{"id":113546,"date":"2018-07-31T22:39:54","date_gmt":"2018-07-31T22:39:54","guid":{"rendered":"https:\/\/\/programme-cyberstationf-de-thales-premiers-resultats\/"},"modified":"2018-07-31T22:39:54","modified_gmt":"2018-07-31T22:39:54","slug":"programme-cyberstationf-de-thales-premiers-resultats","status":"publish","type":"post","link":"https:\/\/www.ecinews.fr\/fr\/programme-cyberstationf-de-thales-premiers-resultats\/","title":{"rendered":"Programme cyber@stationF de Thales: premiers r\u00e9sultats"},"content":{"rendered":"<p>Thales a accompagn\u00e9 pendant six mois neuf startups compl\u00e9mentaires au regard de la chaine de cybers\u00e9curit\u00e9 sur pr\u00e8s de 100 candidatures pour rejoindre son programme de cybers\u00e9curit\u00e9 \u00e0 STATION F. Quatre startups sont fran\u00e7aises, cinq viennent de pologne, d\u2019Isra\u00ebl, des Etats-Unis, de Suisse et des Pays-Bas. Gr\u00e2ce au programme cyber@stationF, qui s\u2019inscrit dans la transformation num\u00e9rique et dans la strat\u00e9gie de la Digital Factory du Groupe, Thales a voulu acc\u00e9l\u00e9r\u00e9 le d\u00e9veloppement de chaque startup en leur apportant du conseil, de l\u2019expertise technique et un acc\u00e8s aux 5 grands march\u00e9s du Groupe.<\/p>\n<p>Thales a favoris\u00e9 la coop\u00e9ration entre elles afin de &nbsp;mutualiser leurs comp\u00e9tences, renforcer l\u2019\u00e9change et l\u2019innovation. Gr\u00e2ce \u00e0 leur compl\u00e9mentarit\u00e9, certaines startups ont pu cod\u00e9velopper avec Thales des d\u00e9monstrateurs conjoints. &nbsp;Soutenus par des \u00ab&nbsp;coachs&nbsp;\u00bb, des collaborateurs du Groupe engag\u00e9s dans le programme, chaque start-up et chaque d\u00e9monstrateur a ainsi b\u00e9n\u00e9fici\u00e9 d\u2019un accompagnement du Groupe, approfondi en fonction de ses besoins, demandes, comp\u00e9tences ou sp\u00e9cificit\u00e9s.<\/p>\n<p><strong>Les trois d\u00e9monstrateurs<\/strong> :<\/p>\n<p><strong>Le premier,<\/strong> &nbsp;baptis\u00e9&nbsp;<em>Collaboration without revealing data<\/em>&nbsp;a \u00e9t\u00e9 co-cr\u00e9\u00e9 avec KeeX, Inpher et QED-it. Il permet de tirer les b\u00e9n\u00e9fices des capacit\u00e9s du big data et de l\u2019intelligence artificielle appliqu\u00e9es \u00e0 des jeux de donn\u00e9es venant de plusieurs acteurs d\u2019un \u00e9cosyst\u00e8me, tout en garantissant leur protection. Cette innovation favorise la collaboration entre les fournisseurs de donn\u00e9es, qui offre ainsi des services \u00e0 valeur ajout\u00e9e \u00e0 leurs clients, dans les domaines m\u00e9dical (pr\u00e9venir des maladies) ou industriel (\u00e9viter une action de maintenance ou de r\u00e9paration non n\u00e9cessaire). Et ce, sans perdre la ma\u00eetrise de leurs donn\u00e9es (conformit\u00e9 RGPD, maintien de la confidentialit\u00e9 commerciale, etc.).<\/p>\n<p><strong>Le second,&nbsp;<\/strong><em>Secure<\/em>&nbsp;<em>Critical infrastructure<\/em>, cr\u00e9\u00e9 avec Alsid et Nethone, traite les menaces cyber internes pour mieux prot\u00e9ger les infrastructures critiques, notamment satellitaire. Pour r\u00e9pondre \u00e0 une menace en constante \u00e9volution, les startups recourent \u00e0 l\u2019intelligence artificielle et \u00e0 des techniques de&nbsp;<em>Threat Intelligence<\/em>&nbsp;afin de s\u00e9curiser les donn\u00e9es sensibles \u00e9chang\u00e9es entre le centre de contr\u00f4le terrestre et le satellite.<\/p>\n<p><strong>Le troisi\u00e8me<a href=\"https:\/\/www.youtube.com\/watch?v=guZo3m6mtvw&amp;feature=youtu.be\"> <\/a><\/strong>, Car Sharing, cr\u00e9\u00e9 en collaboration avec Keex, QED-it et MultiSense, permet de v\u00e9rifier l\u2019authenticit\u00e9 de donn\u00e9es propri\u00e9taires et locataires d\u2019une application de location de voitures, pour faciliter l\u2019exp\u00e9rience utilisateur et s\u00e9curiser la transaction dans la mesure o\u00f9 l\u2019utilisation se fait sans partage de donn\u00e9es. L\u2019\u00e9tat initial et final du v\u00e9hicule est certifi\u00e9 par une signature \u00e9lectronique. La s\u00e9curit\u00e9 d\u2019acc\u00e8s et de d\u00e9marrage du v\u00e9hicule est assur\u00e9e par une authentification biom\u00e9trique multi-facteurs qui garantit que l\u2019utilisateur est bien le locataire valid\u00e9.<\/p>\n<hr \/>\n<p><strong>Les neuf Starups<\/strong>:<\/p>\n<p><strong>Alsid<\/strong>&nbsp;con\u00e7oit des solutions de cyberd\u00e9fense permettant aux grandes entreprises de s\u00e9curiser le c\u0153ur de leurs syst\u00e8mes d\u2019information.<\/p>\n<p><strong>Biowatch<\/strong>&nbsp;d\u00e9veloppe une technologie biom\u00e9trique portable &nbsp;bas\u00e9e sur la reconnaissance des veines, s\u2019inscrivant en alternative aux m\u00e9thodes d\u2019authentification actuelles.<br \/>\n&nbsp;<br \/>\n<strong>Inpher<\/strong>&nbsp;et ses sp\u00e9cialistes du cryptage travaillent sur l\u2019application du \u00ab&nbsp;big data&nbsp;\u00bb et &nbsp;du \u00ab&nbsp;machine learning&nbsp;\u00bb, ou apprentissage automatique, aux donn\u00e9es crypt\u00e9es, afin d\u2019am\u00e9liorer la combinaison s\u00e9curit\u00e9-exp\u00e9rience utilisateur&nbsp;;<\/p>\n<p><strong>KeeeX<\/strong>&nbsp;propose des solutions blockchain totalement op\u00e9rationnelles pour s\u00e9curiser, signer, cha\u00eener, partager et horodater tout type de document sans alt\u00e9ration (+250 formats)&nbsp;; il ajoute aussi des tags pour permettre une meilleure recherche&nbsp;; les documents sont encr\u00e9s par d\u00e9faut sur la Blockain Bitcoin pour prouver son existence \u00e0 une date donn\u00e9e.<\/p>\n<p><strong>Multisense B.V<\/strong>, sp\u00e9cialiste de la multibiom\u00e9trie et des solutions logicielles de pointe, propose une technologie unique qui fusionne des facteurs multibiom\u00e9triques (reconnaissance faciale et vocale, signature par empreinte digitale et les combine aux technologies GPS et NFC, et \u00e0 quelques proc\u00e9d\u00e9s brevet\u00e9s de d\u00e9tection du vivant).,<\/p>\n<p>&nbsp;<strong>Nethone<\/strong>&nbsp;cr\u00e9e des solutions d\u2019auto-apprentissage qui convertissent les menaces en d\u00e9cisions rentables, automatiquement et en temps r\u00e9el&nbsp;;<br \/>\n&nbsp;<br \/>\n<strong>QED-it<\/strong>&nbsp;a d\u00e9velopp\u00e9 la Zero Knowledge Blockchain, une plateforme qui combine l\u2019avantage d\u2019une coordination des parties op\u00e9ratives (technologie Blockchain) et la n\u00e9cessit\u00e9, pour des raisons l\u00e9gales ou commerciales, de fournir une preuve sans divulguer les donn\u00e9es (Zero Knowledge Proof)&nbsp;;<\/p>\n<p><strong>Skeyecode<\/strong>, offre une solution cryptographique de s\u00e9curisation des transactions financi\u00e8res et de l\u2019authentification de l\u2019utilisateur ce qui permet une s\u00e9curit\u00e9 importante lors de cyberattaques.<\/p>\n<p>La plate-forme Bug Bounty de&nbsp;<strong>Yogosha<\/strong>&nbsp;s\u2019appuie sur un r\u00e9seau mondial de hackers \u00e9thiques pour aider les clients \u00e0 mettre en \u0153uvre une d\u00e9marche de d\u00e9tection de leurs failles de s\u00e9curit\u00e9. La start-up accompagne ses clients et d\u00e9fini une mission de Bug Bounty pour mieux r\u00e9pondre \u00e0 leurs attentes et objectifs.<\/p>\n<p><strong><a href=\"https:\/\/www.youtube.com\/watch?v=IfxGrdvdsF0\">Cyber@stationF<\/a>&nbsp;<\/strong> &nbsp; <a href=\"https:\/\/www.youtube.com\/watch?v=TY8G9BtcNdc&amp;feature=youtu.be\"><strong>Le premier d\u00e9monstrateur<\/strong><\/a>&nbsp;&nbsp;<a href=\"https:\/\/www.youtube.com\/watch?v=guZo3m6mtvw&amp;feature=youtu.be\"><strong>Le troisi\u00e8me d\u00e9monstrateur<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/www.alsid.it\/\"><strong>Alsid<\/strong><\/a>&nbsp; &nbsp; &nbsp;<strong><a href=\"https:\/\/www.biowatchid.com\/\">Biowatch<\/a>&nbsp; &nbsp;<\/strong>&nbsp; <strong><a href=\"https:\/\/www.inpher.io\/\">Inpher<\/a>&nbsp; &nbsp;<\/strong>&nbsp; <strong><a href=\"https:\/\/keeex.me\/fr\/\">KeeeX<\/a>&nbsp; &nbsp;<\/strong>&nbsp; <strong><a href=\"http:\/\/www.multisense.nl\/\">Multisense B.V<\/a><\/strong>&nbsp; &nbsp;<strong><a href=\"https:\/\/nethone.com\/\">Nethone<\/a>&nbsp;<\/strong>&nbsp; <a href=\"http:\/\/qed-it.com\/category\/company\/\"><strong>QED-it<\/strong><\/a>&nbsp; <strong><a href=\"https:\/\/skeyecode.com\/\">Skeyecode<\/a>&nbsp;<\/strong>&nbsp; <a href=\"https:\/\/www.yogosha.com\/\"><strong>Yogosha<\/strong><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Au terme de 6 mois d\u2019acc\u00e9l\u00e9ration, les 9 startups du programme Cyber@StationF ont pu d\u00e9velopper conjointement 3 d\u00e9monstrateurs. La premi\u00e8re p\u00e9riode d\u2019acc\u00e9l\u00e9ration arrive \u00e0 son terme, et Thales travaille d\u00e9j\u00e0 \u00e0 la deuxi\u00e8me session et une s\u00e9lection de nouvelles startups.\u00a0<\/p>\n","protected":false},"author":11,"featured_media":113547,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[],"tags":[],"domains":[47],"ppma_author":[1143],"class_list":["post-113546","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","domains-electronique-eci"],"acf":[],"yoast_head":"<title>Programme cyber@stationF de Thales: premiers r\u00e9sultats ...<\/title>\n<meta name=\"description\" content=\"Au terme de 6 mois d\u2019acc\u00e9l\u00e9ration, les 9 startups du programme Cyber@StationF ont pu d\u00e9velopper conjointement 3 d\u00e9monstrateurs. La premi\u00e8re p\u00e9riode...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/113546\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Programme cyber@stationF de Thales: premiers r\u00e9sultats\" \/>\n<meta property=\"og:description\" content=\"Au terme de 6 mois d\u2019acc\u00e9l\u00e9ration, les 9 startups du programme Cyber@StationF ont pu d\u00e9velopper conjointement 3 d\u00e9monstrateurs. La premi\u00e8re p\u00e9riode d\u2019acc\u00e9l\u00e9ration arrive \u00e0 son terme, et Thales travaille d\u00e9j\u00e0 \u00e0 la deuxi\u00e8me session et une s\u00e9lection de nouvelles startups.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/113546\/\" \/>\n<meta property=\"og:site_name\" content=\"EENewsEurope\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-31T22:39:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eenewseurope.com\/wp-content\/uploads\/import\/default\/files\/sites\/default\/files\/images\/thales-9-starups.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"288\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Daniel Cardon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Daniel Cardon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.eenewseurope.com\/fr\/programme-cyberstationf-de-thales-premiers-resultats\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.eenewseurope.com\/fr\/programme-cyberstationf-de-thales-premiers-resultats\/\"},\"author\":{\"name\":\"Daniel Cardon\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/93c44cde463762f40a8236eaa44c1c17\"},\"headline\":\"Programme cyber@stationF de Thales: premiers r\u00e9sultats\",\"datePublished\":\"2018-07-31T22:39:54+00:00\",\"dateModified\":\"2018-07-31T22:39:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.eenewseurope.com\/fr\/programme-cyberstationf-de-thales-premiers-resultats\/\"},\"wordCount\":910,\"publisher\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#organization\"},\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.eenewseurope.com\/fr\/programme-cyberstationf-de-thales-premiers-resultats\/\",\"url\":\"https:\/\/www.eenewseurope.com\/fr\/programme-cyberstationf-de-thales-premiers-resultats\/\",\"name\":\"Programme cyber@stationF de Thales: premiers r\u00e9sultats -\",\"isPartOf\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#website\"},\"datePublished\":\"2018-07-31T22:39:54+00:00\",\"dateModified\":\"2018-07-31T22:39:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.eenewseurope.com\/fr\/programme-cyberstationf-de-thales-premiers-resultats\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.eenewseurope.com\/fr\/programme-cyberstationf-de-thales-premiers-resultats\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.eenewseurope.com\/fr\/programme-cyberstationf-de-thales-premiers-resultats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ecinews.fr\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Programme cyber@stationF de Thales: premiers r\u00e9sultats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#website\",\"url\":\"https:\/\/www.eenewseurope.com\/en\/\",\"name\":\"EENewsEurope\",\"description\":\"Just another WordPress site\",\"publisher\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.eenewseurope.com\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#organization\",\"name\":\"EENewsEurope\",\"url\":\"https:\/\/www.eenewseurope.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"contentUrl\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"width\":283,\"height\":113,\"caption\":\"EENewsEurope\"},\"image\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/93c44cde463762f40a8236eaa44c1c17\",\"name\":\"Daniel Cardon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/image\/2b243f6bcc1cff7d86aadfb2cd0bd870\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/de9edc136dfc061ad4778e04635baefa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/de9edc136dfc061ad4778e04635baefa?s=96&d=mm&r=g\",\"caption\":\"Daniel Cardon\"}}]}<\/script>","yoast_head_json":{"title":"Programme cyber@stationF de Thales: premiers r\u00e9sultats ...","description":"Au terme de 6 mois d\u2019acc\u00e9l\u00e9ration, les 9 startups du programme Cyber@StationF ont pu d\u00e9velopper conjointement 3 d\u00e9monstrateurs. La premi\u00e8re p\u00e9riode...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/113546\/","og_locale":"fr_FR","og_type":"article","og_title":"Programme cyber@stationF de Thales: premiers r\u00e9sultats","og_description":"Au terme de 6 mois d\u2019acc\u00e9l\u00e9ration, les 9 startups du programme Cyber@StationF ont pu d\u00e9velopper conjointement 3 d\u00e9monstrateurs. La premi\u00e8re p\u00e9riode d\u2019acc\u00e9l\u00e9ration arrive \u00e0 son terme, et Thales travaille d\u00e9j\u00e0 \u00e0 la deuxi\u00e8me session et une s\u00e9lection de nouvelles startups.\u00a0","og_url":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/113546\/","og_site_name":"EENewsEurope","article_published_time":"2018-07-31T22:39:54+00:00","og_image":[{"width":500,"height":288,"url":"https:\/\/www.eenewseurope.com\/wp-content\/uploads\/import\/default\/files\/sites\/default\/files\/images\/thales-9-starups.jpg","type":"image\/jpeg"}],"author":"Daniel Cardon","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Daniel Cardon","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eenewseurope.com\/fr\/programme-cyberstationf-de-thales-premiers-resultats\/#article","isPartOf":{"@id":"https:\/\/www.eenewseurope.com\/fr\/programme-cyberstationf-de-thales-premiers-resultats\/"},"author":{"name":"Daniel Cardon","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/93c44cde463762f40a8236eaa44c1c17"},"headline":"Programme cyber@stationF de Thales: premiers r\u00e9sultats","datePublished":"2018-07-31T22:39:54+00:00","dateModified":"2018-07-31T22:39:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eenewseurope.com\/fr\/programme-cyberstationf-de-thales-premiers-resultats\/"},"wordCount":910,"publisher":{"@id":"https:\/\/www.eenewseurope.com\/en\/#organization"},"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.eenewseurope.com\/fr\/programme-cyberstationf-de-thales-premiers-resultats\/","url":"https:\/\/www.eenewseurope.com\/fr\/programme-cyberstationf-de-thales-premiers-resultats\/","name":"Programme cyber@stationF de Thales: premiers r\u00e9sultats -","isPartOf":{"@id":"https:\/\/www.eenewseurope.com\/en\/#website"},"datePublished":"2018-07-31T22:39:54+00:00","dateModified":"2018-07-31T22:39:54+00:00","breadcrumb":{"@id":"https:\/\/www.eenewseurope.com\/fr\/programme-cyberstationf-de-thales-premiers-resultats\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eenewseurope.com\/fr\/programme-cyberstationf-de-thales-premiers-resultats\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.eenewseurope.com\/fr\/programme-cyberstationf-de-thales-premiers-resultats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ecinews.fr\/fr\/"},{"@type":"ListItem","position":2,"name":"Programme cyber@stationF de Thales: premiers r\u00e9sultats"}]},{"@type":"WebSite","@id":"https:\/\/www.eenewseurope.com\/en\/#website","url":"https:\/\/www.eenewseurope.com\/en\/","name":"EENewsEurope","description":"Just another WordPress site","publisher":{"@id":"https:\/\/www.eenewseurope.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eenewseurope.com\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.eenewseurope.com\/en\/#organization","name":"EENewsEurope","url":"https:\/\/www.eenewseurope.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","contentUrl":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","width":283,"height":113,"caption":"EENewsEurope"},"image":{"@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/93c44cde463762f40a8236eaa44c1c17","name":"Daniel Cardon","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/image\/2b243f6bcc1cff7d86aadfb2cd0bd870","url":"https:\/\/secure.gravatar.com\/avatar\/de9edc136dfc061ad4778e04635baefa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/de9edc136dfc061ad4778e04635baefa?s=96&d=mm&r=g","caption":"Daniel Cardon"}}]}},"authors":[{"term_id":1143,"user_id":11,"is_guest":0,"slug":"danielcardon","display_name":"Daniel Cardon","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/de9edc136dfc061ad4778e04635baefa?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/113546"}],"collection":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/comments?post=113546"}],"version-history":[{"count":0,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/113546\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media\/113547"}],"wp:attachment":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media?parent=113546"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/categories?post=113546"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/tags?post=113546"},{"taxonomy":"domains","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/domains?post=113546"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/ppma_author?post=113546"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}