{"id":7134,"date":"2024-04-15T19:07:58","date_gmt":"2024-04-15T17:07:58","guid":{"rendered":"https:\/\/plateformes-de-veille.org\/index.php\/2024\/04\/15\/j-2-decryptage-gf2i-8-comment-proteger-ses-donnees-face-aux-utilisations-des-datasets-des-ia-il-nest-pas-trop-tard-pour-sinscrire\/"},"modified":"2024-04-15T19:07:58","modified_gmt":"2024-04-15T17:07:58","slug":"j-2-decryptage-gf2i-8-comment-proteger-ses-donnees-face-aux-utilisations-des-datasets-des-ia-il-nest-pas-trop-tard-pour-sinscrire","status":"publish","type":"post","link":"https:\/\/plateformes-de-veille.org\/index.php\/2024\/04\/15\/j-2-decryptage-gf2i-8-comment-proteger-ses-donnees-face-aux-utilisations-des-datasets-des-ia-il-nest-pas-trop-tard-pour-sinscrire\/","title":{"rendered":"J-2 : D\u00e9cryptage GF2I #8 : Comment prot\u00e9ger ses donn\u00e9es face aux utilisations des datasets des IA &#8211; il n&rsquo;est pas trop tard pour s&rsquo;inscrire !"},"content":{"rendered":"<p>Source : www.veillemag.com<\/p>\n<p><a href=\"https:\/\/www.veillemag.com\/J-2-Decryptage-GF2I-8-Comment-proteger-ses-donnees-face-aux-utilisations-des-datasets-des-IA-il-n-est-pas-trop-tard-pour_a4826.html\" target=\"_blank\" class=\"feedzy-rss-link-icon\" rel=\"noopener\">Read More<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Source : www.veillemag.com Read More<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[46],"tags":[],"class_list":["post-7134","post","type-post","status-publish","format-standard","hentry","category-veillemag"],"_links":{"self":[{"href":"https:\/\/plateformes-de-veille.org\/index.php\/wp-json\/wp\/v2\/posts\/7134","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/plateformes-de-veille.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/plateformes-de-veille.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/plateformes-de-veille.org\/index.php\/wp-json\/wp\/v2\/comments?post=7134"}],"version-history":[{"count":0,"href":"https:\/\/plateformes-de-veille.org\/index.php\/wp-json\/wp\/v2\/posts\/7134\/revisions"}],"wp:attachment":[{"href":"https:\/\/plateformes-de-veille.org\/index.php\/wp-json\/wp\/v2\/media?parent=7134"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/plateformes-de-veille.org\/index.php\/wp-json\/wp\/v2\/categories?post=7134"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/plateformes-de-veille.org\/index.php\/wp-json\/wp\/v2\/tags?post=7134"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}