="sage-customer-view" src="http://www.it-news.fr/wp-content/uploads/2014/02/sage-customer-view.jpg" width="500" height="281" /></p>
<p style="text-align: justify;"><a href="http://www.linkedin.com/pub/lucie-laurendon/10/a87/680" target="_blank">Lucie Laurendon</a>, chef du marché mobilité chez Sage explique que  « <i>60% des personnes actives professionnellement et disposant d’une tablette utilisent des applications professionnelles (étude Sage/IFOP, juillet 2013). Le développement d’outils spécifiquement liés aux besoins métier et à l’évolution des usages de ces utilisateurs présente donc un potentiel très significatif » </i></p>
<p style="text-align: justify;"><span style="color: #ff6600;"><b>Comment </b><b> Aquastar Consulting peut vous aider ? </b></span></p>
<p style="text-align: justify;"><span style="color: #000000; font-size: medium;">Certifié PCS - Partenaire Conseil Sage - depuis plus de 10 ans, <a href="http://www.aquastar-consulting.com/" target="_blank">Aquastar Consulting</a> possède un haut niveau de compétences et d'expertise autour de l'offre de l’éditeur. </span><span style="color: #000000; font-size: medium;">Tous nos consultants sont certifiés et pourront vous assister de la conception à la mise en œuvre de vos projets.</span></p>

<ul>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/gestion-metier/gestion-commerciale/business-mobile" target="_blank">Sage Business Mobile</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/gestion-metier/gestion-commerciale/pilotage" target="_blank">Sage BI - Report</a></li>
</ul>
<p style="text-align: justify;"><b> </b></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2191</wp:post_id>
		<wp:post_date>2014-02-26 09:03:53</wp:post_date>
		<wp:post_date_gmt>2014-02-26 08:03:53</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>sage-lance-2-applications-pour-la-mobilite-le-pilotage</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="mobilite"><![CDATA[Mobilité]]></category>
		<category domain="category" nicename="solutions-de-gestion"><![CDATA[Solutions de gestion]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[87]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[applications]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Deux nouvelles applications ont été créées par Sage l’éditeur de solutions de gestion: Sage Reports et Sage Customer View.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438472]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"38.71733774971895";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:17:"28.12282532579349";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"21.653428090566916";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"21.393704163752478";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"17.847595079104078";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"16.135243583067687";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[2324]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"62.52587263673043";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:17:"45.60919002152954";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:18:"39.594511556224575";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"34.309943478215295";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:17:"32.99414824213094";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"29.93564733500334";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"26.322523675506556";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"344";s:5:"score";s:18:"23.658120833839728";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:12:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"92.53507855292995";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:17:"69.17140993909825";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"50.88081336283808";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"47.829917907690024";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:17:"47.66855302337246";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"40.58250266444153";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:17:"28.95383676507359";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:18:"28.778761891080613";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2266";s:5:"score";s:18:"28.778761891080613";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:18:"28.778761891080613";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:18:"28.778761891080613";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"2371";s:5:"score";s:18:"27.136598977969356";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"92.79954002862361";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:17:"69.43917779961228";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"51.09484490440308";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"48.072585947056936";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:16:"47.2565318857819";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:16:"40.9527088996549";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:17:"29.06367989730139";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:18:"29.033542406389024";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2266";s:5:"score";s:18:"29.033542406389024";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:18:"29.033542406389024";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:comment>
			<wp:comment_id>1147</wp:comment_id>
			<wp:comment_author><![CDATA[[BLOCKED BY STBV] Sage et Microsoft : partenaires sur le cloud | L&#039;actualité pour décideurs informatiquesL&#039;actualité pour décideurs informatiques]]></wp:comment_author>
			<wp:comment_author_email></wp:comment_author_email>
			<wp:comment_author_url>http://www.it-news.fr/sage-microsoft-partenaires-sur-le-cloud/</wp:comment_author_url>
			<wp:comment_author_IP>37.187.41.26</wp:comment_author_IP>
			<wp:comment_date>2014-02-26 13:01:52</wp:comment_date>
			<wp:comment_date_gmt>2014-02-26 12:01:52</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[[&#8230;] function bb2_addLoadEvent(func){var oldonload=window.onload;if(typeof window.onload!=&#039;function&#039;){window.onload=func;}else{window.onload=function(){oldonload();func();}}} bb2_addLoadEvent(function(){for(i=0;i       &larr; Sage lance 2 applications pour la mobilité et le pilotage [&#8230;]]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type>pingback</wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
	</item>
	<item>
		<title>Sage et Microsoft : partenaires sur le cloud</title>
		<link>http://www.it-news.fr/sage-microsoft-partenaires-sur-le-cloud/</link>
		<pubDate>Wed, 26 Feb 2014 12:00:31 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2197</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><img class="alignleft size-medium wp-image-2199" title="Sage et Microsoft : partenaires sur le cloud" alt="sage-microsoft-partenaires" src="http://www.it-news.fr/wp-content/uploads/2014/02/sage-microsoft-partenaires-300x200.jpg" width="300" height="200" />D’après une étude menée par Microsoft et Sage, 13% des solutions de gestion destinées aux PME sont aujourd’hui virtualisées.</p>
<p style="text-align: justify;">Raison pour laquelle, ces entreprises ont décidé de devenir partenaires notamment pour les systèmes Windows Azure et Windows 8.</p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;">Grâce à ce partenariat, <a href="http://www.sage.fr/fr">Sage</a> souhaite pouvoir proposer à ses clients des solutions mobiles, onlines ou offlines, et interopérables avec <a href="http://www.microsoftstore.com/store/msfr/fr_FR/cat/ThemeID.35463200/categoryID.64843200?tid=sxnOMOW9y_dc&amp;cid=5369&amp;pcrid=28540822822&amp;pkw=office%20365&amp;pmt=p&amp;WT.srch=1&amp;WT.mc_id=pointitsem_Microsoft+FR_google_Office+15+Suites&amp;WT.term=office%20365&amp;WT.campaign=Office+15+Suites&amp;WT.content=xnOMOW9y&amp;WT.source=google&amp;WT.medium=cpc" target="_blank">Office 365</a>.</p>
<p style="text-align: justify;">Par ailleurs, l’éditeur a également lancé <a href="http://www.it-news.fr/sage-lance-2-applications-pour-la-mobilite-le-pilotage/" target="_blank">deux nouvelles applications mobiles</a> consacrées à la gestion des PME : Sage Report et Sage Customer View.</p>
<p style="text-align: justify;">Disponible en mars 2014, <a href="http://aquastar-consulting.com/index.php/solutions/gestion-metier/comptabilite-finances/comptabilite-edition-pilotee" target="_blank">la première application</a> est spécialisée dans la Business Intelligence, la deuxième permettra à son utilisateur d’avoir une vision globale du pilotage de son activité. Bien entendu, ces deux applications seront accessibles sur des terminaux mobiles comme une tablette ou un Smartphone.</p>
<p style="text-align: justify;"><a href="http://www.microsoft.com/fr-fr/default.aspx" target="_blank">Microsoft</a> a, par ailleurs, dévoilé son argument de vente.</p>
<p style="text-align: justify;">Une étude mondiale, menée entre 2010 à 2012 par la <a href="http://www.bcg.fr/" target="_blank">BCG (Boston Consulting Group</a>) , estimant que, ce sont les PME qui ont le plus rapidement adopté les nouvelles technologies dans leur organisation, , qui ont une croissance de leur chiffre d’affaire de plus de 15% par rapport aux autres entreprises.</p>
<p style="text-align: justify;">Ces dernières auraient, en deux ans, créé deux fois plus d’emplois que les autres… d’où un réel intérêt commun à se lancer dans de telles applications.</p>
<p style="text-align: justify;"><b>Comment Aquastar Consulting peut vous aider ? </b></p>
<p style="text-align: justify;"><a href="http://www.aquastar-consulting.com/" target="_blank">Aquastar Consulting</a>,partenaire de Sage et de Microsoft  peut vous conseiller et vous accompagner dans vos projets IT, <a href="http://www.aquastar-consulting.com/index.php/votre-projet/form/4" target="_blank">contactez-nous</a>.</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2197</wp:post_id>
		<wp:post_date>2014-02-26 13:00:31</wp:post_date>
		<wp:post_date_gmt>2014-02-26 12:00:31</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>sage-microsoft-partenaires-sur-le-cloud</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="cloud"><![CDATA[cloud]]></category>
		<category domain="post_tag" nicename="microsoft"><![CDATA[Microsoft]]></category>
		<category domain="category" nicename="mobilite"><![CDATA[Mobilité]]></category>
		<category domain="post_tag" nicename="sage"><![CDATA[sage]]></category>
		<category domain="category" nicename="solutions-de-gestion"><![CDATA[Solutions de gestion]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[81]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[partenaires]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Raison pour laquelle, ils ont décidé de devenir partenaires notamment pour les systèmes Windows Azure et Windows 8.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437750]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"61.990219713699744";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:17:"45.99185960862289";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"43.73890224528603";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:17:"43.32181274226462";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"40.293369049744996";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"39.42083889953605";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[2323]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"105.14118778300836";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:18:"104.12005131565314";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"75.51996665934462";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:17:"73.84512531991187";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:17:"73.19078892283213";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"65.24909779549253";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"344";s:5:"score";s:18:"63.314332959538106";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"62.71254116024171";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:18:"165.40979907786925";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"164.85454743627903";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:16:"119.084267877603";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:18:"116.71501428798501";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"106.75047377495167";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"95.70598746188703";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"92.79954002862361";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2319";s:5:"score";s:17:"85.51990879697544";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"77.71693136856265";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2444";s:5:"score";s:17:"66.26272875884317";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Les tendances IT pour 2014</title>
		<link>http://www.it-news.fr/les-tendances-pour-2014/</link>
		<pubDate>Mon, 03 Mar 2014 09:17:49 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2216</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/?p=2216"><img class="size-full wp-image-2219 alignleft" title="Les tendances IT pour 2014" alt="tendances-it-2014" src="http://www.it-news.fr/wp-content/uploads/2014/03/tendances-it-2014.jpg" width="341" height="228" /></a>Un nouveau phénomène est en train de se propager dans le monde de l’entreprise.</p>
<p style="text-align: justify;">L'apparition de nouvelles technologies dans nos vies personnelles est en train de  bouleverser nos habitudes de travail.</p>
<p style="text-align: right;"><!--more Lire la Suite--></p>
<p style="text-align: justify;">C’est au DSI qu’incombe la lourde tâche d'intégrer les nouveautés technologiques dans l'organisation de l’entreprise et d'établir une stratégie de déploiement, notamment pour les jeunes collaborateurs, de plus en plus exigeants en matière de nouvelles technologies.</p>
<p style="text-align: justify;">Pour la plus grande majorité, ils ont déjà réussi à intégrer les services de Cloud et à gérer la multiplication des terminaux mobiles (<a href="http://www.it-news.fr/la-france-championne-europeenne-du-byod/" target="_blank">BYOD</a>).</p>
<p style="text-align: justify;">Pour autant, ils devront également réussir à faire face à l'explosion des objets connectés, à la démocratisation de la robotisation, au phénomène des impressions 3D, etc.</p>

<h2 style="text-align: justify;">Le maître mot de l’année est la sécurité !</h2>
<p style="text-align: justify;">La tendance, en matière de sécurité informatique dans les entreprises, est de centrer la sécurité sur l’utilisateur. Et ce, surtout face aux nouveaux usages tels que le Cloud et le <a href="http://www.it-news.fr/linternet-mobile-devient-plus-populaire-en-france/" target="_blank">BYOD</a>.</p>
<p style="text-align: justify;">Face à un Système d’Information de plus en plus externalisé, les DSI éprouvent certaines  difficultés à <a href="http://www.it-news.fr/la-securite-informatique-est-toujours-sous-estimee/">maintenir une sécurité stable</a> au sein de leur entreprise. En effet, les collaborateurs veulent pouvoir accéder aux données sensibles quel que soit l’endroit où ils se trouvent et quel que soit l’appareil utilisé.</p>
<p style="text-align: justify;">La sécurité centrée sur l’utilisateur permet de mieux analyser le comportement et les habitudes des collaborateurs, qui, bien souvent, sont la cause de l’intrusion de menaces informatiques.</p>

<h2 style="text-align: justify;">Des objets de plus en plus connectés</h2>
<p style="text-align: justify;">Selon <a href="http://www.idate.org/" target="_blank">l'institut Idate</a>, en 2020, 80 milliards d'objets seront connectés à Internet dans le monde.</p>
<p style="text-align: justify;">De la voiture aux vêtements, les objets du quotidien deviendront pour la plupart des objets connectés à Internet et les données recueillies pourront être accessibles sur n'importe quel Système d'Information, qu'il soit mobile ou non.</p>
<p style="text-align: justify;">Par ailleurs, ces objets connectés seront exploités par les entreprises. Par exemple, en <img class="alignright size-full wp-image-2218" title="Des objets de plus en plus connectés" alt="objet-connecte" src="http://www.it-news.fr/wp-content/uploads/2014/03/objet-connecte.jpg" width="288" height="175" />2014, plusieurs objets connectés pourront être utilisés pendant l'exercice de son métier, comme la police de New York par exemple, aux Etats-Unis, qui est en train de tester les <a href="http://fr.wikipedia.org/wiki/Google_Glass" target="_blank">Google Glasses</a>. Bientôt, les <a href="http://www.smartwatchfans.com/" target="_blank">Smartwatches</a> seront sur le marché et seront exploitées par les professionnels, toujours à la recherche d'un gain de temps.</p>

<h2 style="text-align: justify;">Démocratisation de l’imprimerie 3D</h2>
<p style="text-align: justify;">L'imprimerie 3D a atteint un tel niveau d’importance qu'elle est non seulement utilisée pour la construction d'avions, notamment par les constructeurs Boeing et Airbus, mais également dans le domaine de la santé, par exemple avec la fabrication d'une prothèse artificielle bio résorbable.</p>
<p style="text-align: justify;">Selon le cabinet Gartner, en 2013, 56 500 imprimantes 3D se sont vendues dans le monde toutes cibles confondues (professionnelle et grand-public). De 2014 à 2015, ces ventes vont plus que doubler.</p>
<p style="text-align: justify;">Par ailleurs, le marché des consommables, c'est-à-dire le matériel utilisé par les imprimantes, comme par exemple les différentes sortes de plastiques ou  de métaux, devrait littéralement exploser. Selon <a href="http://www.idtechex.com/" target="_blank">IDTechEx</a>, le marché des consommables devrait représenter plus de 500 millions d’euros en 2025.</p>
<p style="text-align: center;"><img class="aligncenter size-full wp-image-2217" title="Démocratisation de l’imprimerie 3D" alt="imprimante-3d" src="http://www.it-news.fr/wp-content/uploads/2014/03/imprimante-3d.jpg" width="290" height="174" /></p>

<h2 style="text-align: justify;">Le Software Defined Anything</h2>
<p style="text-align: justify;">Le <a href="http://www.webopedia.com/TERM/S/software-defined_everything.html">Software Defined Anything</a>, concept où tout est régi par le logiciel, rassemble de nombreux standards tels qu’<a href="http://fr.wikipedia.org/wiki/OpenStack">OpenStack</a>, <a href="http://en.wikipedia.org/wiki/OpenFlow">OpenFlow</a> ou OpenRack.</p>
<p style="text-align: justify;">Le but commun de ces standards est de faciliter les interactions entre les différentes infrastructures IT à tous les niveaux de l’entreprise (réseaux, stockage, plateformes, applications…).</p>

<h2 style="text-align: justify;">Evolution du e-learning</h2>
<p style="text-align: justify;">Le <a href="http://fr.wikipedia.org/wiki/Cours_en_ligne_ouvert_et_massif">Mooc</a>, ou « Massive Open Line Course » en anglais, est un système de cours gratuits en ligne ouverts à tous (étudiants, salariés…). L’unique but du Mooc est le partage universel du savoir. Déjà présents aux Etats-Unis depuis plus d’un an, ces cours, pour la plupart délivrés par des universités, peuvent être suivis par des personnes qui n’ont habituellement pas accès à ce type de cursus, faute de moyens financiers par exemple.</p>
<p style="text-align: justify;">Aux Etats-Unis, lors du premier Mooc, Harvard, Berkeley et le MIT avaient réuni plus de 150 000 candidats sur leur plateforme edX (plateforme rassemblant textes, vidéos et forums).</p>
<p style="text-align: justify;">En France, le premier Mooc, mis en ligne par la <a href="http://www.france-universite-numerique.fr/">France Université Numérique (FUN)</a>, a réuni 12 000 personnes quelques jours après l’ouverture de la plateforme.</p>
<p style="text-align: justify;">Par conséquent, les Mooc semblent représenter le futur du e-learning. Il est donc à prévoir que les entreprises vont capitaliser sur ce type de formation. Et, pourquoi pas, créer leur propre plateforme…</p>

<h2 style="text-align: justify;">De nouvelles générations de processeurs</h2>
<p style="text-align: justify;">Les deux leaders du marché se préparent à un duel. En effet, <a href="http://www.intel.fr/content/www/fr/fr/homepage.html">Intel</a> proposera une puce baptisé <a href="http://fr.wikipedia.org/wiki/Skylake">Skylake</a>, qui succédera à la famille <a href="http://fr.wikipedia.org/wiki/Haswell">Haswell</a>. Gravé en 14 nanomètres, ce processeur ciblera les serveurs dans un premier temps. Equipé d’un contrôleur de mémoire capable de supporter jusqu’à 64 Go de mémoire RAM, cette puce devrait équiper les serveurs dès Janvier 2015.</p>
<p style="text-align: justify;">De son côté, <a href="http://www.amd.com/fr/Pages/AMDHomePage.aspx">AMD</a> se focalise sur sa nouvelle gamme de CPU (Central Processing Unit) et APU (Accelerated Processing Unit). Sous le nom de Berlin, ces processeurs cibleront également les serveurs Rack hautes densités et seront mis sur le marché en 2014. Cette puce, équipée de l’architecture système HSA (Heterogeneous System Architecture), permettra de traiter le CPU et le GPU comme une entité unique.</p>
<p style="text-align: center;"><img class="aligncenter size-full wp-image-2222" title="De nouvelles générations de processeurs" alt="serveurs-intel-amd" src="http://www.it-news.fr/wp-content/uploads/2014/03/serveurs-intel-amd.jpg" width="482" height="231" /></p>

<h2 style="text-align: justify;">Optimiser la consommation des  datacenters</h2>
<p style="text-align: justify;">Les Datacenters sont toujours à la recherche <a href="http://www.it-news.fr/consommation-energetique-dun-data-center/?preview=true&amp;preview_id=1495&amp;preview_nonce=bc4e6db7eb&amp;post_format=standard">de méthodes qui optimiseront la consommation de l’énergie</a>.</p>
<p style="text-align: justify;">Une des solutions choisies serait d’utiliser un équipement basse consommation, ce qui permettrait de réduire la consommation.</p>
<p style="text-align: justify;">Bien plus permanents que les serveurs ARM 32 bits et bien plus économes, les serveurs ARM 64 bits seraient une des solutions choisies par les constructeurs pour diminuer leur consommation d’énergie.</p>
<p style="text-align: justify;"><span style="color: #000000; font-size: 1.8em; line-height: 1.5em;">L‘e-citoyenneté  </span></p>
<p style="text-align: justify;">La tendance du moment est de créer des plateformes permettant aux utilisateurs de discuter ou de proposer des idées sur des thématiques politiques ou publiques posées par les élus. C’est l’e-citoyenneté.</p>
<p style="text-align: justify;">L’objectif est de faire du citoyen un acteur aidant à l’amélioration des différents services d’une ville, d’une collectivité, d’un département ou d’une région, via des moyens de communications tels que les réseaux sociaux.</p>
<p style="text-align: justify;">En plus de leur rôle interactif, ces plateformes ont aussi un rôle informatif. En effet, les utilisateurs peuvent se renseigner sur des démarches à suivre ou télécharger des documents administratifs au format PDF…</p>
<p style="text-align: justify;">Une ville intelligente est donc une ville qui a intégré l’outil numérique dans son mode de fonctionnement, de communication et d’organisation.</p>

<h2 style="text-align: justify;">Les traders de services Cloud</h2>
<p style="text-align: justify;">Le courtage de services Cloud aura sa place dès cette année. Les « Cloud Brokers », comme on les appelle communément, promettent de trouver les meilleures offres du Cloud Computing (<a href="http://www.it-news.fr/le-cloud-en-2014-trouve-enfin-sa-place-en-france/#more-2071" target="_blank">SaaS</a>, <a href="http://fr.wikipedia.org/wiki/Plate-forme_en_tant_que_service" target="_blank">PaaS</a>, <a href="http://fr.wikipedia.org/wiki/Infrastructure_as_a_service" target="_blank">IaaS</a>) aux meilleurs prix et à partir d'un seul point d'entrée. Ces derniers appliquent le même travail que s’ils avaient été courtier bancaire ou en assurance.</p>
<p style="text-align: justify;"><span style="color: #ff6600;"><b>Comment Aquastar Consulting peut vous aider ? </b></span></p>
<p style="text-align: justify;"><a href="http://www.aquastar-consulting.com/" target="_blank">Aquastar Consulting</a>, intégrateur informatique spécialisé dans le déploiement de solutions infra (réseaux, système, mobilité, sécurité…), vous propose de vous accompagner tout le long de vos projets d’infrastructure. N’hésitez pas à <a href="http://www.aquastar-consulting.com/index.php/contact" target="_blank">nous contacter</a>.</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2216</wp:post_id>
		<wp:post_date>2014-03-03 10:17:49</wp:post_date>
		<wp:post_date_gmt>2014-03-03 09:17:49</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>les-tendances-pour-2014</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="3d"><![CDATA[3D]]></category>
		<category domain="post_tag" nicename="courtier"><![CDATA[courtier]]></category>
		<category domain="post_tag" nicename="datacenter"><![CDATA[datacenter]]></category>
		<category domain="category" nicename="decisionnel"><![CDATA[Décisionnel]]></category>
		<category domain="post_tag" nicename="e-citoyen"><![CDATA[e-citoyen]]></category>
		<category domain="post_tag" nicename="e-learning"><![CDATA[e-learning]]></category>
		<category domain="category" nicename="infrastructures"><![CDATA[Infrastructures]]></category>
		<category domain="post_tag" nicename="mooc"><![CDATA[Mooc]]></category>
		<category domain="post_tag" nicename="objets-connectes"><![CDATA[objets connectés]]></category>
		<category domain="category" nicename="reseaux-et-mobilite"><![CDATA[Réseaux et mobilité]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[84]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[2219]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[tendance]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Les tendances IT en 2014 sont multiples. La question est de savoir si les entreprises françaises vont les intégrer dans leur organisatio.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426436450]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"21.752785697523613";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"19.198186539196918";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:17:"19.02748488466129";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"16.723625903546953";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"16.12061755662861";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1924";s:5:"score";s:17:"15.79052774600421";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1495";s:5:"score";s:17:"51.16456185058436";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:17:"46.19923698817989";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:16:"39.5394975083884";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1262";s:5:"score";s:17:"36.88662879940578";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"36.173166602976046";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:17:"28.98434972252117";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1320";s:5:"score";s:17:"27.49519239883913";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:17:"27.35513838580976";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:12:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:16:"62.5169644118405";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"56.389039240928824";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1495";s:5:"score";s:17:"45.48739426399276";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:17:"41.72218928060651";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2411";s:5:"score";s:18:"41.390474999920116";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:16:"39.3090624395578";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:18:"34.730530657403705";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:18:"33.490405692647606";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2371";s:5:"score";s:17:"32.67708688887879";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2436";s:5:"score";s:17:"32.13326324336458";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"31.367044531390107";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"29.103139015173493";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:17:"63.11130823062627";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"56.69146947177813";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1495";s:5:"score";s:17:"45.67847965075077";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:17:"41.82157208121083";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2411";s:5:"score";s:17:"41.50264644281439";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:17:"39.66575515874095";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:17:"34.84770301456926";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:17:"33.88092509872511";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2371";s:5:"score";s:17:"32.94460642994678";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2436";s:5:"score";s:17:"32.28365176352054";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Solution Wi-Fi Aruba Networks</title>
		<link>http://www.it-news.fr/solution-wi-fi-aruba-networks-2/</link>
		<pubDate>Tue, 04 Mar 2014 09:02:17 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2232</guid>
		<description></description>
		<content:encoded><![CDATA[<iframe src="//www.youtube.com/embed/mxVKZwb2P_o?list=UUcFRvOTXG8X9mXb1hU6ho6Q" height="315" width="560" allowfullscreen="" frameborder="0"></iframe>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2232</wp:post_id>
		<wp:post_date>2014-03-04 10:02:17</wp:post_date>
		<wp:post_date_gmt>2014-03-04 09:02:17</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>solution-wi-fi-aruba-networks-2</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="aruba-networks"><![CDATA[Aruba networks]]></category>
		<category domain="post_tag" nicename="internet"><![CDATA[internet]]></category>
		<category domain="category" nicename="videos"><![CDATA[Vidéos]]></category>
		<category domain="post_tag" nicename="wi-fi"><![CDATA[Wi-Fi]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[41]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Wi-Fi]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Une vidéo mettant en scène deux différents scénarios dont l'un avec une solution Wi-Fi d'Aruba Networks.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437217]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:3:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2030";s:5:"score";s:17:"115.7689426313699";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2251";s:5:"score";s:17:"65.08859324085745";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:17:"5.933489473302654";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[empty]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2030";s:5:"score";s:17:"200.3625284433744";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2251";s:5:"score";s:18:"108.45517101418994";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"133";s:5:"score";s:17:"81.36953598902542";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2362";s:5:"score";s:17:"54.22758550709498";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"849";s:5:"score";s:18:"42.029173484178706";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"760";s:5:"score";s:18:"40.075812065044715";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"723";s:5:"score";s:17:"34.14442608412176";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:17:"9.835724653433696";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2030";s:5:"score";s:18:"320.55489282247873";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2251";s:5:"score";s:18:"164.64131111067383";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2362";s:5:"score";s:18:"123.48098333300538";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"133";s:5:"score";s:17:"69.09594580412374";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"849";s:5:"score";s:17:"37.70364698885416";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"760";s:5:"score";s:17:"32.61850776100442";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2482";s:5:"score";s:17:"32.58334912563292";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"723";s:5:"score";s:17:"28.65370455659102";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2319";s:5:"score";s:18:"12.708936322669487";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2400";s:5:"score";s:17:"11.30724721577033";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Microsoft prépare la fin du support de Windows XP</title>
		<link>http://www.it-news.fr/microsoft-prepare-la-fin-du-support-de-windows-xp/</link>
		<pubDate>Tue, 04 Mar 2014 14:20:25 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2234</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/?p=2234"><img class="alignleft size-full wp-image-2235" title="Microsoft prépare la fin du support  Windows XP" alt="fin-xp" src="http://www.it-news.fr/wp-content/uploads/2014/03/fin-xp.jpg" width="341" height="228" /></a>Face à l’approche de la fin du support de Windows XP, Microsoft va proposer un outil gratuit qui facilitera la migration vers un Windows 7 ou un Windows 8.</p>
<p style="text-align: Right;"><!--more Lire la Suite--></p>
<p style="text-align: justify;">Une fenêtre Pop-up apparaîtra dans le  but d’alerter les utilisateurs de Windows XP de sa fin imminente.</p>
<p style="text-align: justify;">C’est dans maintenant 2 mois que <a href="http://www.it-news.fr/la-fin-de-windows-xp-se-rapproche/" target="_blank">Microsoft</a> va arrêter le support Windows XP, et pour pousser ses utilisateurs à migrer, l’entreprise lance 2 nouveautés.</p>
<p style="text-align: justify;">La première est un outil gratuit : « <a href="http://ww2.laplink.com/fre/pcmover/pcmoverexpress.html" target="_blank">PCmover Express for Windows XP</a> » , disponible en français dès cette semaine sur le site dédié à la fin du support de Windows XP. Il s’agit d’un outil qui facilitera le passage des données d’un PC sous Windows XP vers un Windows 7, 8 ou 8.1.</p>
<p style="text-align: justify;">Cet outil, conçu en partenariat avec <a href="http://www.laplink.com/index.php/fre/" target="_blank">Laplink</a>, migrera les fichiers, les emails, les profils et les paramétrages vers le nouvel système d'application. Par contre, pour améliorer la migration des applications, l’application deviendra payante.</p>
<p style="text-align: justify;">La deuxième nouveauté lancée par Microsoft apparaîtra le 8 mars prochain. Les utilisateurs de Windows XP recevant leur demande de mises à jour via Windows Udapte seront alertés par une fenêtre Pop-up les alertant sur le fait que leur système ne sera plus supporté à partir du 8 avril. Ils recevront cette notification tous les mois à la même date.</p>
<p style="text-align: justify;"><span style="color: #ff6600;"><b>Comment Aquastar Consulting peut vous aider ? </b></span></p>
<p style="text-align: justify;"><a href="http://www.aquastar-consulting.com/" target="_blank">Aquastar Consulting</a>, partenaire de Microsoft, peut vous aider pour vos projets de migrations d’OS.</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2234</wp:post_id>
		<wp:post_date>2014-03-04 15:20:25</wp:post_date>
		<wp:post_date_gmt>2014-03-04 14:20:25</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>microsoft-prepare-la-fin-du-support-de-windows-xp</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="decisionnel"><![CDATA[Décisionnel]]></category>
		<category domain="post_tag" nicename="microsoft"><![CDATA[Microsoft]]></category>
		<category domain="post_tag" nicename="migration"><![CDATA[migration]]></category>
		<category domain="post_tag" nicename="pop-up"><![CDATA[pop-up]]></category>
		<category domain="category" nicename="solutions-de-gestion"><![CDATA[Solutions de gestion]]></category>
		<category domain="category" nicename="systemes"><![CDATA[Systèmes]]></category>
		<category domain="post_tag" nicename="windows-7"><![CDATA[windows 7]]></category>
		<category domain="post_tag" nicename="windows-8"><![CDATA[Windows 8]]></category>
		<category domain="post_tag" nicename="windows-xp"><![CDATA[windows xp]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[79]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[2235]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[fin du support de windows xp]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Face à l’approche de la fin du support de Windows XP, Microsoft va proposer un outil gratuit qui facilitera la migration vers un Windows 7 ou un Windows 8.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1425137418]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"96.45512677185268";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"61.990219713699744";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:17:"45.99855198777722";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:16:"26.9845141779485";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"21.936368450509477";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:18:"18.358515698286702";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:18:"172.44726120265278";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"104.83755631653533";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1626";s:5:"score";s:16:"95.5727187662397";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:17:"76.65378611921466";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1439";s:5:"score";s:17:"48.60047594231972";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1719";s:5:"score";s:17:"46.83934939932494";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:18:"45.001217768819544";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"39.94313972173911";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"286.7095260560613";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"164.85454743627903";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:18:"117.51301750364047";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1626";s:5:"score";s:17:"83.41355256612549";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:18:"61.171340629773546";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"51.30689843526765";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"51.09484490440308";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1439";s:5:"score";s:17:"42.36844018565006";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:17:"42.03236722877513";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:17:"37.61848302277015";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Le contrôle fiscal : entre obligation et conformité</title>
		<link>http://www.it-news.fr/le-controle-fiscal-obligation-conformite/</link>
		<pubDate>Fri, 07 Mar 2014 07:33:49 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2239</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/?p=2239"><img class="alignleft size-full wp-image-2240" title="Le contrôle fiscal : entre obligation et conformité" alt="controle-fiscal" src="http://www.it-news.fr/wp-content/uploads/2014/03/controle-fiscal.jpg" width="341" height="228" /></a>En 2014, les entreprises soumises à un contrôle fiscal devront obligatoirement fournir leurs données comptables sous format numérique à l’administration.</p>
<p style="text-align: right;"><!--more Lire la Suite--></p>
<p style="text-align: justify;">Il faut, tout d’abord, savoir que lors d’un contrôle fiscal vous êtes, depuis quelques semaines, dans l’obligation de fournir vos données comptables au format numérique, autrement dit fournir le « <a href="http://www.it-news.fr/le-fec-contrainte-ou-opportunite/" target="_blank">FEC </a>» ou Fichier des Écritures Comptable, le format papier ne sera désormais plus accepté.</p>
<p style="text-align: justify;">C’est ce qu’indique le nouvel <a href="http://www.legifrance.gouv.fr/affichCodeArticle.do?idArticle=LEGIARTI000018567134&amp;cidTexte=LEGITEXT000006069583" target="_blank">article A47 A-1 du Livre des Procédures Fiscales </a>: «<em>L’ensemble des données comptables et des écritures retracées dans tous les journaux comptables au titre d’un exercice est remis dans un fichier unique, dénommé fichier des écritures comptables, dans lequel celles-ci sont classées par ordre chronologique de validation</em> ».</p>
<p style="text-align: justify;">Si vous êtes dans l’incapacité de remettre ce Fichier d’Ecriture Comptable structuré au format défini par la loi, le contrôleur pourrait interpréter <strong><span style="color: #ff0000;">ce manquement comme une opposition au contrôle fiscal.</span></strong></p>

<h2 style="text-align: justify;">Contrôle fiscal, quelles sont les sanctions ?</h2>
<p style="text-align: justify;">L’amende est importante et les conséquences peuvent être dramatiques voir insurmontables ; la sanction encourue est de 5 pour mille du Chiffre d’Affaires ou des recettes brutes de l’entreprise avec un <strong><span style="color: #ff0000;">minimum de 1 500€</span></strong>. De plus, l’administration peut demander votre <strong><span style="color: #ff0000;">taxation immédiate</span></strong>.</p>
<p style="text-align: justify;">Ce qui peut être considéré comme une opposition à un contrôle fiscal sont :</p>

<ul style="text-align: justify;">
	<li>La remise d’un fichier comptable papier ;</li>
	<li>La remise d’un fichier comptable numérique partiel ;</li>
	<li>La remise d’un fichier comptable numérique non conforme à l’arrêté du 29 Juillet.</li>
</ul>
<p style="text-align: justify;">Exceptions faites pour les données des exercices antérieurs à décembre 2013, les rares entreprises tenant encore une comptabilité manuelle ainsi que les entreprises agricoles soumis au régime forfaitaire.</p>

<h2 style="text-align: justify;">Une conformité requise et exigée</h2>
<p style="text-align: justify;">La mise en conformité est devenue une obligation dans la mesure où les documents sont traités informatiquement par des outils d’analyse de l’administration fiscale.</p>
<p style="text-align: justify;">Georges Granger, administrateur de <a href="http://www.afai.fr/" target="_blank">l’Association françaises des auditeurs et conseils informatique (Afai)</a>, confirme que : « <i>le chef d’entreprise contrôlé devra remettre à l’inspecteur un Fichier des Ecritures Comptables structuré dans un format prédéfini, de manière à pouvoir être lu par le logiciel d’analyse du fisc ». </i></p>
<p style="text-align: justify;">Concrètement, le nouveau Fichier d’Ecritures Comptables doit répondre à des normes définies dans <a href="http://www.legifrance.gouv.fr/affichTexte.do?cidTexte=JORFTEXT000027788276&amp;dateTexte&amp;categorieLien=id" target="_blank">l’arrêté du 29 Juillet 2013</a>, les changements se trouvent dans le nombre de champs, de formats, caractères… <strong><span style="color: #ff0000;">Il est donc indispensable pour une entreprise de revoir son logiciel de comptabilité ou de demander à son éditeur de le mettre à jour.</span></strong></p>
<p style="text-align: justify;">La qualité de ce fichier doit être irréprochable, il faut être capable d’extraire l’ensemble des documents concernés par le Fichier d’Ecritures Comptables, remettre des écritures comptables dans leur ordre chronologique, y ajouter des références aux pièces justificatives, etc… C’est pourquoi il est indispensable de conserver tous les documents exigibles.</p>

<h2 style="text-align: justify;">Face à un contrôle fiscal : 6 conseils pour être en conformité</h2>
<p style="text-align: justify;">Toute entreprise, qu’elles soient petites ou grandes, va, un jour, devoir faire face à un contrôle fiscal. Dès lors, une préparation rigoureuse est vitale.</p>
<p style="text-align: justify;">Voici 6 étapes à suivre dès la réception de votre avis de contrôle fiscal.</p>

<ol style="text-align: justify;">
	<li>En <b>informer votre comptable et votre avocat fiscaliste</b> en leur fournissant la copie du courrier ;</li>
	<li><b>Etablir une</b> <b>liste</b>, en collaboration avec votre expert-comptable et votre avocat fiscaliste, <b>des documents exigibles</b> par l’administrateur fiscal, en fixant le rôle de chacun ;</li>
	<li>Anticiper <b>les facteurs et les risques potentiels</b> qui pourraient être soulevés par le contrôleur et préparer des éléments de réponses ;</li>
	<li>Ne pas oublier de préparer les conditions matérielles du contrôle, autrement dit, la salle, l’ordinateur, les documents … ;</li>
	<li>Trouver <b>le représentant de l’entreprise</b>, identifier la meilleure personne qui servira d’intermédiaire entre le contrôleur et l’entreprise ;</li>
	<li><b>Eviter les demandes de report de la première intervention</b> qui est généralement une réunion explicative du déroulement de la vérification entre le représentant et le contrôleur.</li>
</ol>
<p style="text-align: justify;"><span style="color: #ff6600;"><b>Comment Aquastar Consulting peut vous aider ? </b></span></p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/gestion-metier/comptabilite-finances" target="_blank">Solution de Gestion en Comptabilité et Finances – Sage</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2239</wp:post_id>
		<wp:post_date>2014-03-07 08:33:49</wp:post_date>
		<wp:post_date_gmt>2014-03-07 07:33:49</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>le-controle-fiscal-obligation-conformite</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="comptabilite"><![CDATA[comptabilité]]></category>
		<category domain="category" nicename="comptabilite-finances"><![CDATA[Comptabilité - Finances]]></category>
		<category domain="category" nicename="decisionnel"><![CDATA[Décisionnel]]></category>
		<category domain="post_tag" nicename="fec"><![CDATA[FEC]]></category>
		<category domain="post_tag" nicename="fichier-des-ecritures-comptables"><![CDATA[Fichier des écritures comptables]]></category>
		<category domain="post_tag" nicename="finance"><![CDATA[finance]]></category>
		<category domain="post_tag" nicename="impot"><![CDATA[impôt]]></category>
		<category domain="category" nicename="solutions-de-gestion"><![CDATA[Solutions de gestion]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[88]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[contrôle fiscal]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[En 2014, les entreprises soumises à un contrôle fiscal devront obligatoirement fournir leurs données comptables sous format numérique à l’administration.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437800]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:17:"57.50643766421794";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"32.669638377736376";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:16:"26.9845141779485";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"26.840293111611874";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:16:"22.0625743413761";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"19.43823955204023";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[2240]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:17:"95.31087994377233";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2438";s:5:"score";s:17:"85.09101852329485";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1605";s:5:"score";s:17:"75.79589834284087";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"53.831796414960706";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"342";s:5:"score";s:17:"49.57375315379592";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"41.55451370588272";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"39.765146609078315";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:17:"37.21598498060963";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2438";s:5:"score";s:18:"202.49943720235763";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:18:"149.38171247016015";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"84.11096380644724";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1605";s:5:"score";s:17:"59.90298159648344";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:17:"58.85620807821488";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"55.87201862675238";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2371";s:5:"score";s:17:"52.18286562730732";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"51.30689843526765";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:16:"46.8651953240832";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:17:"46.09501100874645";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Solution ClearPass GUEST ACCESS d&#039;Aruba Networks</title>
		<link>http://www.it-news.fr/solution-clearpass-guest-access-daruba-networks/</link>
		<pubDate>Mon, 24 Mar 2014 08:58:57 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2251</guid>
		<description></description>
		<content:encoded><![CDATA[<iframe src="//www.youtube.com/embed/75JTTlLmJ3I" height="315" width="560" allowfullscreen="" frameborder="0"></iframe>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2251</wp:post_id>
		<wp:post_date>2014-03-24 09:58:57</wp:post_date>
		<wp:post_date_gmt>2014-03-24 08:58:57</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>solution-clearpass-guest-access-daruba-networks</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="aruba-networks"><![CDATA[Aruba networks]]></category>
		<category domain="post_tag" nicename="clearpass"><![CDATA[ClearPass]]></category>
		<category domain="category" nicename="videos"><![CDATA[Vidéos]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[clearpass guest access]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[35]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438099]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:3:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2232";s:5:"score";s:17:"64.08458609477779";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2030";s:5:"score";s:17:"64.08458609477779";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:17:"5.827804510550703";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[empty]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2232";s:5:"score";s:17:"107.9518523978025";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2030";s:5:"score";s:17:"107.9518523978025";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2362";s:5:"score";s:16:"93.0961562531827";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"133";s:5:"score";s:16:"33.0254790403898";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"760";s:5:"score";s:18:"28.134107167200362";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:17:"9.782743746378877";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2319";s:5:"score";s:17:"5.626821433440073";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1681";s:5:"score";s:17:"5.626821433440073";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2362";s:5:"score";s:18:"216.98152985158538";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2232";s:5:"score";s:18:"164.64131111067383";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2030";s:5:"score";s:18:"164.64131111067383";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2482";s:5:"score";s:17:"32.58334912563292";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"133";s:5:"score";s:18:"26.062899294900994";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"760";s:5:"score";s:18:"22.293816889644216";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2319";s:5:"score";s:18:"12.708936322669487";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2400";s:5:"score";s:17:"11.30724721577033";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"1963";s:5:"score";s:17:"7.538164810513553";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1681";s:5:"score";s:17:"4.236312107556496";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Sécurité informatique : les entreprises sous-estiment leurs employés</title>
		<link>http://www.it-news.fr/securite-informatique-les-entreprises-estiment-leurs-employes/</link>
		<pubDate>Fri, 28 Mar 2014 09:00:53 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2253</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/?p=2253"><img class="alignleft size-full wp-image-2255" title="Sécurité informatique: les entreprises sous-estiment leurs employés" alt="securite-et-employes" src="http://www.it-news.fr/wp-content/uploads/2014/03/securite-et-employes.jpg" width="341" height="228" /></a>D’après une <a href="http://www.proofpoint.com/fr/" target="_blank">étude réalisée par Proofpoint</a> (fournisseur de solutions de sécurité informatique), les deux principaux facteurs responsables des attaques dans les entreprises sont…</p>
<p style="text-align: right;"><!--more Lire la Suite--></p>

<ol style="text-align: justify;">
	<li>Les emails</li>
	<li>Les réseaux sociaux</li>
</ol>
<p style="text-align: justify;">Cette étude révèle qu’en moyenne 1 employé sur 10 va cliquer sur un lien malveillant contenu dans un email. Elle mentionne également que  les employés victimes de ce type d’attaque sont issus de tous les types de structures (PME, MGE, administrations publics, ...).</p>
<p style="text-align: justify;">Par ailleurs, selon la position de la personne dans la société, les individus ne sont pas égaux face aux emails malveillants. En effet, les cadres dirigeants sont deux fois moins amenés à cliquer sur un lien malveillant que les employés non cadres de l’entreprise.</p>
<p style="text-align: justify;">Malgré l’essor du <a href="http://www.it-news.fr/la-france-championne-europeenne-du-byod/" target="_blank">BYOD</a>, ce ne sont pas les appareils mobiles qui sont concernés par ces attaques. D’après l’étude, 90% des liens malveillants sont consultés sur des ordinateurs et non pas sur des appareils mobiles.</p>
<p style="text-align: justify;">Au sujet des réseaux sociaux, très utilisés dans les entreprises, ils constituent un appât de choix pour les pirates informatiques.</p>
<p style="text-align: justify;"><a href="https://www.linkedin.com/" target="_blank">LinkedIn</a>, réseau social professionnel, se trouve être le terrain de prédilection des hackers.  « Les <i>utilisateurs sont particulièrement enclins à cliquer sur des URL lorsque l'email évoque une invitation à se connecter avec une tierce personne sur les réseaux sociaux, comme LinkedIn</i> ». Le nombre d’utilisateurs victimes de ces liens y est deux fois plus nombreux.</p>
<p style="text-align: justify;"><span style="color: #ff6600;"><strong>Comment Aquastar Consulting peut vous aider ?</strong></span></p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/securite-des-postes-de-travail">Solution de sécurité des postes et de la messagerie  - Sophos, Barracuda Networks et VadeRetro</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2253</wp:post_id>
		<wp:post_date>2014-03-28 10:00:53</wp:post_date>
		<wp:post_date_gmt>2014-03-28 09:00:53</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>securite-informatique-les-entreprises-estiment-leurs-employes</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="employes"><![CDATA[employés]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[2255]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[sécurité informatique]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[D’après une étude réalisée par Proofpoint (fournisseur de solutions de sécurité informatique), les deux principaux facteurs responsables des attaques dans les entreprises sont…]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[74]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426436917]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"17.990123326137372";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1940";s:5:"score";s:18:"16.828464956791443";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:17:"16.23592662452489";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"14.966032191993238";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:17:"14.60709521676112";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1876";s:5:"score";s:18:"14.071407755650268";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:18:"28.166728889713706";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"27.541447965735426";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1940";s:5:"score";s:16:"26.6169940695403";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:17:"22.12657520447776";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:17:"22.12657520381551";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:17:"20.53438116224146";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1933";s:5:"score";s:17:"20.27324401153367";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1876";s:5:"score";s:17:"20.23794927346763";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:17:"44.86030171219079";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:17:"35.85157386197306";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:18:"28.929522752972403";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"27.443449411073768";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:18:"25.942020759891733";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:18:"24.585738354387686";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"21.384366358214994";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1940";s:5:"score";s:18:"19.911974741185745";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:18:"18.541873177763588";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"15.54775688092559";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>La mise en conformité des factures </title>
		<link>http://www.it-news.fr/mise-en-en-conformite-factures/</link>
		<pubDate>Thu, 27 Mar 2014 09:00:11 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2258</guid>
		<description></description>
		<content:encoded><![CDATA[<div style="text-align: justify;">
<p style="text-align: justify;"><a href="http://www.it-news.fr/?p=2258"><img class="alignleft size-full wp-image-2254" title="La mise en en conformité des factures" alt="facture-edi" src="http://www.it-news.fr/wp-content/uploads/2014/03/facture-edi.jpg" width="341" height="228" /></a>En octobre dernier, le <a href="http://bofip.impots.gouv.fr/" target="_blank">BOFiP (Bulletin Officiel des Finances Publiques)</a> a imposé de nouvelles règles pour les factures au format papier, ainsi que pour les factures électroniques, tout en visant, dans le même temps, l’émetteur et le récepteur de la facture...</p>

</div>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;"><span style="text-align: justify;">Les entreprises utilisant uniquement des factures au format papier se retrouvent avec un nouveau cadre légal à appliquer depuis le 1</span><sup style="text-align: justify;">er</sup><span style="text-align: justify;"> janvier 2014. Cet article va tenter d’éclaircir les questions que se posent les utilisateurs…</span></p>

<h2 style="text-align: justify;">Pourquoi le cadre réglementaire applicable à la facturation a changé ?</h2>
<p style="text-align: justify;">Les règles ont changé en raison de la transcription en droit français de <a href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2010:189:0001:0008:FR:PDF" target="_blank">la directive européenne 2010 – 45 CE</a>.</p>
<p style="text-align: justify;">Le BOFiP a publié le 18 octobre 2013 les dispositions mettant un point final au délai de transition obligatoire en droit national imposé à tous les pays de la Communauté Européenne.</p>

<h2 style="text-align: justify;">Comment envoyer désormais ses factures ?</h2>
<p style="text-align: justify;">Le cadre règlementaire applicable à la facturation concerne les factures papiers et les factures électroniques.</p>
<p style="text-align: justify;">Le BOFiP du 18/10/2013 définit, d’après <a href="http://www.legifrance.gouv.fr/affichCodeArticle.do?idArticle=LEGIARTI000018036005&amp;cidTexte=LEGITEXT000006069577" target="_blank">l’article 289 VII du Code Général des Impôts</a>,  trois modes d’échanges inter-entreprises :</p>

<ol style="text-align: justify;">
	<li>Pour le cas d’une <b>facture au format papier ou électronique non porteur d’une signature électronique,</b> il faut, en plus, une « piste d’audit » documentée qui doit prouver la transaction économique (par exemple, un bon de commande, un devis…). En effet, selon l’alinéa 1 de l’article 289 VII ou 289-VII 1°,  la facture seule ne suffit plus.</li>
	<li>Pour le cas d’une <b>facture au format PDF signée par un certificat  électronique de niveau RGS</b> (ou supérieur), la signature électronique remplace la piste d’audit et supprime les contraintes liées à la conservation des documents qui justifient la transaction commerciale.</li>
	<li>Et pour le cas de la<b> facture au format EDI</b> (Echange de Données Informatisé), la facture doit impérativement contenir des données et mentions obligatoires, faire l’objet d’une liste récapitulative et être associée à un fichier partenaire. Par ailleurs toutes les factures EDI n’entrent pas dans la dématérialisation fiscale, cela dépend du respect des mentions obligatoires.</li>
</ol>
<h2 style="text-align: justify;">Qu’en est-il des obligations du récepteur ?</h2>
<p style="text-align: justify;">Bien entendu, le récepteur est <b>obligé de respecter certaines règles, dont la forme d’émission de la facture</b>.</p>
<p style="text-align: justify;">Si la facture est reçue au format papier, elle doit rester sous cette forme, de même pour la facture au format électronique, et ce, quel que soit le type de facture (facture PDF non signé, ou signé ou sous format EDI).</p>
<p style="text-align: justify;">Par ailleurs, le récepteur est tenu de respecter les <b>obligations propres aux modes de transmission choisis par son fournisseur</b>. Ainsi, si le fournisseur décide d’émettre ses factures au format papier ou PDF sans signature électronique, alors le récepteur se doit de gérer sa piste d’audit documentée pour prouver la validité de l’échange économique lié à la facture.</p>
<p style="text-align: justify;">Pour une facture au format électronique, <b>le client récepteur est libre d’accepter ou de refuser la dématérialisation des factures</b> qui lui sont transmises <b>sous accord formel et préalable des deux partis</b>. Mais si le récepteur reçoit une facture dématérialisée, il devient lié par l’obligation de maintenir le format d’origine de la facture.</p>
<p style="text-align: justify;">De plus, c’est au récepteur de vérifier la signature électronique émise sous PDF signé.</p>

<h2 style="text-align: justify;">Et la conservation des données ?</h2>
Les obligations sont simples : <b>le mode de conservation</b> des partis liés par l’échange commercial doit <b>être similaire</b>. C’est-à-dire qu’une facture doit être conservée dans son format d’origine (papier, si elle a été envoyée au format papier, PDF, si elle l’a été au format PDF).
<p style="text-align: justify;">L’instruction fiscale n4c du 11 Janvier 2007 est une <b>exception</b>. Elle autorise l’émetteur, sous condition de garanties d’intégrité et de pérennité, à conserver électroniquement les factures qui ont été émises et transmises sous format papier. Par ailleurs, même en cas de numérisation de la facture reçue, l’originale demeure la facture papier et donc, la re-matérialisation de la facture ne sera pas considérée comme une originale en cas de contrôle.</p>
<p style="text-align: justify;">Enfin, pour <b>les factures imprimées,</b> puis scannées pour être <b>transmises sous forme électronique</b>, <b>l’originale demeure la facture papier</b>.</p>
<p style="text-align: justify;">Dernier point, les factures doivent être stockées sur un territoire lié par une convention fiscale avec  la France, ce qui rend délicat le stockage via Cloud car nombreuses sont les solutions qui sont hébergées dans des pays sans convention fiscale avec la France.</p>

<h2 style="text-align: justify;">3 Conseils à retenir :</h2>
<ol style="text-align: justify;">
	<li>Demander aux émetteurs de factures d’indiquer au recto de leurs factures leur mode d’émission et de le confirmer dans leurs CGV.</li>
	<li> Inciter les récepteurs à réfléchir avant de payer payer une facture sous forme dématérialisée (PDF ou PDF signé), car si le paiement est effectuée, le récepteur accepte tacitement de respecter le format de la facture.</li>
	<li>Attention à ne pas changer la forme de la facture lors des échanges, cela peut mettre en cause la recevabilité de la facture par l’administration fiscale.</li>
</ol>
<p style="text-align: justify;"><span style="color: #ff6600;"><strong>Comment Aquastar Consulting peut vous aider ?</strong></span></p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/gestion-metier/comptabilite-finances/scan-fact" target="_blank">Sage EDI – Scanfact</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2258</wp:post_id>
		<wp:post_date>2014-03-27 10:00:11</wp:post_date>
		<wp:post_date_gmt>2014-03-27 09:00:11</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>mise-en-en-conformite-factures</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="bofip"><![CDATA[BOFiP]]></category>
		<category domain="category" nicename="comptabilite-finances"><![CDATA[Comptabilité - Finances]]></category>
		<category domain="category" nicename="edi-ged"><![CDATA[EDI - GED]]></category>
		<category domain="post_tag" nicename="factures-edi"><![CDATA[factures EDI]]></category>
		<category domain="category" nicename="gestion-commerciale"><![CDATA[Gestion commerciale]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[2254]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[facture]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[En Octobre dernier, le BOFiP (Bulletin Officiel des Finances Publiques) a imposé de nouvelles règles pour les factures au format papier ainsi que les factures électroniques tout en visant, dans le même temps, l’émetteur et le récepteur de la facture...]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[89]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437149]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"24.390901828561773";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"21.99078401894315";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1902";s:5:"score";s:18:"17.382792294358044";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1924";s:5:"score";s:18:"15.639619879104782";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"13.717629366545635";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"10.828734922297425";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"40.97590699195587";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"37.21598498060963";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1156";s:5:"score";s:18:"29.984495555235466";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1902";s:5:"score";s:18:"29.251131982290193";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"336";s:5:"score";s:18:"27.434258904422588";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"953";s:5:"score";s:18:"26.479418043165918";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1728";s:5:"score";s:17:"25.51655821197002";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1924";s:5:"score";s:18:"23.792420692384418";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"65.98399146989075";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"58.85620807821488";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2438";s:5:"score";s:18:"38.661002633296555";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"33.22795302476458";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2465";s:5:"score";s:18:"30.007356519486322";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2509";s:5:"score";s:18:"28.830758730707608";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2424";s:5:"score";s:18:"26.726095942892794";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2278";s:5:"score";s:18:"26.268596715648705";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"1156";s:5:"score";s:16:"26.0208224865822";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"25.942020759891733";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Logiciel Word : Une faille Zero Day toujours active découverte par Microsoft</title>
		<link>http://www.it-news.fr/logiciel-word-faille-zero-day-toujours-active-decouverte-microsoft/</link>
		<pubDate>Wed, 26 Mar 2014 07:53:34 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2261</guid>
		<description></description>
		<content:encoded><![CDATA[<div style="text-align: justify;">

<a href="http://www.it-news.fr/?p=2261"><img class="alignleft size-full wp-image-2262" title="Logiciel Word : Une faille Zero Day toujours active découverte par Microsoft" alt="word-0day" src="http://www.it-news.fr/wp-content/uploads/2014/03/word-0day.jpg" width="341" height="228" /></a>Microsoft a lancé un avertissement concernant une faille zero day dans Word. En effet, une simple prévisualisation des messages malveillants dans Outlook 2007, 2010  ou  2013, suffit à déclencher une attaque informatique.

</div>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;">Ce sont les utilisateurs de Microsoft Word 2010 qui ont reçu un avertissement  contre des attaques informatiques qui exploitent une faille non corrigée de l’éditeur de texte. En attendant la correction, Microsoft propose un outil destiné à protéger les utilisateurs.</p>
<p style="text-align: justify;">Dustin Child, manager et porte-parole du groupe <a href="http://www.microsoft.com/en-us/twc/" target="_blank">Trustworthy Computing</a> de Microsoft, a déclaré : <i>« Un hacker peut provoquer l'exécution d’un code à distance si l'utilisateur ouvre un fichier  au format .rtf - Rich Text Format  ou un email  malveillant dans Outlook en utilisant Word comme logiciel de prévisualisation des messages</i> ».</p>
<p style="text-align: justify;">Les attaques détectées par Microsoft ne concernaient alors que les utilisateurs de Word 2010, la société a annoncé dans un bulletin, que les utilisateurs des logiciels Word 2003, 2007, 2013et Word 2013 RT seraient également concernés. De même que la version Word pour Mac 2011 est touchée.</p>

<h2 style="text-align: justify;">Outlook dans la ligne de mire</h2>
<p style="text-align: justify;">Sous Windows, c’est Word qui est l’éditeur par défaut d’Outlook (2007, 2010 et 2013) et donc Les cybercriminels peuvent déclencher la vulnérabilité de Word, en incitant les utilisateurs à ouvrir ou prévisualiser  un email malveillant.</p>
<p style="text-align: justify;">De plus, Microsoft a également annoncé que les cybercriminels pouvaient utiliser des attaques du type « <a href="http://www.journaldunet.com/solutions/securite/virus-informatique-faille-et-exploit-sur-windows-microsoft/attaque-drive-by.shtml" target="_blank">drive-by </a>». C’est-à-dire que l’attaque se déclenche dès que l’utilisateur accède à une page compromise, exploitant en même temps la faille découverte du format RTF.</p>
<p style="text-align: justify;">En 2012, Microsoft avait déjà corrigé une faille liée au format RTF dans Word. Et comme elle en a l’habitude, Microsoft a également fourni un outil de contournement temporaire (téléchargeable sur le <a href="http://support.microsoft.com/?ln=fr" target="_blank">site du support de Microsoft</a>) qui empêche Word d’ouvrir les fichiers RTF.</p>

<h2 style="text-align: justify;">EMET, un outil qui peut contenir les attaques</h2>
<p style="text-align: justify;">Le dernier message de Microsoft propose d’autres mesures de contournement qui permettent de se passer du patch. La société recommande, toutefois, le recours de l’outil <a href="http://support.microsoft.com/kb/2458544/fr" target="_blank">EMET (Enhanced Migration Experience Toolkit</a>) qui permet d’activer manuellement des technologies anti-exploits comme <a href="http://www.microsoft.com/security/sir/strategy/default.aspx#!section_3_3" target="_blank">l’ASLR (Adress Space Layout Randomisation</a>) et DEP (<a href="http://www.commentcamarche.net/faq/3011-prevention-de-l-execution-des-donnees" target="_blank">prévention d’exécution des données</a>).</p>
<p style="text-align: justify;">Le géant n’a pas annoncé quand est-ce qu’elle allait livrer le patch pour corriger la faille de Word, ni si elle allait fournir un patch d’urgence.</p>
<p style="text-align: justify;"><span style="color: #ff6600;"><strong>Comment Aquastar Consulting peut vous aider ?</strong></span></p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/securite-des-postes-de-travail" target="_blank">Solution de sécurité de la messagerie – Sophos, VadeRetro et SpamBlock</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls" target="_blank">Solution de sécurité internet – Netasq et Palo Alto Networks</a></li>
</ul>
<p style="text-align: justify;"></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2261</wp:post_id>
		<wp:post_date>2014-03-26 08:53:34</wp:post_date>
		<wp:post_date_gmt>2014-03-26 07:53:34</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>logiciel-word-faille-zero-day-toujours-active-decouverte-microsoft</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="attaque-informatique"><![CDATA[attaque informatique]]></category>
		<category domain="post_tag" nicename="microsoft"><![CDATA[Microsoft]]></category>
		<category domain="post_tag" nicename="outlook"><![CDATA[outlook]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[2262]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[word]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Microsoft a lancé un avertissement concernant une faille zero day dans Word.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[84]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438764]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"45.355888018502284";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"42.65535822494401";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"37.92063028339474";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:18:"15.481120066310707";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"13.638947337335056";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1868";s:5:"score";s:17:"10.54184171102705";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"76.12312328901449";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"73.09841440157508";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"64.23808561887343";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1434";s:5:"score";s:17:"36.57071455901201";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1099";s:5:"score";s:18:"31.524595952889367";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:18:"24.167209177483556";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:17:"21.83475061091216";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1476";s:5:"score";s:18:"17.328280914474146";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:12:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"116.75386044035375";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"116.00162884532139";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:18:"101.02721143010865";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2475";s:5:"score";s:17:"93.68254944113944";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:17:"35.65734933037089";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:17:"32.02816947193765";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1434";s:5:"score";s:18:"27.769303397000595";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1099";s:5:"score";s:18:"25.256802857527166";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:18:"21.215685875147795";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2376";s:5:"score";s:17:"17.95920901643403";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:17:"14.97441741521273";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"14.97441741521273";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"117.51301750364047";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"116.71501428798501";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:18:"101.63868466695791";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2475";s:5:"score";s:17:"94.09904893032157";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:17:"35.90694536339262";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"32.227586381741055";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1434";s:5:"score";s:16:"27.9465478821089";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1099";s:5:"score";s:17:"25.40967116673948";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:17:"21.31759808147434";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2376";s:5:"score";s:18:"18.074442983319265";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Livre Blanc Mobilité et BYOD : Impacts et Enjeux</title>
		<link>http://www.it-news.fr/livre-blanc-mobilite-byod-impacts-enjeux/</link>
		<pubDate>Thu, 27 Mar 2014 09:59:26 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2266</guid>
		<description></description>
		<content:encoded><![CDATA[<a href="http://page.arubanetworks.com/GenMobile_Aquastar.html?Partner=Aquastar" target="_blank"><img class="alignleft size-full wp-image-2267" alt="genmobile" src="http://www.it-news.fr/wp-content/uploads/2014/03/genmobile.jpg" width="560" height="271" /></a>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2266</wp:post_id>
		<wp:post_date>2014-03-27 10:59:26</wp:post_date>
		<wp:post_date_gmt>2014-03-27 09:59:26</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>livre-blanc-mobilite-byod-impacts-enjeux</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="byod"><![CDATA[BYOD]]></category>
		<category domain="category" nicename="livres-blanc"><![CDATA[Livres Blanc]]></category>
		<category domain="category" nicename="mobilite"><![CDATA[Mobilité]]></category>
		<category domain="post_tag" nicename="mobilite"><![CDATA[Mobilité]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Livre Blanc - BYOD]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[31]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437777]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"12.424533248940001";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"12.424533248940001";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"12.424533248940001";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:18:"12.424533248940001";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:18:"12.424533248940001";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:16:"8.37930948405285";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[2267]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2354";s:5:"score";s:18:"42.902415938906756";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"789";s:5:"score";s:17:"38.98316324732112";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"760";s:5:"score";s:17:"38.98316324732112";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1728";s:5:"score";s:17:"33.94508393511359";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1722";s:5:"score";s:17:"33.10529659796436";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1454";s:5:"score";s:17:"33.10529659796436";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1257";s:5:"score";s:17:"33.10529659796436";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"820";s:5:"score";s:17:"33.10529659796436";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:12:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2354";s:5:"score";s:18:"109.43112689095655";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"789";s:5:"score";s:17:"35.47274390795708";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"760";s:5:"score";s:17:"35.47274390795708";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1728";s:5:"score";s:18:"31.039458581621723";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1722";s:5:"score";s:17:"29.28235182421536";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1454";s:5:"score";s:17:"29.28235182421536";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1257";s:5:"score";s:17:"29.28235182421536";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"820";s:5:"score";s:17:"29.28235182421536";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:3:"223";s:5:"score";s:17:"29.28235182421536";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:18:"28.778761891080613";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"28.778761891080613";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"28.778761891080613";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2354";s:5:"score";s:17:"110.0808172034526";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"789";s:5:"score";s:16:"35.6256122174555";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"760";s:5:"score";s:16:"35.6256122174555";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1728";s:5:"score";s:18:"31.166848839526658";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1722";s:5:"score";s:18:"29.435220132886943";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1454";s:5:"score";s:18:"29.435220132886943";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1257";s:5:"score";s:18:"29.435220132886943";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"820";s:5:"score";s:18:"29.435220132886943";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:3:"223";s:5:"score";s:18:"29.435220132886943";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:18:"29.033542406389024";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>En 2014, 50% des solutions CRM en Europe seront vendues en SaaS</title>
		<link>http://www.it-news.fr/en-2014-50-solutions-crm-en-europe-seront-vendues-en-saas/</link>
		<pubDate>Tue, 01 Apr 2014 07:00:29 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2272</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/?p=2272"><img class="alignleft size-full wp-image-2188" title="En 2014, 50% des solutions CRM en Europe seront vendues en SaaS" alt="crm-cloud" src="http://www.it-news.fr/wp-content/uploads/2014/02/crm-cloud.jpg" width="341" height="228" /></a>Selon Gartner, le marché européen du CRM est en expansion en 2014. Avec une hausse de 9% par rapport à 2013, il représentera 5.5 milliards de dollars en 2014 et ses revenus augmentent de 24%.</p>
<p style="text-align: right;"><!--more Lire la Suite--></p>

<h2 style="text-align: justify;"><b>Une volonté commune pour les entreprises : S’engager durablement auprès des clients</b></h2>
<p style="text-align: justify;">Après avoir interrogé une centaine de responsables de la relation clients, <a href="http://www.gartner.com/technology/home.jsp" target="_blank">Gartner</a> a ainsi pu conclure qu’en 2014, les entreprises vont augmenter leur budget accordé aux solutions CRM, et ce en raison d’une volonté commune : celle de s’engager durablement auprès de leurs clients.</p>
<p style="text-align: justify;">Ainsi, la moitié d’entre eux ont confirmé que leurs dépenses augmenteront en 2014 de 2.5% en moyenne.</p>
<p style="text-align: justify;">La conséquence majeure de cette hausse d’investissement dans les <a href="http://www.aquastar-consulting.com/index.php/solutions/gestion-metier/crm" target="_blank">logiciels CRM</a>, est la croissance des ventes qui sera de l’ordre de 9% soit 5.5 milliards de dollars.</p>
<p style="text-align: justify;">Par ailleurs, <a href="https://www.gartner.com/AnalystBiography?authorId=16473" target="_blank">Jim Davis</a>, directeur de recherches pour le Garner, a déclaré «  <i>Nous observons les lancements d'un nombre croissant de grands projets par des entreprises qui veulent adopter des approches plus sociales et mobiles pour leur force de ventes, leur marketing et leur support client</i> ».</p>

<h2 style="text-align: justify;"><b>Une solution vendue sur deux sera un CRM en SaaS</b></h2>
<p style="text-align: justify;">D’un autre côté, les logiciels CRM en <a href="http://fr.wikipedia.org/wiki/Logiciel_en_tant_que_service" target="_blank">SaaS (Software as a Service)</a> sont en constante augmentation. C’est pourquoi Gartner prévoit qu’en 2014, 49% des applications CRM vendues en Europe seront hébergées.</p>
<p style="text-align: justify;">De plus, les revenus liés à ce marché s’élèveront à 2.3 milliards de dollars, soit une augmentation de 24% par rapport à 2013.</p>
<p style="text-align: justify;">Jim Davis établit une corrélation entre les médias sociaux et le mobile qui ont modifié le comportement des individus et, par conséquent, les interactions entre les entreprises et leurs clients.  Il déclare : « <i>Les médias sociaux et le mobile ont fondamentalement modifié les interactions entre les entreprises et leurs clients. Celles-ci sont donc obligées de repenser complètement leur logique de CRM et leur stratégie client</i> ».</p>
<p style="text-align: justify;"><span style="color: #ff6600;"><b>Comment Aquastar Consulting peut vous aider ?</b></span></p>

<ul>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/gestion-metier/crm">Solution CRM – Sage</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2272</wp:post_id>
		<wp:post_date>2014-04-01 08:00:29</wp:post_date>
		<wp:post_date_gmt>2014-04-01 07:00:29</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>en-2014-50-solutions-crm-en-europe-seront-vendues-en-saas</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="crm"><![CDATA[CRM]]></category>
		<category domain="post_tag" nicename="europe"><![CDATA[Europe]]></category>
		<category domain="post_tag" nicename="logiciel-crm-en-saas"><![CDATA[Logiciel CRM en SaaS]]></category>
		<category domain="post_tag" nicename="marche-du-crm"><![CDATA[Marché du CRM]]></category>
		<category domain="post_tag" nicename="saas"><![CDATA[SaaS]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[2188]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[crm]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Le marché européen du CRM est en expansion en 2014. Avec une hausse de 9% par rapport à 2013, il représentera 5.5 milliards de dollars en 2014.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[85]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438560]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:16:"65.5313701554964";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:17:"21.10409221137151";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1902";s:5:"score";s:18:"17.244272595700036";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"16.181260936603426";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1868";s:5:"score";s:17:"13.67573499931418";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"10.918949987741355";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"109.61079758745335";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:17:"33.59968824893439";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1902";s:5:"score";s:18:"27.933397366632384";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:17:"26.22447711875803";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"24.26693594706113";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"180";s:5:"score";s:17:"23.65194054590877";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"967";s:5:"score";s:17:"23.23534645986499";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1868";s:5:"score";s:17:"19.87248679166142";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:12:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:17:"171.0108153855532";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:17:"50.65816190105629";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2436";s:5:"score";s:17:"43.35364514468557";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:17:"37.36293108158783";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"32.67594704691003";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"24.279623891658176";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1902";s:5:"score";s:18:"21.281227165078832";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2411";s:5:"score";s:17:"19.03058724287422";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:3:"180";s:5:"score";s:18:"19.005749618248036";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:3:"967";s:5:"score";s:18:"18.817691719489947";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:18:"17.595567818927904";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"15.726649010245094";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"171.90571134078525";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:17:"50.99772520486926";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2436";s:5:"score";s:17:"43.57905924662813";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:17:"37.60058217995059";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"32.959369765379826";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:18:"24.415362783690494";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1902";s:5:"score";s:18:"21.456981284163874";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2411";s:5:"score";s:17:"19.21778426758161";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:3:"180";s:5:"score";s:18:"19.106365703783748";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:3:"967";s:5:"score";s:17:"18.90686489986988";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Retour sur le petit-déjeuner sur les Cybermenaces   </title>
		<link>http://www.it-news.fr/retour-petit-dejeuner-les-cybermenaces/</link>
		<pubDate>Fri, 04 Apr 2014 07:36:22 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2278</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/?p=2278"><img class="alignleft size-full wp-image-2129" alt="petit-dejeuner-cybermenace" src="http://www.it-news.fr/wp-content/uploads/2014/02/petit-dejeuner-cybermenace.jpg" width="341" height="228" /></a>Le jeudi 20 mars, Aquastar Consulting a organisé, en collaboration avec la gendarmerie du Nord-Pas-de-Calais, un petit-déjeuner visant à sensibiliser le public aux risques liés aux cybermenaces.</p>
<p style="text-align: justify;">Objectif accompli !</p>
<p style="text-align: right;"><!--more Lire la Suite--></p>
<p style="text-align: justify;">Le 20 Mars dernier, vous étiez plus de 50 sociétés à venir assister à la conférence dédiée aux risques des cybermenaces, nous vous remercions de votre confiance !</p>
<p style="text-align: justify;">Le principal orateur, le <strong>Lieutenant-Colonel Pascal Leplongeon</strong>, en charge de la sécurité économique du Nord-Pas-de-Calais, a évoqué les risques liés à différentes sortes de cyberattaques.</p>
<p style="text-align: center;"><img class="aligncenter size-full wp-image-2281" title="Lieutenant-Colonel Pascal Leplongeon, principal orateur de la conférence" alt="principal-orateur-du-petit-dej" src="http://www.it-news.fr/wp-content/uploads/2014/04/principal-orateur-du-petit-dej.jpg" width="500" height="300" /></p>
<p style="text-align: justify;">Les thèmes abordés durant le petit-déjeuner ont été :</p>

<ul style="text-align: justify;">
	<li>Les risques économiques, juridiques et d’images</li>
	<li>Les bons réflexes à avoir</li>
	<li>Les bonnes pratiques préventives</li>
	<li>Les réseaux mafieux d’aujourd’hui, leur méthodes et comment les prévenir</li>
</ul>
<p style="text-align: justify;">Nous remercions encore tous ceux qui ont fait de cet événement une réussite.</p>
<p style="text-align: justify;">Pour plus d’informations concernant les thématiques évoquées durant la conférence, pour évaluer la sécurité de votre système d’information, ou enfin pour toute mise en place d’actions correctives ou d’outils de protection, <a href="mailto:contact@aquastar-consulting.com?subject=Je%20souhaite%20un%20accompagnement%20pour%20evaluer%20la%20securite%20demon%20SI">contactez-nous</a></p>
<p style="text-align: center;"><img class="aligncenter  wp-image-2286" title="Gauche: Stéphane Wallyn et deux membres de l'équipe d'Aquastar Consulting Anne Delescluse et Stéphane Maes, Droite: Ludovic Deschamps, responsable du service commercial d'Aquastar Consulting " alt="bande photo" src="http://www.it-news.fr/wp-content/uploads/2014/04/bande-photo1.jpg" width="900" height="270" /></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2278</wp:post_id>
		<wp:post_date>2014-04-04 08:36:22</wp:post_date>
		<wp:post_date_gmt>2014-04-04 07:36:22</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>retour-petit-dejeuner-les-cybermenaces</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="cyberattaques"><![CDATA[cyberattaques]]></category>
		<category domain="post_tag" nicename="evenement"><![CDATA[événement]]></category>
		<category domain="post_tag" nicename="petit-dejeuner"><![CDATA[petit déjeuner]]></category>
		<category domain="post_tag" nicename="risques"><![CDATA[risques]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[cybermenaces]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[49]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[2129]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437651]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2125";s:5:"score";s:18:"107.90092409417336";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:17:"51.16334235560456";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"13.989386850569174";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"10.41656129327042";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:17:"9.799615610480565";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2087";s:5:"score";s:16:"8.96942627609635";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2125";s:5:"score";s:18:"186.75890172722163";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:17:"84.13293744339006";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"644";s:5:"score";s:17:"70.21688879994227";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1868";s:5:"score";s:18:"22.260366846735323";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"20.401824397636393";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1786";s:5:"score";s:18:"19.836264479941548";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1779";s:5:"score";s:18:"18.597795884349406";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"723";s:5:"score";s:18:"18.458602698262307";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2125";s:5:"score";s:17:"306.3383307969186";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:18:"132.33105522365054";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"644";s:5:"score";s:17:"58.11890021275414";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:18:"26.268596715648705";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"24.585738354387686";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:18:"21.861899400959782";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"20.54504300566163";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"19.747039790006166";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"18.320050486297486";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2371";s:5:"score";s:17:"15.79792213897824";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Un grand nombre de PME utilisent encore des logiciels dépassés</title>
		<link>http://www.it-news.fr/grand-nombre-pme-utilisent-encore-logiciels-depasses/</link>
		<pubDate>Mon, 07 Apr 2014 07:00:52 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2300</guid>
		<description></description>
		<content:encoded><![CDATA[<div style="text-align: justify;">

<span style="font-size: 16px;"><a href="http://www.it-news.fr/?p=2300"><img class="alignleft size-full wp-image-2301" title="Un grand nombre de PPME utilisent encore des logiciels dépasés" alt="un-grand-nbre-de-pme-utilisent-encore-des-logiciels-depasses" src="http://www.it-news.fr/wp-content/uploads/2014/04/un-grand-nbre-de-pme-utilisent-encore-des-logiciels-depasses.jpg" width="341" height="228" /></a>Ne pas mettre à jour ses logiciels c’est mettre en péril la sécurité informatique de votre entreprise. Une enquête effectuée par F-Secure montre que 4 PME sur 10 mettent en danger leur entreprise en utilisant des logiciels dépassés !</span>

</div>
<p style="text-align: right;"><!--more Lire la suite--></p>

<h2 style="text-align: justify;">Des chiffres alarmants pour les PME</h2>
<p style="text-align: justify;">Pourtant les PME ont conscience du danger, puisque 94% d’entre elles pensent qu’il est important de garder à jour leurs logiciels. Mais dans la réalité, seulement 59% des entreprises mettent effectivement leurs logiciels à jour, et 63% disent qu’elles ont assez de ressources pour accomplir les tâches associés.</p>
<p style="text-align: justify;">Le fait de ne pas mettre à jour son logiciel permet le maintient de faille de sécurité et donc de mettre en danger la pérennité et la sécurité de vos outils et de vos données informatiques. C’est une des méthodes les plus prisées par les cybercriminels qui n’hésitent pas à pénétrer le réseau informatique d’une entreprise mal protégée.</p>
<p style="text-align: justify;">Selon F-Secure, 70 à 80% des principaux malwares détectés auraient pu être évités avec la mise à jour d’un logiciel.</p>

<h2 style="text-align: justify;">Mettre à jour un logiciel ? Cela prend du temps</h2>
<p style="text-align: justify;">Les entreprises déclarent passer environ 11 heures par semaine sur la mise à jour de logiciels. Bien entendu, plus la taille de l’entreprise est importante plus le temps de la mise à jour l’est.</p>
<p style="text-align: justify;">Selon l’étude de F-Secure, pour les entreprises de moins de 50 salariés, la mise à jour dure en moyenne 3 heures par semaine alors que pour les entreprises de plus de 250 employés, la mise à jour peut souvent dépasser 15 heures.</p>
<p style="text-align: justify;"> Dans un autre contexte, le facteur temps est devenu moins important pour les cybercriminels qui exploitent les logiciels obsolètes. Quand la mise à jour d’un logiciel peut durer des heures, le cybercriminel peut trouver de nouvelles variantes pour exploiter une menace en quelques secondes !</p>

<h2 style="text-align: justify;">Le facteur humain : les employés</h2>
<p style="text-align: justify;">Le phénomène <a href="http://www.it-news.fr/byod-et-securite/" target="_blank">BYOD (Bring Your Own Device)</a> n’est plus un secret pour les PME, les employés préfèrent apporter leur propre outil informatique pour travailler, et un peu plus de la moitié des employeurs interrogés acceptent que leurs salariés utilisent leurs propres logiciels (<a href="http://www.itpro.fr/a/byod-byoa-pyca-cyode-cope-quel-modele-choisir/" target="_blank">BYOA – Bring Your Own Applications</a>).</p>
<p style="text-align: justify;">Cette tendance est encore plus forte pour les PME de moins de 50 salariés (56%) contre 30% des entreprises de plus de 250 personnes.</p>
<p style="text-align: justify;">Par contre, la majorité des politiques étudiées montre que les employés qui utilisent leurs propres logiciels doivent eux-mêmes mettre à jour leurs applications. Une politique très risqué sachant que ces mises-à-jours peuvent être facilement oubliées.</p>
<p style="text-align: justify;">Pour les PME de moins de 50 salariés, 81% des employés doivent eux-mêmes gérer leurs mises-à-jours et 30% des entreprises se contentent d’effectuer des mises-à-jours Microsoft.</p>
<p style="text-align: justify;"><b> </b><span style="color: #ff6600;"><b>Comment Aquastar Consulting peut vous aider ?</b></span></p>
<p style="text-align: justify;">Aquastar <a href="http://www.aquastar-consulting.com/" target="_blank">Consulting</a> est un intégrateur de solutions informatiques pour PME et MGE. Nous pouvons vous conseiller sur l’optimisation  de vos logiciels et de vos parcs informatiques. Pour plus d’information, <a href="http://www.aquastar-consulting.com/index.php/contact" target="_blank">contactez-nous.</a></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2300</wp:post_id>
		<wp:post_date>2014-04-07 08:00:52</wp:post_date>
		<wp:post_date_gmt>2014-04-07 07:00:52</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>grand-nombre-pme-utilisent-encore-logiciels-depasses</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="byoa"><![CDATA[BYOA]]></category>
		<category domain="category" nicename="decisionnel"><![CDATA[Décisionnel]]></category>
		<category domain="post_tag" nicename="logiciels-obsoletes"><![CDATA[logiciels obsolètes]]></category>
		<category domain="post_tag" nicename="mettre-a-jour-son-logiciel"><![CDATA[mettre à jour son logiciel]]></category>
		<category domain="post_tag" nicename="pme"><![CDATA[PME]]></category>
		<category domain="post_tag" nicename="securite-inform"><![CDATA[sécurité inform]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[2301]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[logiciels]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[84]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Ne pas mettre à jour ses logiciels c’est mettre en péril la sécurité informatique de votre entreprise. Une enquête montre que 4 PME sur 10 mettent en danger leur entreprise en utilisant des logiciels dépassés !]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438437]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"33.95352484853976";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"20.34621182730181";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"19.43823955204023";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:16:"16.3195412132951";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"15.604394327676108";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:18:"14.417193056626324";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"58.59894553592207";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"342";s:5:"score";s:16:"45.1187044880725";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"323";s:5:"score";s:17:"38.81859905540806";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"774";s:5:"score";s:18:"31.972903161418586";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2406";s:5:"score";s:17:"30.65262139330215";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"29.141337366463503";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:18:"28.974679927363333";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"28.974679927363333";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2475";s:5:"score";s:17:"95.78693613274739";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"94.18179327572444";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"38.78864636821362";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:18:"36.575588477130026";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"36.575588477130026";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:17:"35.73121417242446";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"342";s:5:"score";s:17:"33.03244976363223";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"31.753104778054745";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:3:"323";s:5:"score";s:17:"30.51865973476466";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"26.259946597198088";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Lorsque le métier de RH se met au SaaS</title>
		<link>http://www.it-news.fr/lorsque-metier-rh-se-met-au-saas/</link>
		<pubDate>Fri, 11 Apr 2014 07:00:19 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2305</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/?p=2305"><img class="alignleft size-full wp-image-2307" title="Lorsque le métier de RH se met au SaaS" alt="la-rh-se-met-au-saas" src="http://www.it-news.fr/wp-content/uploads/2014/04/la-rh-se-met-au-saas.jpg" width="341" height="228" /></a>Le secteur des Ressources Humaines se modernise en utilisant la technologie SaaS permettant d’affirmer le rôle de conseil et d’intégration du DSI.</p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;">Selon une étude de <a href="http://blog.markess.fr/" target="_blank">Markess</a>, le secteur des Ressources Humaines, comme pour tous les grands secteurs de l’entreprise, se modernise en intégrant le numérique dans leur méthode de travail.</p>
<p style="text-align: justify;">Malgré tout, les DRH ne sont pas égaux en matière de modernisation numérique. En effet, certaines entreprises se contentent d’un simple logiciel isolé et dédié alors que d’autres ont mis en place un véritable <a href="http://fr.wikipedia.org/wiki/Syst%C3%A8me_d'information_de_gestion_des_ressources_humaines" target="_blank">SIRH (Système Informatique de Gestion des Ressources Humaines</a>).</p>

<h2 style="text-align: justify;">Une majorité de DRH préfèrent la solution en SaaS</h2>
<p style="text-align: justify;">Dans le but de gagner du temps et de simplifier les tâches administratives, les acteurs du département des Ressources Humaines sont plus disposés à numériser certains documents comme les fiches de paie (93%), les demandes de congés et les fiches d’absence (87%) ou encore tout ce qui concerne l’administration du personnel (84%).</p>
<p style="text-align: center;"><img class="aligncenter size-full wp-image-2306" title="Principaux besoins auxquels répond le SaaS/Cloud pour la gestion des processus RH" alt="une-majorite-de-drh-préfèrent-la-solution-en-saas" src="http://www.it-news.fr/wp-content/uploads/2014/04/une-majorite-de-drh-préfèrent-la-solution-en-saas.jpg" width="534" height="338" /></p>
<p style="text-align: justify;">D’après les sondés, 56% des DRH affirment que leur entreprise a recours au mode SaaS/Cloud pour gérer l’ensemble ou une partie de leurs processus RH et 14% affirment avoir des projets à plus ou moins long terme.</p>

<h2 style="text-align: justify;">Grâce au SaaS, naît une relation entre la DRH et la DSI</h2>
<p style="text-align: justify;">Le SaaS n’est pas une nouveauté à proprement parlé pour les RH, mais elle s’est étendue à d’autres tâches. En effet, en 2011, de nombreux services des Ressources Humaines utilisaient déjà des solutions en SaaS pour les processus administratifs alors qu’en 2014, les solutions en SaaS incluent la gestion des entretiens annuels, des objectifs et des performances des salariés.</p>
<p style="text-align: justify;">Ci-dessous, un graphique montrant les principales tâches gérées par des solutions SaaS/Cloud.</p>
<p style="text-align: center;"><img class="aligncenter size-full wp-image-2308" title="Principaux processus RH gérés en mode SaaS/Cloud dans les entreprises" alt="avec-le-saas-ne-une-relation-entre-drh-et-dsi" src="http://www.it-news.fr/wp-content/uploads/2014/04/avec-le-saas-ne-une-relation-entre-drh-et-dsi.jpg" width="542" height="361" /></p>
<p style="text-align: justify;">Par ailleurs, pour migrer d’un logiciel « classique » à un logiciel en mode SaaS, il faut être accompagné par la DSI. Cette relation est facilitée grâce au fait que les services RH n’hésitent plus à solliciter l’aide de la DSI.</p>
<p style="text-align: justify;">De plus, contrairement à la pensée générale, le SaaS ne constitue pas une menace pour les métiers IT, par conséquent, il n’y aucune raison pour empêcher son expansion.</p>
<p style="text-align: justify;">D’après l’étude : «  <i>En 2014, 94% des décideurs RH interrogés mentionnent l’intervention de leur DSI dans leurs projets RH en mode SaaS / Cloud (contre 64% des décideurs RH interrogés en 2011 sur ce même thème, qui mentionnaient une implication de la DSI). Pour la quasi‐totalité des décideurs, la DSI est donc associée à ces projets et est vue comme (co)décisionnaire (selon 67% des décideurs), voire comme intervenant financièrement (45%)</i> ».</p>
<p style="text-align: justify;"><span style="color: #ff6600;"><b>Comment Aquastar Consulting peut vous aider ? </b></span></p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/gestion-metier/paye-rh" target="_blank">Solution Paie-RH – Sage</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2305</wp:post_id>
		<wp:post_date>2014-04-11 08:00:19</wp:post_date>
		<wp:post_date_gmt>2014-04-11 07:00:19</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>lorsque-metier-rh-se-met-au-saas</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="decisionnel"><![CDATA[Décisionnel]]></category>
		<category domain="category" nicename="mobilite"><![CDATA[Mobilité]]></category>
		<category domain="category" nicename="paie-rh"><![CDATA[Paie - RH]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[2307]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[SaaS]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[83]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437334]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:18:"30.430832972484808";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"23.225692687013257";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"21.27309269329329";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"21.04258681451786";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"21.011000749942426";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:18:"20.544812984636657";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:12:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:17:"49.50091892994507";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"36.160518351193495";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"33.10485334569074";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"32.30232016233082";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1419";s:5:"score";s:18:"31.521560682397933";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:18:"31.393101489444053";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"31.051302040562046";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"29.25163455830982";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:18:"28.464687076632394";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1605";s:5:"score";s:18:"28.289513851638194";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:3:"563";s:5:"score";s:17:"23.66868216773932";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:17:"22.73342956941036";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:16:"48.1409594898934";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2319";s:5:"score";s:17:"36.83514211334677";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"36.07175553115933";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"33.08247178039116";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"32.51031269038204";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1419";s:5:"score";s:18:"31.359677779934835";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"30.903310841982563";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:18:"30.257433403257906";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2319";s:5:"score";s:17:"77.86199540018235";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:17:"66.95686417358203";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2371";s:5:"score";s:17:"62.45355785666673";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2465";s:5:"score";s:17:"47.25413812943009";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:16:"46.8651953240832";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"45.75732558536937";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"42.03236722877513";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:17:"38.90517149707174";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:17:"38.79131081655832";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"37.37359169278549";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Sage se lance dans le Cloud avec son Sage 100 Online</title>
		<link>http://www.it-news.fr/sage-se-lance-cloud-sage-100-online/</link>
		<pubDate>Wed, 09 Apr 2014 07:00:13 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2314</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/?p=2314"><img class="alignleft size-full wp-image-2195" alt="sage-lance-deux-applications" src="http://www.it-news.fr/wp-content/uploads/2014/02/sage-lance-deux-applications.jpg" width="341" height="228" /></a>Sage lance sa 1<sup>ère</sup> application de gestion virtuelle destinée aux PME. Sage 100 Online reprend l’intégralité des fonctionnalités de Sage 100 On Premise, tout en récupérant son ergonomie, et en l’agrémentant avec les avantages du Cloud.</p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;">L’été dernier, Sage se lançait dans le marché des applications de gestion en mode SaaS en introduisant le produit destiné aux TPE, Sage One.</p>
<p style="text-align: justify;">Avec <a href="http://na.sage.com/us/erp/sage-100-erp/online" target="_blank">Sage 100 Online</a>, un produit qui cible les PME, l’entreprise renforce sa position dans le marché du Cloud. Antoine Henri, directeur général de Sage France, a déclaré : « <i>Plutôt que de refaire quelque chose de complètement nouveau, nous avons capitalisé sur Sage 100 qui équipe déjà plus de 100 000 PME en France. Nous avons repris les mêmes fonctionnalités et la même ergonomie</i> <i>pour créer la version SaaS de ce logiciel ». </i></p>

<h2 style="text-align: justify;">La différence entre Sage 100 Online et Sage 100 On Premise ?</h2>
<p style="text-align: justify;">En plus des fonctionnalités de comptabilité, de CRM ou de prise de décisions qu’offrait <a href="http://www.sagecrm.com/middleeast/editionspricing/sagecrmon-premise/" target="_blank">Sage 100 On Premise</a>, <b>Sage 100 Online permet d’effectuer des sauvegardes quotidiennes, de restaurer à la demande des données et de mettre à jour automatiquement ses fonctionnalités.</b> En plus de sa mobilité, cette application fonctionne en mode offline.</p>
<p style="text-align: justify;">Pour l’instant, l’application n’a été développée que pour les appareils informatiques dotés d'un système Windows. Elle sera disponible en mai pour les iPads et en juin pour les Androids.</p>
<p style="text-align: justify;">En ce qui concerne l’hébergement de l’application, Sage 100 Online ne sera accessible qu’à travers le Cloud de Microsoft, Azure. De plus, la solution sera hébergée en Europe par les datacenters de Microsoft présents en Irlande et en Hollande.</p>

<h2 style="text-align: justify;">Les PME et le Cloud, un facteur temps non négligeable</h2>
<p style="text-align: justify;">Les chiffres de 2013 montrent que seulement 13.3% des PME françaises ont utilisé des solutions de gestion en mode Cloud. C’est pourquoi, pour Antoine Henry, l’intégration du SaaS en entreprise se fera par étape. Il déclare notamment que « <i>les PME cherchent d’abord à rentabiliser leurs précédents investissements et pousseront les solutions en place le plus loin possible</i> ».</p>
<p style="text-align: justify;">Par ailleurs, Sage investit dans un premier temps sur le recrutement de nouveaux clients pour développer les ventes du produit Sage 100 Online, notamment parce que l’entreprise n’a pas encore finalisé les différentes passerelles qui permettront la migration des données entre Sage 100 On Premise et Sage 100 Online.</p>

<h2 style="text-align: justify;">Qu’en est-il des fournisseurs?</h2>
<p style="text-align: justify;">Sage 100 Online sera disponible en mode direct pour les TPE, et chez tous les revendeurs et les partenaires de Sage en France pour les PME et les plus grandes entreprises. Claude Cordier, directeur marketing de l’entreprise, déclare : « <i>Nous traiterons directement avec les plus petites PME et laisseront à nos partenaires le soin d'adresser les plus grandes</i> ».</p>
<p style="text-align: justify;">De plus, il affirme que Sage a longuement collaboré avec ses différents canaux de distribution pour adapter leur partenariat à cette offre Cloud.</p>
<p style="text-align: justify;">Par ailleurs, le produit étant en mode SaaS, ce ne sera plus les revendeurs qui s’occuperont de l’assistance technique, mais une équipe européenne de 20 ingénieurs que Sage mettra en place pour répondre aux demandes des clients du produit Sage 100 Online.</p>
<p style="text-align: justify;">Toutefois, les partenaires et revendeurs devront toujours effectuer une partie du support métier et des services de proximité, comme le paramétrage ou les formations.</p>
<p style="text-align: justify;"><b>Comment Aquastar Consulting peut vous aider ?</b><b> </b></p>
<p style="text-align: justify;"><a href="http://www.aquastar-consulting.com/" target="_blank">Aquastar Consulting</a> est intégrateur de solutions de gestion pour les  PME. Partenaire historique de Sage, nous pouvons vous apporter tous les conseils nécessaires à l’intégration de Sage 100 Online dans votre entreprise. Pour plus d’information, <a href="http://www.aquastar-consulting.com/index.php/contact" target="_blank">contactez-nous.</a></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2314</wp:post_id>
		<wp:post_date>2014-04-09 08:00:13</wp:post_date>
		<wp:post_date_gmt>2014-04-09 07:00:13</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>sage-se-lance-cloud-sage-100-online</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="decisionnel"><![CDATA[Décisionnel]]></category>
		<category domain="post_tag" nicename="fournisseur-de-solution-de-gestion"><![CDATA[fournisseur de solution de gestion]]></category>
		<category domain="post_tag" nicename="nouveau-produit"><![CDATA[nouveau produit]]></category>
		<category domain="post_tag" nicename="revendeur"><![CDATA[revendeur]]></category>
		<category domain="post_tag" nicename="sage"><![CDATA[sage]]></category>
		<category domain="post_tag" nicename="solution-de-gestion-en-mode-cloud"><![CDATA[solution de gestion en mode Cloud]]></category>
		<category domain="category" nicename="solutions-de-gestion"><![CDATA[Solutions de gestion]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[2195]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Sage 100 Online]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[82]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437472]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_3</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"60.21032195121555";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"29.895740499108534";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"29.063532117034057";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"28.12282532579349";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"22.807089203863114";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"19.888380609874176";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:12:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"103.95075331337173";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"126";s:5:"score";s:17:"51.09451026833772";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"46.52597160880292";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"44.74877841089623";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"44.41179821762929";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"344";s:5:"score";s:17:"43.87802760534282";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"180";s:5:"score";s:17:"39.54513732631307";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"34.97939026941941";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:18:"31.393101489444053";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"29.011703738453704";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:18:"26.076840515389435";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"23.164264426450536";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"103.12207510439835";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"126";s:5:"score";s:18:"50.521230443522626";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2319";s:5:"score";s:17:"50.19817578347043";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"46.53457884920428";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"45.06233641878859";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"44.952355440225105";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"344";s:5:"score";s:18:"43.318533520117825";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"180";s:5:"score";s:17:"39.07100673229431";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"165.40979907786925";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2319";s:5:"score";s:17:"114.6133919093942";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"69.43917779961228";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"63.11130823062627";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"61.171340629773546";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"46.09501100874645";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"126";s:5:"score";s:17:"40.70304930767341";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:17:"38.79131081655832";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:17:"37.60058217995059";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"37.376714465642955";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Sage et Octime s’associe pour mieux répondre aux demandes des PME</title>
		<link>http://www.it-news.fr/sage-octime-sassocie-mieux-repondre-aux-demandes-pme/</link>
		<pubDate>Mon, 14 Apr 2014 09:30:51 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2319</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/?p=2319"><img class="alignleft size-full wp-image-2320" title="Sage et Octime signe un partenariat" alt="sage-octime" src="http://www.it-news.fr/wp-content/uploads/2014/04/sage-octime.jpg" width="341" height="228" /></a>Octime, éditeur de progiciels dans la planification et la gestion des temps de travail et Sage, leader mondial de l’édition de logiciels de gestion, se sont associés dans le but d’offrir aux PME  une solution plus complète et mieux adaptée à leurs besoins.</p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;">Le but de  ce partenariat est d’unir deux solutions complémentaires. La première, <a href="http://www.aquastar-consulting.com/index.php/solutions/gestion-metier/paye-rh" target="_blank">Sage Paie et RH</a> permet une meilleure gestion de la paie et du capital humain dans une PME. Elle apporte aux dirigeants une aide à la prise de décision, nécessaire afin de piloter une entreprise de manière plus efficace dans un contexte légale et réglementaire de plus en plus complexe. Ci-dessous l'exemple d'un tableaux de bord obtenu grâce à la solution Sage Paie &amp; RH.</p>
<p style="text-align: center;"><img class="aligncenter size-full wp-image-2327" title="tableaux de bord - Sage Paie &amp; RH. " alt="tableaux-de-bord-sage-paie-et-rh" src="http://www.it-news.fr/wp-content/uploads/2014/04/tableaux-de-bord-sage-paie-et-rh.jpg" width="247" height="187" /></p>
<p style="text-align: justify;">La deuxième est la solution en SaaS <a href="http://www.octime-expresso.com/produit-services/saas.htm" target="_blank">Octime Expresso</a>. Le service que propose Octime permet de planifier et d’organiser les différents métiers de l’entreprise en se basant sur le calcul automatique des temps d’activité. D’ailleurs, le fait que la solution soit disponible en mode SaaS permet une intégration rapide de ce service « tout-en-un » ;  les PME de moins de 100 personnes peuvent ainsi bénéficier d’une maintenance et de mise à jour régulière.</p>
<p style="text-align: justify;">Ce partenariat permettra aux PME de gagner en efficacité grâce, entre autres, à l’automatisation de l’intégration des données, éliminant ainsi les opérations de doubles saisies.</p>
<p style="text-align: justify;"><span style="color: #ff6600;"><b>Comment Aquastar Consulting peut vous aider ? </b></span></p>
<p style="text-align: justify;">Aquastar Consulting, intégrateur de solutions de gestion pour les PME, est un partenaire historique de Sage. Nous pouvons vous apporter les réponses et les conseils nécessaires à vos projets dans votre entreprise. Pour plus d’information, <a href="http://www.aquastar-consulting.com/index.php/contact" target="_blank">contactez-nous</a>.</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2319</wp:post_id>
		<wp:post_date>2014-04-14 10:30:51</wp:post_date>
		<wp:post_date_gmt>2014-04-14 09:30:51</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>sage-octime-sassocie-mieux-repondre-aux-demandes-pme</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="decisionnel"><![CDATA[Décisionnel]]></category>
		<category domain="post_tag" nicename="octime"><![CDATA[Octime]]></category>
		<category domain="category" nicename="paie-rh"><![CDATA[Paie - RH]]></category>
		<category domain="post_tag" nicename="partenariat"><![CDATA[partenariat]]></category>
		<category domain="post_tag" nicename="sage"><![CDATA[sage]]></category>
		<category domain="post_tag" nicename="unir-deux-solutions"><![CDATA[Unir deux solutions]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[2320]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[sage]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Le but du partenariat entre Sage et Octime est d’unir deux solutions complémentaires. Il permettra aux PME de gagner en efficacité grâce, entre autres, à l’automatisation de l’intégration des données, éliminant ainsi les opérations de doubles saisies.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[85]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1425136282]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:18:"100.58010712566676";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:16:"72.6930673048434";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"70.69528466499563";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:18:"41.647111775856345";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"126";s:5:"score";s:17:"39.41140264475192";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"344";s:5:"score";s:18:"35.950621598368656";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"180";s:5:"score";s:15:"35.045235547775";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2465";s:5:"score";s:18:"24.177272008700157";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:18:"152.81785587919228";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"114.02654506263393";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:17:"103.8159938669098";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:18:"60.029640458785366";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2465";s:5:"score";s:17:"49.00560057700043";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2371";s:5:"score";s:17:"46.65563571768849";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"126";s:5:"score";s:18:"32.056540968747655";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"29.32974756775696";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:3:"344";s:5:"score";s:18:"28.506636265658482";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:3:"180";s:5:"score";s:18:"28.122316253715567";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Heartbleed : une faille de sécurité qui affecte un demi-million de sites dans le monde</title>
		<link>http://www.it-news.fr/heartbleed-faille-securite-affecte-demi-million-sites-monde/</link>
		<pubDate>Wed, 16 Apr 2014 07:00:54 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2330</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/?p=2330"><img class="alignleft size-full wp-image-2331" alt="heartbleed" src="http://www.it-news.fr/wp-content/uploads/2014/04/heartbleed.jpg" width="341" height="228" /></a>Heartbleed, ou cœur ensanglanté en anglais, est une faille de sécurité qui a infecté environ 20% de sites internet dans le monde utilisant le système de chiffrement https et ssl.</p>
<p style="text-align: right;"><!--more Lire la suite--></p>

<h2 style="text-align: justify;">D’où vient cette faille ?</h2>
<p style="text-align: justify;"><a href="http://emailing.aquastar-consulting.com/2014/Infra/Flash-info-secu-heartbleed/index.html" target="_blank">Heartbleed</a> est à l’origine une extension conçue pour gérer les <a href="http://www.sebsauvage.net/comprendre/ssl/" target="_blank">connexions SSL</a> (Secure Sockets Layer) persistantes. Pourtant identifiée en 2011, Heartbleed n’a véritablement fait parler d’elle que très récemment.</p>
<p style="text-align: justify;">Heartbleed est une importante faille de sécurité présente dans la bibliothèque cryptographiée Open SSL. Cette faille autorise la lecture  de la mémoire chiffrée d’un serveur SSL ; par exemple, un cybercriminel peut avoir accès aux données confidentielles d’une entreprise.</p>

<h2 style="text-align: justify;">Que faut-il faire pour annihiler le problème de sécurité ?</h2>
<h3 style="text-align: justify;"><strong><span style="color: #ff6600;">Pour un internaute</span></strong></h3>
<p style="text-align: justify;">La première étape est de vérifier que les sites Internet utilisés ne sont pas infectés et pour cela  <a href="https://filippo.io/Heartbleed/" target="_blank">un outil d’analyse en ligne</a> et gratuit a été mis en place. Il permet de repérer un site SSL contaminé et ainsi vous éviter de voir vos transactions déchiffrées.</p>
<p style="text-align: justify;"><a href="https://filippo.io/Heartbleed/"><img class="aligncenter size-full wp-image-2345" alt="outil-de-test" src="http://www.it-news.fr/wp-content/uploads/2014/04/outil-de-test.jpg" width="500" height="266" /></a></p>
<p style="text-align: justify;">La deuxième étape est de changer vos mots de passe ; seul accès qui protège vos informations personnelles et donc il se doit d’être bien pensé !</p>

<h3 style="text-align: justify;"><strong><span style="color: #ff6600;">Pour un directeur  informatique</span></strong></h3>
<p style="text-align: justify;">La première étape est de  mettre en place un correctif disponible sur le site du projet OpenSSL.</p>
<p style="text-align: justify;">La deuxième étape est de changer les certificats SSL utilisés par les serveurs de l’entreprise. Comme il est impossible de savoir si un cybercriminel y a eu accès, il vaut mieux changer tous les certificats pour plus de sureté.</p>
<p style="text-align: justify;">La troisième étape<b> </b>est de demander à tous les utilisateurs du système informatique de changer leurs mots de passe.</p>
<p style="text-align: justify;">Un dernier conseil est d’augmenter la surveillance des serveurs qui ont été compromis, notamment grâce au dispositif PFS (<a href="http://fr.wikipedia.org/wiki/Confidentialit%C3%A9_persistante" target="_blank">Perfect Forward Secrecy</a>) qui évite l’utilisation de clés privées volées.</p>

<h2 style="text-align: justify;">Quels sont les principaux sites touchés par la faille ?</h2>
<p style="text-align: justify;">Les logiciels de Microsoft, Salesforce et HP n’ont pas été infectés d’après leurs éditeurs. Par contre, les entreprises telles que VMware, EMC et Citrix, ont été touchées par Heartbleed. VMware a ainsi déclaré que 27 de ces produits sont potentiellement touchés, dont ESXi 5.5 et vCenter Server 5.5.</p>
<p style="text-align: justify;">Pour Citrix ce sont 9 produits qui ont été listés comme « produit-à-risque » notamment XenApp.</p>
<p style="text-align: justify;"><a href="http://mashable.com/" target="_blank">Mashable</a>, grâce à un outil en ligne gratuit, a publié une liste des géants du web touchés et non protégés.</p>

<ol style="text-align: justify;">
	<li><b>Facebook</b>, qui malgré avoir nié être touché avoir été touché par le bug Heartbleed apparaît encore comme un site à risque. Le réseau social a expliqué avoir déjà détecté la faille avant qu’elle ne soit rendue publique et l’avait corrigée. Facebook encourage tout-de-même ses utilisateurs à changer leur(s )mots passe à ces utilisateurs de changer leurs mots de passe.</li>
	<li><b>Google</b> a déclaré que plusieurs de ses services (Gmail, YouTube, Google Play…) ont été touchés mais que Google Chrome ainsi que le système d’exploitation de Google, le Chrome OS, ne sont pas vulnérables à la faille Heartbleed.</li>
	<li><b>Yahoo</b>, a directement été visée par les différents experts en sécurités informatiques. L’entreprise affirme que le problème est corrigé.</li>
	<li><b>Un-demi million de sites Internet touchés</b>, Mashable a ajouté sur sa liste d’autres sites Internet, notamment Tumblr, Dropbox, Twitter, Apple…</li>
</ol>
<p style="text-align: justify;"><span style="color: #ff6600;"><b>Comment Aquastar Consulting peut vous aider ? </b></span></p>
<p style="text-align: justify;">Aquastar Consulting est un intégrateur informatique notamment spécialisé dans les solutions d’infrastructures (sécurité, réseaux, mobilité, système). Nous pouvons répondre à vos questions et vous conseiller sur vos projets de sécurité informatique. Pour plus d’information, <a href="http://www.aquastar-consulting.com/index.php/contact" target="_blank">contactez-nous.</a></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2330</wp:post_id>
		<wp:post_date>2014-04-16 08:00:54</wp:post_date>
		<wp:post_date_gmt>2014-04-16 07:00:54</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>heartbleed-faille-securite-affecte-demi-million-sites-monde</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="bug"><![CDATA[bug]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[2331]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Heartbleed]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[81]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438632]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1773";s:5:"score";s:17:"30.57761818186601";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"27.415001955661978";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1779";s:5:"score";s:17:"23.58081876236231";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:18:"21.872206171234808";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1108";s:5:"score";s:17:"20.73071630283591";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1924";s:5:"score";s:17:"19.43314388387123";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1955";s:5:"score";s:18:"18.262216532720867";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1876";s:5:"score";s:16:"18.2106029133239";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:12:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:17:"42.83906981278976";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:17:"30.54094670926498";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2354";s:5:"score";s:18:"27.531256895941773";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1773";s:5:"score";s:17:"23.39850516756671";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2376";s:5:"score";s:18:"16.999465438843465";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1779";s:5:"score";s:18:"16.778311473076876";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1108";s:5:"score";s:18:"16.389953888941026";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"15.127279484106714";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"15.127279484106714";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:17:"14.62426500355277";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"13.877055607584417";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"2113";s:5:"score";s:18:"13.877055607584417";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:17:"42.91538839191669";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:18:"30.566471467970796";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2354";s:5:"score";s:17:"27.63257422161115";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1773";s:5:"score";s:17:"23.38381926517924";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2376";s:5:"score";s:18:"16.980513641796044";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1779";s:5:"score";s:18:"16.738228660226323";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1108";s:5:"score";s:18:"16.412330772269982";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"15.191262257610857";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"15.191262257610857";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"14.581704245100436";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>La mobilité en entreprise : un réel facteur de productivité</title>
		<link>http://www.it-news.fr/mobilite-en-entreprise-reel-facteur-productivite/</link>
		<pubDate>Wed, 23 Apr 2014 17:00:49 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2354</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/?p=2354"><img class="alignleft wp-image-2355 size-full" src="http://www.it-news.fr/wp-content/uploads/2014/04/mobilite-entreprise-facteur-productivite.jpg" alt="mobilite-entreprise-facteur-productivite" width="341" height="228" /></a>La mobilité en entreprise est devenue une réalité. Rares sont les personnes qui n’utilisent pas leurs smartphones personnels pour consulter leurs mails professionnels ou accéder à un document interne de l’entreprise. Malheureusement, si ce genre de pratiques n’est pas ignoré par l’entreprise, la direction oublie que c’est ce qui menace le plus le SI interne.</p>
<p style="text-align: right;"><!--more Lire la suite--></p>

<h2 style="text-align: justify;">La Mobilité, qu’est-ce que c’est ?</h2>
<p style="text-align: justify;">Le BYOD (Bring Your Own Device), le <a href="http://www.it-news.fr/le-cyod-cest-du-byod-mais-sans-les-inconvenients/" target="_blank">CYOD </a>(Choose Your Own Device) ou les <a href="http://en.wikipedia.org/wiki/Mobile_enterprise_application_platform" target="_blank">MEAP </a>(Mobile Enterprise Application Platform) sont des innovations nées du besoin des entreprises à s’ouvrir au monde de la mobilité.</p>
<p style="text-align: justify;">La mobilité, aussi appelée <a href="http://fr.wikipedia.org/wiki/Nomadisme_num%C3%A9rique" target="_blank">nomadisme numérique</a>, a besoin de deux facteurs pour exister, un appareil mobile et une connexion Internet. Deux éléments qui sont produits et consommés à outrance.</p>
<p style="text-align: justify;"><img class="aligncenter wp-image-2368 size-full" src="http://www.it-news.fr/wp-content/uploads/2014/04/mobilté-quest-ce-que-cest.jpg" alt="mobilité en entreprise, qu'est-ce que c'est?" width="350" height="144" /></p>
<p style="text-align: justify;">De ce fait, les entreprises se retrouvent obligées de s’adapter aux nouveautés technologiques pour pouvoir répondre aux attentes de leurs employés et ainsi accroître leur productivité.
Les plus jeunes collaborateurs transforment la conception « d’outil informatique» dans l’entreprise. Véritables connaisseurs du monde de la mobilité et des besoins des consommateurs, ils ont plus d’exigences que leurs employeurs. En contrepartie, ils apportent une productivité plus dynamique et novatrice.</p>

<h2 style="text-align: justify;">La mobilité en entreprise, gagnant sur tous les tableaux</h2>
<p style="text-align: justify;">C’est avec l’<a href="http://www.it-news.fr/les-tablettes-tactiles-pc-portables/" target="_blank">introduction des tablettes</a> et des smartphones que le monde professionnel s’est retrouvé positivement chamboulé. Non seulement en termes de productivité, où le gain de temps et d’efficacité a clairement été prouvé, mais également en termes financiers.</p>
<p style="text-align: justify;">Une étude, menée par Pierre Audoin Consultants, a révélé que la mise à disposition d’appareils mobiles tels qu’une tablette ou un smartphone permettait d’améliorer la motivation et d’augmenter la fidélité des employés dans plus de 45% des entreprises.</p>
<p style="text-align: justify;">Chaque service ou métier utilise ces appareils de manière différente. Par exemple, alors qu’un commercial aura besoin d’un terminal mobile pour présenter ses produits ou en faire une démonstration, un DSI, lui, utilisera ses terminaux mobiles pour être informé à l’instant T d’une faille informatique.</p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2014/04/tablettes-entreprises.jpg"><img class="aligncenter wp-image-2367 size-full" src="http://www.it-news.fr/wp-content/uploads/2014/04/tablettes-entreprises.jpg" alt="Avec les tablettes, l'entreprise est gagnante " width="377" height="134" /></a></p>

<h2 style="text-align: justify;">La mobilité en entreprise : un défi pour la direction informatique</h2>
<p style="text-align: justify;">Il est facile de contrôler et maîtriser les accès aux ressources professionnelles d’une entreprise dès lors qu’un utilisateur se connecte via un ordinateur interne. Toutefois, contrôler et gérer les utilisateurs utilisant un appareil mobile est beaucoup plus compliqué.</p>
<p style="text-align: justify;">D’ailleurs, une entreprise interrogée sur deux déclare ne pas être suffisamment équipée pour le passage à la mobilité. Car il ne suffit pas seulement de contrôler les accès aux ressources, mais il est surtout question de sécurité.</p>
<p style="text-align: justify;">Avant de passer à la mobilité, les DSI se doivent de résoudre la question principale qui est : Comment l’entreprise peut-elle offrir des ressources adaptées à ses employés, tout en assurant la sécurité et la maîtrise des données et ce, quels que soient l’appareil ou le système utilisés (BYOD, CYOD…) ?</p>
<p style="text-align: justify;"><span style="color: #ff6600;"><strong>Comment Aquastar Consulting peut vous aider ?</strong></span></p>
<p style="text-align: justify;"><a href="http://www.aquastar-consulting.com/" target="_blank">Aquastar Consulting</a> est une entreprise spécialisée dans l’intégration de logiciels d’infrastructure. <a href="http://www.aquastar-consulting.com/index.php/contact" target="_blank">Contactez-nous</a> pour poser vos questions concernant la mobilité (Wi-Fi, BYOD, MDM – Mobile Device Management – Géolocalisation…).</p>

<ul>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/reseau-mobilite/wifi-hotspot" target="_blank">Solution WiFi - Aruba Networks</a></li>
</ul>
<p style="text-align: justify;"></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2354</wp:post_id>
		<wp:post_date>2014-04-23 18:00:49</wp:post_date>
		<wp:post_date_gmt>2014-04-23 17:00:49</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>mobilite-en-entreprise-reel-facteur-productivite</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="byod"><![CDATA[BYOD]]></category>
		<category domain="post_tag" nicename="cyod"><![CDATA[cyod]]></category>
		<category domain="post_tag" nicename="entreprise"><![CDATA[entreprise]]></category>
		<category domain="post_tag" nicename="meap"><![CDATA[MEAP]]></category>
		<category domain="category" nicename="mobilite"><![CDATA[Mobilité]]></category>
		<category domain="post_tag" nicename="productivite"><![CDATA[productivité]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[mobilité]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[79]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[La mobilité en entreprise est devenue une réalité. Rares sont les personnes qui n’utilisent pas leurs smartphones personnels pour consulter leurs mails professionnels ou accéder à un document interne de l’entreprise]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[2355]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438171]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:17:"94.07807311160785";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:17:"92.60011074785419";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2266";s:5:"score";s:17:"86.25817192690144";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1454";s:5:"score";s:17:"86.05909918770575";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"223";s:5:"score";s:18:"41.039675810523164";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1722";s:5:"score";s:18:"39.277733659932935";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:17:"36.73206090327947";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"820";s:5:"score";s:18:"34.302006083993305";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2266";s:5:"score";s:18:"146.77442293793678";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:18:"144.30566855364842";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"135.27436421300496";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1454";s:5:"score";s:17:"73.35532675773968";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:17:"55.67837028558065";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:18:"42.428042406861216";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"41.06840511878179";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2501";s:5:"score";s:17:"37.82058431748673";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:3:"223";s:5:"score";s:17:"34.97958239026299";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1722";s:5:"score";s:18:"33.168165144947906";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Solution mobile pour tablette - ClearPass d&#039;Aruba Networks</title>
		<link>http://www.it-news.fr/solution-mobile-tablette-clearpass-daruba-networks/</link>
		<pubDate>Thu, 24 Apr 2014 15:11:34 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2362</guid>
		<description></description>
		<content:encoded><![CDATA[<a href="http://www.it-news.fr/solution-mobile-tablette-clearpass-daruba-networks/"><iframe src="//www.youtube.com/embed/E1aDngLboiY" width="560" height="315" frameborder="0" allowfullscreen="allowfullscreen"></iframe></a>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2362</wp:post_id>
		<wp:post_date>2014-04-24 16:11:34</wp:post_date>
		<wp:post_date_gmt>2014-04-24 15:11:34</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>solution-mobile-tablette-clearpass-daruba-networks</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="aruba-networks"><![CDATA[Aruba networks]]></category>
		<category domain="post_tag" nicename="clearpass"><![CDATA[ClearPass]]></category>
		<category domain="post_tag" nicename="mobile"><![CDATA[mobile]]></category>
		<category domain="post_tag" nicename="tablette"><![CDATA[tablette]]></category>
		<category domain="category" nicename="videos"><![CDATA[Vidéos]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[empty]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438384]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2251";s:5:"score";s:18:"186.96053565749014";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2232";s:5:"score";s:18:"108.45517101418994";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2030";s:5:"score";s:18:"108.45517101418994";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"75.05555621050675";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"223";s:5:"score";s:17:"68.28885216824352";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1180";s:5:"score";s:17:"37.52777810525338";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"789";s:5:"score";s:17:"37.52777810525338";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"344";s:5:"score";s:17:"37.52777810525338";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2251";s:5:"score";s:17:"289.3087064687805";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2232";s:5:"score";s:18:"164.64131111067383";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2030";s:5:"score";s:18:"164.64131111067383";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:18:"124.31439767532973";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"223";s:5:"score";s:18:"59.820553396117674";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1180";s:5:"score";s:17:"33.59174370176807";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"789";s:5:"score";s:17:"33.59174370176807";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2482";s:5:"score";s:17:"32.58334912563292";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"1454";s:5:"score";s:18:"31.166848839526658";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:3:"344";s:5:"score";s:18:"31.078599418832432";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>La DSN, obligatoire pour tous à partir de 2016 ! </title>
		<link>http://www.it-news.fr/dsn-obligatoire-partir-2016/</link>
		<pubDate>Wed, 30 Apr 2014 07:00:00 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2371</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.aquastar-consulting.com/index.php/actualites/178-la-dsn-obligatoire-pour-tous-a-partir-de-2016"><img class="alignleft wp-image-2372 size-full" src="http://www.it-news.fr/wp-content/uploads/2014/04/dns-declaration-sociale-nominative.jpg" alt="dns-declaration-sociale-nominative" width="341" height="228" /></a>Les Déclarations Sociales sont une tâche administrative lourde mais obligatoire pour toute entreprise qui emploie des salariés.</p>
<p style="text-align: justify;">Elles sont indispensables pour garantir le financement de la protection sociale et les droits des salariés (chômage, maladie, retraite…).</p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;">Avant la création de la Déclaration Sociale Nominative, les entreprises devaient obligatoirement fournir plusieurs déclarations avec des normes et des échéances différentes à des destinataires différents.</p>
<p style="text-align: justify;">Dans un souci de simplification des tâches administratives des entreprises, les ministères ont décidé de regrouper les différentes déclarations sociales en une seule, la <strong>Déclaration Sociale Nominative</strong> (DSN). Son format sera imposé et <strong><span style="color: #ff6600;">son application obligatoire dès le 1er Janvier 2016.</span></strong></p>
<p style="text-align: justify;">Ainsi, la <strong>DSN</strong> sera transmise via <strong>un canal unique</strong> et remplacera 4 déclarations :</p>

<ol>
	<li>l’attestation de salaire pour le versement des indemnités journalières (DSIJ),</li>
	<li>l’attestation employeur destinée à pôle emploi (AE),</li>
	<li>la déclaration et l’enquête de mouvements de main d’œuvre (DMMO)</li>
	<li>les enquêtes mensuelles de mouvements de main d’œuvre (EMMO),</li>
	<li>la radiation des contrats de groupe pour les contrats en assurance complémentaire.</li>
</ol>
<p style="text-align: justify;"><span style="color: #ff6600;"><strong>En 2016, la DSN deviendra obligatoire pour toutes les entreprises concernées et tous les organismes de protection sociale.</strong></span></p>

<h2 style="text-align: justify;">Quelles sont les entreprises concernées par la DSN ?</h2>
<p style="text-align: justify;">Les entreprises concernées sont :</p>

<ul>
	<li>les entreprises soumises au régime général en métropole et dans les DOM,</li>
	<li>les entreprises relevant du cas général en matière d’assurance chômage,</li>
	<li>les entreprises pratiquant la subrogation en matière d’assurance maladie,</li>
	<li>les entreprises dotées d’un logiciel dont l’éditeur est engagé dans la DSN.</li>
</ul>
<p style="text-align: justify;">Par ailleurs, certaines entreprises devront passer obligatoirement par la DSN dès 2015. En effet, un article du projet de loi de financement de la sécurité sociale prévoit de rendre la DSN obligatoire de manière graduelle.</p>

<h2 style="text-align: justify;">Comment fonctionne la DSN ?</h2>
<p style="text-align: justify;">La DSN s’appuie sur la transmission mensuelle des données individuelles des salariés, automatisée par <a href="http://www.aquastar-consulting.com/index.php/solutions/gestion-metier/paye-rh/paie-rh" target="_blank">le logiciel de paie</a> de l’entreprise.</p>
<p style="text-align: justify;">Ce dernier se charge de répartir les données requises aux organismes concernés n’obligeant plus les entreprises à faire leurs déclarations manuellement chaque mois. Les entreprises soumises au régime général de la sécurité sociale ou leur mandataire (par exemple l’expert-comptable de la société) n’ont besoin que de transmettre les données nécessaires mensuellement via un canal unique, le site Internet <a href="http://www.net-entreprise.fr/" target="_blank">www.net-entreprise.fr.</a></p>
<p style="text-align: justify;">Quant aux entreprises agricoles, elles déposeront, dès 2014, leurs déclarations sur le site Internet <a href="http://www.msa.fr/" target="_blank">www.msa.fr.</a></p>

<h2 style="text-align: justify;">Comment préparer la mise en place de la DSN ?</h2>
<p style="text-align: justify;">Dès aujourd’hui, les entreprises et les experts comptables ont la possibilité de s’inscrire sur le site Internet <a href="http://www.net-entreprise.fr/" target="_blank">www.net-entreprise.fr</a> pour pouvoir faire des DSN et ne plus avoir à remplir les nombreuses déclarations sociales demandées.</p>
<p style="text-align: justify;">De nombreuses entreprises s’interrogent aujourd’hui sur les capacités de leur logiciel de paie à gérer l’application de la DSN. D’ailleurs, une trentaine d’entreprises s'est portée volontaire pour participer avec leur éditeur de logiciel de paie, à créer une solution complète respectant les futures normes légales dans le but d’offrir un produit opérationnel.</p>
<p style="text-align: justify;">En ce jour, plus de 12 éditeurs de logiciels paie ont d’ores et déjà signé la charte de partenariat avec les organismes de protections sociales réunis au sein du <a href="http://www.gip-mds.fr/" target="_blank">GIP-MDS</a>.</p>
<p style="text-align: justify;">Comment Aquastar Consulting peut vous aider ?</p>

<ul>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/gestion-metier/paye-rh/paie-rh" target="_blank">Solution de Paie / RH – Sage. </a></li>
</ul>
<p style="text-align: justify;">Aquastar Consulting reste à votre disposition pour toutes questions concernant la DSN et l’intégration de solutions de Paie.</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2371</wp:post_id>
		<wp:post_date>2014-04-30 08:00:00</wp:post_date>
		<wp:post_date_gmt>2014-04-30 07:00:00</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>dsn-obligatoire-partir-2016</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="decisionnel"><![CDATA[Décisionnel]]></category>
		<category domain="category" nicename="paie-rh"><![CDATA[Paie - RH]]></category>
		<category domain="category" nicename="solutions-de-gestion"><![CDATA[Solutions de gestion]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[DSN]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[82]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[2372]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426415206]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:17:"59.33914680617177";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:17:"50.15129981338484";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"48.21060366098552";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:17:"47.67997701962814";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:16:"34.7557055557164";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:18:"33.951659299946336";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"33.81696644084449";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"32.642674881349215";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:12:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:17:"82.55802503320555";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:17:"73.87055638288255";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"68.86376873071272";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2465";s:5:"score";s:18:"59.573320924089785";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:16:"51.9820232739768";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2319";s:5:"score";s:16:"46.2734649450837";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:18:"45.585449980891724";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"45.585449980891724";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"43.56944918517172";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:17:"37.94672029500559";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"36.18213197062581";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:18:"29.308493169037174";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:17:"83.27141047555564";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:16:"74.4820296170158";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:16:"69.5771541697431";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2465";s:5:"score";s:18:"60.031925851475016";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"52.44062819939432";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2319";s:5:"score";s:17:"46.65563571768849";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:17:"46.09501100874645";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:17:"46.09501100874645";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:16:"43.9261419065957";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:17:"38.22697886038395";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:comment>
			<wp:comment_id>1159</wp:comment_id>
			<wp:comment_author><![CDATA[[BLOCKED BY STBV] La DSN, obligatoire pour tous &agrave; partir d...]]></wp:comment_author>
			<wp:comment_author_email></wp:comment_author_email>
			<wp:comment_author_url>http://www.scoop.it/t/dsn/p/4020799858/2014/05/06/la-dsn-obligatoire-pour-tous-a-partir-de-2016-l-actualite-pour-decideurs-informatiques</wp:comment_author_url>
			<wp:comment_author_IP>89.30.118.151</wp:comment_author_IP>
			<wp:comment_date>2014-05-06 08:15:06</wp:comment_date>
			<wp:comment_date_gmt>2014-05-06 07:15:06</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[[&#8230;] Les D&eacute;clarations Sociales sont une t&acirc;che administrative lourde mais obligatoire pour toute entreprise qui emploie des salari&eacute;s.&nbsp; [&#8230;]]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type>pingback</wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
	</item>
	<item>
		<title>Une faille de sécurité dans Internet Explorer : Clandestine Fox</title>
		<link>http://www.it-news.fr/faille-securite-internet-explorer-appelee-clandestine-fox/</link>
		<pubDate>Mon, 28 Apr 2014 08:14:07 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2376</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/?p=2376"><img class="alignleft wp-image-2377 size-full" src="http://www.it-news.fr/wp-content/uploads/2014/04/Clandestine-Fox.jpg" alt="IE faille de sécurité Clandestine Fox" width="341" height="228" /></a>Microsoft a découvert, en ce jour, une faille de sécurité exploitée dans toutes les versions (6 à 11) de son navigateur web : Internet Explorer.</p>
<p style="text-align: justify;">A noter que toutes les versions de Windows Server 2003 et 2008 sont aussi concernées.</p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;">Microsoft vient de dévoiler quelques éléments complémentaires par rapport à cette faille ; c’est à cause d’erreurs dans la gestion de certains objets en mémoire que cette brèche a été activée et est maintenant largement exploitée par les hackers.Le nom de ces attaques ciblées est « <em><strong>Clandestine Fox</strong></em> ».</p>
<p style="text-align: justify;">La brèche est activée dès lors que l’utilisateur ouvre une page web infectée ou un e-mail malveillant. Une fois activée, la machine se retrouve contrôlée à distance avec les droits d’utilisateur accordés à la session en cours (administrateur ou utilisateur).</p>
<p style="text-align: justify;">Dès l’annonce de la découverte de cette faille, Microsoft a travaillé sur un correctif dans l’urgence. A défaut de pouvoir en délivrer un officiel, l’éditeur offre des recommandations à suivre qui sous-entendent que la faille proviendrait du fichier
« vgx.dll ».</p>
<p style="text-align: justify;">Les conseils de l’éditeur sont de :</p>

<ol>
	<li><strong>Désactiver ou, désinstaller Flash Player</strong>, qui n’est pas contaminé mais indispensable aux pirates pour atteindre leurs cibles.
<span style="color: #ffffff;">-</span></li>
	<li><strong>Faire attention aux pages Internet, e-mails et liens douteux</strong>. D’ailleurs, une solution préventive existe pour éviter les mails douteux, il faut configurer sa messagerie pour n’afficher les messages qu’au format texte, et non HTML
(voir <a href="http://www.aquastar-consulting.com/index.php/solutions/securite/securite-des-postes-de-travail/vaderetro" target="_blank">Solution de sécurité des messageries - Vade Retro</a>).</li>
	<li><strong>Choisir un autre navigateur qu'Internet Explorer, </strong>il y a peu de risques qu'un autre navigateur soit également touché par la faille, il est donc conseillé d'installer en parallèle d'Internet Explorer un autre navigateur Internet tel que Firefox ou Chrome.</li>
	<li><strong>Télécharger les outils <a href="http://www.microsoft.com/en-us/download/details.aspx?id=41138" target="_blank">EMET 4.1</a></strong><a href="http://www.microsoft.com/en-us/download/details.aspx?id=41138" target="_blank"> (Enhance Mitigation Toolkit)</a> sur la plateforme

[caption id="attachment_2398" align="alignright" width="293"]<a href="http://www.it-news.fr/wp-content/uploads/2014/04/emet-faille-zero-day-ie.jpg"><img class="wp-image-2398 size-medium" src="http://www.it-news.fr/wp-content/uploads/2014/04/emet-faille-zero-day-ie-293x300.jpg" alt="emet-faille-zero-day-ie" width="293" height="300" /></a> EMET 4.1 (Enhance Mitigation Toolkit)[/caption]

Microsoft Update. Cet outil rend les vulnérabilités sous Windows plus difficiles à exploiter.
<span style="color: #ffffff;">-</span></li>
	<li>Modifier les paramètres dans Internet Explorer e<strong>n augmentant le niveau d’exigence pour les sites de confiances</strong>, en passant <strong>en mode sécurisé</strong> et en <strong>désactivant l’exécution des scripts Active X</strong> (ce qui peut causer des problèmes par rapport aux sites Internet des banques en ligne).
<span style="color: #ffffff;">-</span></li>
	<li>Avoir un <a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls">antivirus performant</a> et le remettre à jour pour obtenir la signature du virus et permettre de lutter contre cette faille appelée CVE-2014-1776.</li>
</ol>
<p style="text-align: justify;"><span style="color: #ff6600;"><strong> Comment Aquastar Consulting peut vous aider ?</strong></span></p>

<ul>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls" target="_blank">Solution de sécurité internet – Palo Alto Networks et Netasq</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/securite-des-postes-de-travail/vaderetro" target="_blank">Solution Antispam VadeRetro</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2376</wp:post_id>
		<wp:post_date>2014-04-28 09:14:07</wp:post_date>
		<wp:post_date_gmt>2014-04-28 08:14:07</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>faille-securite-internet-explorer-appelee-clandestine-fox</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="clandestine-fox"><![CDATA[Clandestine Fox]]></category>
		<category domain="post_tag" nicename="faille-de-securite"><![CDATA[Faille de sécurité]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[2377]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[internet explorer, clandestine fox]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[66]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Microsoft a découvert, en ce jour, une faille de sécurité, Clandestine Fox, dans toutes les versions (6 à 11) de son navigateur Internet Explorer.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438598]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1786";s:5:"score";s:17:"28.41774670653638";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"26.239751352291098";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1434";s:5:"score";s:18:"22.492952224467498";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:18:"22.204301332970186";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"21.386315033465955";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1876";s:5:"score";s:17:"21.20212130762038";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:18:"21.014849893895025";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1924";s:5:"score";s:18:"20.743134143388207";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:17:"38.96817252691617";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"32.19533687591522";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2142";s:5:"score";s:17:"32.19533687591522";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"31.284655741053935";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:17:"28.09523829239887";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:17:"24.09925731109235";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2436";s:5:"score";s:18:"24.027686892361864";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1786";s:5:"score";s:18:"20.693209751152352";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:18:"17.835053511715373";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1434";s:5:"score";s:17:"17.51114119053319";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:comment>
			<wp:comment_id>1158</wp:comment_id>
			<wp:comment_author><![CDATA[[BLOCKED BY STBV] Une faille de s&eacute;curit&eacute; dans Inter...]]></wp:comment_author>
			<wp:comment_author_email></wp:comment_author_email>
			<wp:comment_author_url>http://www.scoop.it/t/fidim/p/4020397731/2014/04/28/une-faille-de-securite-dans-internet-explorer-clandestine-fox-l-actualite-pour-decideurs-informatiques</wp:comment_author_url>
			<wp:comment_author_IP>89.30.118.151</wp:comment_author_IP>
			<wp:comment_date>2014-04-28 15:56:22</wp:comment_date>
			<wp:comment_date_gmt>2014-04-28 14:56:22</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[[&#8230;] Microsoft a d&eacute;couvert, en ce jour, une faille de s&eacute;curit&eacute;, Clandestine Fox, dans toutes les versions (6 &agrave; 11) de son navigateur Internet Explorer.&nbsp; [&#8230;]]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type>pingback</wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
	</item>
	<item>
		<title>Le VPN, une solution pour la sécurité des données</title>
		<link>http://www.it-news.fr/vpn-solution-securite-donnees/</link>
		<pubDate>Wed, 07 May 2014 07:00:39 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2400</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/?p=2400"><img class="alignleft wp-image-2401 size-medium" src="http://www.it-news.fr/wp-content/uploads/2014/05/vpn-solution-securite-donnees-300x200.jpg" alt="Le VPN, une solution pour la sécurité des données" width="300" height="200" /></a>Le principal problème des entreprises est de trouver la solution miracle pour sécuriser les données contre des attaques de plus en plus sophistiquées et rapides. Une des solutions pourrait être le Virtual Private Network, aussi connu sous l’abréviation VPN.</p>
<p style="text-align: right;"><!--more Lire la suite--></p>

<h2 style="text-align: justify;">Qu’est-ce que le VPN ?</h2>
<p style="text-align: justify;">Le <a href="http://fr.wikipedia.org/wiki/R%C3%A9seau_priv%C3%A9_virtuel" target="_blank">Virtual Private Network</a> ou, en français, le réseau privé virtuel permet de créer des espaces d’échanges dans un milieu sécurisé et privé.</p>
<p style="text-align: justify;">Il est perçu comme une extension des réseaux locaux. Toutefois, le VPN conserve la sécurité que l’on peut avoir à l’intérieur d’un réseau local.</p>
<p style="text-align: justify;">Il existe deux types d’infrastructures qui possèdent ce genre de réseaux partagés :</p>

<ol style="text-align: justify;">
	<li><strong>Les infrastructures publiques,</strong> par exemple Internet</li>
	<li><strong>Les infrastructures dédiées</strong> qui sont proposées par les opérateurs aux entreprises</li>
</ol>
<h2 style="text-align: justify;">Le VPN et l’entreprise</h2>
<p style="text-align: justify;">C’est grâce au VPN que nous pouvons facilement relier de manière sécurisée plusieurs sites physiques distants. D’ailleurs, c’est grâce à cette sécurité éprouvée que les collaborateurs peuvent échanger des informations, même confidentielles.</p>
<p style="text-align: justify;">Il est rare aujourd’hui de rencontrer une entreprise qui n’utilise pas le VPN pour sécuriser ses échanges. Sachant que nous sommes dans une ère régie par les nouvelles technologies et Internet, c’est par leur habilité à intégrer et à accéder à ces technologies que  les entreprises sont « jugées » par les consommateurs et par leurs employés.</p>
<p style="text-align: justify;">De plus, c’est grâce à l’existence de VPN gratuits que les nouvelles technologies ont émergé.</p>
<p style="text-align: justify;">Le <a href="http://fr.wikipedia.org/wiki/SSL_VPN" target="_blank">VPN SSL</a> permet une sécurité renforcée des échanges entre différents sites. Les solutions SSL sont une nouvelle méthode de VPN reliant le site de travail à l’employé. Le SSL est un protocole qui permet de sécuriser les échanges, notamment des transactions effectuées sur Internet. C’est une méthode intéressante à exploiter pour les PME car elle permet d’utiliser plus souvent le VPN sans augmenter le budget alloué au service IT. Par ailleurs, les administrateurs peuvent contrôler les autorisations d’accès des différents niveaux d’utilisateurs, notamment par rapport à la base de données accessible via Internet.</p>
<p style="text-align: justify;">Les réseaux VPN offrent donc une extension des réseaux locaux en facilitant les échanges entre les différentes agences ou collaborateurs mobiles, tout en utilisant l’Internet public.</p>
<p style="text-align: justify;"><span style="color: #ff6600;"><strong>Comment Aquastar Consulting peut vous aider ? </strong></span></p>

<ul>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/reseau-mobilite/interconnexion-radio/remote-access-point" target="_blank">Solution d’interconnexion – Remote Access Point d’Aruba Networks</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2400</wp:post_id>
		<wp:post_date>2014-05-07 08:00:39</wp:post_date>
		<wp:post_date_gmt>2014-05-07 07:00:39</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>vpn-solution-securite-donnees</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="reseaux-et-mobilite"><![CDATA[Réseaux et mobilité]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[2401]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[VPN]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[86]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426436958]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:17:"26.27672175245926";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1789";s:5:"score";s:18:"25.840800869979347";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:18:"24.152630829939014";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"19.62115947876371";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:16:"18.6438732042258";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"18.236299546727437";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:17:"17.02134649499763";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:18:"16.595855149643068";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"37.96234169909513";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:18:"36.635845966368045";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"28.84281782312394";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:17:"28.66283283327985";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"26.584231885841234";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"26.584231885841234";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"24.24894862241411";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:18:"22.900491718156523";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"21.271700075467113";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1789";s:5:"score";s:17:"19.26723096198129";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Dématérialisation des documents… Avantages et Inconvénients</title>
		<link>http://www.it-news.fr/dematerialisation-documents-avantages-inconvenients/</link>
		<pubDate>Fri, 09 May 2014 07:00:32 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2406</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/dematerialisation-documents-avantages-inconvenients/#more-2406"><img class="alignleft wp-image-2407 size-medium" src="http://www.it-news.fr/wp-content/uploads/2014/05/dematerialisation-gestion-documents-avantages-et-inconvenients-300x200.jpg" alt="Dématérialisation des documents… Avantages et Inconvénients" width="300" height="200" /></a>La dématérialisation consiste à numériser un document papier et à le transformer en un document numérique. En entreprise, la dématérialisation est présente, qu’elle soit effectuée de manière volontaire ou involontaire.</p>
<p style="text-align: right;"><!--more Lire la suite--></p>

<h2 style="text-align: justify;">Qu’est-ce que la dématérialisation ?</h2>
<p style="text-align: justify;">La dématérialisation est composée d’un processus qui permet le passage d’un document sous format papier au format numérique, prêt à être modifier électroniquement.</p>
<p style="text-align: justify;">Elle permet de gérer électroniquement les documents numérisés reçus lors d’échanges entre clients ou fournisseurs.</p>
<p style="text-align: justify;">Après la numérisation des documents, il faut mettre en place une solution de gestion des documents dématérialisés. Cette solution, qui s’appelle GED ou <a href="http://fr.wikipedia.org/wiki/Gestion_%C3%A9lectronique_des_documents" target="_blank">Gestion Electronique de Documents</a>, permet de stocker ces documents numérisés et de modifier les informations présentes sur ceux-ci.</p>

<h2 style="text-align: justify;">Les avantages de la dématérialisation</h2>
<p style="text-align: justify;">La dématérialisation présente des avantages évidents et certains, notamment en termes logistiques. En effet, alors qu’un local d’archives peut stocker environ 20 à 25 000 pages de documents papiers par mètre carré, cette même quantité peut être contenue dans deux ou trois CD. Ce gain de place est un véritable avantage pour les TPE et les PME qui, souvent, ne disposent pas de grands locaux.</p>
<p style="text-align: justify;"><strong>La dématérialisation améliore également la traçabilité et la circulation des documents pour les collaborateurs mobiles ou en télétravail.</strong></p>
<p style="text-align: justify;">De plus, <a href="http://www.aquastar-consulting.com/index.php/solutions/gestion-metier">la solution de GED</a> permet de prévenir des accidents, notamment la suppression accidentelle d’un document. Elle accroît aussi la sécurité informatique des documents dématérialisés, d’autant qu’ils ne font pas face aux mêmes dangers que les documents papiers (vols, destruction accidentelle ou criminelle…).</p>
<p style="text-align: justify;">Par ailleurs, les documents dématérialisés permettent aux entreprises d’effectuer des économies, notamment par rapport à la gestion des documents papiers (représentant environ 5 à 15% du chiffre d’affaire) et à l’impression des documents (représentant environ 3% du chiffre d’affaire).</p>
<p style="text-align: justify;">Enfin, la dématérialisation permet d’augmenter la productivité des employés. Il est estimé qu’un employé passe 15% de son temps à lire des informations et 50% à les rechercher parmi les autres documents.</p>

<h2 style="text-align: justify;">Les inconvénients de la dématérialisation</h2>
<p style="text-align: justify;">La dématérialisation n’est pas une solution pour toutes les entreprises. Souvent, la méthode dite « classique » est la plus performante en matière de sécurité, notamment par rapport aux données personnelles, bancaires des employés, clients, fournisseurs…</p>
<p style="text-align: justify;">C’est pour cela qu’après avoir dématérialisé un document, il est nécessaire de veiller à sa sécurité, d’où le <a href="http://fr.wikipedia.org/wiki/Syst%C3%A8me_d'archivage_%C3%A9lectronique" target="_blank">Système d’Archivage Electronique</a> (SAE). Ce système de gestion de contenu, contrairement à la GED, interdit toute modification et toute destruction des documents numérisés. Malgré tout, les documents sont quand même vulnérables à la falsification lors de la numérisation.</p>
<p style="text-align: justify;">De plus, la perte des documents numérisés est tout aussi importante que celle des documents papiers. Il est estimé que les entreprises françaises perdent plus de 1.9 millions d’euros par an, notamment dû aux attaques malveillantes et criminelles et à la négligence des salariés.</p>
<p style="text-align: justify;">Par ailleurs, il est à noter que le stockage est un problème pour les entreprises qui ont choisi la dématérialisation. En effet, puisque la quantité d’information augmente, il faut que les supports de stockage augmentent en même temps. Pour une entreprise, il n’est pas question de mentionner les clés USB, une organisation a besoin de matériels performants avec des capacités de mémoire tout aussi performantes et adéquates.</p>
<p style="text-align: justify;">C’est pour cela que la plupart des entreprises utilisent des serveurs composés de disques durs. La problématique de ce genre de matériels est la consommation électrique très importante.</p>
<p style="text-align: justify;">Quoi qu’il en soit, que ce soit pour la GED ou pour le SAE, les utilisateurs qui se retrouveront à l’utiliser se doivent d’être formés et accompagnés.</p>
<p style="text-align: justify;"><span style="color: #ff6600;"><strong>Comment Aquastar Consulting peut vous aider ? </strong></span></p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/gestion-metier">Solution de GED - Sage</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/systemes/virtualisation-serveurs" target="_blank">Solution de virtualisation – VMWare et Window Server</a></li>
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/systemes/sauvegarde" target="_blank">Solution de sauvegarde informatique : CA Technologies ARCserver</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2406</wp:post_id>
		<wp:post_date>2014-05-09 08:00:32</wp:post_date>
		<wp:post_date_gmt>2014-05-09 07:00:32</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>dematerialisation-documents-avantages-inconvenients</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="dematerialisation"><![CDATA[dématérialisation]]></category>
		<category domain="post_tag" nicename="edi"><![CDATA[edi]]></category>
		<category domain="category" nicename="edi-ged"><![CDATA[EDI - GED]]></category>
		<category domain="post_tag" nicename="ged"><![CDATA[GED]]></category>
		<category domain="category" nicename="mobilite"><![CDATA[Mobilité]]></category>
		<category domain="post_tag" nicename="pme"><![CDATA[PME]]></category>
		<category domain="post_tag" nicename="sae"><![CDATA[SAE]]></category>
		<category domain="category" nicename="solutions-de-gestion"><![CDATA[Solutions de gestion]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[2407]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[dématérialisation]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[82]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[La dématérialisation consiste à numériser un document papier et à le transformer en un document numérique. En entreprise, la dématérialisation est présente, qu’elle soit effectuée de manière volontaire ou involontaire.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"102.2964313800283";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"336";s:5:"score";s:16:"92.0947927494433";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1728";s:5:"score";s:17:"84.44216617922946";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1681";s:5:"score";s:17:"70.79954999324717";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1588";s:5:"score";s:16:"67.0731131260373";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"61.77857397449135";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"126";s:5:"score";s:17:"47.15816514868149";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:17:"43.89341418744149";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426438392]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:12:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"164.1929161897927";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"93.97592540365534";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"336";s:5:"score";s:17:"88.11631550066176";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2475";s:5:"score";s:17:"83.70437960261326";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1728";s:5:"score";s:17:"82.38724783663186";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:16:"76.0516975821996";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1681";s:5:"score";s:16:"70.2847903601496";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1588";s:5:"score";s:17:"66.72707823139129";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:17:"60.89257661482018";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:16:"53.0766231583204";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:18:"52.256793804524435";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"49.16188006457666";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:16:"166.346880362015";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"95.09247441058571";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"336";s:5:"score";s:17:"88.21793145613039";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2475";s:5:"score";s:17:"84.69564594172581";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1728";s:5:"score";s:17:"82.38336458424217";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:16:"74.0990577857713";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1681";s:5:"score";s:17:"70.84892383349838";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1588";s:5:"score";s:17:"67.23992684379121";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:17:"61.81570411748853";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:16:"54.1931721636644";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Solutions de gestion en  mode SaaS : Enjeux et défis</title>
		<link>http://www.it-news.fr/solutions-gestion-en-mode-saas-enjeux-defis/</link>
		<pubDate>Mon, 12 May 2014 07:00:13 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2411</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/?p=2411"><img class="alignleft wp-image-2412 size-medium" src="http://www.it-news.fr/wp-content/uploads/2014/05/solution-gestion-cloud-300x200.jpg" alt="Solutions de gestion en  mode SaaS : Enjeux et défis" width="300" height="200" /></a>De plus en plus de PME et de Grands Comptes se lancent aujourd’hui dans l’utilisation en ligne de solutions de gestion. Les offres adaptées à ses nouveaux besoins foisonnent, découvrez les avantages de cette nouvelle tendance informatique.</p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;">Après avoir convaincu de nombreuses directions et DSI à profiter des avantages du Cloud, la tendance est à l’utilisation de ce service pour les solutions métiers dits <a href="http://fr.wikipedia.org/wiki/Progiciel_de_gestion_int%C3%A9gr%C3%A9" target="_blank">ERP (Enterprise Resource Planning)</a>.</p>
<p style="text-align: justify;">Les ERP sont des logiciels indispensables à la bonne gestion d’une entreprise et ce quelque soit sa taille. De par ses nombreux avantages, les dirigeants ont décidé de se tourner vers l’utilisation d’un progiciel de gestion en mode SaaS.</p>
<p style="text-align: justify;">Grâce à ce nouveau mode d’acquisition et d’utilisation, les DSI sont, quant à eux, soulagés du lourd poids financier que représente l’achat, l’intégration et la maintenance d’un logiciel de gestion s’ôtant dans la foulée la négociation interne avec leurs direction des achats ou des finances.</p>
<p style="text-align: justify;">Bertrand Boulet, directeur général d’UNIT4, éditeur d’ERP, explique « <em>Compte tenu de l’explosion des volumes de données à laquelle on assiste, les entreprises devraient faire évoluer leurs systèmes en moyenne tous les trois ans, ce qu’aucune d’entre elles ne peut s’offrir aujourd’hui. Le SaaS, (Software as a Service, logiciel en tant que service, ndlr) permet de bénéficier d’un datacenter en permanence au plus haut niveau</em> <em>de fiabilité, de performance et de sécurité</em> ».</p>
<p style="text-align: justify;">En effet, lors de l’utilisation d’applications en SaaS, ces dernières sont installées sur des serveurs distants et non sur le poste de l’utilisateur.</p>

<h2 style="text-align: justify;"> La souplesse des logiciels de gestion en mode SaaS</h2>
<p style="text-align: justify;">Le principal et le plus important avantage d’utiliser un outil de gestion en mode SaaS est, sans aucun doute, la souplesse offerte pour les entreprises en mutation ou en croissance (interne ou externe).</p>
<p style="text-align: justify;">Bertrand Boulet rajoute « <em>grâce au cloud, on peut rattacher rapidement et facilement une nouvelle filiale au système limitant ainsi les cohabitations complexes entre différents systèmes de gestion parallèles</em> ».</p>

<h2 style="text-align: justify;">La sécurité des logiciels de gestion dans le SaaS</h2>
<p style="text-align: justify;">La problématique concernant la sécurité des outils de gestion présents dans le cloud ne constitue plus un véritable obstacle.</p>
<p style="text-align: justify;">Laurent Dechaux, le nouveau directeur général d’<a href="http://www.oracle.com/index.html" target="_blank">Oracle</a> en France, a déclaré « <em>Les sociétés ont compris que les solutions de sécurité proposées par les professionnels étaient beaucoup plus efficaces que les mesures qu’elles peuvent mettre en œuvre en interne ». </em></p>
<p style="text-align: justify;">Par ailleurs, certaines offres proposées en mode SaaS sont de plus en plus packagées avec des solutions de gestion.</p>
<p style="text-align: justify;">Isabelle Saint-Martin, Chef de marché ERP PME chez <a href="http://www.aquastar-consulting.com/index.php/societe/partenaires/gestion-metier/sage" target="_blank">Sage</a> a déclaré « <em>Les entreprises tentent actuellement de conduire leurs ERP le plus loin possible. <strong>Le recours à des applications complémentaires, par le biais des technologies orientées services ou de services dans le cloud permet de faire évoluer l’ERP</strong>, de l’améliorer et d’élargir le périmètre fonctionnel sans pour autant tout changer ». </em></p>
<p style="text-align: justify;">D’autres solutions hybrides sont également proposées comme par exemple l’utilisation d’un ERP installé physiquement sur le poste de l’utilisateur et complété par des applications hébergées en mode SaaS. Ce sont ces solutions qui sont privilégiées notamment dans les secteurs RH ou CRM.</p>

<h2 style="text-align: justify;">Les solutions 100% SaaS attirent de plus en plus</h2>
<p style="text-align: justify;">Une étude a été réalisée en avril 2013 par le CXP et Sage auprès de250 entreprise pour mieux comprendre cette tendance.</p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2014/05/solution-de-gestion-en-mode-saas-resultats-sondage.jpg"><img class="aligncenter wp-image-2419 size-full" src="http://www.it-news.fr/wp-content/uploads/2014/05/solution-de-gestion-en-mode-saas-resultats-sondage.jpg" alt="solution-de-gestion-en-mode-saas-resultats-sondage" width="691" height="479" /></a></p>
<p style="text-align: justify;">D’après l’étude, les entreprises françaises sont clairement en retard par rapport aux entreprises outre-Atlantique. En effet, 3 offres sur 4 y sont proposées en SaaS alors qu’en France on dépasse à peine 1 offre sur 10.</p>
<p style="text-align: justify;">Malgré une offre adaptée aux PME, Bertrand Boulet justifie que c’est à cause de la culture française : « <em>C’est une question de culture. Les entreprises françaises restent très jacobines : elles veulent posséder leurs outils et centraliser leurs données </em> ».</p>
<p style="text-align: justify;"><span style="color: #ff6600;"><strong>Comment Aquastar Consulting peut vous aider ? </strong></span></p>

<ul>
	<li style="text-align: justify;"><a href="http://www.sirrus.fr/" target="_blank">Plateforme d’hébergement de solutions de gestion - Sirrus</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2411</wp:post_id>
		<wp:post_date>2014-05-12 08:00:13</wp:post_date>
		<wp:post_date_gmt>2014-05-12 07:00:13</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>solutions-gestion-en-mode-saas-enjeux-defis</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="non-classe"><![CDATA[Non classé]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[2412]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[SaaS]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Les ERP sont des logiciels indispensables à la bonne gestion d’une entreprise et ce quelque soit sa taille. De par ses nombreux avantages, les dirigeants ont décidé de se tourner vers l’utilisation d’un progiciel de gestion en mode SaaS.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[82]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426437855]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:16:"37.8896291190783";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1933";s:5:"score";s:17:"35.46957328329312";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1794";s:5:"score";s:18:"31.138554593377172";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:17:"29.33842449177989";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:16:"21.6734087329106";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1924";s:5:"score";s:17:"21.18299944560249";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1465";s:5:"score";s:18:"20.742941434845367";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:17:"19.56113901238072";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:12:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"55.18729999989348";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:18:"42.540611765699396";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2424";s:5:"score";s:17:"40.64958865867861";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1933";s:5:"score";s:17:"29.53876782706756";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:18:"29.326264368659935";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1794";s:5:"score";s:18:"26.025609372131548";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:17:"25.37411632383229";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2444";s:5:"score";s:17:"24.87881208072928";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:18:"21.253069120024985";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"20.220152304902644";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:4:"2491";s:5:"score";s:17:"20.07330538232073";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:18:"19.879253198304003";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"55.33686192375251";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:17:"42.84634838361899";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2424";s:5:"score";s:15:"40.761760101087";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1933";s:5:"score";s:18:"29.717114187330353";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:18:"29.575860400828052";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1794";s:5:"score";s:17:"26.17588543971107";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:18:"25.623712356775478";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2444";s:5:"score";s:17:"25.03168038995133";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:18:"21.198806631695042";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"20.211661437545686";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:comment>
			<wp:comment_id>1160</wp:comment_id>
			<wp:comment_author><![CDATA[[BLOCKED BY STBV] Evolution de l’ERP traditionnel vers un ERP social | L&#039;actualité pour décideurs informatiquesL&#039;actualité pour décideurs informatiques]]></wp:comment_author>
			<wp:comment_author_email></wp:comment_author_email>
			<wp:comment_author_url>http://www.it-news.fr/evolution-lerp-traditionnel-vers-erp-social/</wp:comment_author_url>
			<wp:comment_author_IP>37.187.41.26</wp:comment_author_IP>
			<wp:comment_date>2014-05-14 11:04:02</wp:comment_date>
			<wp:comment_date_gmt>2014-05-14 10:04:02</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[[&#8230;] function bb2_addLoadEvent(func){var oldonload=window.onload;if(typeof window.onload!=&#039;function&#039;){window.onload=func;}else{window.onload=function(){oldonload();func();}}} bb2_addLoadEvent(function(){for(i=0;i       &larr; Solutions de gestion en  mode SaaS : Enjeux et défis [&#8230;]]]></wp:comment_content>
			<wp:comment_approved>1</wp:comment_approved>
			<wp:comment_type>pingback</wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
		</wp:comment>
	</item>
	<item>
		<title>Evolution de l’ERP traditionnel vers un ERP social</title>
		<link>http://www.it-news.fr/evolution-lerp-traditionnel-vers-erp-social/</link>
		<pubDate>Wed, 14 May 2014 10:03:57 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2424</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/?p=2424"><img class="alignleft wp-image-2425 size-full" src="http://www.it-news.fr/wp-content/uploads/2014/05/erp-social-reseaux-sociaux.jpg" alt="erp-social-reseaux-sociaux" width="300" height="200" /></a>Les réseaux sociaux sont aujourd’hui utilisés par une grande majorité de professionnels, il est donc primordial que les solutions de gestion utilisées par les entreprises interagissent avec ces derniers. L’entreprise tout entière se retrouve au beau milieu d’un nouveau phénomène de partages collaboratif et dynamique.</p>
<p style="text-align: right;"><!--more Lire la Suite--></p>
<p style="text-align: justify;">Les solutions informatiques doivent s’adapter aux nouvelles pratiques menées par les salariés tout en répondant aux exigences de rapidité, de mobilité, de partage, de sécurité et de confidentialité requises par l’entreprise et les employés.</p>
<p style="text-align: justify;">Les logiciels de gestion doivent, eux aussi,  innover pour permettre aux utilisateurs de s’adapter à ces nouvelles tendances numériques.</p>
<p style="text-align: justify;">Par ailleurs, <a href="http://www.cxp.fr/" target="_blank">le CXP</a> a récemment publié une étude démontrant que les utilisateurs des solutions de gestion  sont insatisfaits de leur logiciel notamment dû au manque de mobilité proposé. Malgré tout, ces entreprises restent « fidèles » à leur éditeur dû à la lourdeur qu’impliquerait une évolution de leurs logiciels ou de leur Système d’Information.</p>
<p style="text-align: justify;">Pour inverser cette tendance, les éditeurs de solutions de gestion ont dû innover pour proposer des solutions ERP modernes, plus intuitives et surtout plus mobiles.</p>

<h2 style="text-align: justify;">Vers la disparition d’un système ERP antique</h2>
<p style="text-align: justify;">Face aux nombreuses demandes d’évolution des fonctionnalités incluses dans un ERP, les DSI se doivent de répondre à leurs utilisateurs en proposant non seulement des solutions adaptées aux différents métiers mais aussi aux besoins de ces derniers.</p>
<p style="text-align: justify;">Or, dans la réalité, les dirigeants préfèrent adapter l’organisation de leur entreprise au système ERP existant. La raison principale est le coût important que représente la mise à niveau de leur ERP à leur activité. En effet, une étude d’IDC montre que les entreprises dépensent en moyenne 1.2 millions de dollars par an pour mettre à jour leur ERP et 15% des entreprises sondées ont complétement réintégré leur système ERP après un changement.</p>
<p style="text-align: justify;">La différence majeure entre un ERP « traditionnel » et un ERP « moderne » est que le premier n’est pas adapté aux besoins métiers des utilisateurs car standardisé ; alors que le second est fonctionnel et adapté à leurs secteurs tout en répondant aux besoins des entreprises (mobilité, rapidité, partage, sécurité…).</p>

<h2 style="text-align: justify;">L’arrivée d’un ERP moderne, social et 3.0</h2>
<p style="text-align: justify;">Les éditeurs de solutions ERP ont vite compris les besoins des entreprises et ont ainsi développé des systèmes mobiles, souples et « connectés ». D’ailleurs, certaines de ces solutions prennent automatiquement en compte les modifications faites sur les réseaux sociaux.</p>

<ul>
	<li>
<h3>Des solutions Cloud adaptées</h3>
</li>
</ul>
<p style="text-align: justify;">Le <a href="http://www.it-news.fr/solutions-gestion-en-mode-saas-enjeux-defis/" target="_blank">Cloud s’invitant partout</a>… il s’adapte aussi pour les solutions ERP. Les solutions sont proposées en Cloud privé, public ou hybride ! Ces architectures intégrant les données, les processus et les outils décisionnels (reporting et analytique), elles enregistrent et adaptent tout changement effectué dans l’application.</p>

<ul>
	<li>
<h3>Des solutions ERP plus mobiles</h3>
</li>
</ul>
<p style="text-align: justify;">Les solutions de gestion s’adaptent aux technologies existantes et proposent donc désormais leurs applications sur mobiles, avec une interface adaptée, et de nouveaux services  comme par exemple, la géolocalisation ou l’automatisation de la saisie des notes de frais.</p>

<ul>
	<li>
<h3>Des solutions ERP plus sociales</h3>
</li>
</ul>
<p style="text-align: justify;">Les réseaux sociaux ont facilité le partage d’informations et, cette tendance est également vraie dans les entreprises. D’ailleurs, les flux d’échanges entre collaborateurs internes et externes ayant explosé, certains éditeurs proposent désormais des solutions ERP possédant des interfaces souples et intuitives.</p>
<p style="text-align: justify;">Ces solutions permettent la création de communautés par centres d’intérêts, une collaboration sociale via des outils dédiés, un suivi des projets personnalisable, une analyse des données plus pertinente, …</p>
<p style="text-align: justify;">Ces applications permettent une participation active des collaborateurs, qui seront parfois récompensés grâce à un système calculant leur interaction.</p>
<p style="text-align: justify;">Ces nouvelles applications augmentent la productivité des employés et améliorent la performance globale des équipes d’une entreprise. Elles permettent de rapprocher les collaborateurs et humaniser l’entreprise.</p>
<p style="text-align: justify;"><span style="color: #ff6600;"><strong>Comment Aquastar Consulting peut vous aider ?</strong></span></p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/gestion-metier" target="_blank"> Solution de gestion SAGE</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2424</wp:post_id>
		<wp:post_date>2014-05-14 11:03:57</wp:post_date>
		<wp:post_date_gmt>2014-05-14 10:03:57</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>evolution-lerp-traditionnel-vers-erp-social</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="cloud"><![CDATA[cloud]]></category>
		<category domain="category" nicename="erp"><![CDATA[ERP]]></category>
		<category domain="post_tag" nicename="erp-3-0"><![CDATA[ERP 3.0]]></category>
		<category domain="post_tag" nicename="reseaux-sociaux"><![CDATA[Réseaux Sociaux]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[2425]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[ERP]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Les réseaux sociaux ont facilité le partage d’informations et, cette tendance est également vraie dans les entreprises. D’ailleurs, les flux d’échanges entre collaborateurs internes et externes ayant explosé, certains éditeurs proposent désormais des solutions ERP possédant des interfaces souples et intuitives]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[89]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1424280836]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"61.93458347284093";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"59.78168508448397";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"57.32926719083022";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"54.657949699608686";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"29.28730321456822";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1398";s:5:"score";s:18:"27.328974849804343";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1076";s:5:"score";s:18:"26.654532609144454";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"820";s:5:"score";s:18:"26.047967956114757";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2444";s:5:"score";s:17:"106.8745293017652";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"89.54954012350926";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"85.07261381865878";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"82.73733055523167";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:17:"77.71693136856265";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"45.80012621574372";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2411";s:5:"score";s:15:"40.761760101087";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:17:"35.63479459052373";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"24.30761704951141";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2371";s:5:"score";s:18:"23.963781458209567";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Le numérique réinvente le métier du DSI</title>
		<link>http://www.it-news.fr/numerique-reinvente-metier-du-dsi-2/</link>
		<pubDate>Fri, 16 May 2014 06:59:45 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2436</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/?p=2430"><img class="alignleft wp-image-2431 size-full" src="http://www.it-news.fr/wp-content/uploads/2014/05/nouveau-role-DSI.jpg" alt="nouveau-role-DSI" width="300" height="200" /></a>Les entreprises sont de plus en plus visibles sur internet de par leur site web et les réseaux sociaux. Le DSI fait donc maintenant partie des représentants de l’entreprise et doit donc entretenir son image et sa réputation au même titre que le commercial ou le responsable marketing.</p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;">Le DSI d’aujourd’hui se doit d’apporter une réelle contribution face à l’intégration du numérique dans l’entreprise. Cette contribution s’articule en trois axes:</p>

<ol style="text-align: justify;">
	<li>Les nouvelles missions du métier</li>
	<li>Les compétences associées</li>
	<li>La vision marketing de la fonction SI</li>
</ol>
<p style="text-align: justify;">Par ailleurs, le DSI a à présent une double casquette : en interne, il contribue à l’amélioration des dispositifs informatiques mis en place et, en externe, il  rend efficaces les SI des clients.</p>
<p style="text-align: justify;">Dans le rapport du <a href="http://www.cigref.fr/" target="_blank">Cigref</a>, plusieurs problématiques se sont dessinées concernant l’impact de la numérisation de l’entreprise sur le métier du DSI : la valeur ajoutée du numérique au métier même du DSI, une plus forte légitimité du métier de DSI pour l’entreprise et enfin toutes les compétences associées à ce nouveau niveau de responsabilité (managériale, technique…).</p>

<h2 style="text-align: justify;">Les nouveaux enjeux du métier de DSI</h2>
<p style="text-align: justify;">Le concept du « client-roi » a été un bouleversement total pour les marketeurs qui avaient jusqu’à présent privilégié le produit lui-même. Aujourd’hui, c’est au tour du DSI de devoir penser en priorité au client dans son métier.</p>
<p style="text-align: justify;">Toutefois, ce concept de la dominance du client en entreprise est également en train d’évoluer. En effet, ce qui prime aujourd’hui sur le client est l’expérience de celui-ci avec le produit vendu par l’entreprise.</p>
<p style="text-align: justify;">Le client ciblé est le client bénéficiaire du produit, le consommateur. Celui-ci peut prendre la forme d’un individu (B2C), d’une entreprise (B2B) ou d’une entreprise qui vend à un individu (B2B2C).</p>
<p style="text-align: justify;">Les enjeux du DSI diffèrent alors selon le client ciblé.</p>
<p style="text-align: justify;">Pour le B2B, les objectifs à atteindre sont :</p>

<ol style="text-align: justify;">
	<li><strong>Efficacité des systèmes d’informations</strong> : il s’agit d’améliorer l’expérience des internautes sur le site web de l’entreprise en offrant des services de qualité.</li>
	<li><strong>Réorientation des petits comptes vers le site web</strong> : il s’agit d’optimiser la demande du client en le renvoyant sur la page internet de l’entreprise pour qu’il obtienne un service personnalisé à un coût compétitif.</li>
	<li><strong>Développement de l’expérience client</strong> : dans le cas du B2B, il s’agit d’améliorer l’expérience de l’entreprise-cliente mais aussi celle de ses clients.</li>
</ol>
<p style="text-align: justify;">Pour le B2C, les objectifs à atteindre sont :</p>

<ol style="text-align: justify;">
	<li><strong>Optimisation des SI</strong> : puisque les clients ont accès à beaucoup plus d’information aujourd’hui, ils exigent qu’une entreprise puisse fournir un système d’information efficace et productif. Par ailleurs, avec les réseaux sociaux, le lien entre l’entreprise et le client devient plus réel, plus interactif.</li>
	<li><strong>Accessibilité et productivité</strong> : avant que les courriels se soient démocratisés, les interactions entre l’entreprise et les clients prenaient du temps. Aujourd’hui, lorsque le client contacte une entreprise (via un courriel ou les réseaux sociaux), il s’attend à une réponse rapide (voire instantanée). C’est pour cela que les systèmes informatiques d’une entreprise se doivent d’être accessibles, efficaces et interactifs lors d’un échange avec un client.</li>
</ol>
<p style="text-align: justify;">Le numérique n’appartient pas qu’à l’IT, il ne se réduit pas non plus à l’e-business, ni au marketing digital et/ou au client internaute. Le numérique est transverse à l’entreprise et concerne toutes les directions (informatique, production, supply chain, logistique, marketing et commerciale, RH, R&amp;D, direction générale…).</p>
<p style="text-align: justify;">De par l’expansion du concept du « client-roi » dans les différents métiers, notamment dû à la percée du numérique dans le monde de l’entreprise, les DSI voient leur métier complétement bouleversé.</p>
<p style="text-align: justify;">Le nouvel aspect du système informatique, qui se doit d’être collaboratif et interactif, modifie les missions et les enjeux des fonctions du DSI.</p>
<p style="text-align: justify;"><span style="color: #ff6600;"><strong>Comment</strong><strong> Aquastar Consulting peut vous aider ? </strong></span></p>
<p style="text-align: justify;">Aquastar Consulting est un intégrateur de solutions de gestion pour les PME et d’infrastructure pour les MGE. Pour plus d’information, <a href="http://www.aquastar-consulting.com/index.php/contact">contactez-nous</a>.</p>
<p style="text-align: justify;"></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2436</wp:post_id>
		<wp:post_date>2014-05-16 07:59:45</wp:post_date>
		<wp:post_date_gmt>2014-05-16 06:59:45</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>numerique-reinvente-metier-du-dsi-2</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="crm"><![CDATA[CRM]]></category>
		<category domain="category" nicename="decisionnel"><![CDATA[Décisionnel]]></category>
		<category domain="post_tag" nicename="it"><![CDATA[IT]]></category>
		<category domain="post_tag" nicename="numerique"><![CDATA[Numérique]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[2431]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[DSI]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[86]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1423891169]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:17:"79.14984167607514";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:17:"73.98834471962061";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"927";s:5:"score";s:17:"40.16484167712887";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"907";s:5:"score";s:17:"39.77600850909737";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:18:"37.053556527915404";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"33.11747378023242";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:18:"28.099459327883437";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:18:"27.955976823777885";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"120.23682078874651";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:17:"69.54989306820377";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2272";s:5:"score";s:16:"58.1054123288375";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"43.04486901802738";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:17:"35.68918656793125";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"907";s:5:"score";s:17:"34.74677705430044";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:17:"32.51569469267052";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"927";s:5:"score";s:17:"31.89812580971066";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2475";s:5:"score";s:18:"31.042350186423334";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2234";s:5:"score";s:18:"29.999748052083937";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Cloud &amp; IT Expo</title>
		<link>http://www.it-news.fr/event/cloud-it-expo-2/</link>
		<pubDate>Wed, 23 Oct 2013 07:30:46 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?post_type=tribe_events&#038;p=1219</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><strong style="font-size: 16px;"><a href="http://www.it-news.fr/wp-content/uploads/2013/10/cloud-and-it-expo.jpg"><img class="alignleft  wp-image-1225" title="Cloud &amp; IT Expo" alt="cloud-and-it-expo" src="http://www.it-news.fr/wp-content/uploads/2013/10/cloud-and-it-expo.jpg" width="150" height="98" /></a>Au programme</strong></p>
<p style="text-align: justify;"><strong> </strong>Un salon au cœur de l’actualité</p>
<p style="text-align: justify;">• 95 exposants et partenaires
• Keynotes d’Ouverture
• 12 Tables Rondes
• 15 Ateliers Experts
• Les trophées de la Convergence avec deux catégories Cloud Computing</p>
<p style="text-align: justify;"><strong>2 jours pour :    </strong></p>
<p style="text-align: justify;">- Découvrir de nouveaux produits et services
- Connaître mieux et plus de prestataires
- Résoudre un problème précis
- S’informer et se former lors des conférences et des ateliers
- Se tenir informé des évolutions du marché</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1219</wp:post_id>
		<wp:post_date>2013-10-23 08:30:46</wp:post_date>
		<wp:post_date_gmt>2013-10-23 07:30:46</wp:post_date_gmt>
		<wp:comment_status>closed</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cloud-it-expo-2</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>-1</wp:menu_order>
		<wp:post_type>tribe_events</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_EventAuditTrail</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;a:2:{i:0;s:15:"events-calendar";i:1;i:1382512931;}i:1;a:2:{i:0;s:15:"events-calendar";i:1;i:1382513176;}i:2;a:2:{i:0;s:15:"events-calendar";i:1;i:1382513236;}i:3;a:2:{i:0;s:15:"events-calendar";i:1;i:1382513287;}i:4;a:2:{i:0;s:15:"events-calendar";i:1;i:1382513297;}i:5;a:2:{i:0;s:15:"events-calendar";i:1;i:1382513418;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[50]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMapLink</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMap</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventAllDay</wp:meta_key>
			<wp:meta_value><![CDATA[yes]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventStartDate</wp:meta_key>
			<wp:meta_value><![CDATA[2013-10-16 00:00:00]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventEndDate</wp:meta_key>
			<wp:meta_value><![CDATA[2013-10-17 23:59:59]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventDuration</wp:meta_key>
			<wp:meta_value><![CDATA[172799]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventVenueID</wp:meta_key>
			<wp:meta_value><![CDATA[1218]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCurrencySymbol</wp:meta_key>
			<wp:meta_value><![CDATA[€]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCost</wp:meta_key>
			<wp:meta_value><![CDATA[ ]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventURL</wp:meta_key>
			<wp:meta_value><![CDATA[http://www.cloud-and-it-expo.fr/]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventOrganizerID</wp:meta_key>
			<wp:meta_value><![CDATA[1222]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Cloud]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_old_slug</wp:meta_key>
			<wp:meta_value><![CDATA[cloud-it-expo]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Forum International de la Cybersécurité 2014 à Lille</title>
		<link>http://www.it-news.fr/event/forum-international-cybersecurite-2014-lille/</link>
		<pubDate>Wed, 23 Oct 2013 08:29:21 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?post_type=tribe_events&#038;p=1236</guid>
		<description></description>
		<content:encoded><![CDATA[<div><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;"> </span></div>
<a style="color: #ff4b33; line-height: 20px;" href="http://www.it-news.fr/wp-content/uploads/2013/07/calendrier.jpg"><img class="size-full wp-image-691 alignleft" title="Forum International de la Cybersécurité 2014 à Lille" alt="calendrier" src="http://www.it-news.fr/wp-content/uploads/2013/07/calendrier.jpg" width="150" height="150" /></a>
<div><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;">C'est le 21 et 22 Janvier prochain, à Lille Grand Palais, qu'Aquastar Consulting se rendra pour participer au rendez-vous de référence en sécurité numérique. L'objectif premier est de vous faire découvrir les dernières nouveautés en matière de Sécurité.</span></div>
<div><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif;"> </span></div>
<div>Le Forum International de la Cybersécurité s’inscrit dans une démarche de réflexion et d’échanges visant à réunir l’ensemble des acteurs et des décideurs du monde la cybersécurité. Ces échanges entre acteurs institutionnels et experts du domaine en font le Salon européen de référence en matière de confiance numérique.</div>
<div></div>
<div>Pour en connaître davantage, veuillez visitez le<a href="http://www.forum-fic.com/" target="_blank"> site du FIC</a>.</div>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1236</wp:post_id>
		<wp:post_date>2013-10-23 09:29:21</wp:post_date>
		<wp:post_date_gmt>2013-10-23 08:29:21</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>forum-international-cybersecurite-2014-lille</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_events</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_EventAuditTrail</wp:meta_key>
			<wp:meta_value><![CDATA[a:7:{i:0;a:2:{i:0;s:15:"events-calendar";i:1;i:1382516336;}i:1;a:2:{i:0;s:15:"events-calendar";i:1;i:1382516400;}i:2;a:2:{i:0;s:15:"events-calendar";i:1;i:1382516460;}i:3;a:2:{i:0;s:15:"events-calendar";i:1;i:1382516520;}i:4;a:2:{i:0;s:15:"events-calendar";i:1;i:1382516783;}i:5;a:2:{i:0;s:15:"events-calendar";i:1;i:1382516850;}i:6;a:2:{i:0;s:15:"events-calendar";i:1;i:1382516910;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[46]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMapLink</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMap</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventAllDay</wp:meta_key>
			<wp:meta_value><![CDATA[yes]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventStartDate</wp:meta_key>
			<wp:meta_value><![CDATA[2014-01-21 00:00:00]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventEndDate</wp:meta_key>
			<wp:meta_value><![CDATA[2014-01-22 23:59:59]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventDuration</wp:meta_key>
			<wp:meta_value><![CDATA[172799]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventVenueID</wp:meta_key>
			<wp:meta_value><![CDATA[1239]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCurrencySymbol</wp:meta_key>
			<wp:meta_value><![CDATA[€]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCost</wp:meta_key>
			<wp:meta_value><![CDATA[ ]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventURL</wp:meta_key>
			<wp:meta_value><![CDATA[http://www.forum-fic.com/]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventOrganizerID</wp:meta_key>
			<wp:meta_value><![CDATA[1238]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Cybersécurité]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1388815960]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:78:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:3:"653";s:5:"score";s:18:"25.563231919256637";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1454";s:5:"score";s:18:"23.537245550178902";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1571";s:5:"score";s:18:"19.568982826627877";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1480";s:5:"score";s:18:"16.865196958922763";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1305";s:5:"score";s:18:"16.865196958922763";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"323";s:5:"score";s:17:"9.357361256236445";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1037";s:5:"score";s:17:"7.303054607664517";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1495";s:5:"score";s:17:"6.901713216740215";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:3:"907";s:5:"score";s:17:"6.839451379249869";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:3:"180";s:5:"score";s:17:"6.438109988325566";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:3:"332";s:5:"score";s:16:"6.36166756453517";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"1076";s:5:"score";s:17:"6.349206462483899";}i:12;O:8:"stdClass":2:{s:7:"post_id";s:4:"1043";s:5:"score";s:17:"6.349206462483899";}i:13;O:8:"stdClass":2:{s:7:"post_id";s:3:"563";s:5:"score";s:17:"6.349206462483899";}i:14;O:8:"stdClass":2:{s:7:"post_id";s:3:"336";s:5:"score";s:17:"6.349206462483899";}i:15;O:8:"stdClass":2:{s:7:"post_id";s:3:"827";s:5:"score";s:17:"6.196284132194944";}i:16;O:8:"stdClass":2:{s:7:"post_id";s:4:"1444";s:5:"score";s:17:"5.947865071559597";}i:17;O:8:"stdClass":2:{s:7:"post_id";s:3:"110";s:5:"score";s:17:"5.947865071559597";}i:18;O:8:"stdClass":2:{s:7:"post_id";s:4:"1476";s:5:"score";s:17:"5.794942741270642";}i:19;O:8:"stdClass":2:{s:7:"post_id";s:4:"1283";s:5:"score";s:17:"5.304697824504672";}i:20;O:8:"stdClass":2:{s:7:"post_id";s:4:"1419";s:5:"score";s:17:"4.841094596090024";}i:21;O:8:"stdClass":2:{s:7:"post_id";s:4:"1595";s:5:"score";s:18:"3.5766177402441177";}i:22;O:8:"stdClass":2:{s:7:"post_id";s:4:"1588";s:5:"score";s:18:"3.5766177402441177";}i:23;O:8:"stdClass":2:{s:7:"post_id";s:4:"1273";s:5:"score";s:18:"3.5766177402441177";}i:24;O:8:"stdClass":2:{s:7:"post_id";s:4:"1207";s:5:"score";s:18:"3.5766177402441177";}i:25;O:8:"stdClass":2:{s:7:"post_id";s:3:"980";s:5:"score";s:18:"3.5766177402441177";}i:26;O:8:"stdClass":2:{s:7:"post_id";s:3:"947";s:5:"score";s:18:"3.5766177402441177";}i:27;O:8:"stdClass":2:{s:7:"post_id";s:3:"940";s:5:"score";s:18:"3.5766177402441177";}i:28;O:8:"stdClass":2:{s:7:"post_id";s:3:"578";s:5:"score";s:18:"3.5766177402441177";}i:29;O:8:"stdClass":2:{s:7:"post_id";s:4:"1465";s:5:"score";s:17:"2.933450493189193";}i:30;O:8:"stdClass":2:{s:7:"post_id";s:4:"1434";s:5:"score";s:17:"2.933450493189193";}i:31;O:8:"stdClass":2:{s:7:"post_id";s:4:"1262";s:5:"score";s:17:"2.933450493189193";}i:32;O:8:"stdClass":2:{s:7:"post_id";s:3:"334";s:5:"score";s:17:"2.933450493189193";}i:33;O:8:"stdClass":2:{s:7:"post_id";s:4:"1180";s:5:"score";s:18:"2.4698472647745446";}i:34;O:8:"stdClass":2:{s:7:"post_id";s:4:"1108";s:5:"score";s:18:"2.4698472647745446";}i:35;O:8:"stdClass":2:{s:7:"post_id";s:4:"1066";s:5:"score";s:18:"2.4698472647745446";}i:36;O:8:"stdClass":2:{s:7:"post_id";s:4:"1006";s:5:"score";s:18:"2.4698472647745446";}i:37;O:8:"stdClass":2:{s:7:"post_id";s:3:"953";s:5:"score";s:18:"2.4698472647745446";}i:38;O:8:"stdClass":2:{s:7:"post_id";s:3:"900";s:5:"score";s:18:"2.4698472647745446";}i:39;O:8:"stdClass":2:{s:7:"post_id";s:3:"880";s:5:"score";s:18:"2.4698472647745446";}i:40;O:8:"stdClass":2:{s:7:"post_id";s:3:"820";s:5:"score";s:18:"2.4698472647745446";}i:41;O:8:"stdClass":2:{s:7:"post_id";s:3:"736";s:5:"score";s:18:"2.4698472647745446";}i:42;O:8:"stdClass":2:{s:7:"post_id";s:3:"713";s:5:"score";s:18:"2.4698472647745446";}i:43;O:8:"stdClass":2:{s:7:"post_id";s:2:"68";s:5:"score";s:18:"2.4698472647745446";}i:44;O:8:"stdClass":2:{s:7:"post_id";s:4:"1506";s:5:"score";s:18:"1.9796023480085745";}i:45;O:8:"stdClass":2:{s:7:"post_id";s:4:"1459";s:5:"score";s:18:"1.9796023480085745";}i:46;O:8:"stdClass":2:{s:7:"post_id";s:4:"1448";s:5:"score";s:18:"1.9796023480085745";}i:47;O:8:"stdClass":2:{s:7:"post_id";s:4:"1398";s:5:"score";s:18:"1.9796023480085745";}i:48;O:8:"stdClass":2:{s:7:"post_id";s:4:"1391";s:5:"score";s:18:"1.9796023480085745";}i:49;O:8:"stdClass":2:{s:7:"post_id";s:4:"1059";s:5:"score";s:18:"1.9796023480085745";}i:50;O:8:"stdClass":2:{s:7:"post_id";s:4:"1030";s:5:"score";s:18:"1.9796023480085745";}i:51;O:8:"stdClass":2:{s:7:"post_id";s:4:"1000";s:5:"score";s:18:"1.9796023480085745";}i:52;O:8:"stdClass":2:{s:7:"post_id";s:3:"967";s:5:"score";s:18:"1.9796023480085745";}i:53;O:8:"stdClass":2:{s:7:"post_id";s:3:"927";s:5:"score";s:18:"1.9796023480085745";}i:54;O:8:"stdClass":2:{s:7:"post_id";s:3:"849";s:5:"score";s:18:"1.9796023480085745";}i:55;O:8:"stdClass":2:{s:7:"post_id";s:3:"789";s:5:"score";s:18:"1.9796023480085745";}i:56;O:8:"stdClass":2:{s:7:"post_id";s:3:"774";s:5:"score";s:18:"1.9796023480085745";}i:57;O:8:"stdClass":2:{s:7:"post_id";s:3:"760";s:5:"score";s:18:"1.9796023480085745";}i:58;O:8:"stdClass":2:{s:7:"post_id";s:3:"644";s:5:"score";s:18:"1.9796023480085745";}i:59;O:8:"stdClass":2:{s:7:"post_id";s:3:"344";s:5:"score";s:18:"1.9796023480085745";}i:60;O:8:"stdClass":2:{s:7:"post_id";s:3:"342";s:5:"score";s:18:"1.9796023480085745";}i:61;O:8:"stdClass":2:{s:7:"post_id";s:3:"223";s:5:"score";s:18:"1.9796023480085745";}i:62;O:8:"stdClass":2:{s:7:"post_id";s:3:"126";s:5:"score";s:18:"1.9796023480085745";}i:63;O:8:"stdClass":2:{s:7:"post_id";s:3:"723";s:5:"score";s:18:"1.8770157610334735";}i:64;O:8:"stdClass":2:{s:7:"post_id";s:4:"1257";s:5:"score";s:18:"1.8266800177196199";}i:65;O:8:"stdClass":2:{s:7:"post_id";s:4:"1127";s:5:"score";s:18:"1.8266800177196199";}i:66;O:8:"stdClass":2:{s:7:"post_id";s:4:"1320";s:5:"score";s:16:"1.33643510095365";}i:67;O:8:"stdClass":2:{s:7:"post_id";s:4:"1439";s:5:"score";s:18:"0.8728318725390013";}i:68;O:8:"stdClass":2:{s:7:"post_id";s:4:"1172";s:5:"score";s:18:"0.8728318725390013";}i:69;O:8:"stdClass":2:{s:7:"post_id";s:4:"1156";s:5:"score";s:18:"0.8728318725390013";}i:70;O:8:"stdClass":2:{s:7:"post_id";s:4:"1024";s:5:"score";s:18:"0.8728318725390013";}i:71;O:8:"stdClass":2:{s:7:"post_id";s:4:"1016";s:5:"score";s:18:"0.8728318725390013";}i:72;O:8:"stdClass":2:{s:7:"post_id";s:3:"133";s:5:"score";s:18:"0.8728318725390013";}i:73;O:8:"stdClass":2:{s:7:"post_id";s:4:"1099";s:5:"score";s:19:"0.22966462548407657";}i:74;O:8:"stdClass":2:{s:7:"post_id";s:3:"963";s:5:"score";s:19:"0.22966462548407657";}i:75;O:8:"stdClass":2:{s:7:"post_id";s:3:"313";s:5:"score";s:19:"0.15322220169368092";}i:76;O:8:"stdClass":2:{s:7:"post_id";s:3:"319";s:5:"score";s:19:"0.12707803850897556";}i:77;O:8:"stdClass":2:{s:7:"post_id";s:2:"44";s:5:"score";s:19:"0.07644242379039563";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>IT Tour</title>
		<link>http://www.it-news.fr/event/it-tour/</link>
		<pubDate>Wed, 23 Oct 2013 08:50:42 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?post_type=tribe_events&#038;p=1240</guid>
		<description></description>
		<content:encoded><![CDATA[<a href="http://www.it-news.fr/wp-content/uploads/2013/10/it-tour.jpg"><img class="alignleft  wp-image-1243" title="IT Tour" alt="it-tour" src="http://www.it-news.fr/wp-content/uploads/2013/10/it-tour.jpg" width="150" height="98" /></a>L'IT Tour c'est profiter de retours d’expérience, faire le point sur les avancées technologiques, les évolutions métier et partager des moments de convivialité. Une matinée réservée uniquement aux informaticiens professionnels. Et tous cela en une matinée-débat avec petit-déjeuner, débats et cocktail déjeunatoire.

Le programme:

&nbsp;
<table width="571" border="0" cellspacing="0" cellpadding="0">
<tbody>
<tr>
<td width="80">
<p align="center"><b>8h15 </b></p>
</td>
<td nowrap="nowrap" width="491"> Accueil – Petit déjeuner</td>
</tr>
<tr>
<td width="80">
<p align="center"><b>8h40 </b></p>
</td>
<td width="491">– <b>Ouverture et introduction –
</b>par Jacques Cheminat, Chef des actualités à la rédaction du Monde Informatique</td>
</tr>
<tr>
<td width="80">
<p align="center"><b>8h45 </b></p>
</td>
<td width="491"><b>– Quels seront les principaux défis et enjeux pour les informaticiens en 2014 ? – </b>
par Jacques Cheminat, Chef des actualités à la rédaction du Monde Informatique</td>
</tr>
<tr>
<td width="80">
<p align="center"><b>9h05 </b></p>
</td>
<td width="491"><b>– De nouvelles solutions pour faire face aux nouveaux enjeux des DSI–
</b> par Didier Prouteau, Responsable IT Services, Ricoh</td>
</tr>
<tr>
<td width="80">
<p align="center"><b>9h25  </b></p>
</td>
<td nowrap="nowrap" width="491"><b>– Table ronde –</b> Sécurité, les nouvelles menaces à la porte des entreprises</td>
</tr>
<tr>
<td width="80">
<p align="center"><b>9h45 </b></p>
</td>
<td nowrap="nowrap" width="491"><b>– Intervention Numergy– </b></td>
</tr>
<tr>
<td width="80">
<p align="center"><b>10h05  </b></p>
</td>
<td width="491"><b>– Table ronde –</b> Cloud computing, quels sont les nouveaux défis à relever pour répondre à une demande croissante de services</td>
</tr>
<tr>
<td width="80">
<p align="center"><b>10h25 </b></p>
</td>
<td nowrap="nowrap" width="491">– Pause–</td>
</tr>
<tr>
<td width="80">
<p align="center"><b>10h45 </b></p>
</td>
<td nowrap="nowrap" width="491"><b>–  Intervention SAP–</b></td>
</tr>
<tr>
<td width="80">
<p align="center"><b>11h05 </b></p>
</td>
<td nowrap="nowrap" width="491"><b>– Table ronde –</b> Mobilité, Des promesses du BYOD à la réalité</td>
</tr>
<tr>
<td width="80">
<p align="center"><b>11h25 </b></p>
</td>
<td width="491"><b>– Gérer efficacement le patrimoine applicatif pour une DSI agile et proche des métiers–  </b>

par Philippe Bonneville, Account Manager, Mega International</td>
</tr>
<tr>
<td width="80">
<p align="center"><b>11h45 </b></p>
</td>
<td nowrap="nowrap" width="491"><b> – Table ronde–  </b>Recrutement IT : opportunités et prospectives</td>
</tr>
<tr>
<td width="80">
<p align="center"><b>12h05 </b></p>
</td>
<td width="491"><b>– La DSI doit-elle devenir un prestataire de services comme un autre?</b> –
par Karim Djamai, Directeur Commercial, Citrix</td>
</tr>
<tr>
<td width="80">
<p align="center"><b>12h25 </b></p>
</td>
<td nowrap="nowrap" width="491">Cocktail déjeunatoire</td>
</tr>
</tbody>
</table>
&nbsp;

&nbsp;

<strong style="font-size: 16px;"> </strong>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1240</wp:post_id>
		<wp:post_date>2013-10-23 09:50:42</wp:post_date>
		<wp:post_date_gmt>2013-10-23 08:50:42</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>it-tour</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_events</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_EventAuditTrail</wp:meta_key>
			<wp:meta_value><![CDATA[a:13:{i:0;a:2:{i:0;s:15:"events-calendar";i:1;i:1382517064;}i:1;a:2:{i:0;s:15:"events-calendar";i:1;i:1382517313;}i:2;a:2:{i:0;s:15:"events-calendar";i:1;i:1382517433;}i:3;a:2:{i:0;s:15:"events-calendar";i:1;i:1382517493;}i:4;a:2:{i:0;s:15:"events-calendar";i:1;i:1382517554;}i:5;a:2:{i:0;s:15:"events-calendar";i:1;i:1382517796;}i:6;a:2:{i:0;s:15:"events-calendar";i:1;i:1382517856;}i:7;a:2:{i:0;s:15:"events-calendar";i:1;i:1382517916;}i:8;a:2:{i:0;s:15:"events-calendar";i:1;i:1382517976;}i:9;a:2:{i:0;s:15:"events-calendar";i:1;i:1382517986;}i:10;a:2:{i:0;s:15:"events-calendar";i:1;i:1382518025;}i:11;a:2:{i:0;s:15:"events-calendar";i:1;i:1382518052;}i:12;a:2:{i:0;s:15:"events-calendar";i:1;i:1382518229;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[75]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMapLink</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMap</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventStartDate</wp:meta_key>
			<wp:meta_value><![CDATA[2013-11-21 08:15:00]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventEndDate</wp:meta_key>
			<wp:meta_value><![CDATA[2013-11-21 13:00:00]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventDuration</wp:meta_key>
			<wp:meta_value><![CDATA[17100]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventVenueID</wp:meta_key>
			<wp:meta_value><![CDATA[1242]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCurrencySymbol</wp:meta_key>
			<wp:meta_value><![CDATA[€]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCost</wp:meta_key>
			<wp:meta_value><![CDATA[ ]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventURL</wp:meta_key>
			<wp:meta_value><![CDATA[http://www.it-tour.fr/]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventOrganizerID</wp:meta_key>
			<wp:meta_value><![CDATA[1241]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[it tour]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1388990941]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:82:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:3:"820";s:5:"score";s:18:"15.282005980295134";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"789";s:5:"score";s:18:"13.695544702775564";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1262";s:5:"score";s:18:"12.941863474970816";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1588";s:5:"score";s:17:"11.40735316971015";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1419";s:5:"score";s:18:"11.381209007194492";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"223";s:5:"score";s:18:"10.129193251773668";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1257";s:5:"score";s:18:"10.003891321064618";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1448";s:5:"score";s:17:"9.228360259832805";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"1320";s:5:"score";s:17:"9.228360259832805";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:3:"563";s:5:"score";s:17:"8.504780170788466";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:3:"135";s:5:"score";s:17:"8.417430043545048";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"1391";s:5:"score";s:17:"8.016088652596936";}i:12;O:8:"stdClass":2:{s:7:"post_id";s:3:"344";s:5:"score";s:18:"7.9883104284422695";}i:13;O:8:"stdClass":2:{s:7:"post_id";s:4:"1127";s:5:"score";s:15:"7.6637488157403";}i:14;O:8:"stdClass":2:{s:7:"post_id";s:4:"1439";s:5:"score";s:17:"7.600809923207114";}i:15;O:8:"stdClass":2:{s:7:"post_id";s:4:"1037";s:5:"score";s:18:"7.4477297683433985";}i:16;O:8:"stdClass":2:{s:7:"post_id";s:3:"953";s:5:"score";s:18:"7.4477297683433985";}i:17;O:8:"stdClass":2:{s:7:"post_id";s:4:"1059";s:5:"score";s:17:"7.266701753809354";}i:18;O:8:"stdClass":2:{s:7:"post_id";s:4:"1595";s:5:"score";s:17:"7.248470086350478";}i:19;O:8:"stdClass":2:{s:7:"post_id";s:3:"900";s:5:"score";s:17:"7.248470086350478";}i:20;O:8:"stdClass":2:{s:7:"post_id";s:3:"760";s:5:"score";s:17:"6.812737098566603";}i:21;O:8:"stdClass":2:{s:7:"post_id";s:4:"1495";s:5:"score";s:17:"6.774785295100973";}i:22;O:8:"stdClass":2:{s:7:"post_id";s:4:"1108";s:5:"score";s:17:"6.774785295100973";}i:23;O:8:"stdClass":2:{s:7:"post_id";s:4:"1156";s:5:"score";s:17:"6.411395707618491";}i:24;O:8:"stdClass":2:{s:7:"post_id";s:4:"1016";s:5:"score";s:17:"6.411395707618491";}i:25;O:8:"stdClass":2:{s:7:"post_id";s:4:"1454";s:5:"score";s:17:"6.272156438467732";}i:26;O:8:"stdClass":2:{s:7:"post_id";s:4:"1398";s:5:"score";s:16:"6.07728753822073";}i:27;O:8:"stdClass":2:{s:7:"post_id";s:4:"1605";s:5:"score";s:17:"5.870815047519619";}i:28;O:8:"stdClass":2:{s:7:"post_id";s:3:"980";s:5:"score";s:17:"5.870815047519619";}i:29;O:8:"stdClass":2:{s:7:"post_id";s:3:"880";s:5:"score";s:17:"5.870815047519619";}i:30;O:8:"stdClass":2:{s:7:"post_id";s:3:"180";s:5:"score";s:17:"5.870815047519619";}i:31;O:8:"stdClass":2:{s:7:"post_id";s:3:"342";s:5:"score";s:17:"5.861268490823829";}i:32;O:8:"stdClass":2:{s:7:"post_id";s:3:"644";s:5:"score";s:17:"5.662008808830908";}i:33;O:8:"stdClass":2:{s:7:"post_id";s:3:"110";s:5:"score";s:17:"5.662008808830908";}i:34;O:8:"stdClass":2:{s:7:"post_id";s:4:"1207";s:5:"score";s:17:"5.536706878121859";}i:35;O:8:"stdClass":2:{s:7:"post_id";s:4:"1283";s:5:"score";s:17:"5.188324017581402";}i:36;O:8:"stdClass":2:{s:7:"post_id";s:4:"1099";s:5:"score";s:17:"5.188324017581402";}i:37;O:8:"stdClass":2:{s:7:"post_id";s:3:"907";s:5:"score";s:17:"5.121428148732036";}i:38;O:8:"stdClass":2:{s:7:"post_id";s:4:"1030";s:5:"score";s:17:"4.685695160948162";}i:39;O:8:"stdClass":2:{s:7:"post_id";s:3:"963";s:5:"score";s:17:"4.284353770000049";}i:40;O:8:"stdClass":2:{s:7:"post_id";s:4:"1476";s:5:"score";s:18:"3.9320139331434136";}i:41;O:8:"stdClass":2:{s:7:"post_id";s:4:"1434";s:5:"score";s:18:"3.9320139331434136";}i:42;O:8:"stdClass":2:{s:7:"post_id";s:4:"1273";s:5:"score";s:18:"3.9320139331434136";}i:43;O:8:"stdClass":2:{s:7:"post_id";s:3:"827";s:5:"score";s:18:"3.9320139331434136";}i:44;O:8:"stdClass":2:{s:7:"post_id";s:3:"578";s:5:"score";s:18:"3.9320139331434136";}i:45;O:8:"stdClass":2:{s:7:"post_id";s:3:"334";s:5:"score";s:18:"3.9320139331434136";}i:46;O:8:"stdClass":2:{s:7:"post_id";s:3:"332";s:5:"score";s:18:"3.8592786448730925";}i:47;O:8:"stdClass":2:{s:7:"post_id";s:4:"1626";s:5:"score";s:18:"3.5349668712124664";}i:48;O:8:"stdClass":2:{s:7:"post_id";s:4:"1480";s:5:"score";s:18:"3.5349668712124664";}i:49;O:8:"stdClass":2:{s:7:"post_id";s:3:"927";s:5:"score";s:18:"3.5349668712124664";}i:50;O:8:"stdClass":2:{s:7:"post_id";s:3:"336";s:5:"score";s:18:"3.5349668712124664";}i:51;O:8:"stdClass":2:{s:7:"post_id";s:3:"126";s:5:"score";s:18:"3.5349668712124664";}i:52;O:8:"stdClass":2:{s:7:"post_id";s:3:"313";s:5:"score";s:18:"3.4622315829421453";}i:53;O:8:"stdClass":2:{s:7:"post_id";s:4:"1506";s:5:"score";s:17:"2.345552655623843";}i:54;O:8:"stdClass":2:{s:7:"post_id";s:4:"1444";s:5:"score";s:17:"2.345552655623843";}i:55;O:8:"stdClass":2:{s:7:"post_id";s:4:"1172";s:5:"score";s:17:"2.345552655623843";}i:56;O:8:"stdClass":2:{s:7:"post_id";s:4:"1043";s:5:"score";s:17:"2.345552655623843";}i:57;O:8:"stdClass":2:{s:7:"post_id";s:4:"1000";s:5:"score";s:17:"2.345552655623843";}i:58;O:8:"stdClass":2:{s:7:"post_id";s:3:"849";s:5:"score";s:17:"2.345552655623843";}i:59;O:8:"stdClass":2:{s:7:"post_id";s:3:"723";s:5:"score";s:17:"2.247972327284979";}i:60;O:8:"stdClass":2:{s:7:"post_id";s:4:"1571";s:5:"score";s:18:"1.8049719955249715";}i:61;O:8:"stdClass":2:{s:7:"post_id";s:4:"1465";s:5:"score";s:18:"1.8049719955249715";}i:62;O:8:"stdClass":2:{s:7:"post_id";s:4:"1236";s:5:"score";s:18:"1.8049719955249715";}i:63;O:8:"stdClass":2:{s:7:"post_id";s:4:"1180";s:5:"score";s:18:"1.8049719955249715";}i:64;O:8:"stdClass":2:{s:7:"post_id";s:4:"1066";s:5:"score";s:18:"1.8049719955249715";}i:65;O:8:"stdClass":2:{s:7:"post_id";s:4:"1006";s:5:"score";s:18:"1.8049719955249715";}i:66;O:8:"stdClass":2:{s:7:"post_id";s:3:"947";s:5:"score";s:18:"1.8049719955249715";}i:67;O:8:"stdClass":2:{s:7:"post_id";s:3:"940";s:5:"score";s:18:"1.8049719955249715";}i:68;O:8:"stdClass":2:{s:7:"post_id";s:3:"736";s:5:"score";s:18:"1.8049719955249715";}i:69;O:8:"stdClass":2:{s:7:"post_id";s:3:"713";s:5:"score";s:18:"1.8049719955249715";}i:70;O:8:"stdClass":2:{s:7:"post_id";s:3:"653";s:5:"score";s:18:"1.8049719955249715";}i:71;O:8:"stdClass":2:{s:7:"post_id";s:2:"68";s:5:"score";s:18:"1.8049719955249715";}i:72;O:8:"stdClass":2:{s:7:"post_id";s:4:"1459";s:5:"score";s:18:"0.2185107180054014";}i:73;O:8:"stdClass":2:{s:7:"post_id";s:4:"1305";s:5:"score";s:18:"0.2185107180054014";}i:74;O:8:"stdClass":2:{s:7:"post_id";s:4:"1076";s:5:"score";s:18:"0.2185107180054014";}i:75;O:8:"stdClass":2:{s:7:"post_id";s:4:"1024";s:5:"score";s:18:"0.2185107180054014";}i:76;O:8:"stdClass":2:{s:7:"post_id";s:3:"967";s:5:"score";s:18:"0.2185107180054014";}i:77;O:8:"stdClass":2:{s:7:"post_id";s:3:"774";s:5:"score";s:18:"0.2185107180054014";}i:78;O:8:"stdClass":2:{s:7:"post_id";s:3:"323";s:5:"score";s:18:"0.2185107180054014";}i:79;O:8:"stdClass":2:{s:7:"post_id";s:3:"133";s:5:"score";s:18:"0.2185107180054014";}i:80;O:8:"stdClass":2:{s:7:"post_id";s:3:"319";s:5:"score";s:19:"0.12093038966653732";}i:81;O:8:"stdClass":2:{s:7:"post_id";s:2:"44";s:5:"score";s:19:"0.07273528827032101";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>RSA Conference Europe 2013</title>
		<link>http://www.it-news.fr/event/rsa-conference-europe-2013/</link>
		<pubDate>Wed, 23 Oct 2013 09:18:41 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?post_type=tribe_events&#038;p=1245</guid>
		<description></description>
		<content:encoded><![CDATA[<a href="http://www.it-news.fr/wp-content/uploads/2013/10/rsa-conference-europe-2013.jpg"><img class="alignleft size-thumbnail wp-image-1253" alt="RSA conférence Europe 2013" src="http://www.it-news.fr/wp-content/uploads/2013/10/rsa-conference-europe-2013-150x150.jpg" width="150" height="150" /></a>BYOD, sécurité du Cloud, vulnérabilités des systèmes mobiles, gouvernance et bien plus encore. Faites confiance à la RSA®Conference Europe pour identifier les principaux enjeux liés au quotidien et vous présenter l’expertise avancée qui vous permettra de les gérer.

Pendant trois jours, vous serez plonger dans des sujets d’actualité, des connaissances d’initiés et des conseils pratiques d’experts en sécurité de l’information. Adoptez des stratégies et des procédures pratiques. Évaluez les risques. Planifiez à l’avance. Inspirez-vous des prévisions et des connaissances d’experts techniques, en assistant à des présentations stratégiques. Faites votre choix parmi 60 ateliers, participez aux débats et échangez avec vos homologues. Réunissant des professionnels venus de plus de 50 pays, cet événement formateur vous permet de développer de nouvelles connaissances, d’élargir votre réseau professionnel et de donner un nouveau souffle à votre carrière.]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1245</wp:post_id>
		<wp:post_date>2013-10-23 10:18:41</wp:post_date>
		<wp:post_date_gmt>2013-10-23 09:18:41</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>rsa-conference-europe-2013</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_events</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_EventAuditTrail</wp:meta_key>
			<wp:meta_value><![CDATA[a:3:{i:0;a:2:{i:0;s:15:"events-calendar";i:1;i:1382519238;}i:1;a:2:{i:0;s:15:"events-calendar";i:1;i:1382519304;}i:2;a:2:{i:0;s:15:"events-calendar";i:1;i:1382519835;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[65]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMapLink</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMap</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventStartDate</wp:meta_key>
			<wp:meta_value><![CDATA[2013-10-28 08:00:00]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventEndDate</wp:meta_key>
			<wp:meta_value><![CDATA[2013-10-31 16:30:00]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventDuration</wp:meta_key>
			<wp:meta_value><![CDATA[289800]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventVenueID</wp:meta_key>
			<wp:meta_value><![CDATA[1247]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCurrencySymbol</wp:meta_key>
			<wp:meta_value><![CDATA[€]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCost</wp:meta_key>
			<wp:meta_value><![CDATA[1095]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventURL</wp:meta_key>
			<wp:meta_value><![CDATA[http://www.rsaconference.com/]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventOrganizerID</wp:meta_key>
			<wp:meta_value><![CDATA[1246]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[RSA]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Supply Chain event 2013</title>
		<link>http://www.it-news.fr/event/supply-chain-event/</link>
		<pubDate>Wed, 23 Oct 2013 09:26:10 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?post_type=tribe_events&#038;p=1248</guid>
		<description></description>
		<content:encoded><![CDATA[<a href="http://www.it-news.fr/wp-content/uploads/2013/10/supply-chain-event-2013.jpg"><img class="alignleft  wp-image-1251" title="Supply Chain Event 2013" alt="supply-chain-event-2013" src="http://www.it-news.fr/wp-content/uploads/2013/10/supply-chain-event-2013.jpg" width="140" height="99" /></a>Fort du succès rencontré lors de sa première édition, le salon Supply Chain Event attend cette année une centaine d’exposants et plus de 3000 visiteurs. Au programme de cette manifestation, 32 conférences de haut niveau autour d’un thème central « Le Supply Chain Management, un vecteur de rentabilité ».

Supply Chain Event résulte de l’association de Reed Expositions et de Supply Chain Magazine.
<span style="font-size: 16px;">Mais cette collaboration va plus loin puisqu’elle va permettre de mettre en place un formidable outil de promotion à travers la mutualisation des fichiers et des outils de marketing et de communication. En outre, une campagne de relation presse sera développée en particulier en direction de la presse économique et sectorielle.</span>

<strong>Un événement européen</strong>

Pour 2013, le salon s’est donné pour objectif de devenir l’événement européen incontournable pour tous les managers de la supply chain. Cette manifestation annuelle comprend une partie exposition centrée sur les sytèmes d’information (saisie et transmission de données, logiciels d’exécution et de pilotage, hardware, sociétés de conseil et de service) et une partie conférences. Les professionnels peuvent en un même lieu s’inspirer des témoignages de différents orateurs et trouver auprès des exposants les solutions informatiques qui répondent à leurs besoins.]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1248</wp:post_id>
		<wp:post_date>2013-10-23 10:26:10</wp:post_date>
		<wp:post_date_gmt>2013-10-23 09:26:10</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>supply-chain-event</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_events</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_EventAuditTrail</wp:meta_key>
			<wp:meta_value><![CDATA[a:4:{i:0;a:2:{i:0;s:15:"events-calendar";i:1;i:1382519959;}i:1;a:2:{i:0;s:15:"events-calendar";i:1;i:1382520024;}i:2;a:2:{i:0;s:15:"events-calendar";i:1;i:1382520038;}i:3;a:2:{i:0;s:15:"events-calendar";i:1;i:1382520105;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[65]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMapLink</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMap</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventStartDate</wp:meta_key>
			<wp:meta_value><![CDATA[2013-11-26 09:00:00]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventEndDate</wp:meta_key>
			<wp:meta_value><![CDATA[2013-11-27 18:00:00]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventDuration</wp:meta_key>
			<wp:meta_value><![CDATA[118800]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventVenueID</wp:meta_key>
			<wp:meta_value><![CDATA[1250]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCurrencySymbol</wp:meta_key>
			<wp:meta_value><![CDATA[€]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCost</wp:meta_key>
			<wp:meta_value><![CDATA[80]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventURL</wp:meta_key>
			<wp:meta_value><![CDATA[http://www.supplychain-event.com/]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventOrganizerID</wp:meta_key>
			<wp:meta_value><![CDATA[1249]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[supply chain]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Documation</title>
		<link>http://www.it-news.fr/event/documation/</link>
		<pubDate>Thu, 05 Dec 2013 15:33:08 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?post_type=tribe_events&#038;p=1681</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/12/documentation.jpg"><img class="alignleft size-full wp-image-1698" alt="documentation" src="http://www.it-news.fr/wp-content/uploads/2013/12/documentation.jpg" width="249" height="58" /></a>Crée en 1994, Documation a pour but de proposer des solutions aux problèmes de gestion de contenus électroniques. Documation connaît depuis des années tous les aspects de la gestion électronique de l'information, qui est l'une des priorités de l'entreprise dû au développement rapide des réseaux, de l'e-business...</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1681</wp:post_id>
		<wp:post_date>2013-12-05 16:33:08</wp:post_date>
		<wp:post_date_gmt>2013-12-05 15:33:08</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>documation</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>-1</wp:menu_order>
		<wp:post_type>tribe_events</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="tribe_events_cat" nicename="calendrier"><![CDATA[Calendrier]]></category>
		<category domain="post_tag" nicename="dematerialisation"><![CDATA[dématérialisation]]></category>
		<category domain="post_tag" nicename="edi"><![CDATA[edi]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventAuditTrail</wp:meta_key>
			<wp:meta_value><![CDATA[a:3:{i:0;a:2:{i:0;s:15:"events-calendar";i:1;i:1386257139;}i:1;a:2:{i:0;s:15:"events-calendar";i:1;i:1386257190;}i:2;a:2:{i:0;s:15:"events-calendar";i:1;i:1386257263;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[59]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMapLink</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMap</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventAllDay</wp:meta_key>
			<wp:meta_value><![CDATA[yes]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventStartDate</wp:meta_key>
			<wp:meta_value><![CDATA[2014-03-26 00:00:00]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventEndDate</wp:meta_key>
			<wp:meta_value><![CDATA[2014-03-27 23:59:59]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventDuration</wp:meta_key>
			<wp:meta_value><![CDATA[172799]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventVenueID</wp:meta_key>
			<wp:meta_value><![CDATA[1250]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCurrencySymbol</wp:meta_key>
			<wp:meta_value><![CDATA[€]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCost</wp:meta_key>
			<wp:meta_value><![CDATA[ ]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventURL</wp:meta_key>
			<wp:meta_value><![CDATA[http://www.documation.fr]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventOrganizerID</wp:meta_key>
			<wp:meta_value><![CDATA[1683]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[documation]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Crée en 1994, Documation a pour but de proposer des solutions aux problèmes de gestion de contenus électroniques.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1389443567]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:88:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1728";s:5:"score";s:17:"64.70140810763257";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"1588";s:5:"score";s:17:"62.56572684785458";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"336";s:5:"score";s:17:"60.51992591398975";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"126";s:5:"score";s:18:"29.496505827867256";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"313";s:5:"score";s:18:"12.500545289397275";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1006";s:5:"score";s:16:"9.70439310463429";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1605";s:5:"score";s:17:"9.370284935487732";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"980";s:5:"score";s:17:"8.733377473025943";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:3:"963";s:5:"score";s:17:"8.165489973781797";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:2:"44";s:5:"score";s:17:"7.636434879038828";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:3:"644";s:5:"score";s:17:"7.568711844856295";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"1595";s:5:"score";s:17:"6.931804382394508";}i:12;O:8:"stdClass":2:{s:7:"post_id";s:4:"1000";s:5:"score";s:17:"6.931804382394508";}i:13;O:8:"stdClass":2:{s:7:"post_id";s:3:"578";s:5:"score";s:17:"6.931804382394508";}i:14;O:8:"stdClass":2:{s:7:"post_id";s:3:"723";s:5:"score";s:17:"6.863226237234996";}i:15;O:8:"stdClass":2:{s:7:"post_id";s:4:"1731";s:5:"score";s:16:"6.59769621324795";}i:16;O:8:"stdClass":2:{s:7:"post_id";s:4:"1419";s:5:"score";s:16:"6.59769621324795";}i:17;O:8:"stdClass":2:{s:7:"post_id";s:4:"1156";s:5:"score";s:16:"6.59769621324795";}i:18;O:8:"stdClass":2:{s:7:"post_id";s:4:"1016";s:5:"score";s:16:"6.59769621324795";}i:19;O:8:"stdClass":2:{s:7:"post_id";s:4:"1240";s:5:"score";s:17:"6.029808714003805";}i:20;O:8:"stdClass":2:{s:7:"post_id";s:4:"1180";s:5:"score";s:18:"5.5229109109914685";}i:21;O:8:"stdClass":2:{s:7:"post_id";s:4:"1076";s:5:"score";s:18:"5.5229109109914685";}i:22;O:8:"stdClass":2:{s:7:"post_id";s:3:"653";s:5:"score";s:18:"5.5229109109914685";}i:23;O:8:"stdClass":2:{s:7:"post_id";s:4:"1719";s:5:"score";s:17:"4.886003448529681";}i:24;O:8:"stdClass":2:{s:7:"post_id";s:4:"1439";s:5:"score";s:17:"4.551895279383123";}i:25;O:8:"stdClass":2:{s:7:"post_id";s:4:"1391";s:5:"score";s:17:"4.551895279383123";}i:26;O:8:"stdClass":2:{s:7:"post_id";s:3:"880";s:5:"score";s:17:"4.551895279383123";}i:27;O:8:"stdClass":2:{s:7:"post_id";s:3:"180";s:5:"score";s:17:"4.551895279383123";}i:28;O:8:"stdClass":2:{s:7:"post_id";s:4:"1465";s:5:"score";s:17:"4.318115949285535";}i:29;O:8:"stdClass":2:{s:7:"post_id";s:4:"1506";s:5:"score";s:18:"2.7503221887516873";}i:30;O:8:"stdClass":2:{s:7:"post_id";s:4:"1444";s:5:"score";s:18:"2.7503221887516873";}i:31;O:8:"stdClass":2:{s:7:"post_id";s:4:"1398";s:5:"score";s:18:"2.7503221887516873";}i:32;O:8:"stdClass":2:{s:7:"post_id";s:4:"1273";s:5:"score";s:18:"2.7503221887516873";}i:33;O:8:"stdClass":2:{s:7:"post_id";s:4:"1172";s:5:"score";s:18:"2.7503221887516873";}i:34;O:8:"stdClass":2:{s:7:"post_id";s:4:"1043";s:5:"score";s:18:"2.7503221887516873";}i:35;O:8:"stdClass":2:{s:7:"post_id";s:3:"900";s:5:"score";s:18:"2.7503221887516873";}i:36;O:8:"stdClass":2:{s:7:"post_id";s:3:"849";s:5:"score";s:18:"2.7503221887516873";}i:37;O:8:"stdClass":2:{s:7:"post_id";s:3:"760";s:5:"score";s:18:"2.7503221887516873";}i:38;O:8:"stdClass":2:{s:7:"post_id";s:3:"344";s:5:"score";s:18:"2.7503221887516873";}i:39;O:8:"stdClass":2:{s:7:"post_id";s:3:"223";s:5:"score";s:18:"2.7503221887516873";}i:40;O:8:"stdClass":2:{s:7:"post_id";s:3:"110";s:5:"score";s:18:"2.7503221887516873";}i:41;O:8:"stdClass":2:{s:7:"post_id";s:3:"332";s:5:"score";s:18:"2.7048656880572493";}i:42;O:8:"stdClass":2:{s:7:"post_id";s:4:"1722";s:5:"score";s:17:"2.182434689507542";}i:43;O:8:"stdClass":2:{s:7:"post_id";s:4:"1476";s:5:"score";s:17:"2.182434689507542";}i:44;O:8:"stdClass":2:{s:7:"post_id";s:4:"1434";s:5:"score";s:17:"2.182434689507542";}i:45;O:8:"stdClass":2:{s:7:"post_id";s:4:"1262";s:5:"score";s:17:"2.182434689507542";}i:46;O:8:"stdClass":2:{s:7:"post_id";s:4:"1127";s:5:"score";s:17:"2.182434689507542";}i:47;O:8:"stdClass":2:{s:7:"post_id";s:3:"827";s:5:"score";s:17:"2.182434689507542";}i:48;O:8:"stdClass":2:{s:7:"post_id";s:3:"334";s:5:"score";s:17:"2.182434689507542";}i:49;O:8:"stdClass":2:{s:7:"post_id";s:4:"1626";s:5:"score";s:18:"0.7045212548868608";}i:50;O:8:"stdClass":2:{s:7:"post_id";s:4:"1571";s:5:"score";s:18:"0.7045212548868608";}i:51;O:8:"stdClass":2:{s:7:"post_id";s:4:"1459";s:5:"score";s:18:"0.7045212548868608";}i:52;O:8:"stdClass":2:{s:7:"post_id";s:4:"1448";s:5:"score";s:18:"0.7045212548868608";}i:53;O:8:"stdClass":2:{s:7:"post_id";s:4:"1236";s:5:"score";s:18:"0.7045212548868608";}i:54;O:8:"stdClass":2:{s:7:"post_id";s:4:"1207";s:5:"score";s:18:"0.7045212548868608";}i:55;O:8:"stdClass":2:{s:7:"post_id";s:4:"1108";s:5:"score";s:18:"0.7045212548868608";}i:56;O:8:"stdClass":2:{s:7:"post_id";s:4:"1066";s:5:"score";s:18:"0.7045212548868608";}i:57;O:8:"stdClass":2:{s:7:"post_id";s:4:"1059";s:5:"score";s:18:"0.7045212548868608";}i:58;O:8:"stdClass":2:{s:7:"post_id";s:4:"1030";s:5:"score";s:18:"0.7045212548868608";}i:59;O:8:"stdClass":2:{s:7:"post_id";s:4:"1024";s:5:"score";s:18:"0.7045212548868608";}i:60;O:8:"stdClass":2:{s:7:"post_id";s:3:"967";s:5:"score";s:18:"0.7045212548868608";}i:61;O:8:"stdClass":2:{s:7:"post_id";s:3:"953";s:5:"score";s:18:"0.7045212548868608";}i:62;O:8:"stdClass":2:{s:7:"post_id";s:3:"947";s:5:"score";s:18:"0.7045212548868608";}i:63;O:8:"stdClass":2:{s:7:"post_id";s:3:"940";s:5:"score";s:18:"0.7045212548868608";}i:64;O:8:"stdClass":2:{s:7:"post_id";s:3:"927";s:5:"score";s:18:"0.7045212548868608";}i:65;O:8:"stdClass":2:{s:7:"post_id";s:3:"907";s:5:"score";s:18:"0.7045212548868608";}i:66;O:8:"stdClass":2:{s:7:"post_id";s:3:"820";s:5:"score";s:18:"0.7045212548868608";}i:67;O:8:"stdClass":2:{s:7:"post_id";s:3:"789";s:5:"score";s:18:"0.7045212548868608";}i:68;O:8:"stdClass":2:{s:7:"post_id";s:3:"774";s:5:"score";s:18:"0.7045212548868608";}i:69;O:8:"stdClass":2:{s:7:"post_id";s:3:"736";s:5:"score";s:18:"0.7045212548868608";}i:70;O:8:"stdClass":2:{s:7:"post_id";s:3:"713";s:5:"score";s:18:"0.7045212548868608";}i:71;O:8:"stdClass":2:{s:7:"post_id";s:3:"563";s:5:"score";s:18:"0.7045212548868608";}i:72;O:8:"stdClass":2:{s:7:"post_id";s:3:"342";s:5:"score";s:18:"0.7045212548868608";}i:73;O:8:"stdClass":2:{s:7:"post_id";s:3:"323";s:5:"score";s:18:"0.7045212548868608";}i:74;O:8:"stdClass":2:{s:7:"post_id";s:3:"135";s:5:"score";s:18:"0.7045212548868608";}i:75;O:8:"stdClass":2:{s:7:"post_id";s:3:"133";s:5:"score";s:18:"0.7045212548868608";}i:76;O:8:"stdClass":2:{s:7:"post_id";s:2:"68";s:5:"score";s:18:"0.7045212548868608";}i:77;O:8:"stdClass":2:{s:7:"post_id";s:2:"41";s:5:"score";s:18:"0.7045212548868608";}i:78;O:8:"stdClass":2:{s:7:"post_id";s:4:"1495";s:5:"score";s:19:"0.13663375564271532";}i:79;O:8:"stdClass":2:{s:7:"post_id";s:4:"1480";s:5:"score";s:19:"0.13663375564271532";}i:80;O:8:"stdClass":2:{s:7:"post_id";s:4:"1454";s:5:"score";s:19:"0.13663375564271532";}i:81;O:8:"stdClass":2:{s:7:"post_id";s:4:"1320";s:5:"score";s:19:"0.13663375564271532";}i:82;O:8:"stdClass":2:{s:7:"post_id";s:4:"1305";s:5:"score";s:19:"0.13663375564271532";}i:83;O:8:"stdClass":2:{s:7:"post_id";s:4:"1283";s:5:"score";s:19:"0.13663375564271532";}i:84;O:8:"stdClass":2:{s:7:"post_id";s:4:"1257";s:5:"score";s:19:"0.13663375564271532";}i:85;O:8:"stdClass":2:{s:7:"post_id";s:4:"1099";s:5:"score";s:19:"0.13663375564271532";}i:86;O:8:"stdClass":2:{s:7:"post_id";s:4:"1037";s:5:"score";s:19:"0.13663375564271532";}i:87;O:8:"stdClass":2:{s:7:"post_id";s:3:"319";s:5:"score";s:18:"0.0680556104832038";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Expoprotection </title>
		<link>http://www.it-news.fr/event/expoprotection/</link>
		<pubDate>Thu, 05 Dec 2013 15:43:25 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?post_type=tribe_events&#038;p=1684</guid>
		<description></description>
		<content:encoded><![CDATA[<a href="http://www.it-news.fr/wp-content/uploads/2013/12/expoprotection.jpg"><img class="alignleft size-full wp-image-1685" title="Expoprotection" alt="expoprotection" src="http://www.it-news.fr/wp-content/uploads/2013/12/expoprotection.jpg" width="180" height="70" /></a>Mettre en place une gestion performante des risques »: c’est l’objectif des offreurs et des donneurs d’ordres qui se retrouvent au salon Expoprotection, tous les deux ans à Paris.

Expoprotection est l’unique rendez-vous en France qui rassemble les conférences, les innovations et les meilleurs spécialistes internationaux de 5 univers complémentaires : Sûreté / Sécurité, Lutte contre le Feu, Santé et Sécurité au Travail, Risques Industriels et Technologiques, Risques Naturels.

Participer à Expoprotection, c’est plonger au cœur des enjeux de la prévention, développer son réseau professionnel et découvrir en avant première les toutes dernières solutions pour faire face aux risques.

C’est, par dessus tout, prendre part au dialogue direct entre offreurs (fabricants, prestataires de services…), prescripteurs et acheteurs (entreprises, collectivités et administrations), indispensable aux décisions d’investissement.]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1684</wp:post_id>
		<wp:post_date>2013-12-05 16:43:25</wp:post_date>
		<wp:post_date_gmt>2013-12-05 15:43:25</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>expoprotection</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_events</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventAuditTrail</wp:meta_key>
			<wp:meta_value><![CDATA[a:4:{i:0;a:2:{i:0;s:15:"events-calendar";i:1;i:1386257645;}i:1;a:2:{i:0;s:15:"events-calendar";i:1;i:1386257679;}i:2;a:2:{i:0;s:15:"events-calendar";i:1;i:1386257707;}i:3;a:2:{i:0;s:15:"events-calendar";i:1;i:1386257892;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[68]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMapLink</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMap</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventAllDay</wp:meta_key>
			<wp:meta_value><![CDATA[yes]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventStartDate</wp:meta_key>
			<wp:meta_value><![CDATA[2014-12-09 00:00:00]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventEndDate</wp:meta_key>
			<wp:meta_value><![CDATA[2014-12-12 23:59:59]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventDuration</wp:meta_key>
			<wp:meta_value><![CDATA[345599]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventVenueID</wp:meta_key>
			<wp:meta_value><![CDATA[1218]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCurrencySymbol</wp:meta_key>
			<wp:meta_value><![CDATA[€]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCost</wp:meta_key>
			<wp:meta_value><![CDATA[ ]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventURL</wp:meta_key>
			<wp:meta_value><![CDATA[http://www.expoprotection.com]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventOrganizerID</wp:meta_key>
			<wp:meta_value><![CDATA[1682]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[expoprotection]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>IT Partners</title>
		<link>http://www.it-news.fr/event/partners/</link>
		<pubDate>Thu, 05 Dec 2013 16:05:00 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?post_type=tribe_events&#038;p=1686</guid>
		<description></description>
		<content:encoded><![CDATA[<a href="http://www.it-news.fr/wp-content/uploads/2013/12/it-partners.jpg"><img class="alignleft size-full wp-image-1687" alt="it-partners" src="http://www.it-news.fr/wp-content/uploads/2013/12/it-partners.jpg" width="190" height="69" /></a>IT Partners s'adresse aux fournisseurs et distributeurs impliqués dans la création et la diffusion de solutions informatiques, télécoms et multimédia pour et vers l'entreprise. IT-Partners]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1686</wp:post_id>
		<wp:post_date>2013-12-05 17:05:00</wp:post_date>
		<wp:post_date_gmt>2013-12-05 16:05:00</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>partners</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_events</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventAuditTrail</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{i:0;a:2:{i:0;s:15:"events-calendar";i:1;i:1386259249;}i:1;a:2:{i:0;s:15:"events-calendar";i:1;i:1386259306;}i:2;a:2:{i:0;s:15:"events-calendar";i:1;i:1386259373;}i:3;a:2:{i:0;s:15:"events-calendar";i:1;i:1386259421;}i:4;a:2:{i:0;s:15:"events-calendar";i:1;i:1386259486;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[54]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMapLink</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMap</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventAllDay</wp:meta_key>
			<wp:meta_value><![CDATA[yes]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventStartDate</wp:meta_key>
			<wp:meta_value><![CDATA[2014-02-04 00:00:00]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventEndDate</wp:meta_key>
			<wp:meta_value><![CDATA[2014-02-05 23:59:59]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventDuration</wp:meta_key>
			<wp:meta_value><![CDATA[172799]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventVenueID</wp:meta_key>
			<wp:meta_value><![CDATA[1688]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCurrencySymbol</wp:meta_key>
			<wp:meta_value><![CDATA[€]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCost</wp:meta_key>
			<wp:meta_value><![CDATA[ ]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventURL</wp:meta_key>
			<wp:meta_value><![CDATA[http://www.itpartners.fr]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventOrganizerID</wp:meta_key>
			<wp:meta_value><![CDATA[1682]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[IT]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Midest</title>
		<link>http://www.it-news.fr/event/midest/</link>
		<pubDate>Thu, 05 Dec 2013 16:13:46 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?post_type=tribe_events&#038;p=1689</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2013/12/midest.jpg"><img class="alignleft size-full wp-image-1690" alt="midest" src="http://www.it-news.fr/wp-content/uploads/2013/12/midest.jpg" width="257" height="71" /></a>MIDEST est la plate-forme mondiale de référencement et d’échanges entre donneurs d’ordres et sous-traitants.
Fabricants, équipementiers et assembleurs rencontrent en face à face les fournisseurs de solutions en transformation des métaux, plasturgie, électronique, microtechniques et services à l’industrie</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1689</wp:post_id>
		<wp:post_date>2013-12-05 17:13:46</wp:post_date>
		<wp:post_date_gmt>2013-12-05 16:13:46</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>midest</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_events</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventAuditTrail</wp:meta_key>
			<wp:meta_value><![CDATA[a:3:{i:0;a:2:{i:0;s:15:"events-calendar";i:1;i:1386259511;}i:1;a:2:{i:0;s:15:"events-calendar";i:1;i:1386259528;}i:2;a:2:{i:0;s:15:"events-calendar";i:1;i:1386259754;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[63]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMapLink</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMap</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventAllDay</wp:meta_key>
			<wp:meta_value><![CDATA[yes]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventStartDate</wp:meta_key>
			<wp:meta_value><![CDATA[2014-12-04 00:00:00]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventEndDate</wp:meta_key>
			<wp:meta_value><![CDATA[2014-12-07 23:59:59]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventDuration</wp:meta_key>
			<wp:meta_value><![CDATA[345599]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventVenueID</wp:meta_key>
			<wp:meta_value><![CDATA[1691]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCurrencySymbol</wp:meta_key>
			<wp:meta_value><![CDATA[€]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCost</wp:meta_key>
			<wp:meta_value><![CDATA[ ]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventURL</wp:meta_key>
			<wp:meta_value><![CDATA[http://www.midest.com]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventOrganizerID</wp:meta_key>
			<wp:meta_value><![CDATA[1682]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[midest]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[MIDEST est la plate-forme mondiale de référencement et d’échanges entre donneurs d’ordres et sous-traitants.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCurrencyPosition</wp:meta_key>
			<wp:meta_value><![CDATA[prefix]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>MedPi</title>
		<link>http://www.it-news.fr/event/medpi/</link>
		<pubDate>Thu, 05 Dec 2013 16:26:42 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?post_type=tribe_events&#038;p=1693</guid>
		<description></description>
		<content:encoded><![CDATA[<a style="color: #ff4b33; line-height: 24px;" href="http://www.it-news.fr/wp-content/uploads/2013/12/medpi.jpg"><img class="alignleft size-full wp-image-1694" alt="medpi" src="http://www.it-news.fr/wp-content/uploads/2013/12/medpi.jpg" width="183" height="136" /></a>

L'accès au MedPi est exclusivement réservé aux décideurs de la distribution des nouvelles technologies.Des prestation clé en main optimisent la dynamique "<strong>Relationnel / affaires". </strong>Une expertise unique dans la gestion d'une communauté d'affaires. Une destination pour les affaires, Monaco.]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1693</wp:post_id>
		<wp:post_date>2013-12-05 17:26:42</wp:post_date>
		<wp:post_date_gmt>2013-12-05 16:26:42</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>medpi</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_events</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventAuditTrail</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{i:0;a:2:{i:0;s:15:"events-calendar";i:1;i:1386260330;}i:1;a:2:{i:0;s:15:"events-calendar";i:1;i:1386260372;}i:2;a:2:{i:0;s:15:"events-calendar";i:1;i:1386260395;}i:3;a:2:{i:0;s:15:"events-calendar";i:1;i:1386260515;}i:4;a:2:{i:0;s:15:"events-calendar";i:1;i:1386260755;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[53]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMapLink</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMap</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventAllDay</wp:meta_key>
			<wp:meta_value><![CDATA[yes]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventStartDate</wp:meta_key>
			<wp:meta_value><![CDATA[2014-04-13 00:00:00]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventEndDate</wp:meta_key>
			<wp:meta_value><![CDATA[2014-04-16 23:59:59]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventDuration</wp:meta_key>
			<wp:meta_value><![CDATA[345599]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventVenueID</wp:meta_key>
			<wp:meta_value><![CDATA[1695]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCurrencySymbol</wp:meta_key>
			<wp:meta_value><![CDATA[€]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCost</wp:meta_key>
			<wp:meta_value><![CDATA[ ]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventURL</wp:meta_key>
			<wp:meta_value><![CDATA[http://www.medpi.com]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventOrganizerID</wp:meta_key>
			<wp:meta_value><![CDATA[1682]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Medpi]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>SITL Europe</title>
		<link>http://www.it-news.fr/event/sitl-europe/</link>
		<pubDate>Thu, 05 Dec 2013 16:32:59 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?post_type=tribe_events&#038;p=1696</guid>
		<description></description>
		<content:encoded><![CDATA[<a href="http://www.it-news.fr/wp-content/uploads/2013/12/sitl-europe.jpg"><img class="alignleft size-full wp-image-1697" alt="sitl-europe" src="http://www.it-news.fr/wp-content/uploads/2013/12/sitl-europe.jpg" width="179" height="180" /></a>La SITL offre à l’ensemble de la communauté nationale et internationale des acteurs du transport de marchandises et de services logistiques, un accès unique à l’ensemble des produits et services innovants dédiés à l’approvisionnement, la distribution, et la supply chain de demain.

La SITL est LE lieu pour obtenir l’information la plus pertinente sur la composition et l’évolution des marchés et développer son réseau ; Elle permet de disposer de tous les atouts nécessaires pour gagner en compétitivité et en performance aussi bien sur des aspects stratégiques qu’opérationnels.

La SITL relie le monde de la logistique.]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1696</wp:post_id>
		<wp:post_date>2013-12-05 17:32:59</wp:post_date>
		<wp:post_date_gmt>2013-12-05 16:32:59</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>sitl-europe</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>-1</wp:menu_order>
		<wp:post_type>tribe_events</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventAuditTrail</wp:meta_key>
			<wp:meta_value><![CDATA[a:3:{i:0;a:2:{i:0;s:15:"events-calendar";i:1;i:1386260821;}i:1;a:2:{i:0;s:15:"events-calendar";i:1;i:1386260943;}i:2;a:2:{i:0;s:15:"events-calendar";i:1;i:1386261004;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[47]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMapLink</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMap</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventAllDay</wp:meta_key>
			<wp:meta_value><![CDATA[yes]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventStartDate</wp:meta_key>
			<wp:meta_value><![CDATA[2014-02-01 00:00:00]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventEndDate</wp:meta_key>
			<wp:meta_value><![CDATA[2014-02-04 23:59:59]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventDuration</wp:meta_key>
			<wp:meta_value><![CDATA[345599]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventVenueID</wp:meta_key>
			<wp:meta_value><![CDATA[1691]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCurrencySymbol</wp:meta_key>
			<wp:meta_value><![CDATA[€]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCost</wp:meta_key>
			<wp:meta_value><![CDATA[ ]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventURL</wp:meta_key>
			<wp:meta_value><![CDATA[http://www.sitl.eu]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventOrganizerID</wp:meta_key>
			<wp:meta_value><![CDATA[1682]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventHideFromUpcoming</wp:meta_key>
			<wp:meta_value><![CDATA[yes]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[SITL Europe]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Quelles devraient être les priorités 2014/2015 des DAF ?</title>
		<link>http://www.it-news.fr/quelles-devraient-etre-les-priorites-20142015-daf/</link>
		<pubDate>Mon, 19 May 2014 07:00:34 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2438</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/?p=2438"><img class="alignleft wp-image-2441 size-medium" src="http://www.it-news.fr/wp-content/uploads/2014/05/priorite-daf-2014-2015-300x200.jpg" alt="priorite-daf-2014-2015" width="300" height="200" /></a>Le DAF ou Directeur Administratif et Financier assure de nombreuses fonctions au sein d’une structure organisationnelle. En plus de la gestion de l’administration, il s’occupe également de la gestion financière.</p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;">L’application d’un certain principe est indispensable dans la réalisation de sa fonction. Chaque réalisation doit se faire par ordre de priorité pour assurer la fluidité de toutes les opérations. Voici les principales priorités des DAF pour l’année 2014/2015.</p>

<h2 style="text-align: justify;">La mission première du DAF : le pilotage financier</h2>
<p style="text-align: justify;">Le pilotage financier est le premier rôle assuré par un DAF. Cette mission consiste essentiellement à la maîtrise des risques financiers par le suivi de la <a href="http://www.aquastar-consulting.com/index.php/solutions/gestion-metier/comptabilite-finances/tresorerie" target="_blank">trésorerie</a>, la gestion des besoins financiers, le financement de l’activité et des investissements et la politique fiscale. L’utilisation d’un logiciel dédié est indispensable pour la gestion de la trésorerie. Il facilite l’application d’une politique de recouvrement et de crédit afin d’assurer la ressource financière.</p>

<h2 style="text-align: justify;">Le pilotage opérationnel : l’enjeu quotidien du DAF</h2>
<p style="text-align: justify;">L’amélioration de la rentabilité et de l’efficacité de l’entreprise fait partie des priorités d’un DAF. Il doit pour cela mettre en place un reporting mensuel afin de pouvoir mensualiser la comptabilité et comparer les résultats. La définition des modes opératoires de la structure lui permet d’assurer le bon fonctionnement de l’entreprise. Le suivi quotidien peut se faire à l’aide d’un logiciel de contrôle de gestion.</p>
<p style="text-align: justify;"><strong>La gestion des obligations légales et des ressources humaines revient également au DAF!</strong></p>

<h2 style="text-align: justify;">Le pilotage stratégique délivré par le DAF est vitale pour l’entreprise</h2>
<p style="text-align: justify;">La mise en place d’une stratégie est indispensable pour le développement de l’entreprise. Le DAF doit pour cela fixer l’objectif et favoriser la croissance par la formalisation de la vision stratégie dans <a href="http://fr.wikipedia.org/wiki/Plan_d'affaires" target="_blank">un business plan</a>. Ce business plan est un outil qui servira à convaincre les investisseurs et motiver les collaborateurs dans la coordination des actions à court et à long terme. La gestion prévisionnelle et les budgets lui sont nécessaires pour atteindre les objectifs fixés. C’est également un outil de pilotage financier de la croissance de l’entreprise.</p>
<p style="text-align: justify;"><strong>Comment Aquastar Consulting Consulting peut vous aider ? </strong></p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/solutions/gestion-metier/comptabilite-finances" target="_blank">Solution de gestion de comptabilité et financière – Sage</a></li>
</ul>
<p style="text-align: justify;"></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2438</wp:post_id>
		<wp:post_date>2014-05-19 08:00:34</wp:post_date>
		<wp:post_date_gmt>2014-05-19 07:00:34</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>quelles-devraient-etre-les-priorites-20142015-daf</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="comptabilite"><![CDATA[comptabilité]]></category>
		<category domain="category" nicename="comptabilite-finances"><![CDATA[Comptabilité - Finances]]></category>
		<category domain="post_tag" nicename="finance"><![CDATA[finance]]></category>
		<category domain="post_tag" nicename="gestion"><![CDATA[gestion]]></category>
		<category domain="post_tag" nicename="ressources-humaines"><![CDATA[Ressources humaines]]></category>
		<category domain="post_tag" nicename="tresorerie"><![CDATA[trésorerie]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[DAF]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[83]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1425386867]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"170.1820370465897";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:3:"563";s:5:"score";s:17:"91.06761857613435";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:17:"78.39788350148608";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"332";s:5:"score";s:17:"56.60992976602655";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:3:"953";s:5:"score";s:17:"50.46134057399237";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:16:"48.4273060973657";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1605";s:5:"score";s:17:"45.16327998115099";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"342";s:5:"score";s:17:"40.67862156900689";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[2449]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:12:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"269.2556942336652";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:18:"121.21637324912881";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"563";s:5:"score";s:17:"77.28190006149131";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"73.68944907987121";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:18:"51.869341822262385";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"332";s:5:"score";s:17:"47.77421655329504";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"953";s:5:"score";s:17:"43.00503973245854";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1605";s:5:"score";s:17:"35.39456240841027";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:18:"34.871441812626685";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"34.403435137216704";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:3:"342";s:5:"score";s:17:"32.49896648389427";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:18:"29.808337899626036";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"269.9992496031435";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:18:"121.97553031095495";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:3:"563";s:5:"score";s:17:"77.56215862853341";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"73.61770680218466";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:17:"51.54800351106207";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"332";s:5:"score";s:17:"47.85819318995328";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"953";s:5:"score";s:18:"43.038060266033675";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1605";s:5:"score";s:17:"35.45306099278662";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2084";s:5:"score";s:17:"35.12103784571268";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"34.025956240420044";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Vers la fin de l’ ERP classique</title>
		<link>http://www.it-news.fr/vers-fin-l-erp-classique/</link>
		<pubDate>Wed, 21 May 2014 07:00:25 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2444</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/?p=2444"><img class="alignleft wp-image-2445 size-full" src="http://www.it-news.fr/wp-content/uploads/2014/05/ERP-hybride.jpg" alt="ERP-hybride" width="300" height="200" /></a>Gartner le prédit, dans les prochaines années, l’ERP classique, sous la forme qu’on lui connaît va mourir. Le cabinet prévoit la démocratisation d’un ERP hybride, avec des applications présentes sur le Cloud et sur les parcs informatique de l’entreprise.</p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;">Le cabinet <a href="http://www.gartner.com/technology/home.jsp" target="_blank">Gartner</a> a révélé que, dès 2016, les ERP classiques ou « monolithiques » et personnalisables ne seront plus d’actualité. En effet, ceux-ci seront peu à peu remplacés par un ERP décrit comme « post-moderne ».</p>
<p style="text-align: justify;">Andy Kyte, vice-président de Gartner déclare que « <em>Les entreprises qui cherchent à améliorer leur gestion peuvent désormais bénéficier de coûts réduits, d'un ajustement fonctionnel optimisé et d'une plus grande flexibilité des processus en combinant des applications cloud avec des applications sur site dans ce que nous appelons aujourd'hui un ERP post-moderne</em> ».</p>
<p style="text-align: justify;">Bien entendu, les <a href="http://fr.wikipedia.org/wiki/Progiciel_de_gestion_int%C3%A9gr%C3%A9" target="_blank">architectures ERP</a> actuelles ne vont pas être exclues du jour au lendemain. Elles vont être graduellement modifiées pour évoluer vers un modèle hybride. D’ailleurs, Gartner prévoit que, d’ici cinq ans, ce sont les entreprises qui vont prendre l’initiative de moderniser leur ERP.</p>
<p style="text-align: justify;">Un ERP dit hybride va pouvoir combiner ses applications soit sur le Cloud, soit sur les terminaux informatiques de l’entreprise. En fait, il s’agit de séparer ce qui nécessite peu de personnalisation, comme les traitements des processus, des applications « cœur de métier » qui, elles, seront présentes sur site.</p>
<p style="text-align: justify;">De plus, le rapport de Gartner précise que d’ici à 2018, plus d’un tiers des entreprises auront déjà remplacé leur ERP monolithique par un ERP post-moderne.</p>
<p style="text-align: justify;">Nigel Rayner, Vice-Président chez Gartner, a annoncé que, d’ici une dizaine d’années, les entreprises se tourneront de plus en plus vers des solutions se situant sur le Cloud. D’après Rayner, « <em>Il n'y aura plus de fournisseurs de méga-suites simples, mais de suite au couplage de fonctionnalités cloud, ce qui va créer de nouveaux défis d'intégration pour les départements IT ». </em></p>
<p style="text-align: justify;">Gartner met tout de même en garde les entreprises qui souhaitent se tourner vers une solution ERP hybride, parce qu’il n’y aura pas une garantie de réduction de coûts. De plus, il y a un risque que les entreprises investissent trop sur la mise en œuvre en mettant de côté la création de valeur à long terme. Le cabinet conseille aux entreprises qui souhaitent éviter ce genre de finalités de lier les objectifs d’affaires et la stratégie ERP.</p>
<p style="text-align: justify;"><span style="color: #ff6600;"><strong>Comment Aquastar Consulting peut vous aider ? </strong></span></p>

<ul style="text-align: justify;">
	<li><a href="http://www.aquastar-consulting.com/index.php/societe/partenaires/gestion-metier/sage" target="_blank">Solution de gestion – ERP – Sage</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2444</wp:post_id>
		<wp:post_date>2014-05-21 08:00:25</wp:post_date>
		<wp:post_date_gmt>2014-05-21 07:00:25</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>vers-fin-l-erp-classique</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="cloud"><![CDATA[cloud]]></category>
		<category domain="category" nicename="erp"><![CDATA[ERP]]></category>
		<category domain="post_tag" nicename="erp-hybride"><![CDATA[erp hybride]]></category>
		<category domain="post_tag" nicename="gartner"><![CDATA[Gartner]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[2445]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[ERP]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[81]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426730632]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:18:"111.41552552337245";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:16:"74.1171938189427";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"66.29267616856691";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"64.47399910663076";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"59.82304482667368";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2424";s:5:"score";s:17:"46.68597911855615";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"42.62076798427957";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"820";s:5:"score";s:18:"33.705762382976154";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:12:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:17:"175.1563542268758";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"109.27704195534639";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2424";s:5:"score";s:18:"106.22483898855492";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"95.26306437693597";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"93.41066050325401";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"87.75120723289027";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"65.00697571838752";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"26.973487162238108";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"26.61787306192785";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:3:"820";s:5:"score";s:18:"25.535761242920522";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:4:"2411";s:5:"score";s:17:"24.87881208072928";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"1398";s:5:"score";s:18:"21.707037660472057";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:18:"175.95927642098846";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"109.99042739671823";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2424";s:5:"score";s:17:"106.8745293017652";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:17:"95.83399019321551";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"94.05098607742443";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:16:"88.3503050117909";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:16:"65.3801453228939";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"27.063704288574797";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"26.708090188463828";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:3:"820";s:5:"score";s:18:"25.714107603314115";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>1er Juin 2014, les entreprises sont visées par la portabilité des frais de santé</title>
		<link>http://www.it-news.fr/1er-juin-2014-les-entreprises-visees-portabilite-frais-sante/</link>
		<pubDate>Tue, 10 Jun 2014 12:00:13 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2465</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/?p=2465"><img class="alignleft wp-image-2467 size-medium" src="http://www.it-news.fr/wp-content/uploads/2014/06/1-juin-2014-loi-securisation-sante-300x200.jpg" alt="1-juin-2014-loi-securisation-sante" width="300" height="200" /></a>Le 1<sup>er</sup> Juin 2014,  les entreprises devront maintenir gratuitement les frais de santé pour les anciens salariés pour une période d’une année.</p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;">Par conséquent, à partir du 1<sup>er</sup> Juin, le certificat de travail délivré aux employés devra porter mention du maintien des garanties.</p>
<p style="text-align: justify;">En effet, d’après <a href="http://www.legifrance.gouv.fr/affichCodeArticle.do;jsessionid=F6CD306768C176D953D0C9837005860F.tpdjo15v_3?cidTexte=LEGITEXT000006073189&amp;idArticle=LEGIARTI000027549338&amp;dateTexte=" target="_blank">la loi de sécurisation de l’emploi du 14 Juin 2013</a>,  les employés ayant involontairement, perdu leur fonction pourront  profiter gratuitement des contrats complémentaires santé pendant un an maximum, dès la cessation de leurs contrats. Cette loi rentre en vigueur dès le 1<sup>er</sup> Juin 2014.</p>
<p style="text-align: justify;">Cette loi a apporté plus de précisions et de codes par rapport à la portabilité de la prévoyance mise en place par l’accord national interprofessionnel du 11 Janvier 2008.</p>
<p style="text-align: justify;">Voici en synthèse ce que la loi de la sécurisation de l’emploi du 14 Juin 2013 apporte :</p>
<img class="aligncenter wp-image-2466 size-full" src="http://www.it-news.fr/wp-content/uploads/2014/06/synthese-loi-securisation-de-l-emploi.jpg" alt="Synthèse de l'application de la loi de la sécurisation de l'emploi" width="728" height="423" />
<p style="text-align: justify;"><strong><span style="color: #ff6600;">Comment Aquastar Consulting peut vous aider ?</span></strong></p>

<ul>
	<li style="text-align: justify;"><a href="http://www.aquastar-consulting.com/index.php/solutions/gestion-metier/paye-rh/paie-rh" target="_blank">Solution de gestion RH - Sage</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2465</wp:post_id>
		<wp:post_date>2014-06-10 13:00:13</wp:post_date>
		<wp:post_date_gmt>2014-06-10 12:00:13</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>1er-juin-2014-les-entreprises-visees-portabilite-frais-sante</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="decisionnel"><![CDATA[Décisionnel]]></category>
		<category domain="category" nicename="paie-rh"><![CDATA[Paie - RH]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[santé]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[63]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Le 1er Juin 2014, les entreprises devront maintenir gratuitement les frais de santé pour les anciens salariés pour une période d’une année.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[2470]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1423891134]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:16:"45.9738269957233";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:18:"30.933717839360803";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"30.465364492225113";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2371";s:5:"score";s:18:"27.277712517515447";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1819";s:5:"score";s:18:"26.779442097409976";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1605";s:5:"score";s:18:"25.607530406053485";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:18:"24.597533370116757";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2319";s:5:"score";s:17:"24.29577883367279";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:12:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:18:"62.450184855143966";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2371";s:5:"score";s:18:"59.573320924089785";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2319";s:5:"score";s:17:"48.56373107456866";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:17:"43.16035956163042";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:15:"41.629902886619";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:17:"40.14646119509125";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"29.369830376032176";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:16:"24.6449700437744";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:18:"23.892738448742037";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"23.892738448742037";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:4:"1979";s:5:"score";s:18:"23.892738448742037";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"2475";s:5:"score";s:18:"22.591546478298405";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:17:"63.00551750590678";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2371";s:5:"score";s:18:"60.031925851475016";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2319";s:5:"score";s:17:"49.00560057700043";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2181";s:5:"score";s:17:"43.49473838300156";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"41.48042425713269";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:17:"40.00980869264843";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"29.72652309722637";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"24.979348865414927";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2314";s:5:"score";s:18:"24.181345649759464";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"24.181345649759464";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Les entreprises sous-utilisent les produits Office</title>
		<link>http://www.it-news.fr/les-entreprises-utilisent-les-produits-office/</link>
		<pubDate>Tue, 17 Jun 2014 16:00:58 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2475</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/?p=2475"><img class="alignleft wp-image-2476 size-medium" src="http://www.it-news.fr/wp-content/uploads/2014/06/le-entreprises-sousestiment-office-300x200.jpg" alt="le-entreprises-sousestiment-office" width="300" height="200" /></a>En entreprise, 2/3 des utilisateurs n’utilisent Office que pour visualiser ou éditer un document. Ces utilisateurs, infidèles, pourraient se tourner vers des solutions alternatives plus économiques.</p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;">Une étude relative à l’usage réelle d’Office dans les entreprises et produite par <a href="http://www.softwatch.com/" target="_blank">Softwatch</a>, un éditeur spécialisé dans les solutions d’optimisation des dépenses de licences, explique que les entreprises n’utilisent en moyenne Office que 48 minutes par jour.</p>
<p style="text-align: justify;">Basée sur une observation de trois mois des comportements de 148.500 salariés de 51 entreprises de plus de 500 employés, cette étude révèle qu’Outlook représente 68% de l’usage quotidien d’Office (avec 33 minutes en moyenne par jour).</p>
<a href="http://www.it-news.fr/wp-content/uploads/2014/06/utilisation-produits-office.jpg"><img class="size-full wp-image-2480 aligncenter" src="http://www.it-news.fr/wp-content/uploads/2014/06/utilisation-produits-office.jpg" alt="utilisation-produits-office" width="481" height="284" /></a>
<p style="text-align: justify;">Un point de l’étude surprend : la moitié des utilisateurs d’Office n’utilisent pas du tout PowerPoint ! En ce qui concerne Excel, un tiers des salariés ne l’utilisent pas ou ne l’emploient que pour visualiser le document sans pour autant le modifier.</p>
<p style="text-align: justify;">Softwatch observe que l’utilisation intensive d’une application <a href="http://office.microsoft.com/fr-fr/" target="_blank">d’Office</a> ne concerne qu’un tiers des 32% des utilisateurs, c’est-à-dire environ 2% ! L’étude définit une utilisation intensive comme un emploi des applications</p>
<p style="text-align: justify;">Cette utilisation se divise de la façon suivante :</p>
<a href="http://www.it-news.fr/wp-content/uploads/2014/06/utilisation-intensive-des-applications-offices.png"><img class="size-full wp-image-2479 aligncenter" src="http://www.it-news.fr/wp-content/uploads/2014/06/utilisation-intensive-des-applications-offices.png" alt="utilisation-intensive-des-applications-offices" width="470" height="254" /></a>
<p style="text-align: justify;">Le Bilan de l’étude montre qu’au moins 80% des entreprises devraient migrer vers des solutions alternatives (sans aucune période d’adaptation pour les utilisateurs) qui seraient moins coûteuses pour les organisations. De plus, l’éditeur conseille aux entreprises de négocier leurs licences avec Microsoft pour qu’elles soient représentatives de l’utilisation réelle des applications d’Office.</p>
<p style="text-align: justify;"><strong><span style="color: #ff6600;">Comment Aquastar Consulting peut vous aider ? </span></strong></p>
<p style="text-align: justify;">Aquastar Consulting est partenaire de Microsoft et peut répondre à vos questions.
<a href="http://www.aquastar-consulting.com/index.php/contact" target="_blank">Contacter Aquastar Consulting</a></p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2475</wp:post_id>
		<wp:post_date>2014-06-17 17:00:58</wp:post_date>
		<wp:post_date_gmt>2014-06-17 16:00:58</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>les-entreprises-utilisent-les-produits-office</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="decisionnel"><![CDATA[Décisionnel]]></category>
		<category domain="post_tag" nicename="excel"><![CDATA[Excel]]></category>
		<category domain="post_tag" nicename="outlook"><![CDATA[outlook]]></category>
		<category domain="post_tag" nicename="pme"><![CDATA[PME]]></category>
		<category domain="post_tag" nicename="powerpoint"><![CDATA[PowerPoint]]></category>
		<category domain="post_tag" nicename="word"><![CDATA[Word]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Office]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[85]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[En entreprise, 2/3 des utilisateurs n’utilisent Office que pour visualiser ou éditer un document.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[2476]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426909715]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:17:"84.69253906901125";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:17:"81.74871530343498";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"69.23358418016183";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"342";s:5:"score";s:17:"42.34626953450562";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2406";s:5:"score";s:18:"35.030832812514326";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:3:"323";s:5:"score";s:17:"31.52064931218054";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:3:"774";s:5:"score";s:18:"31.087727652405786";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:17:"23.10217347578609";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:12:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"126.36672265940729";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:18:"124.65792052430531";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"110.96420754388416";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"342";s:5:"score";s:18:"31.591680664851822";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2436";s:5:"score";s:18:"30.579967140198335";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"28.299146683411383";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2406";s:5:"score";s:18:"27.992075069770312";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"323";s:5:"score";s:17:"25.28552450382323";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:18:"25.110336989902304";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"25.110336989902304";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:3:"774";s:5:"score";s:18:"24.294239303556886";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"2465";s:5:"score";s:18:"22.460315442357082";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"127.23951946170573";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2261";s:5:"score";s:18:"125.16063564483466";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:18:"111.56948817017167";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:3:"342";s:5:"score";s:18:"31.809879865426435";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2436";s:5:"score";s:17:"30.87553047923939";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"28.460050095776815";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2406";s:5:"score";s:17:"28.15722772898177";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:3:"323";s:5:"score";s:18:"25.439372764594566";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2305";s:5:"score";s:18:"25.312410738606726";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:18:"25.312410738606726";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Vidéo humour: Connexion réseau : tablette</title>
		<link>http://www.it-news.fr/video-humour-connexion-reseau-tablette/</link>
		<pubDate>Thu, 19 Jun 2014 07:48:27 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2482</guid>
		<description></description>
		<content:encoded><![CDATA[<iframe src="//www.youtube.com/embed/oEnv_SVZCSc" width="560" height="315" frameborder="0" allowfullscreen="allowfullscreen"></iframe>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2482</wp:post_id>
		<wp:post_date>2014-06-19 08:48:27</wp:post_date>
		<wp:post_date_gmt>2014-06-19 07:48:27</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>video-humour-connexion-reseau-tablette</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="videos"><![CDATA[Vidéos]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[connexion]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[33]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[empty]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1425386856]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:4:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2251";s:5:"score";s:18:"29.575110607337933";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2232";s:5:"score";s:18:"29.575110607337933";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2030";s:5:"score";s:18:"29.575110607337933";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2362";s:5:"score";s:18:"14.787555303668967";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:4:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2251";s:5:"score";s:18:"43.189684985528984";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2232";s:5:"score";s:18:"43.189684985528984";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2030";s:5:"score";s:18:"43.189684985528984";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2362";s:5:"score";s:17:"32.39226373914674";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:4:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2251";s:5:"score";s:17:"43.44446550084389";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2232";s:5:"score";s:17:"43.44446550084389";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2030";s:5:"score";s:17:"43.44446550084389";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2362";s:5:"score";s:17:"32.58334912563292";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Réussir son projet ERP en 10 étapes</title>
		<link>http://www.it-news.fr/reussir-projet-erp-en-10-etapes/</link>
		<pubDate>Mon, 23 Jun 2014 10:29:37 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2491</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.aquastar-consulting.com/index.php/actualites/182-reussir-son-projet-erp-en-10-etapes"><img class="alignleft wp-image-2494 size-full" src="http://www.it-news.fr/wp-content/uploads/2014/06/ERP-hybride.jpg" alt="ERP-hybride" width="300" height="200" /></a>L’ERP, ou Enterprise Ressource Planning, est le pilier qui soutient le système d’information d’une entreprise. Son but principal est de gérer de manière interactive tous les métiers de l’entreprise en centralisant, analysant et partageant les données recueillies.</p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;">Les entreprises sont de plus en plus nombreuses à posséder une solution <a href="http://fr.wikipedia.org/wiki/Progiciel_de_gestion_int%C3%A9gr%C3%A9" target="_blank">ERP</a>. Elles ont toutes un seul objectif, celui <strong>d’être plus productif</strong> tout en <strong>maîtrisant le développement de l’entreprise</strong>.</p>

<h1 style="text-align: justify;">Pour mettre en place une solution ERP, une réflexion est de rigueur</h1>
<p style="text-align: justify;">Pourtant, mettre en place une solution ERP, aussi utile soit-elle, n’est pas simple. Cette solution va devoir respecter les points fondamentaux d’une entreprise :</p>

<ol>
	<li>La stratégie et les enjeux</li>
	<li>Les spécificités (organisations, métiers…)</li>
	<li>Le budget et les délais</li>
	<li>L’architecture matérielle (le système d’information…)</li>
	<li>Les employés (une facilité de maîtrise de l’outil mis en place)</li>
</ol>
<h1 style="text-align: justify;">Les dix étapes pour réussir son projet ERP</h1>
<p style="text-align: justify;">C’est pour respecter ces 5 points fondamentaux qu’il faut suivre les dix étapes de la méthode d’intégration d’une solution ERP.</p>

<h2 style="text-align: justify;">Etape n°1 : Définissez précisément votre problématique</h2>
<p style="text-align: justify;">Chaque entreprise a sa raison de se doter d’une solution ERP. Que ce soit pour une circulation de l’information optimale, un meilleur partage des données ou une réponse aux nouveaux besoins du système d’information, l’entreprise se doit de définir précisément la problématique métier sur le long terme.</p>
<p style="text-align: justify;">Cette étape permettra au décisionnaire de trouver une solution adaptée aux besoins réels de l’entreprise tout en ayant une vision évolutive quant aux objectifs futurs.</p>

<h2 style="text-align: justify;">Etape n°2 : Formalisez vos besoins par écrit</h2>
<p style="text-align: justify;">Peu d’entreprises remplissent cette étape pourtant cruciale pour la finalisation du projet ERP. Il suffit de rédiger ses besoins dans le cadre d’un cahier des charges pour trouver LA solution ERP.</p>
<p style="text-align: justify;">Le premier point à remplir est de décrire les caractéristiques métiers de l’entreprise. Le but est de dresser un portrait précis et synthétique de l’entreprise. Voici quelques exemples de questions :</p>

<ul style="text-align: justify;">
	<li>Quels sont les processus clés de votre entreprise ?</li>
	<li>Quelles sont les particularités de votre secteur d’activité ?</li>
	<li>Quelle est votre architecture informatique actuelle ?</li>
	<li>Etc.</li>
</ul>
<p style="text-align: justify;">Le deuxième point est de poser clairement des objectifs raisonnables. Pour cela, il faudrait rédiger ces objectifs à moyen-terme.</p>
<p style="text-align: justify;">Le but de cette étape est de se faire comprendre sans aucune ambiguïté par le prestataire choisi.</p>

<h2 style="text-align: justify;">Etape n°3 : Impliquez la direction et les utilisateurs</h2>
<p style="text-align: justify;">Pour tout projet stratégique et organisationnel de l’entreprise, l’implication de la direction est fondamentale pour la réussite du projet. Mais il ne faut pas oublier les futurs utilisateurs de la solution. C’est la raison pour laquelle la constitution d’un groupe-projet <strong>est</strong> fondamentale. Ce groupe aura 4 grandes priorités :</p>

<ol style="text-align: justify;">
	<li>Avoir une vision futuriste de l’organisation de l’entreprise</li>
	<li>Définir les rôles de chaque membre du groupe avec précision</li>
	<li>Autoriser le groupe à recevoir le transfert de compétences</li>
	<li>Veiller à communiquer avec les utilisateurs finaux de la solution ERP et avec la direction décisionnaire</li>
</ol>
<p style="text-align: justify;">Cette étape a pour objectif de rassurer les futurs utilisateurs en communicant sur le projet ERP et son utilité. Par ailleurs, il faut informer régulièrement les différents protagonistes – les utilisateurs finaux et la direction – sur l’avancée du projet et sur les points qui les concernent.</p>

<h2 style="text-align: justify;">Etape n°4 : Choix de la solution ERP et de l’éditeur</h2>
<p style="text-align: justify;">La <strong>solution ERP</strong> devra répondre à plusieurs critères prédéfinis par l’entreprise. Par exemple, certains critères pourront être :</p>

<ul style="text-align: justify;">
	<li>La technologie utilisée est-elle en adéquation avec les normes de l’entreprise ?</li>
	<li>L’offre est-elle nouvelle ou mature ?</li>
	<li>L’ergonomie et la facilité d’utilisation, ainsi que la possibilité de paramétrage</li>
	<li>L’intégration au système d’information déjà présente</li>
	<li>…</li>
</ul>
<p style="text-align: justify;">Il faut aussi choisir une solution ERP par rapport à <strong>son éditeur</strong>. En effet, le marché de l’ERP est concurrentiel, il est donc très difficile d’établir un choix. La direction devra donc fixer son choix en se fiant à plusieurs critères :</p>

<ul style="text-align: justify;">
	<li>Les résultats financiers de l’éditeur</li>
	<li>Le parc client de l’éditeur</li>
	<li>La maintenance proposée</li>
	<li>Le positionnement de l’éditeur sur le marché international</li>
</ul>
<p style="text-align: justify;">Cette étape a pour but de paramétrer l’état des critères préétablis en toute autonomie sans interférence externe.</p>

<h2 style="text-align: justify;">Etape n°5 : Le partenaire intégrateur est important</h2>
<p style="text-align: justify;">Après avoir choisi la solution ERP adaptée, il faudra se renseigner sur <a href="http://www.aquastar-consulting.com/index.php/services" target="_blank">le partenaire intégrateur</a> pour que le logiciel soit déployé dans les meilleures conditions.</p>
<p style="text-align: justify;">Le partenaire intégrateur est celui qui va installer votre ERP dans votre organisation. Par conséquent, pour un déploiement optimal de votre solution, il faut choisir un partenaire intégrateur qui remplit certaines conditions préétablies selon les besoins de l’entreprise.</p>
<p style="text-align: justify;">Ces conditions peuvent être géographiques, culturelles (basées sur la connaissance du métier de l’entreprise et de son marché) ou humaines (confiance entre l’intégrateur et l’entreprise).</p>

<h2 style="text-align: justify;">Etape n°6 : Suivez une méthodologie claire et adaptée</h2>
<p style="text-align: justify;">Pour tout projet, il faut suivre des étapes claires et précises. Cette méthodologie doit pouvoir répondre aux spécificités organisationnelles et métier de l’entreprise.</p>
<p style="text-align: justify;">Cette méthodologie est constituée de trois axes majeurs. <strong>Le premier axe</strong> est de bien positionner les charges internes et externes et donc de désigner un chef de projet et les utilisateurs clés de la solution ERP. <strong>Le deuxième point</strong> serait de bien répartir les rôles pour le groupe qui travaillera sur le projet afin que leurs missions soient bien définies. <strong>Le troisième et dernier axe</strong> sera de bien tout formaliser par écrit. Cet axe a pour but de rendre le travail effectué pérenne et transparent.</p>

<h2 style="text-align: justify;">Etape n°7 : Les risques et les pièges</h2>
<p style="text-align: justify;">Dans la plus grande part des projets ERP, ce n’est que lorsque la solution est en place que les entreprises se rendent compte des dangers potentiels sur l’organisation.</p>
<p style="text-align: justify;">En effet, la solution ERP choisie ne pourra répondre à l’ensemble des besoins de l’entreprise. Dans ce cas là, il existe deux solutions : revoir le choix d’ERP ou repenser les processus internes.</p>
<p style="text-align: justify;">Pour éviter d’être dans le cas où la solution ERP ne peut être modifiée, il faut effectuer des tests (par domaine et sous-domaine) tout au long du processus de l’avancée de l’installation avec l’intégrateur.</p>

<h2 style="text-align: justify;">Etape n°8 : Communiquez et formez les différents utilisateurs de l’ERP</h2>
<p style="text-align: justify;">C’est dans la nature humaine d’être récalcitrante face au changement. En effet, l’ERP va impacter la plupart des métiers de l’entreprise, incluant également une modification des processus internes et des  habitudes. Il est donc nécessaire de <strong>communiquer</strong> et de <strong>former</strong> les utilisateurs de la solution pour que le passage vers l’ERP se fasse aussi facilement que possible. Par conséquent, il faut prévoir une véritable stratégie pour faciliter le changement et en incitant à la formation tout en gérant les récalcitrants.</p>
<p style="text-align: justify;">Voici quelques conseils pour obtenir l’adhésion de l’ensemble des collaborateurs concernés :</p>

<ul style="text-align: justify;">
	<li>Mettre en avant les bénéfices de la nouvelle solution (productivité, efficacité, transparence, meilleure qualité de travail…)</li>
	<li>Favoriser la performance de l’entreprise plutôt que la performance individuelle</li>
	<li>Former les utilisateurs dans le but d’une utilisation optimale de l’outil</li>
</ul>
<h2 style="text-align: justify;">Etape n°9 : Maintenance et support de la solution</h2>
<p style="text-align: justify;">Après avoir installé la solution, il faut mettre en place un système de maintenance (mises à jour…). Dans ce cas, le meilleur conseiller sera l’intégrateur qui pourra adapter l’offre à la demande.</p>
<p style="text-align: justify;">Les exigences que chaque entreprise se doit d’avoir sont :</p>

<ul style="text-align: justify;">
	<li>La réactivité : les incidents qui surviendront se doivent d’être rapidement résolus</li>
	<li>L’écoute : un interlocuteur unique se doit d’être à votre disposition</li>
	<li>L’efficacité : Le service de maintenance de l’outil ERP en place doit être efficace.</li>
</ul>
<p style="text-align: justify;">L’objectif est de garder un système cohérent et en adéquation avec les besoins de l’entreprise.</p>

<h2 style="text-align: justify;">Etape n°10 : Mettez en place des systèmes d’analyse et mesurez les bénéfices.</h2>
<p style="text-align: justify;">L’analyse des résultats est primordiale pour dégager les indicateurs de réussite. Par ailleurs, c’est lorsque les bénéfices seront quantifiés (meilleure productivité, augmentation des performances, gain de coûts…) que la direction pourra officiellement déclarer que la mise en place de l’ERP était un succès pour l’entreprise.</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2491</wp:post_id>
		<wp:post_date>2014-06-23 11:29:37</wp:post_date>
		<wp:post_date_gmt>2014-06-23 10:29:37</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>reussir-projet-erp-en-10-etapes</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="erp"><![CDATA[ERP]]></category>
		<category domain="category" nicename="non-classe"><![CDATA[Non classé]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[ERP]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[84]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[L’ ERP, ou Enterprise Ressource Planning, est le pilier qui soutient le système d’information d’une entreprise.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[2494]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1423891147]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:12:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2411";s:5:"score";s:17:"60.39244069632792";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2444";s:5:"score";s:17:"57.91422059840702";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2424";s:5:"score";s:18:"50.204959441621796";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"48.51926517708901";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:16:"36.1194479920299";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1794";s:5:"score";s:18:"34.485933234727966";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1933";s:5:"score";s:17:"31.05128675834859";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:18:"25.840433116316262";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"1257";s:5:"score";s:18:"23.167693775856307";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"22.560170844901872";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:4:"2354";s:5:"score";s:17:"20.79660657379396";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"1955";s:5:"score";s:18:"20.004982367123425";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_4</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2411";s:5:"score";s:17:"60.39244069632792";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2444";s:5:"score";s:17:"57.91422059840702";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2424";s:5:"score";s:18:"50.204959441621796";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:17:"48.51926517708901";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:16:"36.1194479920299";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1794";s:5:"score";s:18:"34.485933234727966";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1933";s:5:"score";s:17:"31.05128675834859";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:18:"25.840433116316262";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2411";s:5:"score";s:17:"60.56386984210128";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2444";s:5:"score";s:18:"58.123745110870324";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2424";s:5:"score";s:17:"50.33829322291354";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2149";s:5:"score";s:16:"48.6970435515948";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:17:"36.32262327716744";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"1794";s:5:"score";s:17:"34.60021933244395";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"1933";s:5:"score";s:16:"31.1655728552559";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:18:"25.942020759891733";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"1257";s:5:"score";s:18:"23.215435607828415";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2300";s:5:"score";s:18:"22.674947439035478";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Lorsque le danger se trouve à portée de main : BYOD</title>
		<link>http://www.it-news.fr/lorsque-danger-se-trouve-portee-main/</link>
		<pubDate>Wed, 25 Jun 2014 12:54:14 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2501</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/?p=2501"><img class="alignleft wp-image-2502 size-full" src="http://www.it-news.fr/wp-content/uploads/2014/06/danger_smartphone_entreprise_securite.jpg" alt="danger_smartphone_entreprise_securite" width="341" height="228" /></a>Les entreprises ont pris conscience de l’importance de protéger leurs parcs informatiques pour contrer les cyber-vols. Beaucoup d’entre elles n’ont malheureusement pas inclus les Smartphones dans leur politique informatique.</p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;">Pourtant, depuis les Smartphones sont très populaires au sein d’une entreprise. Que se soit pour un moment de détente ou pour consulter ses mails, le Smartphone est souvent utilisé tout au long de la journée.</p>
<p style="text-align: justify;">Cyrille Badeau, directeur Europe du sud à Cisco, déclare que la politique des entreprises par rapport au <a href="http://www.it-news.fr/byod-et-securite/" target="_blank">BYOD </a>(tout appareil mobile) se doit d’être <strong>aussi rigoureuse</strong> que la politique instaurée pour les appareils informatiques non-mobiles, sinon plus !</p>
<p style="text-align: justify;">De plus, la frontière séparant la vie professionnelle des employés et leur vie sociale souvent vantée sur les réseaux sociaux publiques (Facebook, Twitter…) est devenue de plus en plus floue. A cause du Smartphone, l’utilisation des réseaux sociaux se fait de plus en plus au sein même de l’entreprise et en utilisant le réseau internet de celle-ci.</p>
<p style="text-align: justify;">Par ailleurs, la problématique majeure des outils informatiques mobiles est que les employés n’hésitent pas à accéder à des ressources de l’entreprise sans pour autant être contrôler par le service informatique de l’entreprise mettant à risque les informations confidentielles de l’organisation.</p>
<p style="text-align: justify;">Avec ce phénomène, une nouvelle tendance des hackers a émergée et se résume à choisir pour cible les périphériques mobiles des employés pour pénétrer l’infrastructure des entreprises.</p>
<p style="text-align: justify;">Avec la propagation des Smartphones, tablettes, phablettes… l’utilisation du BYOD dans le milieu professionnel a accru de façon exponentielle, augmentant le risque d’une attaque informatique via une attaque <a href="http://www.sophos.com/fr-fr/security-news-trends/security-trends/malware-goes-mobile/10-tips-to-prevent-mobile-malware.aspx" target="_blank">malware mobile</a> et malicieux.</p>
<p style="text-align: justify;">Les chiffres le montrent d’ailleurs, plus de la moitié des PME ont déjà été victimes d’une attaque informatique et 33% l’ont été plus de deux fois ! D’après l’étude effectuée par G Data Software, les entreprises sondées craignent de perdre des données clients (52%), des données stratégiques (38%) ou encore subir une perte d’activité (10%).</p>
<p style="text-align: justify;"><a href="https://www.gdata.fr/" target="_blank">G Data Software</a> indique également les techniques les plus utilisées par les hackers qui sont :</p>

<ul style="text-align: justify;">
	<li>Les programmes spécialisés dans le vol de données (62,8%)</li>
	<li>Prise de contrôle à distance – chevaux de Troie – (85,4%).</li>
</ul>
<p style="text-align: justify;">Malheureusement la protection informatique des données de l’entreprise n’est pas systématique et les entreprises ont subit une à plusieurs attaques pour que les décisionnaires agissent.</p>
<p style="text-align: justify;"><span style="color: #ff6600;"><strong>Comment Aquastar Consulting peut vous aider ? </strong></span></p>

<ul>
	<li style="text-align: justify;"><a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls" target="_blank">Solution de sécurité internet : Netasq et Palo Alto Networks</a></li>
	<li style="text-align: justify;"><a href="http://www.aquastar-consulting.com/index.php/solutions/reseau-mobilite/byod-mdm" target="_blank">Solution BYOD : Aruba ClearPass</a></li>
</ul>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2501</wp:post_id>
		<wp:post_date>2014-06-25 13:54:14</wp:post_date>
		<wp:post_date_gmt>2014-06-25 12:54:14</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>lorsque-danger-se-trouve-portee-main</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="appareil-mobile"><![CDATA[appareil mobile]]></category>
		<category domain="post_tag" nicename="entreprise"><![CDATA[entreprise]]></category>
		<category domain="category" nicename="non-classe"><![CDATA[Non classé]]></category>
		<category domain="category" nicename="reseaux-et-mobilite"><![CDATA[Réseaux et mobilité]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<category domain="post_tag" nicename="smartphone"><![CDATA[smartphone]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[BYOD]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[74]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_thumbnail_id</wp:meta_key>
			<wp:meta_value><![CDATA[2502]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[La politique des entreprises par rapport au BYOD se doit d’être aussi rigoureuse que la politique instaurée pour les appareils informatiques non-mobiles.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1426909849]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_6</wp:meta_key>
			<wp:meta_value><![CDATA[a:12:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:18:"164.05772726041857";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:18:"114.76380985840903";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2354";s:5:"score";s:18:"112.79431174779195";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"103.35020589349382";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:17:"42.88960591653086";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2411";s:5:"score";s:18:"39.038414058197326";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"34.374090250895854";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"32.258256848841995";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:17:"30.02759154293122";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1794";s:5:"score";s:17:"27.45964187067466";}i:10;O:8:"stdClass":2:{s:7:"post_id";s:4:"1933";s:5:"score";s:17:"27.08352607315848";}i:11;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"26.862233106850148";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2059";s:5:"score";s:17:"164.4155559522248";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2049";s:5:"score";s:18:"114.92220882975799";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2354";s:5:"score";s:18:"113.08079929190875";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2186";s:5:"score";s:18:"103.60077561552714";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"42.993268787648546";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2411";s:5:"score";s:17:"39.13049437862291";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2033";s:5:"score";s:18:"34.400978943000915";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:16:"32.3020648222164";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:18:"29.897528990208844";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"1794";s:5:"score";s:18:"27.510058009874513";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:comment>
			<wp:comment_id>1381</wp:comment_id>
			<wp:comment_author><![CDATA[Caroline]]></wp:comment_author>
			<wp:comment_author_email>promosoft-info@gmail.com</wp:comment_author_email>
			<wp:comment_author_url>http://www.promosoft.fr/</wp:comment_author_url>
			<wp:comment_author_IP>109.190.84.60</wp:comment_author_IP>
			<wp:comment_date>2014-12-23 09:55:09</wp:comment_date>
			<wp:comment_date_gmt>2014-12-23 08:55:09</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[En effet, la sécurité des entreprises est de plus en plus souvent mise en danger par les salariés même si cela est fait involontairement. Il est indispensable de les prévenir des risques que cela représente par des formations.]]></wp:comment_content>
			<wp:comment_approved>trash</wp:comment_approved>
			<wp:comment_type></wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
			<wp:commentmeta>
				<wp:meta_key>_wp_trash_meta_status</wp:meta_key>
				<wp:meta_value><![CDATA[0]]></wp:meta_value>
			</wp:commentmeta>
			<wp:commentmeta>
				<wp:meta_key>_wp_trash_meta_time</wp:meta_key>
				<wp:meta_value><![CDATA[1423842787]]></wp:meta_value>
			</wp:commentmeta>
		</wp:comment>
	</item>
	<item>
		<title>Les PME sont prêtes au passage au SEPA</title>
		<link>http://www.it-news.fr/les-pme-pretes-au-passage-au-sepa/</link>
		<pubDate>Fri, 25 Jul 2014 08:24:53 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2509</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;">
<a href="http://www.it-news.fr/wp-content/uploads/2014/07/SEPA.jpg"><img class="alignleft size-full wp-image-2519" src="http://www.it-news.fr/wp-content/uploads/2014/07/SEPA.jpg" alt="SEPA" width="341" height="228" /></a>La migration vers le SEPA (Single Euro Payments Area, espace unique de paiement en euros) aura lieu le 1er août 2014.</p>
<p style="text-align: justify;">Dans ce cadre, Sage a interrogé des entreprises françaises de moins de 15 salariés à 200 salariés, afin de savoir où elles en étaient dans la mise en œuvre de la première étape de cette norme.</p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;">Menée entre le 17 juin et le 1er juillet 2014, cette enquête compte 1 047 répondants. L’infographie ci-dessous en synthétise les principaux résultats. Ceux-ci s’avèrent nettement plus encourageants que ceux de la précédente enquête européenne de Sage sur le SEPA, présentée en début d’année où il ressortait que les trois-quarts des PME n’avaient réalisé aucune démarche quant à la migration vers cette norme.</p>
<p style="text-align: justify;">Néanmoins, cette nouvelle enquête révèle que près de la moitié des entreprises ne connaissent pas la date butoir de <strong>mise en application du SEPA</strong>, ni l’avantage que peut représenter cette norme, ni quels sont les prochains outils de paiement concernés par la normalisation SEPA. Toutefois, ceci n’empêche pas que l’essentiel des PME interrogées estiment être prêt pour le passage à cette nouvelle norme, que ce soit au travers de leurs logiciels de gestion ou après avoir déjà une migration vers le SEPA.</p>
<p style="text-align: justify;">Projet qui, par ailleurs, a nécessité moins de six mois pour être mené à bien. Une norme internationale L’espace unique de paiements en euros (SEPA) est une zone dans laquelle plus de 500 millions de citoyens, plus de 20 millions d’entreprises et les pouvoirs publics européens peuvent effectuer et recevoir des paiements en euros dans les mêmes conditions de base et avec les mêmes droits et obligations, quelle que soit leur situation géographique.</p>
<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2014/07/Infographie_SEPA.jpg"><img class="aligncenter size-large wp-image-2511" src="http://www.it-news.fr/wp-content/uploads/2014/07/Infographie_SEPA-455x1024.jpg" alt="Infographie_SEPA" width="455" height="1024" /></a></p>
<p style="text-align: justify;">Les bénéfices seront nombreux pour les entreprises, sur le plan de la trésorerie (simplification du cash management), de la relation avec les banques (optimisation des coûts et des prestations de services), des processus financiers (centralisation des back-offices, gestion des flux de trésorerie sur un périmètre plus large, optimisation de la chaîne des valeurs pour aller vers le STP) ou encore des systèmes d’information (centralisation des moyens de paiement de la communication bancaire, amélioration de la communication avec les tiers). Il est également intéressant de noter que le SEPA inspire déjà d’autres pays, chiffres à l’appui.</p>
<p style="text-align: justify;">La norme s’appuie sur des standards internationaux (ISO20022 XML), adoptée par de nombreux pays hors zone Europe (USA, Asie…), et un socle technique standardisé. Ainsi, le SEPA pourrait notamment bientôt concerner le continent africain, dont 82% des entreprises commercent avec l’Europe. L’application généralisée de cette norme mondiale des échanges de moyens de paiement va entraîner notamment une meilleure harmonisation technique et fonctionnelle pour les projets de centralisation internationale des entreprises.</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2509</wp:post_id>
		<wp:post_date>2014-07-25 09:24:53</wp:post_date>
		<wp:post_date_gmt>2014-07-25 08:24:53</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>les-pme-pretes-au-passage-au-sepa</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="category" nicename="comptabilite-finances"><![CDATA[Comptabilité - Finances]]></category>
		<category domain="category" nicename="edi-ged"><![CDATA[EDI - GED]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>ninja_forms_form</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_og_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_title</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_description</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>wpsmo_twitter_author</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[sepa,]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[76]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[2513]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1424518816]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2258";s:5:"score";s:18:"115.32303492283043";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2172";s:5:"score";s:17:"59.04783400588849";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:17:"33.22795302476458";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"1988";s:5:"score";s:17:"33.22795302476458";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"1902";s:5:"score";s:17:"32.92524805719773";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"29.58912129679089";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2438";s:5:"score";s:18:"24.920964768573434";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"2197";s:5:"score";s:17:"23.01611725022754";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"1728";s:5:"score";s:18:"16.982358352975005";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:3:"336";s:5:"score";s:18:"16.754688069259686";}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:comment>
			<wp:comment_id>1382</wp:comment_id>
			<wp:comment_author><![CDATA[Edouard]]></wp:comment_author>
			<wp:comment_author_email>lesexpertscomptables7@gmail.com</wp:comment_author_email>
			<wp:comment_author_url>http://www.cab-longuemart.fr/</wp:comment_author_url>
			<wp:comment_author_IP>109.190.84.60</wp:comment_author_IP>
			<wp:comment_date>2014-12-23 09:59:05</wp:comment_date>
			<wp:comment_date_gmt>2014-12-23 08:59:05</wp:comment_date_gmt>
			<wp:comment_content><![CDATA[Infographie intéressante mais surprenante ! Cette mesure est importante pour les entreprises pourtant seulement une personne sur 2 connait la deadline SEPA en France.]]></wp:comment_content>
			<wp:comment_approved>trash</wp:comment_approved>
			<wp:comment_type></wp:comment_type>
			<wp:comment_parent>0</wp:comment_parent>
			<wp:comment_user_id>0</wp:comment_user_id>
			<wp:commentmeta>
				<wp:meta_key>_wp_trash_meta_status</wp:meta_key>
				<wp:meta_value><![CDATA[0]]></wp:meta_value>
			</wp:commentmeta>
			<wp:commentmeta>
				<wp:meta_key>_wp_trash_meta_time</wp:meta_key>
				<wp:meta_value><![CDATA[1423842788]]></wp:meta_value>
			</wp:commentmeta>
		</wp:comment>
	</item>
	<item>
		<title>Stormshield Network Security : Nouvelle génération de solutions de protection des réseaux</title>
		<link>http://www.it-news.fr/stormshield-network-security-nouvelle-generation-de-solutions-de-protection-des-reseaux/</link>
		<pubDate>Fri, 01 Aug 2014 09:05:43 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?p=2514</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2014/08/stormshield.jpg"><img class="alignleft size-full wp-image-2516" src="http://www.it-news.fr/wp-content/uploads/2014/08/stormshield.jpg" alt="stormshield" width="341" height="228" /></a>Les liens entre <a href="http://www.aquastar-consulting.com/index.php/solutions/securite/firewalls/netasq">Arkoon – Netasq </a>s’approfondissent sous la houlette de <a href="http://www.cassidian.com/fr_FR/cybersecurity/" target="_blank">Cassidian CyberSecurity</a> (groupe Airbus).</p>
<p style="text-align: justify;">Un an après l’annonce de leur rapprochement, les synergies entre les deux fournisseurs de solutions de sécurité IT s’intensifient.</p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;">Fruit de cette collaboration technologique, la société sort une nouvelle génération de solutions de protection des réseaux informatiques sous la marque <span style="color: #ff6600;"><strong>Stormshield Network Security.</strong></span></p>
<p style="text-align: justify;">C’est une gamme de 9 boîtiers destinés à couvrir l’ensemble du marché des entreprises : de la PME aux grandes entreprises en passant par les structures multi-sites. Les solutions sont disponibles en appliance ou en mode cloud.</p>
<p style="text-align: justify;"><a href="mailto: contact@aquastar-consulting.com?subject=Je souhaite en savoir plus sur la nouvelle gamme Stormshield"><img class="aligncenter size-full wp-image-2515" src="http://www.it-news.fr/wp-content/uploads/2014/08/stormshield-firewalls-nextegen.jpg" alt="stormshield-firewalls-nextegen" width="400" height="292" /></a></p>
<p style="text-align: justify;">Vous êtes intéressé, <a href="mailto: contact@aquastar-consulting.com?subject=Je souhaite en savoir plus sur la nouvelle gamme Stormshield">contactez nous</a>.</p>
<p style="text-align: justify;"><strong>Rappel de ce que dit la loi:</strong></p>
<p style="text-align: justify;">Le chef d’entreprise est responsable de la sécurisation des données personnelles (article 34 de la loi informatique et liberté) et risque jusqu’à 300 000 euros d’amende et 5 ans d’emprisonnement (<a href="http://www.legifrance.gouv.fr/affichCodeArticle.do?idArticle=LEGIARTI000006417964&amp;cidTexte=LEGITEXT000006070719" target="_blank">art. 226-17 du Code Pénal</a>) en cas de non-respect de la législation.</p>
<p style="text-align: justify;">Il a également obligation d’empêcher toute utilisation illicite de son réseau par ses employés ou par des personnes externes (art 323 CP). La gamme de solutions Stormshield Network Security vous aide à respecter ces obligations vis-à-vis de la loi française.</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2514</wp:post_id>
		<wp:post_date>2014-08-01 10:05:43</wp:post_date>
		<wp:post_date_gmt>2014-08-01 09:05:43</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>stormshield-network-security-nouvelle-generation-de-solutions-de-protection-des-reseaux</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>post</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="arkoon"><![CDATA[arkoon]]></category>
		<category domain="post_tag" nicename="firewall"><![CDATA[firewall]]></category>
		<category domain="post_tag" nicename="netasq"><![CDATA[netasq]]></category>
		<category domain="category" nicename="securite"><![CDATA[Sécurité]]></category>
		<category domain="post_tag" nicename="stormshield"><![CDATA[stormshield]]></category>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_expiration</wp:meta_key>
			<wp:meta_value><![CDATA[1427821942]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_related_posts_query_result_cache_5</wp:meta_key>
			<wp:meta_value><![CDATA[a:10:{i:0;O:8:"stdClass":2:{s:7:"post_id";s:4:"2253";s:5:"score";s:17:"35.20033068886528";}i:1;O:8:"stdClass":2:{s:7:"post_id";s:4:"2191";s:5:"score";s:17:"33.28997627008491";}i:2;O:8:"stdClass":2:{s:7:"post_id";s:4:"2071";s:5:"score";s:18:"28.306432890099625";}i:3;O:8:"stdClass":2:{s:7:"post_id";s:4:"2001";s:5:"score";s:18:"26.392376088211872";}i:4;O:8:"stdClass":2:{s:7:"post_id";s:4:"2239";s:5:"score";s:18:"23.895864616970968";}i:5;O:8:"stdClass":2:{s:7:"post_id";s:4:"2161";s:5:"score";s:18:"21.807325173129204";}i:6;O:8:"stdClass":2:{s:7:"post_id";s:4:"2216";s:5:"score";s:18:"18.811897168492894";}i:7;O:8:"stdClass":2:{s:7:"post_id";s:4:"1940";s:5:"score";s:17:"18.26586112025646";}i:8;O:8:"stdClass":2:{s:7:"post_id";s:4:"2465";s:5:"score";s:18:"16.362947753392024";}i:9;O:8:"stdClass":2:{s:7:"post_id";s:4:"2400";s:5:"score";s:18:"16.254836724121176";}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Carole JARDON</title>
		<link>http://www.it-news.fr/?post_type=tribe_organizer&#038;p=1220</link>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?post_type=tribe_organizer&#038;p=1220</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1220</wp:post_id>
		<wp:post_date>2013-10-23 08:28:07</wp:post_date>
		<wp:post_date_gmt>0000-00-00 00:00:00</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name></wp:post_name>
		<wp:status>draft</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_organizer</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_OrganizerAuditTrail</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{i:0;a:2:{i:0;s:15:"events-calendar";i:1;i:1382513288;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Cloud]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[17]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerOrganizer</wp:meta_key>
			<wp:meta_value><![CDATA[Carole JARDON]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerPhone</wp:meta_key>
			<wp:meta_value><![CDATA[+33 (0)1 41 18 60 52]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerWebsite</wp:meta_key>
			<wp:meta_value><![CDATA[http://www.tarsus.fr/]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerEmail</wp:meta_key>
			<wp:meta_value><![CDATA[cjardon@tarsus.fr]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Carole JARDON</title>
		<link>http://www.it-news.fr/organisateur/cloud-it-expo/</link>
		<pubDate>Wed, 23 Oct 2013 07:30:46 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?post_type=tribe_organizer&#038;p=1221</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1221</wp:post_id>
		<wp:post_date>2013-10-23 08:30:46</wp:post_date>
		<wp:post_date_gmt>2013-10-23 07:30:46</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cloud-it-expo</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_organizer</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_OrganizerAuditTrail</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{i:0;a:2:{i:0;s:15:"events-calendar";i:1;i:1382513418;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Cloud]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[26]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerOrganizer</wp:meta_key>
			<wp:meta_value><![CDATA[Carole JARDON]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerPhone</wp:meta_key>
			<wp:meta_value><![CDATA[+33 (0)1 41 18 60 52]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerWebsite</wp:meta_key>
			<wp:meta_value><![CDATA[http://www.tarsus.fr/]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerEmail</wp:meta_key>
			<wp:meta_value><![CDATA[cjardon@tarsus.fr]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Carole JARDON</title>
		<link>http://www.it-news.fr/organisateur/carole-jardon/</link>
		<pubDate>Wed, 23 Oct 2013 07:30:46 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/organizer/carole-jardon/</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1222</wp:post_id>
		<wp:post_date>2013-10-23 08:30:46</wp:post_date>
		<wp:post_date_gmt>2013-10-23 07:30:46</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>carole-jardon</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_organizer</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_OrganizerOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Cloud]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[22]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerOrganizer</wp:meta_key>
			<wp:meta_value><![CDATA[Carole JARDON]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerPhone</wp:meta_key>
			<wp:meta_value><![CDATA[+33 (0)1 41 18 60 52]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerWebsite</wp:meta_key>
			<wp:meta_value><![CDATA[http://www.tarsus.fr/]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerEmail</wp:meta_key>
			<wp:meta_value><![CDATA[cjardon@tarsus.fr]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Mélodie Reynaud</title>
		<link>http://www.it-news.fr/organisateur/forum-international-cybersecurite-2014-lille/</link>
		<pubDate>Wed, 23 Oct 2013 08:29:21 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?post_type=tribe_organizer&#038;p=1238</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1238</wp:post_id>
		<wp:post_date>2013-10-23 09:29:21</wp:post_date>
		<wp:post_date_gmt>2013-10-23 08:29:21</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>forum-international-cybersecurite-2014-lille</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_organizer</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_OrganizerAuditTrail</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{i:0;a:2:{i:0;s:15:"events-calendar";i:1;i:1382516783;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Cybersécurité]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[25]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerOrganizerID</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerOrganizer</wp:meta_key>
			<wp:meta_value><![CDATA[Mélodie Reynaud]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerPhone</wp:meta_key>
			<wp:meta_value><![CDATA[+33 (0) 1 45 55 92 44]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerWebsite</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerEmail</wp:meta_key>
			<wp:meta_value><![CDATA[mreynaud@ceis.eu ]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Sophie Hémon</title>
		<link>http://www.it-news.fr/organisateur/it-tour/</link>
		<pubDate>Wed, 23 Oct 2013 08:50:42 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?post_type=tribe_organizer&#038;p=1241</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1241</wp:post_id>
		<wp:post_date>2013-10-23 09:50:42</wp:post_date>
		<wp:post_date_gmt>2013-10-23 08:50:42</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>it-tour</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_organizer</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_OrganizerAuditTrail</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{i:0;a:2:{i:0;s:15:"events-calendar";i:1;i:1382517986;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[it tour]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[26]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerOrganizerID</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerOrganizer</wp:meta_key>
			<wp:meta_value><![CDATA[Sophie Hémon]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerPhone</wp:meta_key>
			<wp:meta_value><![CDATA[01 41 97 04 84]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerWebsite</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerEmail</wp:meta_key>
			<wp:meta_value><![CDATA[shemon@it-news-info.com]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Unnamed Organizer</title>
		<link>http://www.it-news.fr/organisateur/rsa-conference-europe-2013/</link>
		<pubDate>Wed, 23 Oct 2013 09:18:41 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?post_type=tribe_organizer&#038;p=1246</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1246</wp:post_id>
		<wp:post_date>2013-10-23 10:18:41</wp:post_date>
		<wp:post_date_gmt>2013-10-23 09:18:41</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>rsa-conference-europe-2013</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_organizer</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_OrganizerAuditTrail</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{i:0;a:2:{i:0;s:15:"events-calendar";i:1;i:1382519835;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[RSA]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[26]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerOrganizerID</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerOrganizer</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerPhone</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerWebsite</wp:meta_key>
			<wp:meta_value><![CDATA[http://www.rsaconference.com/]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerEmail</wp:meta_key>
			<wp:meta_value><![CDATA[information@rsaconference.com]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Jean-Philippe GUILLAUME  </title>
		<link>http://www.it-news.fr/organisateur/jean-philippe-guillaume/</link>
		<pubDate>Wed, 23 Oct 2013 09:26:10 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/organizer/jean-philippe-guillaume/</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1249</wp:post_id>
		<wp:post_date>2013-10-23 10:26:10</wp:post_date>
		<wp:post_date_gmt>2013-10-23 09:26:10</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>jean-philippe-guillaume</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_organizer</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_OrganizerOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[supply chain]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[22]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerOrganizerID</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerOrganizer</wp:meta_key>
			<wp:meta_value><![CDATA[Jean-Philippe GUILLAUME  ]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerPhone</wp:meta_key>
			<wp:meta_value><![CDATA[+33 (0)1 47 56 52 57 ]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerWebsite</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerEmail</wp:meta_key>
			<wp:meta_value><![CDATA[jph.guillaume@scmag.fr ]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Reed Expositions France</title>
		<link>http://www.it-news.fr/organisateur/reed-expositions-france/</link>
		<pubDate>Thu, 05 Dec 2013 15:33:08 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/organizer/reed-expositions-france/</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1682</wp:post_id>
		<wp:post_date>2013-12-05 16:33:08</wp:post_date>
		<wp:post_date_gmt>2013-12-05 15:33:08</wp:post_date_gmt>
		<wp:comment_status>closed</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>reed-expositions-france</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_organizer</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[documation]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[22]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerOrganizerID</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerOrganizer</wp:meta_key>
			<wp:meta_value><![CDATA[Reed Expositions France]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerPhone</wp:meta_key>
			<wp:meta_value><![CDATA[01 47 56 50 00]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerWebsite</wp:meta_key>
			<wp:meta_value><![CDATA[www.reedexpo.fr/‎]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerEmail</wp:meta_key>
			<wp:meta_value><![CDATA[guillaume.settembrini@reedexpo.fr]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerAuditTrail</wp:meta_key>
			<wp:meta_value><![CDATA[a:2:{i:0;a:2:{i:0;s:15:"events-calendar";i:1;i:1386844580;}i:1;a:2:{i:0;s:15:"events-calendar";i:1;i:1386844580;}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Reed Expositions France</title>
		<link>http://www.it-news.fr/organisateur/reed-expositions-france-2/</link>
		<pubDate>Thu, 05 Dec 2013 15:33:08 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/organizer/reed-expositions-france-2/</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1683</wp:post_id>
		<wp:post_date>2013-12-05 16:33:08</wp:post_date>
		<wp:post_date_gmt>2013-12-05 15:33:08</wp:post_date_gmt>
		<wp:comment_status>closed</wp:comment_status>
		<wp:ping_status>closed</wp:ping_status>
		<wp:post_name>reed-expositions-france-2</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_organizer</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[documation]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[22]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerOrganizerID</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerOrganizer</wp:meta_key>
			<wp:meta_value><![CDATA[Reed Expositions France]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerPhone</wp:meta_key>
			<wp:meta_value><![CDATA[01 47 56 50 00]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerWebsite</wp:meta_key>
			<wp:meta_value><![CDATA[www.reedexpo.fr/‎]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerEmail</wp:meta_key>
			<wp:meta_value><![CDATA[guillaume.settembrini@reedexpo.fr]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerAuditTrail</wp:meta_key>
			<wp:meta_value><![CDATA[a:2:{i:0;a:2:{i:0;s:15:"events-calendar";i:1;i:1386844929;}i:1;a:2:{i:0;s:15:"events-calendar";i:1;i:1386844929;}}]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>E-Marketing Paris 2014</title>
		<link>http://www.it-news.fr/event/e-marketing-paris-2014/</link>
		<pubDate>Mon, 13 Jan 2014 07:57:19 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?post_type=tribe_events&#038;p=1913</guid>
		<description></description>
		<content:encoded><![CDATA[<a href="http://www.it-news.fr/wp-content/uploads/2014/01/emarketing-paris.png"><img class="alignleft size-full wp-image-1914" alt="emarketing-paris" src="http://www.it-news.fr/wp-content/uploads/2014/01/emarketing-paris.png" width="268" height="66" /></a>Le 8-9-10 Avril se tiendra à Paris, Porte de Versailles, le rendez-vous annuel des professionnels du marketing digital.

Le salon e-Marketing se positionne en parallèle du salon Stratégie Client afin de proposer la plus grande plateforme dédiée à l’univers du marketing et de la relation client cross canal !]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1913</wp:post_id>
		<wp:post_date>2014-01-13 08:57:19</wp:post_date>
		<wp:post_date_gmt>2014-01-13 07:57:19</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>e-marketing-paris-2014</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_events</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventAuditTrail</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{i:0;a:2:{i:0;s:15:"events-calendar";i:1;i:1389599428;}i:1;a:2:{i:0;s:15:"events-calendar";i:1;i:1389599460;}i:2;a:2:{i:0;s:15:"events-calendar";i:1;i:1389599501;}i:3;a:2:{i:0;s:15:"events-calendar";i:1;i:1389599562;}i:4;a:2:{i:0;s:15:"events-calendar";i:1;i:1389599741;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[53]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMapLink</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMap</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventAllDay</wp:meta_key>
			<wp:meta_value><![CDATA[yes]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventStartDate</wp:meta_key>
			<wp:meta_value><![CDATA[2014-04-08 00:00:00]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventEndDate</wp:meta_key>
			<wp:meta_value><![CDATA[2014-04-10 23:59:59]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventDuration</wp:meta_key>
			<wp:meta_value><![CDATA[259199]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventVenueID</wp:meta_key>
			<wp:meta_value><![CDATA[1218]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCurrencySymbol</wp:meta_key>
			<wp:meta_value><![CDATA[€]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCurrencyPosition</wp:meta_key>
			<wp:meta_value><![CDATA[prefix]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCost</wp:meta_key>
			<wp:meta_value><![CDATA[ ]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventURL</wp:meta_key>
			<wp:meta_value><![CDATA[http://www.emarketingparis.com/]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventOrganizerID</wp:meta_key>
			<wp:meta_value><![CDATA[1915]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[e-marketing]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Le 8-9-10 Avril se tiendra à Paris, Porte de Versailles, le rendez-vous annuel des professionnels du marketing digital.]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Tarsus France</title>
		<link>http://www.it-news.fr/organisateur/tarsus-france/</link>
		<pubDate>Mon, 13 Jan 2014 07:57:19 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/organizer/tarsus-france/</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1915</wp:post_id>
		<wp:post_date>2014-01-13 08:57:19</wp:post_date>
		<wp:post_date_gmt>2014-01-13 07:57:19</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>tarsus-france</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_organizer</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[e-marketing]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Le 8-9-10 Avril se tiendra à Paris, Porte de Versailles, le rendez-vous annuel des professionnels du marketing digital.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[20]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerOrganizerID</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerOrganizer</wp:meta_key>
			<wp:meta_value><![CDATA[Tarsus France]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerPhone</wp:meta_key>
			<wp:meta_value><![CDATA[01 41 18 60 62]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerWebsite</wp:meta_key>
			<wp:meta_value><![CDATA[http://www.tarsus.fr/]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerEmail</wp:meta_key>
			<wp:meta_value><![CDATA[gdechambine@tarsus.fr]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Cloud &amp; IT expo</title>
		<link>http://www.it-news.fr/event/cloud-expo/</link>
		<pubDate>Mon, 13 Jan 2014 09:20:06 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?post_type=tribe_events&#038;p=1916</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2014/01/cloud-et-it-expo.png"><img class="alignleft size-full wp-image-1917" title="Cloud &amp; IT expo" alt="cloud-et-it-expo" src="http://www.it-news.fr/wp-content/uploads/2014/01/cloud-et-it-expo.png" width="237" height="86" /></a>Les entreprises sont désormais entrées de plain-pied dans l’ère du cloud computing. Bien conscientes aujourd’hui qu’elles ont à y gagner en compétitivité et en réduction des coûts, la question n’est plus de savoir si le modèle de la virtualisation est à développer, mais comment la gérer.</p>
<p style="text-align: right;"><!--more Lire la suite--></p>
<p style="text-align: justify;">Toutes les solutions de Cloud Computing et de Datacenter sont au sein du salon Cloud and IT Expo qui se tiendra les 18 &amp; 19 novembre2013 à la Porte de Versailles.</p>
<p style="text-align: justify;">Profitez de l’événement pour augmenter votre visibilité et être pendant 2 jours au coeur de la révolution numérique avec 5 salons qui se tiennent dans un même hall d’exposition: Cloud and IT Expo, Mobile IT Expo, Réseaux et Télécoms expo, Big Data Expo et M2M Forum</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1916</wp:post_id>
		<wp:post_date>2014-01-13 10:20:06</wp:post_date>
		<wp:post_date_gmt>2014-01-13 09:20:06</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cloud-expo</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_events</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventAuditTrail</wp:meta_key>
			<wp:meta_value><![CDATA[a:7:{i:0;a:2:{i:0;s:15:"events-calendar";i:1;i:1389602733;}i:1;a:2:{i:0;s:15:"events-calendar";i:1;i:1389602751;}i:2;a:2:{i:0;s:15:"events-calendar";i:1;i:1389604544;}i:3;a:2:{i:0;s:15:"events-calendar";i:1;i:1389604604;}i:4;a:2:{i:0;s:15:"events-calendar";i:1;i:1389604664;}i:5;a:2:{i:0;s:15:"events-calendar";i:1;i:1389604724;}i:6;a:2:{i:0;s:15:"events-calendar";i:1;i:1389604784;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[70]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMapLink</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMap</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventAllDay</wp:meta_key>
			<wp:meta_value><![CDATA[yes]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventStartDate</wp:meta_key>
			<wp:meta_value><![CDATA[2014-11-18 00:00:00]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventEndDate</wp:meta_key>
			<wp:meta_value><![CDATA[2014-11-19 23:59:59]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventDuration</wp:meta_key>
			<wp:meta_value><![CDATA[172799]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventVenueID</wp:meta_key>
			<wp:meta_value><![CDATA[1218]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCurrencySymbol</wp:meta_key>
			<wp:meta_value><![CDATA[€]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCurrencyPosition</wp:meta_key>
			<wp:meta_value><![CDATA[prefix]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCost</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventURL</wp:meta_key>
			<wp:meta_value><![CDATA[http://www.cloud-and-it-expo.fr]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventOrganizerID</wp:meta_key>
			<wp:meta_value><![CDATA[1915]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Cloud]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Toutes les solutions de Cloud Computing et de Datacenter sont au sein du salon Cloud and IT Expo qui se tiendra en novembre2014 à la Porte de Versailles.]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>TechDays</title>
		<link>http://www.it-news.fr/event/techdays/</link>
		<pubDate>Tue, 14 Jan 2014 09:41:23 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?post_type=tribe_events&#038;p=1919</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2014/01/microsoft-tech-days-2014.png"><img class="alignleft size-full wp-image-1920" title="TechDays" alt="microsoft-tech-days-2014" src="http://www.it-news.fr/wp-content/uploads/2014/01/microsoft-tech-days-2014.png" width="245" height="115" /></a>Avec 18 000 visiteurs, le TechDays est l'événement numérique majeur en Europe. Il aura lieu le 11, 12 et 13 Février 2014 au Palais des Congrès de Paris.</p>
<p style="text-align: justify;">Les TechDays ce sont trois jours dédiés aux nouvelles technologies et aux enjeux de la transformation numérique.</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1919</wp:post_id>
		<wp:post_date>2014-01-14 10:41:23</wp:post_date>
		<wp:post_date_gmt>2014-01-14 09:41:23</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>techdays</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_events</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventAuditTrail</wp:meta_key>
			<wp:meta_value><![CDATA[a:6:{i:0;a:2:{i:0;s:15:"events-calendar";i:1;i:1389691477;}i:1;a:2:{i:0;s:15:"events-calendar";i:1;i:1389691540;}i:2;a:2:{i:0;s:15:"events-calendar";i:1;i:1389691601;}i:3;a:2:{i:0;s:15:"events-calendar";i:1;i:1389691661;}i:4;a:2:{i:0;s:15:"events-calendar";i:1;i:1389691721;}i:5;a:2:{i:0;s:15:"events-calendar";i:1;i:1389692446;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[66]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMapLink</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMap</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventAllDay</wp:meta_key>
			<wp:meta_value><![CDATA[yes]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventStartDate</wp:meta_key>
			<wp:meta_value><![CDATA[2014-02-11 00:00:00]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventEndDate</wp:meta_key>
			<wp:meta_value><![CDATA[2014-02-13 23:59:59]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventDuration</wp:meta_key>
			<wp:meta_value><![CDATA[259199]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventVenueID</wp:meta_key>
			<wp:meta_value><![CDATA[1922]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCurrencySymbol</wp:meta_key>
			<wp:meta_value><![CDATA[€]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCurrencyPosition</wp:meta_key>
			<wp:meta_value><![CDATA[prefix]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCost</wp:meta_key>
			<wp:meta_value><![CDATA[   ]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventURL</wp:meta_key>
			<wp:meta_value><![CDATA[http://www.microsoft.com/france/mstechdays/]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventOrganizerID</wp:meta_key>
			<wp:meta_value><![CDATA[1921]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[TechDays]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Avec 18 000 visiteurs, le TechDays est l'événement numérique en Europe. Il aura lieu le 11, 12 et 13 Février 2013 au Palais des Congrès de Paris.]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Microsoft </title>
		<link>http://www.it-news.fr/organisateur/microsoft/</link>
		<pubDate>Tue, 14 Jan 2014 09:41:23 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/organizer/microsoft/</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1921</wp:post_id>
		<wp:post_date>2014-01-14 10:41:23</wp:post_date>
		<wp:post_date_gmt>2014-01-14 09:41:23</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>microsoft</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_organizer</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[TechDays]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Avec 18 000 visiteurs, le TechDays est l'événement numérique en Europe. Il aura lieu le 11, 12 et 13 Février 2013 au Palais des Congrès de Paris.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[20]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerOrganizerID</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerOrganizer</wp:meta_key>
			<wp:meta_value><![CDATA[Microsoft ]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerPhone</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerWebsite</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerEmail</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>NORDBAT 2014</title>
		<link>http://www.it-news.fr/event/nordbat-2014/</link>
		<pubDate>Thu, 06 Feb 2014 16:31:10 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?post_type=tribe_events&#038;p=2022</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><img class="alignleft  wp-image-2023" title="NORDBAT 2014" alt="nord-bat-2014" src="http://www.it-news.fr/wp-content/uploads/2014/02/nord-bat-2014.png" width="166" height="165" />A Lille Grand Palais, se tiendra le 26, 27, 28 Mars 2014, la huitième édition du salon professionnel de la construction NORDBAT.</p>
<p style="text-align: justify;">NordBat permet de réunir dans un même lieu, les entrepreneurs du bâtiments, les prescripteurs, les maîtres d'ouvrages, les fournisseurs et les partenaires.</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2022</wp:post_id>
		<wp:post_date>2014-02-06 17:31:10</wp:post_date>
		<wp:post_date_gmt>2014-02-06 16:31:10</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>nordbat-2014</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_events</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventAuditTrail</wp:meta_key>
			<wp:meta_value><![CDATA[a:9:{i:0;a:2:{i:0;s:15:"events-calendar";i:1;i:1391703508;}i:1;a:2:{i:0;s:15:"events-calendar";i:1;i:1391703661;}i:2;a:2:{i:0;s:15:"events-calendar";i:1;i:1391703843;}i:3;a:2:{i:0;s:15:"events-calendar";i:1;i:1391703903;}i:4;a:2:{i:0;s:15:"events-calendar";i:1;i:1391703963;}i:5;a:2:{i:0;s:15:"events-calendar";i:1;i:1391704024;}i:6;a:2:{i:0;s:15:"events-calendar";i:1;i:1391704084;}i:7;a:2:{i:0;s:15:"events-calendar";i:1;i:1391704144;}i:8;a:2:{i:0;s:15:"events-calendar";i:1;i:1391704236;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[53]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMapLink</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMap</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventAllDay</wp:meta_key>
			<wp:meta_value><![CDATA[yes]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventStartDate</wp:meta_key>
			<wp:meta_value><![CDATA[2014-03-26 00:00:00]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventEndDate</wp:meta_key>
			<wp:meta_value><![CDATA[2014-03-28 23:59:59]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventDuration</wp:meta_key>
			<wp:meta_value><![CDATA[259199]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventVenueID</wp:meta_key>
			<wp:meta_value><![CDATA[2025]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCurrencySymbol</wp:meta_key>
			<wp:meta_value><![CDATA[€]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCurrencyPosition</wp:meta_key>
			<wp:meta_value><![CDATA[prefix]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCost</wp:meta_key>
			<wp:meta_value><![CDATA[ ]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventURL</wp:meta_key>
			<wp:meta_value><![CDATA[http://www.nordbat.com/]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventOrganizerID</wp:meta_key>
			<wp:meta_value><![CDATA[2024]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Nordbat]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Expo Conseil </title>
		<link>http://www.it-news.fr/organisateur/expo-conseil/</link>
		<pubDate>Thu, 06 Feb 2014 16:31:11 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/organizer/expo-conseil/</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2024</wp:post_id>
		<wp:post_date>2014-02-06 17:31:11</wp:post_date>
		<wp:post_date_gmt>2014-02-06 16:31:11</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>expo-conseil</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_organizer</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Nordbat]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[20]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerOrganizerID</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerOrganizer</wp:meta_key>
			<wp:meta_value><![CDATA[Expo Conseil ]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerPhone</wp:meta_key>
			<wp:meta_value><![CDATA[+33 (0)3.20.57.75.78]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerWebsite</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerEmail</wp:meta_key>
			<wp:meta_value><![CDATA[info@nordbat.com  ]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Les cybermenaces - Comment protégez votre entreprise? </title>
		<link>http://www.it-news.fr/event/les-cybermenaces-comment-protegez-votre-entreprise/</link>
		<pubDate>Mon, 17 Feb 2014 15:45:11 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?post_type=tribe_events&#038;p=2132</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="text-align: justify;"><img class="size-full wp-image-2111 alignright" title="les cybermenaces - comment protéger son entreprises?" alt="evenement-cybermenaces-2014" src="http://www.it-news.fr/wp-content/uploads/2014/02/evenement-cybermenaces-2014.jpg" width="198" height="249" />Aquastar Consulting et la Gendarmerie Nationale du Nord Pas-de-Calais organisent, le 20 Mars prochain, un petit-déjeuner sur les <b>Cybermenaces – Comment protéger votre entreprise ?</b></p>
<p style="text-align: justify;">L’objectif de cet évènement est de vous sensibiliser sur les risques qui menacent  vos systèmes d’informations et parc informatique.</p>
<p style="text-align: right;" align="right"><!--more Lire la suite--></p>
<p style="text-align: justify;">Le lieutenant-Colonel <b>Pascal Leplongeon</b>, responsable de la sécurité économique du Nord Pas-de-Calais fera une présentation sur les risques encourus liés à une cyberattaque.</p>
<p style="text-align: justify;">Il évoquera les sujets suivants :</p>

<ul style="text-align: justify;">
	<li>Les risques économiques, juridiques et en termes d’image</li>
	<li>Les bons réflexes à avoir face à une cybermenace</li>
	<li>Les bonnes pratiques préventives</li>
	<li>Les réseaux mafieux d’aujourd’hui et leurs actions.</li>
</ul>
<a href="http://www.aquastar-consulting.com/index.php/conference-cybersecurite-2014/" target="_blank"><img class="aligncenter size-full wp-image-2126" alt="bouton-inscription" src="http://www.it-news.fr/wp-content/uploads/2014/02/bouton-inscription.jpg" width="200" height="75" /></a>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2132</wp:post_id>
		<wp:post_date>2014-02-17 16:45:11</wp:post_date>
		<wp:post_date_gmt>2014-02-17 15:45:11</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>les-cybermenaces-comment-protegez-votre-entreprise</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_events</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="cybermenaces"><![CDATA[cybermenaces]]></category>
		<category domain="post_tag" nicename="cybersecurite"><![CDATA[cybersécurité]]></category>
		<category domain="post_tag" nicename="petit-dejeuner"><![CDATA[petit déjeuner]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventAuditTrail</wp:meta_key>
			<wp:meta_value><![CDATA[a:4:{i:0;a:2:{i:0;s:15:"events-calendar";i:1;i:1392650544;}i:1;a:2:{i:0;s:15:"events-calendar";i:1;i:1392650733;}i:2;a:2:{i:0;s:15:"events-calendar";i:1;i:1392650790;}i:3;a:2:{i:0;s:15:"events-calendar";i:1;i:1392650856;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[68]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMapLink</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMap</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventStartDate</wp:meta_key>
			<wp:meta_value><![CDATA[2014-03-20 08:30:00]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventEndDate</wp:meta_key>
			<wp:meta_value><![CDATA[2014-03-20 10:00:00]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventDuration</wp:meta_key>
			<wp:meta_value><![CDATA[5400]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventVenueID</wp:meta_key>
			<wp:meta_value><![CDATA[2134]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCurrencySymbol</wp:meta_key>
			<wp:meta_value><![CDATA[€]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCurrencyPosition</wp:meta_key>
			<wp:meta_value><![CDATA[prefix]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCost</wp:meta_key>
			<wp:meta_value><![CDATA[ ]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventURL</wp:meta_key>
			<wp:meta_value><![CDATA[http://www.aquastar-consulting.com/index.php/conference-cybersecurite-2014/]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventOrganizerID</wp:meta_key>
			<wp:meta_value><![CDATA[2133]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[cybermenaces]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Aquastar Consulting et la Gendarmerie Nationale du Nord Pas-de-Calais organisent, le 20 Mars prochain, un petit-déjeuner sur les Cybermenaces – Comment protéger votre entreprise ?]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Aquastar Consulting</title>
		<link>http://www.it-news.fr/organisateur/aquastar-consulting/</link>
		<pubDate>Mon, 17 Feb 2014 15:45:11 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/organizer/aquastar-consulting/</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2133</wp:post_id>
		<wp:post_date>2014-02-17 16:45:11</wp:post_date>
		<wp:post_date_gmt>2014-02-17 15:45:11</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>aquastar-consulting</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_organizer</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[cybermenaces]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[22]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerOrganizerID</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerOrganizer</wp:meta_key>
			<wp:meta_value><![CDATA[Aquastar Consulting]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerPhone</wp:meta_key>
			<wp:meta_value><![CDATA[03 20 34 93 40]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerWebsite</wp:meta_key>
			<wp:meta_value><![CDATA[www.aquastar-consulting.com ]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_OrganizerEmail</wp:meta_key>
			<wp:meta_value><![CDATA[ecalliati@aquastar-consulting.com ]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Petit-déjeuner Industrie </title>
		<link>http://www.it-news.fr/event/petit-dejeuner-industrie/</link>
		<pubDate>Tue, 20 May 2014 08:00:06 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?post_type=tribe_events&#038;p=2450</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="color: #333333; text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2014/05/petit-dejeuner-industrie2.jpg"><img class="alignleft size-medium wp-image-2456" src="http://www.it-news.fr/wp-content/uploads/2014/05/petit-dejeuner-industrie2-300x200.jpg" alt="petit-dejeuner-industrie" width="300" height="200" /></a>Aquastar Consulting vous convie à un petit-déjeuner sous le thème de l'Industrie "<em>Améliorez vos performances de production et optimisez votre rendemen</em>t".</p>
<p style="color: #333333; text-align: justify;">Celui-ci se déroulera le jeudi 19 Juin à 9h dans les locaux de l'entreprise au :</p>
<p style="color: #333333; text-align: center;">126 rue Pasteur, ZA du Barœul59370, Mons-en-Barœul<span style="color: #252525;"> </span></p>
<p style="color: #333333; text-align: justify;">Pour vous inscrire, <a title="inscription à l’événement petit-déjeuner Industrie" href="http://emailing.aquastar-consulting.com/2014/evenement/Gestion/Industrie/index2.html" target="_blank">cliquez ici</a>.</p>
<p style="color: #333333; text-align: justify;">Pour plus d'informations, vous pouvez contacter M. DESCHAMPS, Responsable Commercial, au 03.20.34.93.40.</p>
<p style="color: #333333; text-align: justify;">Cordialement,</p>
<p style="color: #333333; text-align: justify;">L'équipe d'Aquastar Consulting</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2450</wp:post_id>
		<wp:post_date>2014-05-20 09:00:06</wp:post_date>
		<wp:post_date_gmt>2014-05-20 08:00:06</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>petit-dejeuner-industrie</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_events</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="industrie"><![CDATA[industrie]]></category>
		<category domain="post_tag" nicename="petit-dejeuner"><![CDATA[petit déjeuner]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventAuditTrail</wp:meta_key>
			<wp:meta_value><![CDATA[a:11:{i:0;a:2:{i:0;s:15:"events-calendar";i:1;i:1400567678;}i:1;a:2:{i:0;s:15:"events-calendar";i:1;i:1400567742;}i:2;a:2:{i:0;s:15:"events-calendar";i:1;i:1400567745;}i:3;a:2:{i:0;s:15:"events-calendar";i:1;i:1400571771;}i:4;a:2:{i:0;s:15:"events-calendar";i:1;i:1400571846;}i:5;a:2:{i:0;s:15:"events-calendar";i:1;i:1400571922;}i:6;a:2:{i:0;s:15:"events-calendar";i:1;i:1400571998;}i:7;a:2:{i:0;s:15:"events-calendar";i:1;i:1400572089;}i:8;a:2:{i:0;s:15:"events-calendar";i:1;i:1400572164;}i:9;a:2:{i:0;s:15:"events-calendar";i:1;i:1400572630;}i:10;a:2:{i:0;s:15:"events-calendar";i:1;i:1400572705;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMapLink</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMap</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventStartDate</wp:meta_key>
			<wp:meta_value><![CDATA[2014-06-19 09:00:00]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventEndDate</wp:meta_key>
			<wp:meta_value><![CDATA[2014-06-19 10:45:00]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventDuration</wp:meta_key>
			<wp:meta_value><![CDATA[6300]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventVenueID</wp:meta_key>
			<wp:meta_value><![CDATA[2452]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCurrencySymbol</wp:meta_key>
			<wp:meta_value><![CDATA[€]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCurrencyPosition</wp:meta_key>
			<wp:meta_value><![CDATA[prefix]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCost</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventURL</wp:meta_key>
			<wp:meta_value><![CDATA[http://www.aquastar-consulting.com/]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventOrganizerID</wp:meta_key>
			<wp:meta_value><![CDATA[2133]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Aquastar Consulting vous convie à un petit-déjeuner sous le thème de l'Industrie "Améliorez vos performances de production et optimisez votre rendement".]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[2457]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Petit-déjeuner CRM</title>
		<link>http://www.it-news.fr/event/petit-dejeuner-crm/</link>
		<pubDate>Tue, 20 May 2014 08:18:28 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?post_type=tribe_events&#038;p=2459</guid>
		<description></description>
		<content:encoded><![CDATA[<p style="color: #333333; text-align: justify;"><a href="http://www.it-news.fr/wp-content/uploads/2014/05/petit-dejeuner-crm.jpg"><img class="alignleft size-medium wp-image-2460" src="http://www.it-news.fr/wp-content/uploads/2014/05/petit-dejeuner-crm-300x200.jpg" alt="petit-dejeuner-crm" width="300" height="200" /></a>Aquastar Consulting vous convie à un petit-déjeuner découverte CRM avec pour thème : "Augmentez vos marges grâce à Sage CRM".</p>
<p style="color: #333333; text-align: justify;">Celui-ci se déroulera le mardi 17 Juin à 9h dans les locaux de l'entreprise au :</p>
<p style="color: #333333; text-align: center;">126 rue Pasteur,
ZA du Barœul59370,
Mons-en-Barœul<span style="color: #252525;"> </span></p>
<p style="color: #333333; text-align: justify;">Pour vous inscrire, <a title="inscription à l’événement petit-déjeuner Industrie" href="http://emailing.aquastar-consulting.com/2014/evenement/Gestion/Industrie/index2.html" target="_blank">cliquez ici</a>.</p>
<p style="color: #333333; text-align: justify;">Pour plus d'informations, vous pouvez contacter M. DESCHAMPS, Responsable Commercial, au 03.20.34.93.40.</p>
<p style="color: #333333; text-align: justify;">Cordialement,</p>
<p style="color: #333333; text-align: justify;">L'équipe d'Aquastar Consulting</p>]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2459</wp:post_id>
		<wp:post_date>2014-05-20 09:18:28</wp:post_date>
		<wp:post_date_gmt>2014-05-20 08:18:28</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>petit-dejeuner-crm</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_events</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<category domain="post_tag" nicename="crm"><![CDATA[CRM]]></category>
		<category domain="post_tag" nicename="petit-dejeuner"><![CDATA[petit déjeuner]]></category>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventAuditTrail</wp:meta_key>
			<wp:meta_value><![CDATA[a:5:{i:0;a:2:{i:0;s:15:"events-calendar";i:1;i:1400573651;}i:1;a:2:{i:0;s:15:"events-calendar";i:1;i:1400573674;}i:2;a:2:{i:0;s:15:"events-calendar";i:1;i:1400573703;}i:3;a:2:{i:0;s:15:"events-calendar";i:1;i:1400573778;}i:4;a:2:{i:0;s:15:"events-calendar";i:1;i:1400573898;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_edit_last</wp:meta_key>
			<wp:meta_value><![CDATA[37]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMapLink</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMap</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventStartDate</wp:meta_key>
			<wp:meta_value><![CDATA[2014-06-17 09:00:00]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventEndDate</wp:meta_key>
			<wp:meta_value><![CDATA[2014-06-17 10:00:00]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventDuration</wp:meta_key>
			<wp:meta_value><![CDATA[3600]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventVenueID</wp:meta_key>
			<wp:meta_value><![CDATA[2452]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCurrencySymbol</wp:meta_key>
			<wp:meta_value><![CDATA[€]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCurrencyPosition</wp:meta_key>
			<wp:meta_value><![CDATA[prefix]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventCost</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventURL</wp:meta_key>
			<wp:meta_value><![CDATA[www.aquastar-consulting.com]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventOrganizerID</wp:meta_key>
			<wp:meta_value><![CDATA[2133]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[crm]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Aquastar Consulting vous convie à un petit-déjeuner découverte CRM avec pour thème : "Augmentez vos marges grâce à Sage CRM".]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[58]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_wp_rp_image</wp:meta_key>
			<wp:meta_value><![CDATA[2461]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Une question ? Ecrivez-nous et on répondra à toutes vos interrogations !</title>
		<link>http://www.it-news.fr/?post_type=wpcf7_contact_form&#038;p=918</link>
		<pubDate>Wed, 21 Aug 2013 12:06:56 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?post_type=wpcf7_contact_form&#038;p=918</guid>
		<description></description>
		<content:encoded><![CDATA[<p>Votre nom (obligatoire)<br />
    [text* your-name] </p>

<p>Votre email (obligatoire)<br />
    [email* your-email] </p>

<p>Sujet<br />
    [text your-subject] </p>

<p>Votre message<br />
    [textarea your-message] </p>

[captchac captcha-753]
[captchar captcha-753]
<p>[submit "Envoyer"]</p>
[your-subject]
[your-name] < [your-email]>
De : [your-name] < [your-email]>
Sujet : [your-subject]

Corps du message :
[your-message]

--
This e-mail was sent from a contact form on L&#039;actualité de l&#039;informatique pour entreprise - Logiciel de gestion et infrastructures réseaux - (http://www.it-news.fr)
evoltolini@aquastar-consulting.com




[your-subject]
[your-name] < [your-email]>
Corps du message :
[your-message]

--
This e-mail was sent from a contact form on L&#039;actualité de l&#039;informatique pour entreprise - Logiciel de gestion et infrastructures réseaux - (http://www.it-news.fr)
[your-email]



Votre message a bien été envoyé. Merci.
Erreur lors de l'envoi du message. Veuillez réessayer plus tard ou contacter l'administrateur d'une autre manière.
Erreur de validation. Veuillez vérifier les champs et soumettre à nouveau.
Erreur lors de l'envoi du message. Veuillez réessayer plus tard ou contacter l'administrateur d'une autre manière.
Merci de bien vouloir accepter les conditions pour continuer.
Veuillez remplir le champ obligatoire.
Le format de date semble invalide.
Cette date est trop tôt.
Cette date est trop tard.
Le format numérique semble invalide.
Ce nombre est trop petit.
Ce nombre est trop grand.
Le code entre est incorrect.
Impossible de télécharger le fichier.
Ce type de fichier n'est pas autorisé.
Ce fichier est trop volumineux.
Impossible de télécharger le fichier. Une erreur est survenue.
Votre réponse est incorrecte.
L'adresse email semble invalide.
L'URL semble invalide.
Le numéro de téléphone semble invalide.]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>918</wp:post_id>
		<wp:post_date>2013-08-21 13:06:56</wp:post_date>
		<wp:post_date_gmt>2013-08-21 12:06:56</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>formulaire-de-contact-1</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>wpcf7_contact_form</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_form</wp:meta_key>
			<wp:meta_value><![CDATA[<p>Votre nom (obligatoire)<br />
    [text* your-name] </p>

<p>Votre email (obligatoire)<br />
    [email* your-email] </p>

<p>Sujet<br />
    [text your-subject] </p>

<p>Votre message<br />
    [textarea your-message] </p>

[captchac captcha-753]
[captchar captcha-753]
<p>[submit "Envoyer"]</p>]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_mail</wp:meta_key>
			<wp:meta_value><![CDATA[a:7:{s:7:"subject";s:14:"[your-subject]";s:6:"sender";s:26:"[your-name] <[your-email]>";s:4:"body";s:270:"De : [your-name] <[your-email]>
Sujet : [your-subject]

Corps du message :
[your-message]

--
This e-mail was sent from a contact form on L&#039;actualité de l&#039;informatique pour entreprise - Logiciel de gestion et infrastructures réseaux - (http://www.it-news.fr)";s:9:"recipient";s:34:"evoltolini@aquastar-consulting.com";s:18:"additional_headers";s:0:"";s:11:"attachments";s:0:"";s:8:"use_html";b:0;}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_mail_2</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{s:6:"active";b:0;s:7:"subject";s:14:"[your-subject]";s:6:"sender";s:26:"[your-name] <[your-email]>";s:4:"body";s:214:"Corps du message :
[your-message]

--
This e-mail was sent from a contact form on L&#039;actualité de l&#039;informatique pour entreprise - Logiciel de gestion et infrastructures réseaux - (http://www.it-news.fr)";s:9:"recipient";s:12:"[your-email]";s:18:"additional_headers";s:0:"";s:11:"attachments";s:0:"";s:8:"use_html";b:0;}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_messages</wp:meta_key>
			<wp:meta_value><![CDATA[a:21:{s:12:"mail_sent_ok";s:42:"Votre message a bien été envoyé. Merci.";s:12:"mail_sent_ng";s:116:"Erreur lors de l'envoi du message. Veuillez réessayer plus tard ou contacter l'administrateur d'une autre manière.";s:16:"validation_error";s:76:"Erreur de validation. Veuillez vérifier les champs et soumettre à nouveau.";s:4:"spam";s:116:"Erreur lors de l'envoi du message. Veuillez réessayer plus tard ou contacter l'administrateur d'une autre manière.";s:12:"accept_terms";s:61:"Merci de bien vouloir accepter les conditions pour continuer.";s:16:"invalid_required";s:38:"Veuillez remplir le champ obligatoire.";s:12:"invalid_date";s:34:"Le format de date semble invalide.";s:14:"date_too_early";s:25:"Cette date est trop tôt.";s:13:"date_too_late";s:25:"Cette date est trop tard.";s:14:"invalid_number";s:37:"Le format numérique semble invalide.";s:16:"number_too_small";s:25:"Ce nombre est trop petit.";s:16:"number_too_large";s:25:"Ce nombre est trop grand.";s:17:"captcha_not_match";s:28:"Le code entre est incorrect.";s:13:"upload_failed";s:39:"Impossible de télécharger le fichier.";s:24:"upload_file_type_invalid";s:39:"Ce type de fichier n'est pas autorisé.";s:21:"upload_file_too_large";s:31:"Ce fichier est trop volumineux.";s:23:"upload_failed_php_error";s:64:"Impossible de télécharger le fichier. Une erreur est survenue.";s:23:"quiz_answer_not_correct";s:30:"Votre réponse est incorrecte.";s:13:"invalid_email";s:32:"L'adresse email semble invalide.";s:11:"invalid_url";s:22:"L'URL semble invalide.";s:11:"invalid_tel";s:42:"Le numéro de téléphone semble invalide.";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_additional_settings</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_locale</wp:meta_key>
			<wp:meta_value><![CDATA[fr_FR]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Inscription Newsletter</title>
		<link>http://www.it-news.fr/?post_type=wpcf7_contact_form&#038;p=1048</link>
		<pubDate>Thu, 19 Sep 2013 14:00:56 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?post_type=wpcf7_contact_form&#038;p=1048</guid>
		<description></description>
		<content:encoded><![CDATA[<p>Nom (obligatoire)<br />
    [text* your-name] </p>

<p>Société (obligatoire)<br />
    [text* societe] </p>

<p>Email (obligatoire)<br />
    [email* your-email] </p>

[captchac captcha-376]
[captchar captcha-376]
<p>[submit "Envoyer"]</p>
Inscription Newsletter Aquastar Consulting
[your-name] < [your-email]>
De : [your-name] < [your-email]>
Sujet : [your-subject]

Corps du message :
[your-email]
[your-name]
[societe]

--
This e-mail was sent from a contact form on L&#039;actualité de l&#039;informatique pour entreprise - Logiciel de gestion et infrastructures réseaux - (http://www.it-news.fr)
ecalliati@aquastar-consulting.com




[your-subject]
[your-name] < [your-email]>
Corps du message :
[your-message]

--
This e-mail was sent from a contact form on L&#039;actualité de l&#039;informatique pour entreprise - Logiciel de gestion et infrastructures réseaux - (http://www.it-news.fr)
[your-email]



Votre message a bien été envoyé. Merci.
Erreur lors de l'envoi du message. Veuillez réessayer plus tard ou contacter l'administrateur d'une autre manière.
Erreur de validation. Veuillez vérifier les champs et soumettre à nouveau.
Erreur lors de l'envoi du message. Veuillez réessayer plus tard ou contacter l'administrateur d'une autre manière.
Merci de bien vouloir accepter les conditions pour continuer.
Veuillez remplir le champ obligatoire.
Le format de date semble invalide.
Cette date est trop tôt.
Cette date est trop tard.
Le format numérique semble invalide.
Ce nombre est trop petit.
Ce nombre est trop grand.
Le code entre est incorrect.
Impossible de télécharger le fichier.
Ce type de fichier n'est pas autorisé.
Ce fichier est trop volumineux.
Impossible de télécharger le fichier. Une erreur est survenue.
Votre réponse est incorrecte.
L'adresse email semble invalide.
L'URL semble invalide.
Le numéro de téléphone semble invalide.]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1048</wp:post_id>
		<wp:post_date>2013-09-19 15:00:56</wp:post_date>
		<wp:post_date_gmt>2013-09-19 14:00:56</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>inscription-newsletter</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>wpcf7_contact_form</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_form</wp:meta_key>
			<wp:meta_value><![CDATA[<p>Nom (obligatoire)<br />
    [text* your-name] </p>

<p>Société (obligatoire)<br />
    [text* societe] </p>

<p>Email (obligatoire)<br />
    [email* your-email] </p>

[captchac captcha-376]
[captchar captcha-376]
<p>[submit "Envoyer"]</p>]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_mail</wp:meta_key>
			<wp:meta_value><![CDATA[a:7:{s:7:"subject";s:42:"Inscription Newsletter Aquastar Consulting";s:6:"sender";s:26:"[your-name] <[your-email]>";s:4:"body";s:290:"De : [your-name] <[your-email]>
Sujet : [your-subject]

Corps du message :
[your-email]
[your-name]
[societe]

--
This e-mail was sent from a contact form on L&#039;actualité de l&#039;informatique pour entreprise - Logiciel de gestion et infrastructures réseaux - (http://www.it-news.fr)";s:9:"recipient";s:33:"ecalliati@aquastar-consulting.com";s:18:"additional_headers";s:0:"";s:11:"attachments";s:0:"";s:8:"use_html";b:0;}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_mail_2</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{s:6:"active";b:0;s:7:"subject";s:14:"[your-subject]";s:6:"sender";s:26:"[your-name] <[your-email]>";s:4:"body";s:214:"Corps du message :
[your-message]

--
This e-mail was sent from a contact form on L&#039;actualité de l&#039;informatique pour entreprise - Logiciel de gestion et infrastructures réseaux - (http://www.it-news.fr)";s:9:"recipient";s:12:"[your-email]";s:18:"additional_headers";s:0:"";s:11:"attachments";s:0:"";s:8:"use_html";b:0;}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_messages</wp:meta_key>
			<wp:meta_value><![CDATA[a:21:{s:12:"mail_sent_ok";s:42:"Votre message a bien été envoyé. Merci.";s:12:"mail_sent_ng";s:116:"Erreur lors de l'envoi du message. Veuillez réessayer plus tard ou contacter l'administrateur d'une autre manière.";s:16:"validation_error";s:76:"Erreur de validation. Veuillez vérifier les champs et soumettre à nouveau.";s:4:"spam";s:116:"Erreur lors de l'envoi du message. Veuillez réessayer plus tard ou contacter l'administrateur d'une autre manière.";s:12:"accept_terms";s:61:"Merci de bien vouloir accepter les conditions pour continuer.";s:16:"invalid_required";s:38:"Veuillez remplir le champ obligatoire.";s:12:"invalid_date";s:34:"Le format de date semble invalide.";s:14:"date_too_early";s:25:"Cette date est trop tôt.";s:13:"date_too_late";s:25:"Cette date est trop tard.";s:14:"invalid_number";s:37:"Le format numérique semble invalide.";s:16:"number_too_small";s:25:"Ce nombre est trop petit.";s:16:"number_too_large";s:25:"Ce nombre est trop grand.";s:17:"captcha_not_match";s:28:"Le code entre est incorrect.";s:13:"upload_failed";s:39:"Impossible de télécharger le fichier.";s:24:"upload_file_type_invalid";s:39:"Ce type de fichier n'est pas autorisé.";s:21:"upload_file_too_large";s:31:"Ce fichier est trop volumineux.";s:23:"upload_failed_php_error";s:64:"Impossible de télécharger le fichier. Une erreur est survenue.";s:23:"quiz_answer_not_correct";s:30:"Votre réponse est incorrecte.";s:13:"invalid_email";s:32:"L'adresse email semble invalide.";s:11:"invalid_url";s:22:"L'URL semble invalide.";s:11:"invalid_tel";s:42:"Le numéro de téléphone semble invalide.";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_additional_settings</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_locale</wp:meta_key>
			<wp:meta_value><![CDATA[fr_FR]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Porte de Versailles</title>
		<link>http://www.it-news.fr/lieu/cloud-it-expo/</link>
		<pubDate>Wed, 23 Oct 2013 07:30:46 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?post_type=tribe_venue&#038;p=1218</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1218</wp:post_id>
		<wp:post_date>2013-10-23 08:30:46</wp:post_date>
		<wp:post_date_gmt>2013-10-23 07:30:46</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cloud-it-expo</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_venue</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_VenueAuditTrail</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{i:0;a:2:{i:0;s:15:"events-calendar";i:1;i:1382512866;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Cloud]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[26]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMapLink</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMap</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueVenue</wp:meta_key>
			<wp:meta_value><![CDATA[Porte de Versailles]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueAddress</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueCity</wp:meta_key>
			<wp:meta_value><![CDATA[Paris]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueCountry</wp:meta_key>
			<wp:meta_value><![CDATA[France Métropolitaine]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueProvince</wp:meta_key>
			<wp:meta_value><![CDATA[Île de France]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueState</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueZip</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenuePhone</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueURL</wp:meta_key>
			<wp:meta_value><![CDATA[http://www.cloud-and-it-expo.fr/]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueStateProvince</wp:meta_key>
			<wp:meta_value><![CDATA[Île de France]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Lille Grand Palais</title>
		<link>http://www.it-news.fr/lieu/forum-international-cybersecurite-2014-lille/</link>
		<pubDate>Wed, 23 Oct 2013 08:29:21 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?post_type=tribe_venue&#038;p=1239</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1239</wp:post_id>
		<wp:post_date>2013-10-23 09:29:21</wp:post_date>
		<wp:post_date_gmt>2013-10-23 08:29:21</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>forum-international-cybersecurite-2014-lille</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_venue</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_VenueAuditTrail</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{i:0;a:2:{i:0;s:15:"events-calendar";i:1;i:1382516783;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Cybersécurité]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[25]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMapLink</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMap</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueVenueID</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueVenue</wp:meta_key>
			<wp:meta_value><![CDATA[Lille Grand Palais]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueAddress</wp:meta_key>
			<wp:meta_value><![CDATA[Lille Grand Palais 1 boulevard des Cités Unies 59777 Lille – Euralille]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueCity</wp:meta_key>
			<wp:meta_value><![CDATA[Lille]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueCountry</wp:meta_key>
			<wp:meta_value><![CDATA[France]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueProvince</wp:meta_key>
			<wp:meta_value><![CDATA[Nord Pas de Calais]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueState</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueZip</wp:meta_key>
			<wp:meta_value><![CDATA[59777]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenuePhone</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueURL</wp:meta_key>
			<wp:meta_value><![CDATA[http://www.forum-fic.com/2014/fr/]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueStateProvince</wp:meta_key>
			<wp:meta_value><![CDATA[Nord Pas de Calais]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Le domaine des Cigognes</title>
		<link>http://www.it-news.fr/lieu/it-tour/</link>
		<pubDate>Wed, 23 Oct 2013 08:50:42 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?post_type=tribe_venue&#038;p=1242</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1242</wp:post_id>
		<wp:post_date>2013-10-23 09:50:42</wp:post_date>
		<wp:post_date_gmt>2013-10-23 08:50:42</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>it-tour</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_venue</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_VenueAuditTrail</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{i:0;a:2:{i:0;s:15:"events-calendar";i:1;i:1382517986;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[it tour]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[26]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMapLink</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMap</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueVenueID</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueVenue</wp:meta_key>
			<wp:meta_value><![CDATA[Le domaine des Cigognes]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueAddress</wp:meta_key>
			<wp:meta_value><![CDATA[Départementale 917 Lieu dit Pont Thibault Route nationale ]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueCity</wp:meta_key>
			<wp:meta_value><![CDATA[Ennevelin]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueCountry</wp:meta_key>
			<wp:meta_value><![CDATA[France]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueProvince</wp:meta_key>
			<wp:meta_value><![CDATA[Nord Pas de Calais]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueState</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueZip</wp:meta_key>
			<wp:meta_value><![CDATA[59 710 ]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenuePhone</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueURL</wp:meta_key>
			<wp:meta_value><![CDATA[:www.domainedescigognes.info]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueStateProvince</wp:meta_key>
			<wp:meta_value><![CDATA[Nord Pas de Calais]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Amsterdam RAI</title>
		<link>http://www.it-news.fr/lieu/rsa-conference-europe-2013/</link>
		<pubDate>Wed, 23 Oct 2013 09:18:41 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?post_type=tribe_venue&#038;p=1247</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1247</wp:post_id>
		<wp:post_date>2013-10-23 10:18:41</wp:post_date>
		<wp:post_date_gmt>2013-10-23 09:18:41</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>rsa-conference-europe-2013</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_venue</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_VenueAuditTrail</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{i:0;a:2:{i:0;s:15:"events-calendar";i:1;i:1382519835;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[RSA]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[26]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMapLink</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMap</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueVenueID</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueVenue</wp:meta_key>
			<wp:meta_value><![CDATA[Amsterdam RAI]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueAddress</wp:meta_key>
			<wp:meta_value><![CDATA[Amsterdam RAI Europaplein NL 1078 GZ Amsterdam]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueCity</wp:meta_key>
			<wp:meta_value><![CDATA[Amsterdam]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueCountry</wp:meta_key>
			<wp:meta_value><![CDATA[Netherlands]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueProvince</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueState</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueZip</wp:meta_key>
			<wp:meta_value><![CDATA[NL 1078 GZ ]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenuePhone</wp:meta_key>
			<wp:meta_value><![CDATA[+31 (0) 20 549 12 12]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueURL</wp:meta_key>
			<wp:meta_value><![CDATA[http://www.rai.nl/]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueStateProvince</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Cnit La défence</title>
		<link>http://www.it-news.fr/lieu/cnit-la-defence/</link>
		<pubDate>Wed, 23 Oct 2013 09:26:10 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/lieu/cnit-la-defence/</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1250</wp:post_id>
		<wp:post_date>2013-10-23 10:26:10</wp:post_date>
		<wp:post_date_gmt>2013-10-23 09:26:10</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cnit-la-defence</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_venue</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_VenueOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[supply chain]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[22]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMapLink</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMap</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueVenueID</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueVenue</wp:meta_key>
			<wp:meta_value><![CDATA[Cnit La défence]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueAddress</wp:meta_key>
			<wp:meta_value><![CDATA[Cnit La Defense‎ 2 Place de la Défense, 92053 Paris, France]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueCity</wp:meta_key>
			<wp:meta_value><![CDATA[Paris]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueCountry</wp:meta_key>
			<wp:meta_value><![CDATA[France]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueProvince</wp:meta_key>
			<wp:meta_value><![CDATA[Île de France]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueState</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueZip</wp:meta_key>
			<wp:meta_value><![CDATA[92053]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenuePhone</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueURL</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueStateProvince</wp:meta_key>
			<wp:meta_value><![CDATA[Île de France]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Test</title>
		<link>http://www.it-news.fr/?post_type=wpcf7_contact_form&#038;p=1430</link>
		<pubDate>Tue, 12 Nov 2013 10:59:21 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?post_type=wpcf7_contact_form&#038;p=1430</guid>
		<description></description>
		<content:encoded><![CDATA[<p>Votre nom (obligatoire)<br />
    [text* your-name] </p>

<p>Votre email (obligatoire)<br />
    [email* your-email] </p>

<p>Sujet<br />
    [text your-subject] </p>

<p>Votre message<br />
    [textarea your-message] </p>

[captchac captcha-32]
[captchar captcha-32]
<p>[submit "Envoyer"]</p>
[your-subject]
[your-name] < [your-email]>
De : [your-name] < [your-email]>
Sujet : [your-subject]

Corps du message :
[your-message]

--
Cet email a été envoyé via le formulaire de contact le L&#039;actualité IT pour les décideurs informatiques (http://www.it-news.fr)
ecalliati@aquastar-consulting.com




[your-subject]
[your-name] < [your-email]>
Corps du message :
[your-message]

--
Cet email a été envoyé via le formulaire de contact le L&#039;actualité IT pour les décideurs informatiques (http://www.it-news.fr)
[your-email]



Votre message a bien été envoyé. Merci.
Erreur lors de l'envoi du message. Veuillez réessayer plus tard ou contacter l'administrateur d'une autre manière.
Erreur de validation. Veuillez vérifier les champs et soumettre à nouveau.
Erreur lors de l'envoi du message. Veuillez réessayer plus tard ou contacter l'administrateur d'une autre manière.
Merci de bien vouloir accepter les conditions pour continuer.
Veuillez remplir le champ obligatoire.
Le format de date semble invalide.
Cette date est trop tôt.
Cette date est trop tard.
Le format numérique semble invalide.
Ce nombre est trop petit.
Ce nombre est trop grand.
Le code entre est incorrect.
Impossible de télécharger le fichier.
Ce type de fichier n'est pas autorisé.
Ce fichier est trop volumineux.
Impossible de télécharger le fichier. Une erreur est survenue.
Votre réponse est incorrecte.
L'adresse email semble invalide.
L'URL semble invalide.
Le numéro de téléphone semble invalide.]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1430</wp:post_id>
		<wp:post_date>2013-11-12 11:59:21</wp:post_date>
		<wp:post_date_gmt>2013-11-12 10:59:21</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>test</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>wpcf7_contact_form</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_form</wp:meta_key>
			<wp:meta_value><![CDATA[<p>Votre nom (obligatoire)<br />
    [text* your-name] </p>

<p>Votre email (obligatoire)<br />
    [email* your-email] </p>

<p>Sujet<br />
    [text your-subject] </p>

<p>Votre message<br />
    [textarea your-message] </p>

[captchac captcha-32]
[captchar captcha-32]
<p>[submit "Envoyer"]</p>]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_mail</wp:meta_key>
			<wp:meta_value><![CDATA[a:7:{s:7:"subject";s:14:"[your-subject]";s:6:"sender";s:26:"[your-name] <[your-email]>";s:4:"body";s:230:"De : [your-name] <[your-email]>
Sujet : [your-subject]

Corps du message :
[your-message]

--
Cet email a été envoyé via le formulaire de contact le L&#039;actualité IT pour les décideurs informatiques (http://www.it-news.fr)";s:9:"recipient";s:33:"ecalliati@aquastar-consulting.com";s:18:"additional_headers";s:0:"";s:11:"attachments";s:0:"";s:8:"use_html";b:0;}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_mail_2</wp:meta_key>
			<wp:meta_value><![CDATA[a:8:{s:6:"active";b:0;s:7:"subject";s:14:"[your-subject]";s:6:"sender";s:26:"[your-name] <[your-email]>";s:4:"body";s:174:"Corps du message :
[your-message]

--
Cet email a été envoyé via le formulaire de contact le L&#039;actualité IT pour les décideurs informatiques (http://www.it-news.fr)";s:9:"recipient";s:12:"[your-email]";s:18:"additional_headers";s:0:"";s:11:"attachments";s:0:"";s:8:"use_html";b:0;}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_messages</wp:meta_key>
			<wp:meta_value><![CDATA[a:21:{s:12:"mail_sent_ok";s:42:"Votre message a bien été envoyé. Merci.";s:12:"mail_sent_ng";s:116:"Erreur lors de l'envoi du message. Veuillez réessayer plus tard ou contacter l'administrateur d'une autre manière.";s:16:"validation_error";s:76:"Erreur de validation. Veuillez vérifier les champs et soumettre à nouveau.";s:4:"spam";s:116:"Erreur lors de l'envoi du message. Veuillez réessayer plus tard ou contacter l'administrateur d'une autre manière.";s:12:"accept_terms";s:61:"Merci de bien vouloir accepter les conditions pour continuer.";s:16:"invalid_required";s:38:"Veuillez remplir le champ obligatoire.";s:12:"invalid_date";s:34:"Le format de date semble invalide.";s:14:"date_too_early";s:25:"Cette date est trop tôt.";s:13:"date_too_late";s:25:"Cette date est trop tard.";s:14:"invalid_number";s:37:"Le format numérique semble invalide.";s:16:"number_too_small";s:25:"Ce nombre est trop petit.";s:16:"number_too_large";s:25:"Ce nombre est trop grand.";s:17:"captcha_not_match";s:28:"Le code entre est incorrect.";s:13:"upload_failed";s:39:"Impossible de télécharger le fichier.";s:24:"upload_file_type_invalid";s:39:"Ce type de fichier n'est pas autorisé.";s:21:"upload_file_too_large";s:31:"Ce fichier est trop volumineux.";s:23:"upload_failed_php_error";s:64:"Impossible de télécharger le fichier. Une erreur est survenue.";s:23:"quiz_answer_not_correct";s:30:"Votre réponse est incorrecte.";s:13:"invalid_email";s:32:"L'adresse email semble invalide.";s:11:"invalid_url";s:22:"L'URL semble invalide.";s:11:"invalid_tel";s:42:"Le numéro de téléphone semble invalide.";}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_additional_settings</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_locale</wp:meta_key>
			<wp:meta_value><![CDATA[fr_FR]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Disneyland Resort Paris</title>
		<link>http://www.it-news.fr/lieu/partners/</link>
		<pubDate>Thu, 05 Dec 2013 16:05:00 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/?post_type=tribe_venue&#038;p=1688</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1688</wp:post_id>
		<wp:post_date>2013-12-05 17:05:00</wp:post_date>
		<wp:post_date_gmt>2013-12-05 16:05:00</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>partners</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_venue</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueAuditTrail</wp:meta_key>
			<wp:meta_value><![CDATA[a:1:{i:0;a:2:{i:0;s:15:"events-calendar";i:1;i:1386259421;}}]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[IT]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[32]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMapLink</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMap</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueVenueID</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueVenue</wp:meta_key>
			<wp:meta_value><![CDATA[Disneyland Resort Paris]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueAddress</wp:meta_key>
			<wp:meta_value><![CDATA[77777 Marne La Vallée]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueCity</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueCountry</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueProvince</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueState</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueZip</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenuePhone</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueURL</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueStateProvince</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Paris Nord Villepinte</title>
		<link>http://www.it-news.fr/lieu/paris-nord-villepinte/</link>
		<pubDate>Thu, 05 Dec 2013 16:13:46 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/lieu/paris-nord-villepinte/</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1691</wp:post_id>
		<wp:post_date>2013-12-05 17:13:46</wp:post_date>
		<wp:post_date_gmt>2013-12-05 16:13:46</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>paris-nord-villepinte</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_venue</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[midest]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[20]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMapLink</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMap</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueVenueID</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueVenue</wp:meta_key>
			<wp:meta_value><![CDATA[Paris Nord Villepinte]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueAddress</wp:meta_key>
			<wp:meta_value><![CDATA[Allée des Érables]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueCity</wp:meta_key>
			<wp:meta_value><![CDATA[Paris]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueCountry</wp:meta_key>
			<wp:meta_value><![CDATA[France]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueProvince</wp:meta_key>
			<wp:meta_value><![CDATA[Villepinte]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueState</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueZip</wp:meta_key>
			<wp:meta_value><![CDATA[93420 ]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenuePhone</wp:meta_key>
			<wp:meta_value><![CDATA[01 40 68 22 22]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueURL</wp:meta_key>
			<wp:meta_value><![CDATA[http://www.viparis.com/viparisFront/do/centre/accueil]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueStateProvince</wp:meta_key>
			<wp:meta_value><![CDATA[Villepinte]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Grimaldi Forum Monaco</title>
		<link>http://www.it-news.fr/lieu/grimaldi-forum-monaco/</link>
		<pubDate>Thu, 05 Dec 2013 16:26:42 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/lieu/grimaldi-forum-monaco/</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1695</wp:post_id>
		<wp:post_date>2013-12-05 17:26:42</wp:post_date>
		<wp:post_date_gmt>2013-12-05 16:26:42</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>grimaldi-forum-monaco</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_venue</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Medpi]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[20]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMapLink</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMap</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueVenueID</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueVenue</wp:meta_key>
			<wp:meta_value><![CDATA[Grimaldi Forum Monaco]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueAddress</wp:meta_key>
			<wp:meta_value><![CDATA[10 Avenue Princesse Grace]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueCity</wp:meta_key>
			<wp:meta_value><![CDATA[Monaco]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueCountry</wp:meta_key>
			<wp:meta_value><![CDATA[Monaco]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueProvince</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueState</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueZip</wp:meta_key>
			<wp:meta_value><![CDATA[98000 ]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenuePhone</wp:meta_key>
			<wp:meta_value><![CDATA[+377 99 99 20 00]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueURL</wp:meta_key>
			<wp:meta_value><![CDATA[www.grimaldiforum.com/‎]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueStateProvince</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Palais des Congrès de Paris</title>
		<link>http://www.it-news.fr/lieu/palais-des-congres-de-paris/</link>
		<pubDate>Tue, 14 Jan 2014 09:41:23 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/lieu/palais-des-congres-de-paris/</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>1922</wp:post_id>
		<wp:post_date>2014-01-14 10:41:23</wp:post_date>
		<wp:post_date_gmt>2014-01-14 09:41:23</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>palais-des-congres-de-paris</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_venue</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[TechDays]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_metadesc</wp:meta_key>
			<wp:meta_value><![CDATA[Avec 18 000 visiteurs, le TechDays est l'événement numérique en Europe. Il aura lieu le 11, 12 et 13 Février 2013 au Palais des Congrès de Paris.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[17]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMapLink</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMap</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueVenueID</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueVenue</wp:meta_key>
			<wp:meta_value><![CDATA[Palais des Congrès de Paris]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueAddress</wp:meta_key>
			<wp:meta_value><![CDATA[Palais des Congrès de Paris - Porte Maillot]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueCity</wp:meta_key>
			<wp:meta_value><![CDATA[Paris]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueCountry</wp:meta_key>
			<wp:meta_value><![CDATA[France]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueProvince</wp:meta_key>
			<wp:meta_value><![CDATA[Ile-de-France]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueState</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueZip</wp:meta_key>
			<wp:meta_value><![CDATA[75017 ]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenuePhone</wp:meta_key>
			<wp:meta_value><![CDATA[01 40 68 22 22]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueURL</wp:meta_key>
			<wp:meta_value><![CDATA[www.palaisdescongres-paris.com]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueStateProvince</wp:meta_key>
			<wp:meta_value><![CDATA[Ile-de-France]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Lille Grand Palais</title>
		<link>http://www.it-news.fr/lieu/lille-grand-palais/</link>
		<pubDate>Thu, 06 Feb 2014 16:34:11 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/lieu/lille-grand-palais/</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2025</wp:post_id>
		<wp:post_date>2014-02-06 17:34:11</wp:post_date>
		<wp:post_date_gmt>2014-02-06 16:34:11</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>lille-grand-palais</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_venue</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[Nordbat]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[26]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMapLink</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMap</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueVenueID</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueVenue</wp:meta_key>
			<wp:meta_value><![CDATA[Lille Grand Palais]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueAddress</wp:meta_key>
			<wp:meta_value><![CDATA[Lille Grand Palais 1 boulevard des Cités Unies 59777 Lille – Euralille]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueCity</wp:meta_key>
			<wp:meta_value><![CDATA[Lille]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueProvince</wp:meta_key>
			<wp:meta_value><![CDATA[Nord Pas de Calais]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueZip</wp:meta_key>
			<wp:meta_value><![CDATA[59777]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenuePhone</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueURL</wp:meta_key>
			<wp:meta_value><![CDATA[http://www.lillegrandpalais.com/]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueStateProvince</wp:meta_key>
			<wp:meta_value><![CDATA[Nord Pas de Calais]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Cité des Echanges de Marcq-en-Barœul</title>
		<link>http://www.it-news.fr/lieu/cite-des-echanges-de-marcq-en-baroeul/</link>
		<pubDate>Mon, 17 Feb 2014 15:45:11 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/lieu/cite-des-echanges-de-marcq-en-baroeul/</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2134</wp:post_id>
		<wp:post_date>2014-02-17 16:45:11</wp:post_date>
		<wp:post_date_gmt>2014-02-17 15:45:11</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>cite-des-echanges-de-marcq-en-baroeul</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_venue</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_focuskw</wp:meta_key>
			<wp:meta_value><![CDATA[cybermenaces]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_yoast_wpseo_linkdex</wp:meta_key>
			<wp:meta_value><![CDATA[19]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMapLink</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMap</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueVenueID</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueVenue</wp:meta_key>
			<wp:meta_value><![CDATA[Cité des Echanges de Marcq-en-Barœul]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueAddress</wp:meta_key>
			<wp:meta_value><![CDATA[40, rue Eugène Jacquet ]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueCity</wp:meta_key>
			<wp:meta_value><![CDATA[Marcq-en-Barœul]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueCountry</wp:meta_key>
			<wp:meta_value><![CDATA[France Métropolitaine]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueProvince</wp:meta_key>
			<wp:meta_value><![CDATA[Nord Pas de Calais]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueState</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueZip</wp:meta_key>
			<wp:meta_value><![CDATA[59700 ]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenuePhone</wp:meta_key>
			<wp:meta_value><![CDATA[03 20 99 47 53]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueURL</wp:meta_key>
			<wp:meta_value><![CDATA[wwwcitedesechanges.com]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueStateProvince</wp:meta_key>
			<wp:meta_value><![CDATA[Nord Pas de Calais]]></wp:meta_value>
		</wp:postmeta>
	</item>
	<item>
		<title>Aquastar Consulting</title>
		<link>http://www.it-news.fr/lieu/aquastar-consulting/</link>
		<pubDate>Tue, 20 May 2014 08:00:06 +0000</pubDate>
		<dc:creator><![CDATA[aquastar]]></dc:creator>
		<guid isPermaLink="false">http://www.it-news.fr/lieu/aquastar-consulting/</guid>
		<description></description>
		<content:encoded><![CDATA[]]></content:encoded>
		<excerpt:encoded><![CDATA[]]></excerpt:encoded>
		<wp:post_id>2452</wp:post_id>
		<wp:post_date>2014-05-20 09:00:06</wp:post_date>
		<wp:post_date_gmt>2014-05-20 08:00:06</wp:post_date_gmt>
		<wp:comment_status>open</wp:comment_status>
		<wp:ping_status>open</wp:ping_status>
		<wp:post_name>aquastar-consulting</wp:post_name>
		<wp:status>publish</wp:status>
		<wp:post_parent>0</wp:post_parent>
		<wp:menu_order>0</wp:menu_order>
		<wp:post_type>tribe_venue</wp:post_type>
		<wp:post_password></wp:post_password>
		<wp:is_sticky>0</wp:is_sticky>
		<wp:postmeta>
			<wp:meta_key>_EventShowMapLink</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_EventShowMap</wp:meta_key>
			<wp:meta_value><![CDATA[1]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueVenueID</wp:meta_key>
			<wp:meta_value><![CDATA[0]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueVenue</wp:meta_key>
			<wp:meta_value><![CDATA[Aquastar Consulting]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueAddress</wp:meta_key>
			<wp:meta_value><![CDATA[126 rue Pasteur, ZA du Barœul]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueCity</wp:meta_key>
			<wp:meta_value><![CDATA[ Mons-en-Barœul ]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueCountry</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueProvince</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueState</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueZip</wp:meta_key>
			<wp:meta_value><![CDATA[59370]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenuePhone</wp:meta_key>
			<wp:meta_value><![CDATA[03.20.34.93.40.]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueURL</wp:meta_key>
			<wp:meta_value><![CDATA[www.aquastar-consulting.com]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueShowMap</wp:meta_key>
			<wp:meta_value><![CDATA[false]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueShowMapLink</wp:meta_key>
			<wp:meta_value><![CDATA[false]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueStateProvince</wp:meta_key>
			<wp:meta_value><![CDATA[]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_jsps_metabox_hide_buttons</wp:meta_key>
			<wp:meta_value><![CDATA[off]]></wp:meta_value>
		</wp:postmeta>
		<wp:postmeta>
			<wp:meta_key>_VenueOrigin</wp:meta_key>
			<wp:meta_value><![CDATA[events-calendar]]></wp:meta_value>
		</wp:postmeta>
	</item>
</channel>
</rss>
