{"id":3776,"date":"2025-01-28T15:33:19","date_gmt":"2025-01-28T14:33:19","guid":{"rendered":"https:\/\/curtispc.fr\/blog\/?p=3776"},"modified":"2025-01-29T14:39:39","modified_gmt":"2025-01-29T13:39:39","slug":"deepseek-la-startup-chinoise-qui-revolutionne-lia-open-source","status":"publish","type":"post","link":"https:\/\/curtispc.fr\/blog\/deepseek-la-startup-chinoise-qui-revolutionne-lia-open-source\/","title":{"rendered":"DeepSeek : La Startup Chinoise qui R\u00e9volutionne l\u2019IA Open-Source"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"3776\" class=\"elementor elementor-3776\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-3bbb697 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3bbb697\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d4dd921\" data-id=\"d4dd921\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-af3d108 elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading\" data-id=\"af3d108\" data-element_type=\"widget\" data-widget_type=\"theme-post-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/curtispc.fr\/cyberattaques.html\">DeepSeek : La Startup Chinoise qui R\u00e9volutionne l\u2019IA Open-Source<\/a><\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b494279 elementor-widget elementor-widget-text-editor\" data-id=\"b494279\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>DeepSeek est une entreprise chinoise d&rsquo;intelligence artificielle (IA) qui a r\u00e9cemment boulevers\u00e9 le secteur technologique en d\u00e9veloppant des mod\u00e8les de langage de grande envergure (LLM) open-source, rivalisant avec des g\u00e9ants comme OpenAI.<\/p><p>\u00a0<\/p><p>Fond\u00e9e en 2023 par Liang Wenfeng, DeepSeek est bas\u00e9e \u00e0 Hangzhou, dans la province du Zhejiang, et est enti\u00e8rement financ\u00e9e par le fonds sp\u00e9culatif High-<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9a7b7d3 elementor-widget elementor-widget-post-info\" data-id=\"9a7b7d3\" data-element_type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-87450e9 elementor-inline-item\" itemprop=\"author\">\n\t\t\t\t\t\t<a href=\"https:\/\/curtispc.fr\/blog\/author\/curtispc\/\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"elementor-avatar\" src=\"https:\/\/secure.gravatar.com\/avatar\/663d9ed39cf5b5548c531ba51ac4c235?s=96&amp;d=monsterid&amp;r=g\" alt=\"Picture of curtispc\" loading=\"lazy\">\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-author\">\n\t\t\t\t\t\t\t<span class=\"elementor-post-info__item-prefix\">Publi\u00e9 par<\/span>\n\t\t\t\t\t\t\t\t\t\tcurtispc\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-753aac4 elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t<a href=\"https:\/\/curtispc.fr\/blog\/2025\/01\/28\/\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-calendar\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>28\/01\/2025<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-a085001 elementor-inline-item\" itemprop=\"commentCount\">\n\t\t\t\t\t\t<a href=\"https:\/\/curtispc.fr\/blog\/deepseek-la-startup-chinoise-qui-revolutionne-lia-open-source\/#respond\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-comments\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-comments\">\n\t\t\t\t\t\t\t\t\t\tNo Comments\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-0b4a2d9 elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-custom\">\n\t\t\t\t\t\t\t\t\t\t <div class=\"post-views content-post post-2740 entry-meta load-static\">\r\n\t\t\t\t<span class=\"post-views-icon dashicons dashicons-chart-bar\"><\/span> <span class=\"post-views-label\">Vues:<\/span> <span class=\"post-views-count\">5\u00a0062<\/span>\r\n\t\t\t<\/div>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-926c034 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"926c034\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-99ca02e\" data-id=\"99ca02e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b648c35 elementor-widget elementor-widget-image\" data-id=\"b648c35\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"896\" height=\"439\" src=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2025\/01\/Deep-seek.png\" class=\"attachment-large size-large wp-image-3777\" alt=\"Deep seek\" srcset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2025\/01\/Deep-seek.png 896w, https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2025\/01\/Deep-seek-300x147.png 300w, https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2025\/01\/Deep-seek-768x376.png 768w, https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2025\/01\/Deep-seek-585x287.png 585w\" sizes=\"(max-width: 896px) 100vw, 896px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12d894a elementor-blockquote--skin-border elementor-blockquote--button-color-official elementor-widget elementor-widget-blockquote\" data-id=\"12d894a\" data-element_type=\"widget\" data-widget_type=\"blockquote.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<blockquote class=\"elementor-blockquote\">\n\t\t\t<p class=\"elementor-blockquote__content\">\n\t\t\t\tSource: Deepseek\t\t\t<\/p>\n\t\t\t\t\t<\/blockquote>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6704d41 elementor-widget elementor-widget-spacer\" data-id=\"6704d41\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-a6d4832 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a6d4832\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e541bb\" data-id=\"1e541bb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ee66c5d elementor-widget elementor-widget-text-editor\" data-id=\"ee66c5d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1>Origines et Vision<\/h1><p>Liang Wenfeng, passionn\u00e9 d&rsquo;IA et co-fondateur de High-Flyer, a cr\u00e9\u00e9 DeepSeek avec pour mission de rendre l&rsquo;intelligence artificielle g\u00e9n\u00e9rale (AGI) accessible \u00e0 tous. L&rsquo;entreprise se distingue par son engagement envers l&rsquo;open-source, rendant ses algorithmes et mod\u00e8les accessibles pour utilisation et modification.<\/p><h1>\u00a0<\/h1><h1>Innovations et Mod\u00e8les Phares<\/h1><p>Parmi les r\u00e9alisations notables de DeepSeek figure le mod\u00e8le DeepSeek-R1, qui offre des performances comparables aux LLM contemporains tels que GPT-4 d&rsquo;OpenAI, tout en \u00e9tant d\u00e9velopp\u00e9 \u00e0 un co\u00fbt significativement inf\u00e9rieur, estim\u00e9 \u00e0 6 millions de dollars contre 100 millions pour GPT-4. Cette efficacit\u00e9 est attribu\u00e9e \u00e0 des approches techniques innovantes et \u00e0 une utilisation optimis\u00e9e des ressources informatiques.<\/p><div class=\"relative inline-flex items-center\">\u00a0<\/div><p>En janvier 2025, DeepSeek a lanc\u00e9 une application de chatbot gratuite bas\u00e9e sur le mod\u00e8le DeepSeek-R1, qui est rapidement devenue l&rsquo;application gratuite la plus t\u00e9l\u00e9charg\u00e9e sur l&rsquo;App Store d&rsquo;Apple aux \u00c9tats-Unis, surpassant ChatGPT. Cette ascension fulgurante a entra\u00een\u00e9 une baisse de 18 % du cours de l&rsquo;action Nvidia, soulignant l&rsquo;impact significatif de DeepSeek sur le march\u00e9 de l&rsquo;IA.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-5b9e5aa elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5b9e5aa\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cf1e64f\" data-id=\"cf1e64f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8b5c9c2 elementor-widget elementor-widget-spacer\" data-id=\"8b5c9c2\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7052b7c elementor-widget elementor-widget-text-editor\" data-id=\"7052b7c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1>Impact sur l&rsquo;Industrie Technologique?<\/h1><p>Le succ\u00e8s de DeepSeek remet en question la domination des grandes entreprises technologiques dans le domaine de l&rsquo;IA, d\u00e9montrant que des startups peuvent \u00e9galement r\u00e9aliser des avanc\u00e9es significatives avec des ressources limit\u00e9es. L&rsquo;approche open-source de DeepSeek favorise la transparence et la collaboration, offrant aux chercheurs et aux d\u00e9veloppeurs la possibilit\u00e9 d&rsquo;explorer et d&rsquo;am\u00e9liorer les mod\u00e8les existants.<\/p><h1>\u00a0<\/h1><h1>Perspectives d&rsquo;Avenir ?<\/h1><p>Avec son engagement envers l&rsquo;open-source et son accent sur la recherche fondamentale, DeepSeek est bien positionn\u00e9e pour continuer \u00e0 influencer le paysage de l&rsquo;IA. L&rsquo;entreprise pr\u00e9voit de poursuivre le d\u00e9veloppement de mod\u00e8les innovants et de promouvoir une culture de partage des connaissances, contribuant ainsi \u00e0 l&rsquo;avancement de l&rsquo;AGI et \u00e0 son accessibilit\u00e9 mondiale.<\/p><div class=\"relative inline-flex items-center\">\u00a0<\/div><p>En conclusion, DeepSeek incarne une nouvelle vague d&rsquo;innovation dans l&rsquo;IA, prouvant que l&rsquo;ing\u00e9niosit\u00e9 et l&rsquo;efficacit\u00e9 peuvent rivaliser avec des investissements massifs. Son approche unique et ses contributions open-source ouvrent la voie \u00e0 une d\u00e9mocratisation de l&rsquo;IA, offrant des opportunit\u00e9s pour une collaboration mondiale et un progr\u00e8s technologique partag\u00e9.<\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-b48a003 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b48a003\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c64da66\" data-id=\"c64da66\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-45e2a46 elementor-widget elementor-widget-spacer\" data-id=\"45e2a46\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d38307e elementor-share-buttons--view-icon elementor-share-buttons--shape-circle elementor-share-buttons--align-center elementor-share-buttons--skin-gradient elementor-grid-0 elementor-share-buttons--color-official elementor-widget elementor-widget-share-buttons\" data-id=\"d38307e\" data-element_type=\"widget\" data-widget_type=\"share-buttons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-grid\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_facebook\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on facebook\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-facebook\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_twitter\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on twitter\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-twitter\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_linkedin\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on linkedin\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-linkedin\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_whatsapp\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on whatsapp\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-whatsapp\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_email\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on email\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fas fa-envelope\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-d71b56e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d71b56e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-365c50e\" data-id=\"365c50e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c714fc4 elementor-post-navigation-borders-yes elementor-widget elementor-widget-post-navigation\" data-id=\"c714fc4\" data-element_type=\"widget\" data-widget_type=\"post-navigation.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-post-navigation\">\n\t\t\t<div class=\"elementor-post-navigation__prev elementor-post-navigation__link\">\n\t\t\t\t<a href=\"https:\/\/curtispc.fr\/blog\/windows-11-un-clic-suffit-pour-renforcer-votre-securite-introduction\/\" rel=\"prev\"><span class=\"post-navigation__arrow-wrapper post-navigation__arrow-prev\"><i class=\"fa fa-chevron-circle-left\" aria-hidden=\"true\"><\/i><span class=\"elementor-screen-only\">Prev<\/span><\/span><span class=\"elementor-post-navigation__link__prev\"><span class=\"post-navigation__prev--label\">Pr\u00e9c\u00e9dent<\/span><span class=\"post-navigation__prev--title\">Windows 11 : un clic suffit pour renforcer votre s\u00e9curit\u00e9 Introduction<\/span><\/span><\/a>\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-post-navigation__separator-wrapper\">\n\t\t\t\t\t<div class=\"elementor-post-navigation__separator\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-post-navigation__next elementor-post-navigation__link\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b186de9 elementor-widget elementor-widget-spacer\" data-id=\"b186de9\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-848085d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"848085d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cf0e263\" data-id=\"cf0e263\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-50c34b0 elementor-headline--style-highlight elementor-widget elementor-widget-animated-headline\" data-id=\"50c34b0\" data-element_type=\"widget\" data-settings=\"{&quot;marker&quot;:&quot;double&quot;,&quot;highlighted_text&quot;:&quot;Articles Similaires&quot;,&quot;headline_style&quot;:&quot;highlight&quot;,&quot;loop&quot;:&quot;yes&quot;,&quot;highlight_animation_duration&quot;:1200,&quot;highlight_iteration_delay&quot;:8000}\" data-widget_type=\"animated-headline.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h2 class=\"elementor-headline\">\n\t\t\t\t<span class=\"elementor-headline-dynamic-wrapper elementor-headline-text-wrapper\">\n\t\t\t\t\t<span class=\"elementor-headline-dynamic-text elementor-headline-text-active\">Articles Similaires<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<\/h2>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2fc543e elementor-widget elementor-widget-spacer\" data-id=\"2fc543e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-2932f20 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2932f20\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6a0b773\" data-id=\"6a0b773\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9d2fd96 elementor-widget elementor-widget-penci-featured-sliders\" data-id=\"9d2fd96\" data-element_type=\"widget\" data-widget_type=\"penci-featured-sliders.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"penci-block-el featured-area featured-style-23\"><div class=\"penci-owl-featured-area elsl-style-23 swiper penci-owl-carousel pcfg-slide-9d2fd96 elsl-style-23\" data-dots=\"false\" data-nav=\"true\" data-ceffect=\"swing\" data-seffect=\"creative\" data-style=\"style-23\" data-auto=\"true\" data-autotime=\"4000\" data-speed=\"600\" data-loop=\"true\"><div class=\"penci-owl-nav\"><div class=\"owl-prev\"><i class=\"penciicon-left-chevron\"><\/i><\/div><div class=\"owl-next\"><i class=\"penciicon-right-chevron\"><\/i><\/div><\/div><div class=\"swiper-wrapper\">    <div class=\"item swiper-slide\">\n        <div class=\"wrapper-item wrapper-item-classess\">\n\t\t\t                <div class=\"penci-item-mag penci-item-1 penci-pitem-big\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2024\/11\/hacker-with-smartphone-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2024\/11\/hacker-with-smartphone-585x390.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/piratage-de-smartphones-une-menace-grandissante-en-2024\/\"\n                           title=\"Piratage de smartphones : Une menace grandissante en 2024\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Piratage de smartphones : Une menace grandissante en 2024\"\n                           href=\"https:\/\/curtispc.fr\/blog\/piratage-de-smartphones-une-menace-grandissante-en-2024\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Piratage de smartphones : Une menace grandissante en 2024\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/piratage-de-smartphones-une-menace-grandissante-en-2024\/\">Piratage de smartphones : Une menace grandissante en 2024<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <div class=\"feat-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-time\"><time class=\"entry-date published\" datetime=\"2024-11-05T10:44:58+01:00\">5 novembre 2024<\/time><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-comments\"><a\n                                                            href=\"https:\/\/curtispc.fr\/blog\/piratage-de-smartphones-une-menace-grandissante-en-2024\/#respond \">0 Commentaires<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-2 penci-pitem-big\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2024\/06\/cybert-securite-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2024\/06\/cybert-securite-585x390.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/la-cybersecurite-en-2024-enjeux-et-strategies-pour-un-monde-connecte\/\"\n                           title=\"La cybers\u00e9curit\u00e9 en 2024 : enjeux et strat\u00e9gies pour un monde connect\u00e9\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"La cybers\u00e9curit\u00e9 en 2024 : enjeux et strat\u00e9gies pour un monde connect\u00e9\"\n                           href=\"https:\/\/curtispc.fr\/blog\/la-cybersecurite-en-2024-enjeux-et-strategies-pour-un-monde-connecte\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"La cybers\u00e9curit\u00e9 en 2024 : enjeux et strat\u00e9gies pour un monde connect\u00e9\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/la-cybersecurite-en-2024-enjeux-et-strategies-pour-un-monde-connecte\/\">La cybers\u00e9curit\u00e9 en 2024 : enjeux et strat\u00e9gies pour un monde connect\u00e9<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <div class=\"feat-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-time\"><time class=\"entry-date published\" datetime=\"2024-06-06T09:10:40+02:00\">6 juin 2024<\/time><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-comments\"><a\n                                                            href=\"https:\/\/curtispc.fr\/blog\/la-cybersecurite-en-2024-enjeux-et-strategies-pour-un-monde-connecte\/#comments \">1 Commentaires<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-3 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/istockphoto-832169838-612x612-1-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/istockphoto-832169838-612x612-1-585x390.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/\"\n                           title=\"L&rsquo;intelligence artificielle et l&rsquo;apprentissage automatique sont les fers de lance d&rsquo;une r\u00e9volution silencieuse dans le domaine du droit\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"L&rsquo;intelligence artificielle et l&rsquo;apprentissage automatique sont les fers de lance d&rsquo;une r\u00e9volution silencieuse dans le domaine du droit\"\n                           href=\"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"L&rsquo;intelligence artificielle et l&rsquo;apprentissage automatique sont les fers de lance d&rsquo;une r\u00e9volution silencieuse dans le domaine du droit\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/\">L&rsquo;intelligence artificielle et l&rsquo;apprentissage automatique sont les fers de lance d&rsquo;une r\u00e9volution...<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-4 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/byod_risque-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/byod_risque-585x439.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/boyd-%e2%80%89bring-your-own-device%e2%80%89-quelle-sont-les-risques%e2%80%89\/\"\n                           title=\"Boyd \u00ab\u2009Bring your own device\u2009\u00bb quelle sont les risques\u2009?\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Boyd \u00ab\u2009Bring your own device\u2009\u00bb quelle sont les risques\u2009?\"\n                           href=\"https:\/\/curtispc.fr\/blog\/boyd-%e2%80%89bring-your-own-device%e2%80%89-quelle-sont-les-risques%e2%80%89\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Boyd \u00ab\u2009Bring your own device\u2009\u00bb quelle sont les risques\u2009?\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/boyd-%e2%80%89bring-your-own-device%e2%80%89-quelle-sont-les-risques%e2%80%89\/\">Boyd \u00ab\u2009Bring your own device\u2009\u00bb quelle sont les risques\u2009?<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-5 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/byod_windows.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/byod_windows.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/byod-quelles-sont-les-bonnes-pratiques\/\"\n                           title=\"BYOD : quelles sont les bonnes pratiques\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"BYOD : quelles sont les bonnes pratiques\"\n                           href=\"https:\/\/curtispc.fr\/blog\/byod-quelles-sont-les-bonnes-pratiques\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"BYOD : quelles sont les bonnes pratiques\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/byod-quelles-sont-les-bonnes-pratiques\/\">BYOD : quelles sont les bonnes pratiques<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-0 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/cloud-security-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/cloud-security-585x383.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/\"\n                           title=\"S\u00e9curit\u00e9 Cloud: voici les menaces \u00e0 ne pas n\u00e9gliger\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"S\u00e9curit\u00e9 Cloud: voici les menaces \u00e0 ne pas n\u00e9gliger\"\n                           href=\"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"S\u00e9curit\u00e9 Cloud: voici les menaces \u00e0 ne pas n\u00e9gliger\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/voici-les-menaces-a-ne-pas-negliger\/\">S\u00e9curit\u00e9 Cloud: voici les menaces \u00e0 ne pas n\u00e9gliger<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t<\/div><\/div><div class=\"item swiper-slide\"><div class=\"wrapper-item wrapper-item-classess\">\n\t\t\t\t                <div class=\"penci-item-mag penci-item-1 penci-pitem-big\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/message-messagerie-chiffre-secret-1024x576-1-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/message-messagerie-chiffre-secret-1024x576-1-585x329.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/messagerie-securisee\/\"\n                           title=\"Messagerie S\u00e9curis\u00e9e\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Messagerie S\u00e9curis\u00e9e\"\n                           href=\"https:\/\/curtispc.fr\/blog\/messagerie-securisee\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Messagerie S\u00e9curis\u00e9e\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/messagerie-securisee\/\">Messagerie S\u00e9curis\u00e9e<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <div class=\"feat-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-time\"><time class=\"entry-date published\" datetime=\"2021-05-12T12:00:42+02:00\">12 mai 2021<\/time><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-comments\"><a\n                                                            href=\"https:\/\/curtispc.fr\/blog\/messagerie-securisee\/#comments \">1 Commentaires<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-2 penci-pitem-big\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2021\/04\/img-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2021\/04\/img-585x399.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/smartphone-et-tablette-fin-de-la-vie-privee%e2%80%89\/\"\n                           title=\"Smartphone et tablette, fin de la vie priv\u00e9e\u2009?\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Smartphone et tablette, fin de la vie priv\u00e9e\u2009?\"\n                           href=\"https:\/\/curtispc.fr\/blog\/smartphone-et-tablette-fin-de-la-vie-privee%e2%80%89\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Smartphone et tablette, fin de la vie priv\u00e9e\u2009?\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/smartphone-et-tablette-fin-de-la-vie-privee%e2%80%89\/\">Smartphone et tablette, fin de la vie priv\u00e9e\u2009?<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <div class=\"feat-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-time\"><time class=\"entry-date published\" datetime=\"2021-04-13T10:00:11+02:00\">13 avril 2021<\/time><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-comments\"><a\n                                                            href=\"https:\/\/curtispc.fr\/blog\/smartphone-et-tablette-fin-de-la-vie-privee%e2%80%89\/#respond \">0 Commentaires<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-3 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/diffamation-professeurs-reseaux-sociaux-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/diffamation-professeurs-reseaux-sociaux-585x401.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/reseaux-sociaux-source-de-piratage-informatique%e2%80%89\/\"\n                           title=\"R\u00e9seaux sociaux, source de piratage informatique\u2009?\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"R\u00e9seaux sociaux, source de piratage informatique\u2009?\"\n                           href=\"https:\/\/curtispc.fr\/blog\/reseaux-sociaux-source-de-piratage-informatique%e2%80%89\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"R\u00e9seaux sociaux, source de piratage informatique\u2009?\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/reseaux-sociaux-source-de-piratage-informatique%e2%80%89\/\">R\u00e9seaux sociaux, source de piratage informatique\u2009?<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-4 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/bigstock_Cloud_Computing-585x390.png\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/bigstock_Cloud_Computing-585x329.png\"\n                           href=\"https:\/\/curtispc.fr\/blog\/cloud-donne-hors-de-controle%e2%80%89\/\"\n                           title=\"Cloud : donn\u00e9 hors de contr\u00f4le\u2009?\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Cloud : donn\u00e9 hors de contr\u00f4le\u2009?\"\n                           href=\"https:\/\/curtispc.fr\/blog\/cloud-donne-hors-de-controle%e2%80%89\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Cloud : donn\u00e9 hors de contr\u00f4le\u2009?\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/cloud-donne-hors-de-controle%e2%80%89\/\">Cloud : donn\u00e9 hors de contr\u00f4le\u2009?<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-5 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/shadow_iot-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/shadow_iot-585x390.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/shadow-iot-une-menace-grandissante-pour-les-entreprises\/\"\n                           title=\"Shadow IoT: une menace grandissante pour les entreprises\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Shadow IoT: une menace grandissante pour les entreprises\"\n                           href=\"https:\/\/curtispc.fr\/blog\/shadow-iot-une-menace-grandissante-pour-les-entreprises\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Shadow IoT: une menace grandissante pour les entreprises\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/shadow-iot-une-menace-grandissante-pour-les-entreprises\/\">Shadow IoT: une menace grandissante pour les entreprises<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-0 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/10_hacker-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/10_hacker-585x390.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/top-10-des-hackers-les-plus-celebres\/\"\n                           title=\"TOP 10 DES HACKERS LES PLUS C\u00c9L\u00c8BRES\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"TOP 10 DES HACKERS LES PLUS C\u00c9L\u00c8BRES\"\n                           href=\"https:\/\/curtispc.fr\/blog\/top-10-des-hackers-les-plus-celebres\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"TOP 10 DES HACKERS LES PLUS C\u00c9L\u00c8BRES\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/top-10-des-hackers-les-plus-celebres\/\">TOP 10 DES HACKERS LES PLUS C\u00c9L\u00c8BRES<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t<\/div><\/div><div class=\"item swiper-slide\"><div class=\"wrapper-item wrapper-item-classess\">\n\t\t\t\t                <div class=\"penci-item-mag penci-item-1 penci-pitem-big\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/social_engineering_2.0-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/social_engineering_2.0-585x293.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/etes-vous-une-faille-de-securite-humaine-sur-internet-social-engineering\/\"\n                           title=\"\u00cates-vous une faille de s\u00e9curit\u00e9 humaine sur Internet ? Social engineering\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"\u00cates-vous une faille de s\u00e9curit\u00e9 humaine sur Internet ? Social engineering\"\n                           href=\"https:\/\/curtispc.fr\/blog\/etes-vous-une-faille-de-securite-humaine-sur-internet-social-engineering\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"\u00cates-vous une faille de s\u00e9curit\u00e9 humaine sur Internet ? Social engineering\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/etes-vous-une-faille-de-securite-humaine-sur-internet-social-engineering\/\">\u00cates-vous une faille de s\u00e9curit\u00e9 humaine sur Internet ? Social engineering<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <div class=\"feat-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-time\"><time class=\"entry-date published\" datetime=\"2021-02-22T10:00:07+01:00\">22 f\u00e9vrier 2021<\/time><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-comments\"><a\n                                                            href=\"https:\/\/curtispc.fr\/blog\/etes-vous-une-faille-de-securite-humaine-sur-internet-social-engineering\/#comments \">2 Commentaires<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-2 penci-pitem-big\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/menace_2020.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/menace_2020.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/previsions-2020-de-mcafee-labs-sur-les-menaces-de-cybersecurite\/\"\n                           title=\"Pr\u00e9visions 2020 de McAfee Labs sur les menaces de cybers\u00e9curit\u00e9\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Pr\u00e9visions 2020 de McAfee Labs sur les menaces de cybers\u00e9curit\u00e9\"\n                           href=\"https:\/\/curtispc.fr\/blog\/previsions-2020-de-mcafee-labs-sur-les-menaces-de-cybersecurite\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Pr\u00e9visions 2020 de McAfee Labs sur les menaces de cybers\u00e9curit\u00e9\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/previsions-2020-de-mcafee-labs-sur-les-menaces-de-cybersecurite\/\">Pr\u00e9visions 2020 de McAfee Labs sur les menaces de cybers\u00e9curit\u00e9<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <div class=\"feat-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-time\"><time class=\"entry-date published\" datetime=\"2020-03-02T09:00:45+01:00\">2 mars 2020<\/time><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-comments\"><a\n                                                            href=\"https:\/\/curtispc.fr\/blog\/previsions-2020-de-mcafee-labs-sur-les-menaces-de-cybersecurite\/#comments \">2 Commentaires<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-3 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/fond_ecran_whatsapp-320x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/fond_ecran_whatsapp.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/whatsapp-comment-savoir-si-quelquun-ma-bloque\/\"\n                           title=\"WhatsApp : comment savoir si quelqu\u2019un m\u2019a bloqu\u00e9 ?\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"WhatsApp : comment savoir si quelqu\u2019un m\u2019a bloqu\u00e9 ?\"\n                           href=\"https:\/\/curtispc.fr\/blog\/whatsapp-comment-savoir-si-quelquun-ma-bloque\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"WhatsApp : comment savoir si quelqu\u2019un m\u2019a bloqu\u00e9 ?\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/whatsapp-comment-savoir-si-quelquun-ma-bloque\/\">WhatsApp : comment savoir si quelqu\u2019un m\u2019a bloqu\u00e9 ?<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-4 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/algorithme-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/algorithme-585x329.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/top-10-des-algorithmes-que-chaque-programmeur-devrait-connaitre\/\"\n                           title=\"Top 10 des algorithmes que chaque programmeur devrait conna\u00eetre\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Top 10 des algorithmes que chaque programmeur devrait conna\u00eetre\"\n                           href=\"https:\/\/curtispc.fr\/blog\/top-10-des-algorithmes-que-chaque-programmeur-devrait-connaitre\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Top 10 des algorithmes que chaque programmeur devrait conna\u00eetre\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/top-10-des-algorithmes-que-chaque-programmeur-devrait-connaitre\/\">Top 10 des algorithmes que chaque programmeur devrait conna\u00eetre<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-5 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/security-4851428_960_720-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/security-4851428_960_720-585x366.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/mise-en-garde-contre-les-menaces-qui-existent-sur-le-web\/\"\n                           title=\"Mise en garde contre les menaces qui existent sur le web\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Mise en garde contre les menaces qui existent sur le web\"\n                           href=\"https:\/\/curtispc.fr\/blog\/mise-en-garde-contre-les-menaces-qui-existent-sur-le-web\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Mise en garde contre les menaces qui existent sur le web\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/mise-en-garde-contre-les-menaces-qui-existent-sur-le-web\/\">Mise en garde contre les menaces qui existent sur le web<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-0 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/malware_mobile-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/malware_mobile-585x329.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/des-pirates-utilisant-des-applications-mobiles-cachees-des-identifiants-de-connexion-tiers-et-des-videos-de-jeu-contrefaites-pour-cibler-les-consommateurs\/\"\n                           title=\"Des pirates utilisant des applications mobiles cach\u00e9es, des identifiants de connexion tiers et des vid\u00e9os de jeu contrefaites pour cibler les consommateurs\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Des pirates utilisant des applications mobiles cach\u00e9es, des identifiants de connexion tiers et des vid\u00e9os de jeu contrefaites pour cibler les consommateurs\"\n                           href=\"https:\/\/curtispc.fr\/blog\/des-pirates-utilisant-des-applications-mobiles-cachees-des-identifiants-de-connexion-tiers-et-des-videos-de-jeu-contrefaites-pour-cibler-les-consommateurs\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Des pirates utilisant des applications mobiles cach\u00e9es, des identifiants de connexion tiers et des vid\u00e9os de jeu contrefaites pour cibler les consommateurs\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/des-pirates-utilisant-des-applications-mobiles-cachees-des-identifiants-de-connexion-tiers-et-des-videos-de-jeu-contrefaites-pour-cibler-les-consommateurs\/\">Des pirates utilisant des applications mobiles cach\u00e9es, des identifiants de connexion tiers...<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t        <\/div>\n    <\/div>\n<\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb4006e elementor-widget elementor-widget-spacer\" data-id=\"eb4006e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-cc2256e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cc2256e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-70d5c9c\" data-id=\"70d5c9c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9f9d352 elementor-widget elementor-widget-spacer\" data-id=\"9f9d352\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>DeepSeek est une entreprise chinoise d&rsquo;intelligence artificielle (IA) qui a r\u00e9cemment boulevers\u00e9 le secteur technologique en d\u00e9veloppant des mod\u00e8les de langage de grande envergure (LLM) open-source, rivalisant avec des g\u00e9ants&hellip;<\/p>\n","protected":false},"author":1,"featured_media":3778,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[25,27],"tags":[46,56,47],"class_list":["post-3776","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualites","category-windows-mac-linux","tag-cyber-securite","tag-ia","tag-windows"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>DeepSeek : La Startup Chinoise qui R\u00e9volutionne l\u2019IA Open-Source<\/title>\n<meta name=\"description\" content=\"DeepSeek est une entreprise chinoise d&#039;intelligence artificielle (IA) qui a r\u00e9cemment boulevers\u00e9 le secteur technologique\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/curtispc.fr\/blog\/deepseek-la-startup-chinoise-qui-revolutionne-lia-open-source\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DeepSeek : La Startup Chinoise qui R\u00e9volutionne l\u2019IA Open-Source\" \/>\n<meta property=\"og:description\" content=\"DeepSeek est une entreprise chinoise d&#039;intelligence artificielle (IA) qui a r\u00e9cemment boulevers\u00e9 le secteur technologique\" \/>\n<meta property=\"og:url\" content=\"https:\/\/curtispc.fr\/blog\/deepseek-la-startup-chinoise-qui-revolutionne-lia-open-source\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog | Curtis PC 2025\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-28T14:33:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-29T13:39:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2025\/01\/deepseek-ai-icon-logo-png_seeklogo-611473.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"curtispc\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@curtispcfr\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"curtispc\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/curtispc.fr\/blog\/deepseek-la-startup-chinoise-qui-revolutionne-lia-open-source\/\",\"url\":\"https:\/\/curtispc.fr\/blog\/deepseek-la-startup-chinoise-qui-revolutionne-lia-open-source\/\",\"name\":\"DeepSeek : La Startup Chinoise qui R\u00e9volutionne l\u2019IA Open-Source\",\"isPartOf\":{\"@id\":\"https:\/\/curtispc.fr\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/curtispc.fr\/blog\/deepseek-la-startup-chinoise-qui-revolutionne-lia-open-source\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/curtispc.fr\/blog\/deepseek-la-startup-chinoise-qui-revolutionne-lia-open-source\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2025\/01\/deepseek-ai-icon-logo-png_seeklogo-611473.png\",\"datePublished\":\"2025-01-28T14:33:19+00:00\",\"dateModified\":\"2025-01-29T13:39:39+00:00\",\"author\":{\"@id\":\"https:\/\/curtispc.fr\/blog\/#\/schema\/person\/751262d339812b9e62cb0d1dc09c5653\"},\"description\":\"DeepSeek est une entreprise chinoise d'intelligence artificielle (IA) qui a r\u00e9cemment boulevers\u00e9 le secteur technologique\",\"breadcrumb\":{\"@id\":\"https:\/\/curtispc.fr\/blog\/deepseek-la-startup-chinoise-qui-revolutionne-lia-open-source\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/curtispc.fr\/blog\/deepseek-la-startup-chinoise-qui-revolutionne-lia-open-source\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/curtispc.fr\/blog\/deepseek-la-startup-chinoise-qui-revolutionne-lia-open-source\/#primaryimage\",\"url\":\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2025\/01\/deepseek-ai-icon-logo-png_seeklogo-611473.png\",\"contentUrl\":\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2025\/01\/deepseek-ai-icon-logo-png_seeklogo-611473.png\",\"width\":600,\"height\":600,\"caption\":\"Deep seek\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/curtispc.fr\/blog\/deepseek-la-startup-chinoise-qui-revolutionne-lia-open-source\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/curtispc.fr\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DeepSeek : La Startup Chinoise qui R\u00e9volutionne l\u2019IA Open-Source\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/curtispc.fr\/blog\/#website\",\"url\":\"https:\/\/curtispc.fr\/blog\/\",\"name\":\"Blog | Curtis PC 2025\",\"description\":\"Pour une vie num\u00e9rique plus simple\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/curtispc.fr\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/curtispc.fr\/blog\/#\/schema\/person\/751262d339812b9e62cb0d1dc09c5653\",\"name\":\"curtispc\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/curtispc.fr\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/663d9ed39cf5b5548c531ba51ac4c235?s=96&d=monsterid&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/663d9ed39cf5b5548c531ba51ac4c235?s=96&d=monsterid&r=g\",\"caption\":\"curtispc\"},\"sameAs\":[\"https:\/\/www.curtispc.fr\/\",\"https:\/\/x.com\/curtispcfr\"],\"url\":\"https:\/\/curtispc.fr\/blog\/author\/curtispc\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DeepSeek : La Startup Chinoise qui R\u00e9volutionne l\u2019IA Open-Source","description":"DeepSeek est une entreprise chinoise d'intelligence artificielle (IA) qui a r\u00e9cemment boulevers\u00e9 le secteur technologique","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/curtispc.fr\/blog\/deepseek-la-startup-chinoise-qui-revolutionne-lia-open-source\/","og_locale":"fr_FR","og_type":"article","og_title":"DeepSeek : La Startup Chinoise qui R\u00e9volutionne l\u2019IA Open-Source","og_description":"DeepSeek est une entreprise chinoise d'intelligence artificielle (IA) qui a r\u00e9cemment boulevers\u00e9 le secteur technologique","og_url":"https:\/\/curtispc.fr\/blog\/deepseek-la-startup-chinoise-qui-revolutionne-lia-open-source\/","og_site_name":"Blog | Curtis PC 2025","article_published_time":"2025-01-28T14:33:19+00:00","article_modified_time":"2025-01-29T13:39:39+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2025\/01\/deepseek-ai-icon-logo-png_seeklogo-611473.png","type":"image\/png"}],"author":"curtispc","twitter_card":"summary_large_image","twitter_creator":"@curtispcfr","twitter_misc":{"\u00c9crit par":"curtispc","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/curtispc.fr\/blog\/deepseek-la-startup-chinoise-qui-revolutionne-lia-open-source\/","url":"https:\/\/curtispc.fr\/blog\/deepseek-la-startup-chinoise-qui-revolutionne-lia-open-source\/","name":"DeepSeek : La Startup Chinoise qui R\u00e9volutionne l\u2019IA Open-Source","isPartOf":{"@id":"https:\/\/curtispc.fr\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/curtispc.fr\/blog\/deepseek-la-startup-chinoise-qui-revolutionne-lia-open-source\/#primaryimage"},"image":{"@id":"https:\/\/curtispc.fr\/blog\/deepseek-la-startup-chinoise-qui-revolutionne-lia-open-source\/#primaryimage"},"thumbnailUrl":"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2025\/01\/deepseek-ai-icon-logo-png_seeklogo-611473.png","datePublished":"2025-01-28T14:33:19+00:00","dateModified":"2025-01-29T13:39:39+00:00","author":{"@id":"https:\/\/curtispc.fr\/blog\/#\/schema\/person\/751262d339812b9e62cb0d1dc09c5653"},"description":"DeepSeek est une entreprise chinoise d'intelligence artificielle (IA) qui a r\u00e9cemment boulevers\u00e9 le secteur technologique","breadcrumb":{"@id":"https:\/\/curtispc.fr\/blog\/deepseek-la-startup-chinoise-qui-revolutionne-lia-open-source\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/curtispc.fr\/blog\/deepseek-la-startup-chinoise-qui-revolutionne-lia-open-source\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/curtispc.fr\/blog\/deepseek-la-startup-chinoise-qui-revolutionne-lia-open-source\/#primaryimage","url":"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2025\/01\/deepseek-ai-icon-logo-png_seeklogo-611473.png","contentUrl":"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2025\/01\/deepseek-ai-icon-logo-png_seeklogo-611473.png","width":600,"height":600,"caption":"Deep seek"},{"@type":"BreadcrumbList","@id":"https:\/\/curtispc.fr\/blog\/deepseek-la-startup-chinoise-qui-revolutionne-lia-open-source\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/curtispc.fr\/blog\/"},{"@type":"ListItem","position":2,"name":"DeepSeek : La Startup Chinoise qui R\u00e9volutionne l\u2019IA Open-Source"}]},{"@type":"WebSite","@id":"https:\/\/curtispc.fr\/blog\/#website","url":"https:\/\/curtispc.fr\/blog\/","name":"Blog | Curtis PC 2025","description":"Pour une vie num\u00e9rique plus simple","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/curtispc.fr\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/curtispc.fr\/blog\/#\/schema\/person\/751262d339812b9e62cb0d1dc09c5653","name":"curtispc","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/curtispc.fr\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/663d9ed39cf5b5548c531ba51ac4c235?s=96&d=monsterid&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/663d9ed39cf5b5548c531ba51ac4c235?s=96&d=monsterid&r=g","caption":"curtispc"},"sameAs":["https:\/\/www.curtispc.fr\/","https:\/\/x.com\/curtispcfr"],"url":"https:\/\/curtispc.fr\/blog\/author\/curtispc\/"}]}},"_links":{"self":[{"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/posts\/3776","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/comments?post=3776"}],"version-history":[{"count":4,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/posts\/3776\/revisions"}],"predecessor-version":[{"id":3782,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/posts\/3776\/revisions\/3782"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/media\/3778"}],"wp:attachment":[{"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/media?parent=3776"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/categories?post=3776"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/tags?post=3776"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}