{"id":239,"date":"2019-05-11T23:51:16","date_gmt":"2019-05-11T21:51:16","guid":{"rendered":"http:\/\/localhost:81\/wordpress\/?page_id=239"},"modified":"2019-11-06T20:59:50","modified_gmt":"2019-11-06T19:59:50","slug":"infrastructure-architecture-si","status":"publish","type":"page","link":"http:\/\/f2k-computing.fr\/index.php\/infrastructure-architecture-si\/","title":{"rendered":"Infrastructure &#038; Architecture SI"},"content":{"rendered":"\n<p>L&#8217;infrastructure informatique est la squelette de tout le syst\u00e8me IT de l&#8217;entreprise du fait qu&#8217;elle regroupe tous les \u00e9quipements mat\u00e9riels et logiciels  pour optimiser son installation et faciliter le plus possible son utilisation ainsi que la gestion de sa maintenance. Nous mettons \u00e0 la disposition de nos clients, nos consultants certifi\u00e9s dans le but  de les offrir le service num\u00e9rique qui r\u00e9pond exactement \u00e0 leurs besoins. <br> Nous offrons un service de qualit\u00e9 gr\u00e2ce aux comp\u00e9tences pointues de nos consultants, notamment en architecture, s\u00e9curit\u00e9, stockage et sauvegarde.<br> Afin d&#8217;assurer l\u2019harmonie du fonctionnement du syst\u00e8me informatique de l&#8217;entreprise, nos architectes veuillent \u00e0 : <br><\/p>\n\n\n\n<ul><li>Conception et impl\u00e9mentation des solutions <\/li><li>Coordonner les actions de restauration imm\u00e9diate (analyse, contournement, r\u00e9solution)<\/li><li>G\u00e9rer la communication relative \u00e0 l&#8217;incident vers les utilisateurs, les clients et les managers<\/li><li>Suivre la cl\u00f4ture des incidents<\/li><li>Mobiliser les ressources et les moyens n\u00e9cessaires pour d\u00e9finir un plan d&#8217;action en vue de contourner ou r\u00e9soudre les incidents<\/li><li>Assurer le reporting et le lancement des plans de communication vers les utilisateurs<\/li><li>R\u00e9diger les proc\u00e9dures techniques et enrichir la base de connaissances<\/li><li>Respect des exigences l\u00e9gales<\/li><li>D\u00e9finition des sp\u00e9cifications (co\u00fbts et plannings)<\/li><li>Organisation du travail de l\u2019\u00e9quipe ex\u00e9cutante <\/li><li>Suivi du calendrier global des projets<\/li><li>Reporting internes<\/li><li>Analyse et r\u00e9daction des sp\u00e9cifications<\/li><li>\u00c9tablir les politiques et proc\u00e9dures de gestion des incidents de s\u00e9curit\u00e9 selon ITIL<\/li><li>Diagnostic et r\u00e9solution des incidents<\/li><li>\u00c9laboration des documents d&#8217;impl\u00e9mentation et d&#8217;exploitation<\/li><li>R\u00e9alisation des maquettes pour les nouveaux produits<\/li><\/ul>\n\n\n\n<p><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>L&#8217;infrastructure informatique est la squelette de tout le syst\u00e8me IT de l&#8217;entreprise du fait qu&#8217;elle regroupe tous les \u00e9quipements mat\u00e9riels et logiciels pour optimiser son installation et faciliter le plus possible son utilisation ainsi que la gestion de sa maintenance. Nous mettons \u00e0 la disposition de nos clients, nos consultants certifi\u00e9s dans le but de <a href=\"http:\/\/f2k-computing.fr\/index.php\/infrastructure-architecture-si\/\" rel=\"nofollow\"><span class=\"sr-only\">Read more about Infrastructure &#038; Architecture SI<\/span>[&hellip;]<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Infrastructure &amp; Architecture SI - F2K Computing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/f2k-computing.fr\/index.php\/infrastructure-architecture-si\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Infrastructure &amp; Architecture SI - F2K Computing\" \/>\n<meta property=\"og:description\" content=\"L&#8217;infrastructure informatique est la squelette de tout le syst\u00e8me IT de l&#8217;entreprise du fait qu&#8217;elle regroupe tous les \u00e9quipements mat\u00e9riels et logiciels pour optimiser son installation et faciliter le plus possible son utilisation ainsi que la gestion de sa maintenance. Nous mettons \u00e0 la disposition de nos clients, nos consultants certifi\u00e9s dans le but de Read more about Infrastructure &#038; Architecture SI[&hellip;]\" \/>\n<meta property=\"og:url\" content=\"http:\/\/f2k-computing.fr\/index.php\/infrastructure-architecture-si\/\" \/>\n<meta property=\"og:site_name\" content=\"F2K Computing\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.linkedin.com\/in\/f2k-computing-rh-aa4974184\/\" \/>\n<meta property=\"article:modified_time\" content=\"2019-11-06T19:59:50+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"http:\/\/f2k-computing.fr\/index.php\/infrastructure-architecture-si\/\",\"url\":\"http:\/\/f2k-computing.fr\/index.php\/infrastructure-architecture-si\/\",\"name\":\"Infrastructure & Architecture SI - F2K Computing\",\"isPartOf\":{\"@id\":\"http:\/\/f2k-computing.fr\/#website\"},\"datePublished\":\"2019-05-11T21:51:16+00:00\",\"dateModified\":\"2019-11-06T19:59:50+00:00\",\"breadcrumb\":{\"@id\":\"http:\/\/f2k-computing.fr\/index.php\/infrastructure-architecture-si\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/f2k-computing.fr\/index.php\/infrastructure-architecture-si\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/f2k-computing.fr\/index.php\/infrastructure-architecture-si\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"http:\/\/f2k-computing.fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infrastructure &#038; Architecture SI\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/f2k-computing.fr\/#website\",\"url\":\"http:\/\/f2k-computing.fr\/\",\"name\":\"F2K Computing\",\"description\":\"\",\"publisher\":{\"@id\":\"http:\/\/f2k-computing.fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/f2k-computing.fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"http:\/\/f2k-computing.fr\/#organization\",\"name\":\"F2K Computing\",\"url\":\"http:\/\/f2k-computing.fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"http:\/\/f2k-computing.fr\/#\/schema\/logo\/image\/\",\"url\":\"http:\/\/f2k-computing.fr\/wp-content\/uploads\/2019\/11\/f2K-final.png\",\"contentUrl\":\"http:\/\/f2k-computing.fr\/wp-content\/uploads\/2019\/11\/f2K-final.png\",\"width\":458,\"height\":374,\"caption\":\"F2K Computing\"},\"image\":{\"@id\":\"http:\/\/f2k-computing.fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/f2k-computing-rh-aa4974184\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Infrastructure & Architecture SI - F2K Computing","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/f2k-computing.fr\/index.php\/infrastructure-architecture-si\/","og_locale":"fr_FR","og_type":"article","og_title":"Infrastructure & Architecture SI - F2K Computing","og_description":"L&#8217;infrastructure informatique est la squelette de tout le syst\u00e8me IT de l&#8217;entreprise du fait qu&#8217;elle regroupe tous les \u00e9quipements mat\u00e9riels et logiciels pour optimiser son installation et faciliter le plus possible son utilisation ainsi que la gestion de sa maintenance. Nous mettons \u00e0 la disposition de nos clients, nos consultants certifi\u00e9s dans le but de Read more about Infrastructure &#038; Architecture SI[&hellip;]","og_url":"http:\/\/f2k-computing.fr\/index.php\/infrastructure-architecture-si\/","og_site_name":"F2K Computing","article_publisher":"https:\/\/www.linkedin.com\/in\/f2k-computing-rh-aa4974184\/","article_modified_time":"2019-11-06T19:59:50+00:00","twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"http:\/\/f2k-computing.fr\/index.php\/infrastructure-architecture-si\/","url":"http:\/\/f2k-computing.fr\/index.php\/infrastructure-architecture-si\/","name":"Infrastructure & Architecture SI - F2K Computing","isPartOf":{"@id":"http:\/\/f2k-computing.fr\/#website"},"datePublished":"2019-05-11T21:51:16+00:00","dateModified":"2019-11-06T19:59:50+00:00","breadcrumb":{"@id":"http:\/\/f2k-computing.fr\/index.php\/infrastructure-architecture-si\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["http:\/\/f2k-computing.fr\/index.php\/infrastructure-architecture-si\/"]}]},{"@type":"BreadcrumbList","@id":"http:\/\/f2k-computing.fr\/index.php\/infrastructure-architecture-si\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"http:\/\/f2k-computing.fr\/"},{"@type":"ListItem","position":2,"name":"Infrastructure &#038; Architecture SI"}]},{"@type":"WebSite","@id":"http:\/\/f2k-computing.fr\/#website","url":"http:\/\/f2k-computing.fr\/","name":"F2K Computing","description":"","publisher":{"@id":"http:\/\/f2k-computing.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/f2k-computing.fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"http:\/\/f2k-computing.fr\/#organization","name":"F2K Computing","url":"http:\/\/f2k-computing.fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"http:\/\/f2k-computing.fr\/#\/schema\/logo\/image\/","url":"http:\/\/f2k-computing.fr\/wp-content\/uploads\/2019\/11\/f2K-final.png","contentUrl":"http:\/\/f2k-computing.fr\/wp-content\/uploads\/2019\/11\/f2K-final.png","width":458,"height":374,"caption":"F2K Computing"},"image":{"@id":"http:\/\/f2k-computing.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/in\/f2k-computing-rh-aa4974184\/"]}]}},"_links":{"self":[{"href":"http:\/\/f2k-computing.fr\/index.php\/wp-json\/wp\/v2\/pages\/239"}],"collection":[{"href":"http:\/\/f2k-computing.fr\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/f2k-computing.fr\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/f2k-computing.fr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/f2k-computing.fr\/index.php\/wp-json\/wp\/v2\/comments?post=239"}],"version-history":[{"count":5,"href":"http:\/\/f2k-computing.fr\/index.php\/wp-json\/wp\/v2\/pages\/239\/revisions"}],"predecessor-version":[{"id":355,"href":"http:\/\/f2k-computing.fr\/index.php\/wp-json\/wp\/v2\/pages\/239\/revisions\/355"}],"wp:attachment":[{"href":"http:\/\/f2k-computing.fr\/index.php\/wp-json\/wp\/v2\/media?parent=239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}