{"id":2719,"date":"2021-06-14T10:00:34","date_gmt":"2021-06-14T08:00:34","guid":{"rendered":"https:\/\/curtispc.fr\/blog\/?p=2719"},"modified":"2021-06-14T22:55:28","modified_gmt":"2021-06-14T20:55:28","slug":"lintelligence-artificielle-et-lapprentissage","status":"publish","type":"post","link":"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/","title":{"rendered":"L&rsquo;intelligence artificielle et l&rsquo;apprentissage automatique sont les fers de lance d&rsquo;une r\u00e9volution silencieuse dans le domaine du droit"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2719\" class=\"elementor elementor-2719\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-c6f8296 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c6f8296\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8ecd007\" data-id=\"8ecd007\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-50b8143 elementor-widget elementor-widget-image\" data-id=\"50b8143\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/elementor\/thumbs\/file-20190820-170941-xq11fp-pei1mar6daw99xs0srus2kzvyegcmyb9cifuwrzivc.jpg\" title=\"file-20190820-170941-xq11fp\" alt=\"file-20190820-170941-xq11fp\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-afb1a63 elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading\" data-id=\"afb1a63\" data-element_type=\"widget\" data-widget_type=\"theme-post-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/curtispc.fr\/cyberattaques.html\">L&rsquo;intelligence artificielle et l&rsquo;apprentissage automatique sont les fers de lance d&rsquo;une r\u00e9volution silencieuse dans le domaine du droit<\/a><\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c1c3390 elementor-widget elementor-widget-post-info\" data-id=\"c1c3390\" data-element_type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-87450e9 elementor-inline-item\" itemprop=\"author\">\n\t\t\t\t\t\t<a href=\"https:\/\/curtispc.fr\/blog\/author\/curtispc\/\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"elementor-avatar\" src=\"https:\/\/secure.gravatar.com\/avatar\/663d9ed39cf5b5548c531ba51ac4c235?s=96&amp;d=monsterid&amp;r=g\" alt=\"Picture of curtispc\" loading=\"lazy\">\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-author\">\n\t\t\t\t\t\t\t<span class=\"elementor-post-info__item-prefix\">Publi\u00e9 par<\/span>\n\t\t\t\t\t\t\t\t\t\tcurtispc\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-753aac4 elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t<a href=\"https:\/\/curtispc.fr\/blog\/2021\/06\/14\/\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-calendar\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>14\/06\/2021<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-a085001 elementor-inline-item\" itemprop=\"commentCount\">\n\t\t\t\t\t\t<a href=\"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/#comments\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-comments\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-comments\">\n\t\t\t\t\t\t\t\t\t\t2 Comments\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-e8a3e96 elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-custom\">\n\t\t\t\t\t\t\t\t\t\t <div class=\"post-views content-post post-3076 entry-meta load-static\">\r\n\t\t\t\t<span class=\"post-views-icon dashicons dashicons-chart-bar\"><\/span> <span class=\"post-views-label\">Vues:<\/span> <span class=\"post-views-count\">3\u00a0079<\/span>\r\n\t\t\t<\/div>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-42a9016 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"42a9016\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-49e4f0c\" data-id=\"49e4f0c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a114e69 elementor-widget elementor-widget-text-editor\" data-id=\"a114e69\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La r\u00e9volution de l&rsquo;intelligence artificielle a la capacit\u00e9 de transformer le secteur juridique de diverses mani\u00e8res, et l&rsquo;industrie rattrape maintenant la tendance<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-a081e79 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a081e79\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6f6cc67\" data-id=\"6f6cc67\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-578073f elementor-widget elementor-widget-text-editor\" data-id=\"578073f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L&rsquo;intelligence artificielle a infiltr\u00e9 toutes les facettes de nos vies aujourd&rsquo;hui. Qu&rsquo;il s&rsquo;agisse d&rsquo;appareils intelligents, de v\u00e9hicules automatis\u00e9s, de chatbots ou m\u00eame d&rsquo;applications de conseil en sant\u00e9 mentale bas\u00e9es sur l&rsquo;IA, il est difficile de ne pas rep\u00e9rer de machines intelligentes autour de vous. Si vous avez atteint cet article gr\u00e2ce \u00e0 une recherche Google sur le secteur du droit, vous utilisez l&rsquo;une des manifestations les plus puissantes de l&rsquo;IA sous la forme du moteur de recherche. Selon une \u00e9tude de march\u00e9, l&rsquo;intelligence artificielle devrait devenir un march\u00e9 de 190,61 milliards de dollars d&rsquo;ici 2025.<\/p><p>\u00a0<\/p><p>Le secteur juridique est la derni\u00e8re industrie \u00e0 avoir rattrap\u00e9 la r\u00e9volution de l&rsquo;IA qui a commenc\u00e9 \u00e0 transformer la profession juridique de plusieurs mani\u00e8res. En imitant les actions humaines et en apprenant les fonctions de connaissances essentielles, l&rsquo;apprentissage automatique permet d&rsquo;automatiser une s\u00e9rie de t\u00e2ches manuelles et de processus juridiques &#8211; recherche, examen de documents, analyse de jurisprudence ou de pr\u00e9c\u00e9dents.<\/p><p>\u00a0<\/p><p>Cette automatisation des processus chronophages am\u00e9liore consid\u00e9rablement l&rsquo;efficacit\u00e9, \u00e9conomise du temps et des co\u00fbts et entra\u00eene un revirement majeur dans la mani\u00e8re dont les avocats exercent leurs fonctions. Les t\u00e2ches routini\u00e8res \u00e9puisantes \u00e9tant automatis\u00e9es, les avocats ont plus de temps pour se concentrer sur des fonctions plus critiques. Les experts estiment qu&rsquo;une plus grande adoption d&rsquo;outils bas\u00e9s sur l&rsquo;IA par les avocats contribuera \u00e0 terme \u00e0 r\u00e9duire les co\u00fbts des services juridiques pour les gens ordinaires.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-25fce73 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"25fce73\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-22fc577\" data-id=\"22fc577\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6d47bfc elementor-widget elementor-widget-text-editor\" data-id=\"6d47bfc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>Voyons quelques fa\u00e7ons dont l&rsquo;intelligence artificielle bouleverse le secteur juridique Simplifier la recherche juridique.<\/h2>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-f8c2631 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f8c2631\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-048bb9b\" data-id=\"048bb9b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ec521e5 elementor-widget elementor-widget-text-editor\" data-id=\"ec521e5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Une recherche juridique efficace est indispensable aux professionnels du droit et constitue le fondement d&rsquo;une saine pratique juridique. La recherche juridique implique plusieurs facettes de la collecte d&rsquo;informations qui aident les avocats \u00e0 pr\u00e9parer des arguments efficaces dans une affaire. Il s&rsquo;agit d&rsquo;\u00e9tudier les lois, les l\u00e9gislations, les r\u00e9glementations et l&rsquo;historique des cas similaires et leur interpr\u00e9tation.\u00a0<\/p><p>\u00a0<\/p><p>Avant l&rsquo;av\u00e8nement de la num\u00e9risation, la recherche juridique obligeait les avocats \u00e0 rechercher et \u00e0 num\u00e9riser des copies physiques des dossiers juridiques. Cependant, la num\u00e9risation a cr\u00e9\u00e9 un impact majeur sur la recherche juridique, ce qui facilite consid\u00e9rablement la recherche et la recherche de fichiers par les chercheurs.<\/p><p>\u00a0<\/p><p>Ces derni\u00e8res ann\u00e9es, les outils de recherche soutenus par l&rsquo;intelligence artificielle ont ajout\u00e9 une nouvelle dimension \u00e0 cette histoire en offrant aux avocats des machines intelligentes qui peuvent faire bien plus que lancer des r\u00e9sultats de recherche.\u00a0<\/p><p>\u00a0<\/p><p>Les nouveaux outils de recherche juridique soutenus par l&rsquo;IA ont l&rsquo;intelligence pour comprendre votre requ\u00eate et trouver plus rapidement les documents juridiques pertinents.\u00a0<\/p><p>\u00a0<\/p><p>Une \u00e9tude men\u00e9e par les avocats du National Legal Research Group des \u00c9tats-Unis a r\u00e9v\u00e9l\u00e9 que les couches utilisant un outil de recherche AI ont termin\u00e9 les projets de recherche en moyenne 24,5% plus rapidement que les avocats utilisant la recherche juridique traditionnelle.<\/p><p>\u00a0<\/p><p>\u00a0En fait, le passage \u00e0 une application soutenue par l&rsquo;IA a permis \u00e0 un avocat moyen de 132 \u00e0 210 heures de recherche juridique par an.\u00a0<\/p><p>\u00a0<\/p><p>De m\u00eame, l&rsquo;\u00e9tude a \u00e9galement conclu que les r\u00e9sultats de recherche des avocats utilisant l&rsquo;outil de recherche soutenu par l&rsquo;IA \u00e9taient en moyenne 21% plus pertinents que ceux faisant de la recherche juridique traditionnelle.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-be942e9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"be942e9\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2722841\" data-id=\"2722841\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bcd7a24 elementor-widget elementor-widget-text-editor\" data-id=\"bcd7a24\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>Faciliter la recherche sur la jurisprudence<\/h2>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-9deac25 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9deac25\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c5c2379\" data-id=\"c5c2379\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-090b58a elementor-widget elementor-widget-text-editor\" data-id=\"090b58a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La jurisprudence est un terme utilis\u00e9 pour d\u00e9signer la somme totale de toutes les d\u00e9cisions judiciaires ant\u00e9rieures rendues par les tribunaux \u00e0 travers leur interpr\u00e9tation des lois et r\u00e8glements existants.\u00a0<\/p><p>\u00a0<\/p><p>La connaissance des d\u00e9cisions pass\u00e9es est aussi importante pour les avocats et les juges que les l\u00e9gislations, car elles constituent des pr\u00e9c\u00e9dents juridiques et aident \u00e0 r\u00e9soudre les affaires difficiles et conflictuelles dans le pr\u00e9sent.<\/p><p>\u00a0<\/p><p>La recherche de lois sur les affaires a toujours \u00e9t\u00e9 une t\u00e2che extr\u00eamement fastidieuse pour les avocats. Il faut \u00e9norm\u00e9ment de temps et d&rsquo;\u00e9nergie pour utiliser les informations brutes, les histoires de cas, les arguments et les jugements disponibles et les interpr\u00e9ter pour les rendre utiles pour votre cas.\u00a0<\/p><p>\u00a0<\/p><p>Un certain nombre de bases de donn\u00e9es juridiques num\u00e9ris\u00e9es ont cherch\u00e9 \u00e0 r\u00e9pondre \u00e0 cette t\u00e2che de recherche, mais la plupart d&rsquo;entre elles ont fourni une pl\u00e9thore de transcriptions de jugement textuellement dans les r\u00e9sultats de recherche sans aucune valeur ajout\u00e9e.<\/p><p>\u00a0<\/p><p>C&rsquo;est quelque chose que les outils de recherche bas\u00e9s sur l&rsquo;IA tentent de changer en offrant des ajouts de valeur tels que des notes de t\u00eate ou des r\u00e9sum\u00e9s de cas. Dans l&rsquo;\u00e9tude am\u00e9ricaine cit\u00e9e ci-dessus, jusqu&rsquo;\u00e0 45% des avocats ont d\u00e9clar\u00e9 qu&rsquo;ils auraient manqu\u00e9 des pr\u00e9c\u00e9dents importants ou critiques s&rsquo;ils n&rsquo;avaient fait que des recherches juridiques traditionnelles au lieu d&rsquo;utiliser \u00e9galement un outil bas\u00e9 sur l&rsquo;IA.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-81382aa elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"81382aa\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-32308e9\" data-id=\"32308e9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-71556b8 elementor-widget elementor-widget-text-editor\" data-id=\"71556b8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>Accro\u00eetre l&rsquo;examen des documents<\/h2>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-7aa7037 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7aa7037\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d02462f\" data-id=\"d02462f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d27034f elementor-widget elementor-widget-text-editor\" data-id=\"d27034f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>En tant qu&rsquo;examinateurs de documents pour un tribunal ou un cabinet d&rsquo;avocats, les avocats sont tenus d&rsquo;examiner des centaines de documents pertinents pour un litige ou une enqu\u00eate en cours et de les marquer par ordre de pertinence ou de sensibilit\u00e9 par rapport \u00e0 l&rsquo;affaire.\u00a0<\/p><p>\u00a0<\/p><p>Lorsqu&rsquo;il est men\u00e9 de fa\u00e7on traditionnelle, ce processus prend naturellement beaucoup de temps. La technologie soutenue par l&rsquo;IA propose d\u00e9sormais des solutions telles que le codage pr\u00e9dictif pour acc\u00e9l\u00e9rer \u00e9galement ce m\u00e9canisme.\u00a0<\/p><p>\u00a0<\/p><p>Le codage pr\u00e9dictif est un processus par lequel un algorithme est \u00abform\u00e9\u00bb par un expert en droit dans l&rsquo;art d&rsquo;analyser des documents et de les classer par ordre de pertinence aux fins de divulgation. Une fois \u00abform\u00e9\u00bb, l&rsquo;algorithme ex\u00e9cute lui-m\u00eame la fonction de r\u00e9vision des documents. Dans certains cas, le codage pr\u00e9dictif peut \u00e9galement \u00eatre utilis\u00e9 comme un outil pour \u00e9valuer le bien-fond\u00e9 d&rsquo;un cas \u00e0 ses d\u00e9buts.\u00a0<\/p><p>\u00a0<\/p><p>Lorsqu&rsquo;il est utilis\u00e9 de mani\u00e8re appropri\u00e9e, cela peut entra\u00eener des \u00e9conomies de temps et d&rsquo;argent importantes<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-ce5a80b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ce5a80b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0d260c5\" data-id=\"0d260c5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cb18fe9 elementor-widget elementor-widget-spacer\" data-id=\"cb18fe9\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7dcec87 elementor-blockquote--skin-border elementor-blockquote--button-color-official elementor-widget elementor-widget-blockquote\" data-id=\"7dcec87\" data-element_type=\"widget\" data-widget_type=\"blockquote.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<blockquote class=\"elementor-blockquote\">\n\t\t\t<p class=\"elementor-blockquote__content\">\n\t\t\t\tSi vous souhaitez nous aider, vous pouvez nous faire un don par bitcoin \u00e0 l\u2019adresse : 12J3mWpunJASd57Mjwfap4b6QvgWoCWmEq\t\t\t<\/p>\n\t\t\t\t\t\t\t<div class=\"e-q-footer\">\n\t\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-blockquote__author\">En vous remerciant d\u2019avance Curtis PC<\/cite>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/blockquote>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3b8dcf elementor-widget elementor-widget-penci-text-block\" data-id=\"a3b8dcf\" data-element_type=\"widget\" data-widget_type=\"penci-text-block.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"penci-block-vc penci-text-editor\">\n\t\t\t        <div class=\"penci-border-arrow penci-homepage-title penci-home-latest-posts style-7 pcalign-left pciconp-right pcicon-right block-title-icon-left\">\n            <h3 class=\"inner-arrow\">\n                <span>\n                    <span>Partager cet article<\/a>                <\/span>\n            <\/h3>\n\t\t\t        <\/div>\n\t\t\t\t\t<div class=\"penci-block_content\">\n\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-2a8403a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2a8403a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9b7e2c7\" data-id=\"9b7e2c7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-94a62a1 elementor-share-buttons--view-icon elementor-share-buttons--shape-circle elementor-share-buttons--align-center elementor-share-buttons--skin-gradient elementor-grid-0 elementor-share-buttons--color-official elementor-widget elementor-widget-share-buttons\" data-id=\"94a62a1\" data-element_type=\"widget\" data-widget_type=\"share-buttons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-grid\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_facebook\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on facebook\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-facebook\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_twitter\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on twitter\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-twitter\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_linkedin\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on linkedin\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-linkedin\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_whatsapp\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on whatsapp\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-whatsapp\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_email\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on email\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fas fa-envelope\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-d71b56e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d71b56e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-365c50e\" data-id=\"365c50e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c714fc4 elementor-post-navigation-borders-yes elementor-widget elementor-widget-post-navigation\" data-id=\"c714fc4\" data-element_type=\"widget\" data-widget_type=\"post-navigation.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-post-navigation\">\n\t\t\t<div class=\"elementor-post-navigation__prev elementor-post-navigation__link\">\n\t\t\t\t<a href=\"https:\/\/curtispc.fr\/blog\/boyd-%e2%80%89bring-your-own-device%e2%80%89-quelle-sont-les-risques%e2%80%89\/\" rel=\"prev\"><span class=\"post-navigation__arrow-wrapper post-navigation__arrow-prev\"><i class=\"fa fa-chevron-circle-left\" aria-hidden=\"true\"><\/i><span class=\"elementor-screen-only\">Prev<\/span><\/span><span class=\"elementor-post-navigation__link__prev\"><span class=\"post-navigation__prev--label\">Pr\u00e9c\u00e9dent<\/span><span class=\"post-navigation__prev--title\">Boyd \u00ab\u2009Bring your own device\u2009\u00bb quelle sont les risques\u2009?<\/span><\/span><\/a>\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-post-navigation__separator-wrapper\">\n\t\t\t\t\t<div class=\"elementor-post-navigation__separator\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-post-navigation__next elementor-post-navigation__link\">\n\t\t\t\t<a href=\"https:\/\/curtispc.fr\/blog\/la-cybersecurite-en-2024-enjeux-et-strategies-pour-un-monde-connecte\/\" rel=\"next\"><span class=\"elementor-post-navigation__link__next\"><span class=\"post-navigation__next--label\">Suivant<\/span><span class=\"post-navigation__next--title\">La cybers\u00e9curit\u00e9 en 2024 : enjeux et strat\u00e9gies pour un monde connect\u00e9<\/span><\/span><span class=\"post-navigation__arrow-wrapper post-navigation__arrow-next\"><i class=\"fa fa-chevron-circle-right\" aria-hidden=\"true\"><\/i><span class=\"elementor-screen-only\">Next<\/span><\/span><\/a>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b186de9 elementor-widget elementor-widget-spacer\" data-id=\"b186de9\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-848085d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"848085d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cf0e263\" data-id=\"cf0e263\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-50c34b0 elementor-headline--style-highlight elementor-widget elementor-widget-animated-headline\" data-id=\"50c34b0\" data-element_type=\"widget\" data-settings=\"{&quot;marker&quot;:&quot;double&quot;,&quot;highlighted_text&quot;:&quot;Articles Similaires&quot;,&quot;headline_style&quot;:&quot;highlight&quot;,&quot;loop&quot;:&quot;yes&quot;,&quot;highlight_animation_duration&quot;:1200,&quot;highlight_iteration_delay&quot;:8000}\" data-widget_type=\"animated-headline.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h2 class=\"elementor-headline\">\n\t\t\t\t<span class=\"elementor-headline-dynamic-wrapper elementor-headline-text-wrapper\">\n\t\t\t\t\t<span class=\"elementor-headline-dynamic-text elementor-headline-text-active\">Articles Similaires<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<\/h2>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2fc543e elementor-widget elementor-widget-spacer\" data-id=\"2fc543e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-2932f20 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2932f20\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6a0b773\" data-id=\"6a0b773\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9d2fd96 elementor-widget elementor-widget-penci-featured-sliders\" data-id=\"9d2fd96\" data-element_type=\"widget\" data-widget_type=\"penci-featured-sliders.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"penci-block-el featured-area featured-style-23\"><div class=\"penci-owl-featured-area elsl-style-23 swiper penci-owl-carousel pcfg-slide-9d2fd96 elsl-style-23\" data-dots=\"false\" data-nav=\"true\" data-ceffect=\"swing\" data-seffect=\"creative\" data-style=\"style-23\" data-auto=\"true\" data-autotime=\"4000\" data-speed=\"600\" data-loop=\"true\"><div class=\"penci-owl-nav\"><div class=\"owl-prev\"><i class=\"penciicon-left-chevron\"><\/i><\/div><div class=\"owl-next\"><i class=\"penciicon-right-chevron\"><\/i><\/div><\/div><div class=\"swiper-wrapper\">    <div class=\"item swiper-slide\">\n        <div class=\"wrapper-item wrapper-item-classess\">\n\t\t\t                <div class=\"penci-item-mag penci-item-1 penci-pitem-big\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2024\/06\/cybert-securite-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2024\/06\/cybert-securite-585x390.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/la-cybersecurite-en-2024-enjeux-et-strategies-pour-un-monde-connecte\/\"\n                           title=\"La cybers\u00e9curit\u00e9 en 2024 : enjeux et strat\u00e9gies pour un monde connect\u00e9\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"La cybers\u00e9curit\u00e9 en 2024 : enjeux et strat\u00e9gies pour un monde connect\u00e9\"\n                           href=\"https:\/\/curtispc.fr\/blog\/la-cybersecurite-en-2024-enjeux-et-strategies-pour-un-monde-connecte\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"La cybers\u00e9curit\u00e9 en 2024 : enjeux et strat\u00e9gies pour un monde connect\u00e9\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/la-cybersecurite-en-2024-enjeux-et-strategies-pour-un-monde-connecte\/\">La cybers\u00e9curit\u00e9 en 2024 : enjeux et strat\u00e9gies pour un monde connect\u00e9<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <div class=\"feat-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-time\"><time class=\"entry-date published\" datetime=\"2024-06-06T09:10:40+02:00\">6 juin 2024<\/time><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-comments\"><a\n                                                            href=\"https:\/\/curtispc.fr\/blog\/la-cybersecurite-en-2024-enjeux-et-strategies-pour-un-monde-connecte\/#comments \">1 Commentaires<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-2 penci-pitem-big\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/istockphoto-832169838-612x612-1-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/istockphoto-832169838-612x612-1-585x390.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/\"\n                           title=\"L&rsquo;intelligence artificielle et l&rsquo;apprentissage automatique sont les fers de lance d&rsquo;une r\u00e9volution silencieuse dans le domaine du droit\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"L&rsquo;intelligence artificielle et l&rsquo;apprentissage automatique sont les fers de lance d&rsquo;une r\u00e9volution silencieuse dans le domaine du droit\"\n                           href=\"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"L&rsquo;intelligence artificielle et l&rsquo;apprentissage automatique sont les fers de lance d&rsquo;une r\u00e9volution silencieuse dans le domaine du droit\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/\">L&rsquo;intelligence artificielle et l&rsquo;apprentissage automatique sont les fers de lance d&rsquo;une r\u00e9volution...<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <div class=\"feat-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-time\"><time class=\"entry-date published\" datetime=\"2021-06-14T10:00:34+02:00\">14 juin 2021<\/time><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-comments\"><a\n                                                            href=\"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/#comments \">2 Commentaires<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-3 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/byod_risque-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/byod_risque-585x439.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/boyd-%e2%80%89bring-your-own-device%e2%80%89-quelle-sont-les-risques%e2%80%89\/\"\n                           title=\"Boyd \u00ab\u2009Bring your own device\u2009\u00bb quelle sont les risques\u2009?\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Boyd \u00ab\u2009Bring your own device\u2009\u00bb quelle sont les risques\u2009?\"\n                           href=\"https:\/\/curtispc.fr\/blog\/boyd-%e2%80%89bring-your-own-device%e2%80%89-quelle-sont-les-risques%e2%80%89\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Boyd \u00ab\u2009Bring your own device\u2009\u00bb quelle sont les risques\u2009?\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/boyd-%e2%80%89bring-your-own-device%e2%80%89-quelle-sont-les-risques%e2%80%89\/\">Boyd \u00ab\u2009Bring your own device\u2009\u00bb quelle sont les risques\u2009?<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-4 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/cloud-security-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/cloud-security-585x383.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/\"\n                           title=\"S\u00e9curit\u00e9 Cloud: voici les menaces \u00e0 ne pas n\u00e9gliger\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"S\u00e9curit\u00e9 Cloud: voici les menaces \u00e0 ne pas n\u00e9gliger\"\n                           href=\"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"S\u00e9curit\u00e9 Cloud: voici les menaces \u00e0 ne pas n\u00e9gliger\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/\">S\u00e9curit\u00e9 Cloud: voici les menaces \u00e0 ne pas n\u00e9gliger<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-5 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/message-messagerie-chiffre-secret-1024x576-1-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/message-messagerie-chiffre-secret-1024x576-1-585x329.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/messagerie-securisee\/\"\n                           title=\"Messagerie S\u00e9curis\u00e9e\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Messagerie S\u00e9curis\u00e9e\"\n                           href=\"https:\/\/curtispc.fr\/blog\/messagerie-securisee\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Messagerie S\u00e9curis\u00e9e\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/messagerie-securisee\/\">Messagerie S\u00e9curis\u00e9e<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-0 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/diffamation-professeurs-reseaux-sociaux-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/diffamation-professeurs-reseaux-sociaux-585x401.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/reseaux-sociaux-source-de-piratage-informatique%e2%80%89\/\"\n                           title=\"R\u00e9seaux sociaux, source de piratage informatique\u2009?\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"R\u00e9seaux sociaux, source de piratage informatique\u2009?\"\n                           href=\"https:\/\/curtispc.fr\/blog\/reseaux-sociaux-source-de-piratage-informatique%e2%80%89\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"R\u00e9seaux sociaux, source de piratage informatique\u2009?\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/reseaux-sociaux-source-de-piratage-informatique%e2%80%89\/\">R\u00e9seaux sociaux, source de piratage informatique\u2009?<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t<\/div><\/div><div class=\"item swiper-slide\"><div class=\"wrapper-item wrapper-item-classess\">\n\t\t\t\t                <div class=\"penci-item-mag penci-item-1 penci-pitem-big\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/bigstock_Cloud_Computing-585x390.png\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/bigstock_Cloud_Computing-585x329.png\"\n                           href=\"https:\/\/curtispc.fr\/blog\/cloud-donne-hors-de-controle%e2%80%89\/\"\n                           title=\"Cloud : donn\u00e9 hors de contr\u00f4le\u2009?\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Cloud : donn\u00e9 hors de contr\u00f4le\u2009?\"\n                           href=\"https:\/\/curtispc.fr\/blog\/cloud-donne-hors-de-controle%e2%80%89\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Cloud : donn\u00e9 hors de contr\u00f4le\u2009?\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/cloud-donne-hors-de-controle%e2%80%89\/\">Cloud : donn\u00e9 hors de contr\u00f4le\u2009?<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <div class=\"feat-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-time\"><time class=\"entry-date published\" datetime=\"2021-03-25T10:00:37+01:00\">25 mars 2021<\/time><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-comments\"><a\n                                                            href=\"https:\/\/curtispc.fr\/blog\/cloud-donne-hors-de-controle%e2%80%89\/#comments \">1 Commentaires<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-2 penci-pitem-big\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/shadow_iot-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/shadow_iot-585x390.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/shadow-iot-une-menace-grandissante-pour-les-entreprises\/\"\n                           title=\"Shadow IoT: une menace grandissante pour les entreprises\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Shadow IoT: une menace grandissante pour les entreprises\"\n                           href=\"https:\/\/curtispc.fr\/blog\/shadow-iot-une-menace-grandissante-pour-les-entreprises\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Shadow IoT: une menace grandissante pour les entreprises\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/shadow-iot-une-menace-grandissante-pour-les-entreprises\/\">Shadow IoT: une menace grandissante pour les entreprises<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <div class=\"feat-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-time\"><time class=\"entry-date published\" datetime=\"2021-03-24T09:00:16+01:00\">24 mars 2021<\/time><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-comments\"><a\n                                                            href=\"https:\/\/curtispc.fr\/blog\/shadow-iot-une-menace-grandissante-pour-les-entreprises\/#comments \">1 Commentaires<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-3 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/10_hacker-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/10_hacker-585x390.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/top-10-des-hackers-les-plus-celebres\/\"\n                           title=\"TOP 10 DES HACKERS LES PLUS C\u00c9L\u00c8BRES\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"TOP 10 DES HACKERS LES PLUS C\u00c9L\u00c8BRES\"\n                           href=\"https:\/\/curtispc.fr\/blog\/top-10-des-hackers-les-plus-celebres\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"TOP 10 DES HACKERS LES PLUS C\u00c9L\u00c8BRES\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/top-10-des-hackers-les-plus-celebres\/\">TOP 10 DES HACKERS LES PLUS C\u00c9L\u00c8BRES<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-4 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/social_engineering_2.0-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/social_engineering_2.0-585x293.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/etes-vous-une-faille-de-securite-humaine-sur-internet-social-engineering\/\"\n                           title=\"\u00cates-vous une faille de s\u00e9curit\u00e9 humaine sur Internet ? Social engineering\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"\u00cates-vous une faille de s\u00e9curit\u00e9 humaine sur Internet ? Social engineering\"\n                           href=\"https:\/\/curtispc.fr\/blog\/etes-vous-une-faille-de-securite-humaine-sur-internet-social-engineering\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"\u00cates-vous une faille de s\u00e9curit\u00e9 humaine sur Internet ? Social engineering\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/etes-vous-une-faille-de-securite-humaine-sur-internet-social-engineering\/\">\u00cates-vous une faille de s\u00e9curit\u00e9 humaine sur Internet ? Social engineering<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-5 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/menace_2020.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/menace_2020.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/previsions-2020-de-mcafee-labs-sur-les-menaces-de-cybersecurite\/\"\n                           title=\"Pr\u00e9visions 2020 de McAfee Labs sur les menaces de cybers\u00e9curit\u00e9\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Pr\u00e9visions 2020 de McAfee Labs sur les menaces de cybers\u00e9curit\u00e9\"\n                           href=\"https:\/\/curtispc.fr\/blog\/previsions-2020-de-mcafee-labs-sur-les-menaces-de-cybersecurite\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Pr\u00e9visions 2020 de McAfee Labs sur les menaces de cybers\u00e9curit\u00e9\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/previsions-2020-de-mcafee-labs-sur-les-menaces-de-cybersecurite\/\">Pr\u00e9visions 2020 de McAfee Labs sur les menaces de cybers\u00e9curit\u00e9<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-0 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/algorithme-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/algorithme-585x329.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/top-10-des-algorithmes-que-chaque-programmeur-devrait-connaitre\/\"\n                           title=\"Top 10 des algorithmes que chaque programmeur devrait conna\u00eetre\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Top 10 des algorithmes que chaque programmeur devrait conna\u00eetre\"\n                           href=\"https:\/\/curtispc.fr\/blog\/top-10-des-algorithmes-que-chaque-programmeur-devrait-connaitre\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Top 10 des algorithmes que chaque programmeur devrait conna\u00eetre\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/top-10-des-algorithmes-que-chaque-programmeur-devrait-connaitre\/\">Top 10 des algorithmes que chaque programmeur devrait conna\u00eetre<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t<\/div><\/div><div class=\"item swiper-slide\"><div class=\"wrapper-item wrapper-item-classess\">\n\t\t\t\t                <div class=\"penci-item-mag penci-item-1 penci-pitem-big\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/security-4851428_960_720-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/security-4851428_960_720-585x366.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/mise-en-garde-contre-les-menaces-qui-existent-sur-le-web\/\"\n                           title=\"Mise en garde contre les menaces qui existent sur le web\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Mise en garde contre les menaces qui existent sur le web\"\n                           href=\"https:\/\/curtispc.fr\/blog\/mise-en-garde-contre-les-menaces-qui-existent-sur-le-web\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Mise en garde contre les menaces qui existent sur le web\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/mise-en-garde-contre-les-menaces-qui-existent-sur-le-web\/\">Mise en garde contre les menaces qui existent sur le web<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <div class=\"feat-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-time\"><time class=\"entry-date published\" datetime=\"2020-02-18T16:00:13+01:00\">18 f\u00e9vrier 2020<\/time><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-comments\"><a\n                                                            href=\"https:\/\/curtispc.fr\/blog\/mise-en-garde-contre-les-menaces-qui-existent-sur-le-web\/#comments \">2 Commentaires<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-2 penci-pitem-big\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/malware_mobile-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/malware_mobile-585x329.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/des-pirates-utilisant-des-applications-mobiles-cachees-des-identifiants-de-connexion-tiers-et-des-videos-de-jeu-contrefaites-pour-cibler-les-consommateurs\/\"\n                           title=\"Des pirates utilisant des applications mobiles cach\u00e9es, des identifiants de connexion tiers et des vid\u00e9os de jeu contrefaites pour cibler les consommateurs\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Des pirates utilisant des applications mobiles cach\u00e9es, des identifiants de connexion tiers et des vid\u00e9os de jeu contrefaites pour cibler les consommateurs\"\n                           href=\"https:\/\/curtispc.fr\/blog\/des-pirates-utilisant-des-applications-mobiles-cachees-des-identifiants-de-connexion-tiers-et-des-videos-de-jeu-contrefaites-pour-cibler-les-consommateurs\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Des pirates utilisant des applications mobiles cach\u00e9es, des identifiants de connexion tiers et des vid\u00e9os de jeu contrefaites pour cibler les consommateurs\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/des-pirates-utilisant-des-applications-mobiles-cachees-des-identifiants-de-connexion-tiers-et-des-videos-de-jeu-contrefaites-pour-cibler-les-consommateurs\/\">Des pirates utilisant des applications mobiles cach\u00e9es, des identifiants de connexion tiers...<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <div class=\"feat-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-time\"><time class=\"entry-date published\" datetime=\"2020-02-15T10:00:09+01:00\">15 f\u00e9vrier 2020<\/time><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-comments\"><a\n                                                            href=\"https:\/\/curtispc.fr\/blog\/des-pirates-utilisant-des-applications-mobiles-cachees-des-identifiants-de-connexion-tiers-et-des-videos-de-jeu-contrefaites-pour-cibler-les-consommateurs\/#comments \">1 Commentaires<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-3 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/security-password-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/security-password-585x390.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/authentification-par-mot-de-passe\/\"\n                           title=\"Authentification par mot de passe\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Authentification par mot de passe\"\n                           href=\"https:\/\/curtispc.fr\/blog\/authentification-par-mot-de-passe\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Authentification par mot de passe\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/authentification-par-mot-de-passe\/\">Authentification par mot de passe<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-4 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/pirate_informatique-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/pirate_informatique-585x322.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/piratage-informatique\/\"\n                           title=\"Piratage informatique des PME et ETI\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Piratage informatique des PME et ETI\"\n                           href=\"https:\/\/curtispc.fr\/blog\/piratage-informatique\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Piratage informatique des PME et ETI\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/piratage-informatique\/\">Piratage informatique des PME et ETI<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-5 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/malware_window-2.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/malware_window-2.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/definition-dun-logiciel-malveillant-en-informatique-malware\/\"\n                           title=\"D\u00e9finition d\u2019un logiciel malveillant en informatique (Malware)\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"D\u00e9finition d\u2019un logiciel malveillant en informatique (Malware)\"\n                           href=\"https:\/\/curtispc.fr\/blog\/definition-dun-logiciel-malveillant-en-informatique-malware\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"D\u00e9finition d\u2019un logiciel malveillant en informatique (Malware)\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/definition-dun-logiciel-malveillant-en-informatique-malware\/\">D\u00e9finition d\u2019un logiciel malveillant en informatique (Malware)<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-0 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/01\/protection-employe-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/01\/protection-employe-585x390.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/comment-proteger-vos-employes-contre-les-pirates-informatiques\/\"\n                           title=\"Comment prot\u00e9ger vos employ\u00e9s contre les pirates informatiques ?\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Comment prot\u00e9ger vos employ\u00e9s contre les pirates informatiques ?\"\n                           href=\"https:\/\/curtispc.fr\/blog\/comment-proteger-vos-employes-contre-les-pirates-informatiques\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Comment prot\u00e9ger vos employ\u00e9s contre les pirates informatiques ?\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/comment-proteger-vos-employes-contre-les-pirates-informatiques\/\">Comment prot\u00e9ger vos employ\u00e9s contre les pirates informatiques ?<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t        <\/div>\n    <\/div>\n<\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb4006e elementor-widget elementor-widget-spacer\" data-id=\"eb4006e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-cc2256e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cc2256e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-70d5c9c\" data-id=\"70d5c9c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9f9d352 elementor-widget elementor-widget-spacer\" data-id=\"9f9d352\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>La r\u00e9volution de l&rsquo;intelligence artificielle a la capacit\u00e9 de transformer le secteur juridique de diverses mani\u00e8res, et l&rsquo;industrie rattrape maintenant la tendance L&rsquo;intelligence artificielle a infiltr\u00e9 toutes les facettes de&hellip;<\/p>\n","protected":false},"author":1,"featured_media":2850,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[28,27],"tags":[46,50,49,47],"class_list":["post-2719","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite-informatique","category-windows-mac-linux","tag-cyber-securite","tag-linux","tag-mac","tag-windows"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>La r\u00e9volution de l\u2019intelligence artificielle transformer le secteur juridique<\/title>\n<meta name=\"description\" content=\"L\u2019intelligence artificielle a infiltr\u00e9 toutes les facettes de nos vies aujourd\u2019hui. Qu\u2019il s\u2019agisse d\u2019appareils intelligents, de v\u00e9hicules automatis\u00e9s.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La r\u00e9volution de l\u2019intelligence artificielle transformer le secteur juridique\" \/>\n<meta property=\"og:description\" content=\"L\u2019intelligence artificielle a infiltr\u00e9 toutes les facettes de nos vies aujourd\u2019hui. Qu\u2019il s\u2019agisse d\u2019appareils intelligents, de v\u00e9hicules automatis\u00e9s.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog | Curtis PC 2025\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-14T08:00:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-14T20:55:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/istockphoto-832169838-612x612-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"curtispc\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@curtispcfr\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"curtispc\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/\",\"url\":\"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/\",\"name\":\"La r\u00e9volution de l\u2019intelligence artificielle transformer le secteur juridique\",\"isPartOf\":{\"@id\":\"https:\/\/curtispc.fr\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/istockphoto-832169838-612x612-1.jpg\",\"datePublished\":\"2021-06-14T08:00:34+00:00\",\"dateModified\":\"2021-06-14T20:55:28+00:00\",\"author\":{\"@id\":\"https:\/\/curtispc.fr\/blog\/#\/schema\/person\/751262d339812b9e62cb0d1dc09c5653\"},\"description\":\"L\u2019intelligence artificielle a infiltr\u00e9 toutes les facettes de nos vies aujourd\u2019hui. Qu\u2019il s\u2019agisse d\u2019appareils intelligents, de v\u00e9hicules automatis\u00e9s.\",\"breadcrumb\":{\"@id\":\"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/#primaryimage\",\"url\":\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/istockphoto-832169838-612x612-1.jpg\",\"contentUrl\":\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/istockphoto-832169838-612x612-1.jpg\",\"width\":612,\"height\":408,\"caption\":\"Artificial intelligence illustration with blue text AI over binary code matrix background. Abstract concept of cyber technology and automation\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/curtispc.fr\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"L&rsquo;intelligence artificielle et l&rsquo;apprentissage automatique sont les fers de lance d&rsquo;une r\u00e9volution silencieuse dans le domaine du droit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/curtispc.fr\/blog\/#website\",\"url\":\"https:\/\/curtispc.fr\/blog\/\",\"name\":\"Blog | Curtis PC 2025\",\"description\":\"Pour une vie num\u00e9rique plus simple\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/curtispc.fr\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/curtispc.fr\/blog\/#\/schema\/person\/751262d339812b9e62cb0d1dc09c5653\",\"name\":\"curtispc\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/curtispc.fr\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/663d9ed39cf5b5548c531ba51ac4c235?s=96&d=monsterid&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/663d9ed39cf5b5548c531ba51ac4c235?s=96&d=monsterid&r=g\",\"caption\":\"curtispc\"},\"sameAs\":[\"https:\/\/www.curtispc.fr\/\",\"https:\/\/x.com\/curtispcfr\"],\"url\":\"https:\/\/curtispc.fr\/blog\/author\/curtispc\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"La r\u00e9volution de l\u2019intelligence artificielle transformer le secteur juridique","description":"L\u2019intelligence artificielle a infiltr\u00e9 toutes les facettes de nos vies aujourd\u2019hui. Qu\u2019il s\u2019agisse d\u2019appareils intelligents, de v\u00e9hicules automatis\u00e9s.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/","og_locale":"fr_FR","og_type":"article","og_title":"La r\u00e9volution de l\u2019intelligence artificielle transformer le secteur juridique","og_description":"L\u2019intelligence artificielle a infiltr\u00e9 toutes les facettes de nos vies aujourd\u2019hui. Qu\u2019il s\u2019agisse d\u2019appareils intelligents, de v\u00e9hicules automatis\u00e9s.","og_url":"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/","og_site_name":"Blog | Curtis PC 2025","article_published_time":"2021-06-14T08:00:34+00:00","article_modified_time":"2021-06-14T20:55:28+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/istockphoto-832169838-612x612-1.jpg","type":"image\/jpeg"}],"author":"curtispc","twitter_card":"summary_large_image","twitter_creator":"@curtispcfr","twitter_misc":{"\u00c9crit par":"curtispc","Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/","url":"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/","name":"La r\u00e9volution de l\u2019intelligence artificielle transformer le secteur juridique","isPartOf":{"@id":"https:\/\/curtispc.fr\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/#primaryimage"},"image":{"@id":"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/#primaryimage"},"thumbnailUrl":"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/istockphoto-832169838-612x612-1.jpg","datePublished":"2021-06-14T08:00:34+00:00","dateModified":"2021-06-14T20:55:28+00:00","author":{"@id":"https:\/\/curtispc.fr\/blog\/#\/schema\/person\/751262d339812b9e62cb0d1dc09c5653"},"description":"L\u2019intelligence artificielle a infiltr\u00e9 toutes les facettes de nos vies aujourd\u2019hui. Qu\u2019il s\u2019agisse d\u2019appareils intelligents, de v\u00e9hicules automatis\u00e9s.","breadcrumb":{"@id":"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/#primaryimage","url":"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/istockphoto-832169838-612x612-1.jpg","contentUrl":"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/istockphoto-832169838-612x612-1.jpg","width":612,"height":408,"caption":"Artificial intelligence illustration with blue text AI over binary code matrix background. Abstract concept of cyber technology and automation"},{"@type":"BreadcrumbList","@id":"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/curtispc.fr\/blog\/"},{"@type":"ListItem","position":2,"name":"L&rsquo;intelligence artificielle et l&rsquo;apprentissage automatique sont les fers de lance d&rsquo;une r\u00e9volution silencieuse dans le domaine du droit"}]},{"@type":"WebSite","@id":"https:\/\/curtispc.fr\/blog\/#website","url":"https:\/\/curtispc.fr\/blog\/","name":"Blog | Curtis PC 2025","description":"Pour une vie num\u00e9rique plus simple","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/curtispc.fr\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/curtispc.fr\/blog\/#\/schema\/person\/751262d339812b9e62cb0d1dc09c5653","name":"curtispc","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/curtispc.fr\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/663d9ed39cf5b5548c531ba51ac4c235?s=96&d=monsterid&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/663d9ed39cf5b5548c531ba51ac4c235?s=96&d=monsterid&r=g","caption":"curtispc"},"sameAs":["https:\/\/www.curtispc.fr\/","https:\/\/x.com\/curtispcfr"],"url":"https:\/\/curtispc.fr\/blog\/author\/curtispc\/"}]}},"_links":{"self":[{"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/posts\/2719","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/comments?post=2719"}],"version-history":[{"count":17,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/posts\/2719\/revisions"}],"predecessor-version":[{"id":3692,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/posts\/2719\/revisions\/3692"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/media\/2850"}],"wp:attachment":[{"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/media?parent=2719"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/categories?post=2719"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/tags?post=2719"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}