{"version":"1.0","provider_name":"Les aventures de Jos\u00e9 ...","provider_url":"https:\/\/joselinformatique.obip.fr","author_name":"pierre","author_url":"https:\/\/joselinformatique.obip.fr\/index.php\/author\/pierre\/","title":"La chasse aux bugs - Les aventures de Jos\u00e9 ...","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"gRqMGPU70d\"><a href=\"https:\/\/joselinformatique.obip.fr\/index.php\/2019\/04\/04\/la-chasse-aux-bugs\/\">La chasse aux bugs<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/joselinformatique.obip.fr\/index.php\/2019\/04\/04\/la-chasse-aux-bugs\/embed\/#?secret=gRqMGPU70d\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0La chasse aux bugs\u00a0\u00bb &#8212; Les aventures de Jos\u00e9 ...\" data-secret=\"gRqMGPU70d\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/joselinformatique.obip.fr\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/joselinformatique.obip.fr\/wp-content\/uploads\/2019\/11\/pexels-photo-577585.jpg","thumbnail_width":1734,"thumbnail_height":1300,"description":"Olivier n\u2019est pas arriv\u00e9 sur le projet le plus int\u00e9ressant au monde, dans l\u2019\u00e9quipe la plus formatrice de sa vie. Il cherche de l\u2019exp\u00e9rience. Alors c\u2019est un bon d\u00e9but. La maintenance applicative pr\u00e9sente trois axes : Les \u00e9volutions ou corrections techniques. Souvent, il s\u2019agit de corriger des erreurs laiss\u00e9es par les pr\u00e9c\u00e9dents d\u00e9veloppeurs ou de [&hellip;]"}