33 changed files with 92 additions and 92 deletions
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
@ -1 +1 @@ |
|||
{"menu":{"children":[{"url":"co/Portfolio_VAE.html","label":"Présentation","source":"page","className":"outPage","id":"c4OL7R4gMrcodBPllwiKif"},{"url":"co/Curriculum_vitae.html","label":"Curriculum Vitae","source":"section","className":"outSec ","id":"KHimBYvCTql5MJLiKv1L8"},{"url":"co/Bloc_de_competences_1.html","label":"Satisfaire les besoins clients","source":"section","className":"outSec ","id":"HegOkDQds1i14W4l2X7u0g","children":[{"url":"co/Bloc_de_competences_1_1.html","label":"Lancement du projet","source":"section","className":"outSec ","id":"nnloxed9GmcAnXP8pBsiMi"},{"url":"co/Bloc_de_competences_1_2.html","label":"Recueil et analyse de besoin","source":"section","className":"outSec ","id":"VBruZcon3OkJhNRg9CiVbb"},{"url":"co/Bloc_de_competences_1_3.html","label":"Formalisation du besoin","source":"section","className":"outSec ","id":"xj3LuR6shmkWl68tWzMRFf"},{"url":"co/Bloc_de_competences_1_4.html","label":"Réalisation de maquettes ou preuves de concept","source":"section","className":"outSec ","id":"etvxkuBVBgl3uvV67ubV5h"}]},{"url":"co/Bloc_de_competences_2.html","label":"Concevoir des infrastructures systèmes et réseau","source":"section","className":"outSec ","id":"jflAKg8T5fkxkn9TdwGe","children":[{"url":"co/Bloc_de_competences_2_1.html","label":"Sélection des technologies, outils, services et dimensionnement de la plate-forme de service","source":"section","className":"outSec ","id":"f8rgWsRR20becvVbgdk5cf"},{"url":"co/Bloc_de_competences_2_2.html","label":"Analyse du retour sur investissement (ROI)","source":"section","className":"outSec ","id":"d8Xx3YK2PYVKAMGMjb3vf"},{"url":"co/Bloc_de_competences_2_3.html","label":"Conception et modélisation de la solution","source":"section","className":"outSec ","id":"OEu6FVtrSPiTDqxLcDJkne"},{"url":"co/Bloc_de_competences_2_4.html","label":"Pilotages des intégrateurs externes","source":"section","className":"outSec ","id":"QLVGSDHpuvhYj0nDeyd4md"}]},{"url":"co/Bloc_de_competences_3.html","label":"Intégrer et déployer une solution technique","source":"section","className":"outSec ","id":"cuu0hhxwljcIURxcPk67pc","children":[{"url":"co/Bloc_de_competences_3_1.html","label":"Réalisation de la solution","source":"section","className":"outSec ","id":"xBlLvp7bQgegI8BVgxS9vd"},{"url":"co/Bloc_de_competences_3_2.html","label":"Test de la solution","source":"section","className":"outSec ","id":"MtInw6iUQ7hwJ3y3mGiV1h"},{"url":"co/Bloc_de_competences_3_3.html","label":"Déploiement de la solution","source":"section","className":"outSec ","id":"VNadPluJYse1GkfUVYSA8g"}]},{"url":"co/Bloc_de_competences_4.html","label":"Assister et former les utilisateurs","source":"section","className":"outSec ","id":"LnbnzG7RwmfsJgWZuC8Qzd","children":[{"url":"co/Bloc_de_competences_4_1.html","label":"Formation des utilisateurs","source":"section","className":"outSec ","id":"xVk6dcXmjVdrMrtHRB3iPh"},{"url":"co/Bloc_de_competences_4_2.html","label":"Assistance aux utilisateurs","source":"section","className":"outSec ","id":"sixYuKntCJhVn7ML1IALNh"}]},{"url":"co/Bloc_de_competences_5.html","label":"Gérer un projet","source":"section","className":"outSec ","id":"gMDpDAbOAZjh28f1wgxR6d","children":[{"url":"co/Bloc_de_competences_5_1.html","label":"Organisation initiale du projet","source":"section","className":"outSec ","id":"tL5ezRREQxjAq1f1LME07c"},{"url":"co/Bloc_de_competences_5_2.html","label":"Planification et budgétisation","source":"section","className":"outSec ","id":"hBWSqcvtDlhcnJVbAJjCQe"},{"url":"co/Bloc_de_competences_5_3.html","label":"Pilotage et communication","source":"section","className":"outSec ","id":"AqfGiwebJih4WBQ4uLQ7Ch"},{"url":"co/Bloc_de_competences_5_4.html","label":"Clôture du projet","source":"section","className":"outSec ","id":"ityWK5jFEBuITx26N1HRi"}]},{"url":"co/Bloc_de_competences_6.html","label":"Administrer et gérer la sécurité","source":"section","className":"outSec ","id":"ns4WOwxKe3gAz4nqpWbTA","children":[{"url":"co/Bloc_de_competences_6_1.html","label":"Exploitation de la solution (infrastructure systèmes et réseaux)","source":"section","className":"outSec ","id":"muymxZKa0BheI5qzgfNtm"},{"url":"co/Bloc_de_competences_6_2.html","label":"Supervision de la solution","source":"section","className":"outSec ","id":"KZ7EIi4UJafQku5BiUbvEd"},{"url":"co/Bloc_de_competences_6_3.html","label":"Audit de sécurité","source":"section","className":"outSec ","id":"vGs6HVd61scFl8MnNNvtri"},{"url":"co/Bloc_de_competences_6_4.html","label":"Gestion de la sécurité","source":"section","className":"outSec ","id":"gnoigtHB4seIaXHjAXTLUd"}]},{"url":"co/Conclusion.html","label":"Résumé","source":"section","className":"outSec ","id":"UzWWshYcwOf3eFv34axbxf"}]}} |
|||
{"menu":{"children":[{"url":"co/Portfolio_VAE.html","label":"Présentation","source":"page","className":"outPage","id":"pIU2BYlwpIisHbSaD0Dnk"},{"url":"co/Curriculum_vitae.html","label":"Curriculum Vitae","source":"section","className":"outSec ","id":"KHimBYvCTql5MJLiKv1L8"},{"url":"co/Bloc_de_competences_1.html","label":"Satisfaire les besoins clients","source":"section","className":"outSec ","id":"HegOkDQds1i14W4l2X7u0g","children":[{"url":"co/Bloc_de_competences_1_1.html","label":"Lancement du projet","source":"section","className":"outSec ","id":"nnloxed9GmcAnXP8pBsiMi"},{"url":"co/Bloc_de_competences_1_2.html","label":"Recueil et analyse de besoin","source":"section","className":"outSec ","id":"VBruZcon3OkJhNRg9CiVbb"},{"url":"co/Bloc_de_competences_1_3.html","label":"Formalisation du besoin","source":"section","className":"outSec ","id":"xj3LuR6shmkWl68tWzMRFf"},{"url":"co/Bloc_de_competences_1_4.html","label":"Réalisation de maquettes ou preuves de concept","source":"section","className":"outSec ","id":"etvxkuBVBgl3uvV67ubV5h"}]},{"url":"co/Bloc_de_competences_2.html","label":"Concevoir des infrastructures systèmes et réseau","source":"section","className":"outSec ","id":"jflAKg8T5fkxkn9TdwGe","children":[{"url":"co/Bloc_de_competences_2_1.html","label":"Sélection des technologies, outils, services et dimensionnement de la plate-forme de service","source":"section","className":"outSec ","id":"f8rgWsRR20becvVbgdk5cf"},{"url":"co/Bloc_de_competences_2_2.html","label":"Analyse du retour sur investissement (ROI)","source":"section","className":"outSec ","id":"d8Xx3YK2PYVKAMGMjb3vf"},{"url":"co/Bloc_de_competences_2_3.html","label":"Conception et modélisation de la solution","source":"section","className":"outSec ","id":"OEu6FVtrSPiTDqxLcDJkne"},{"url":"co/Bloc_de_competences_2_4.html","label":"Pilotages des intégrateurs externes","source":"section","className":"outSec ","id":"QLVGSDHpuvhYj0nDeyd4md"}]},{"url":"co/Bloc_de_competences_3.html","label":"Intégrer et déployer une solution technique","source":"section","className":"outSec ","id":"cuu0hhxwljcIURxcPk67pc","children":[{"url":"co/Bloc_de_competences_3_1.html","label":"Réalisation de la solution","source":"section","className":"outSec ","id":"xBlLvp7bQgegI8BVgxS9vd"},{"url":"co/Bloc_de_competences_3_2.html","label":"Test de la solution","source":"section","className":"outSec ","id":"MtInw6iUQ7hwJ3y3mGiV1h"},{"url":"co/Bloc_de_competences_3_3.html","label":"Déploiement de la solution","source":"section","className":"outSec ","id":"VNadPluJYse1GkfUVYSA8g"}]},{"url":"co/Bloc_de_competences_4.html","label":"Assister et former les utilisateurs","source":"section","className":"outSec ","id":"LnbnzG7RwmfsJgWZuC8Qzd","children":[{"url":"co/Bloc_de_competences_4_1.html","label":"Formation des utilisateurs","source":"section","className":"outSec ","id":"xVk6dcXmjVdrMrtHRB3iPh"},{"url":"co/Bloc_de_competences_4_2.html","label":"Assistance aux utilisateurs","source":"section","className":"outSec ","id":"sixYuKntCJhVn7ML1IALNh"}]},{"url":"co/Bloc_de_competences_5.html","label":"Gérer un projet","source":"section","className":"outSec ","id":"gMDpDAbOAZjh28f1wgxR6d","children":[{"url":"co/Bloc_de_competences_5_1.html","label":"Organisation initiale du projet","source":"section","className":"outSec ","id":"tL5ezRREQxjAq1f1LME07c"},{"url":"co/Bloc_de_competences_5_2.html","label":"Planification et budgétisation","source":"section","className":"outSec ","id":"hBWSqcvtDlhcnJVbAJjCQe"},{"url":"co/Bloc_de_competences_5_3.html","label":"Pilotage et communication","source":"section","className":"outSec ","id":"AqfGiwebJih4WBQ4uLQ7Ch"},{"url":"co/Bloc_de_competences_5_4.html","label":"Clôture du projet","source":"section","className":"outSec ","id":"ityWK5jFEBuITx26N1HRi"}]},{"url":"co/Bloc_de_competences_6.html","label":"Administrer et gérer la sécurité","source":"section","className":"outSec ","id":"ns4WOwxKe3gAz4nqpWbTA","children":[{"url":"co/Bloc_de_competences_6_1.html","label":"Exploitation de la solution (infrastructure systèmes et réseaux)","source":"section","className":"outSec ","id":"muymxZKa0BheI5qzgfNtm"},{"url":"co/Bloc_de_competences_6_2.html","label":"Supervision de la solution","source":"section","className":"outSec ","id":"KZ7EIi4UJafQku5BiUbvEd"},{"url":"co/Bloc_de_competences_6_3.html","label":"Audit de sécurité","source":"section","className":"outSec ","id":"vGs6HVd61scFl8MnNNvtri"},{"url":"co/Bloc_de_competences_6_4.html","label":"Gestion de la sécurité","source":"section","className":"outSec ","id":"gnoigtHB4seIaXHjAXTLUd"}]},{"url":"co/Conclusion.html","label":"Résumé","source":"section","className":"outSec ","id":"UzWWshYcwOf3eFv34axbxf"}]}} |
@ -1,2 +1,2 @@ |
|||
<?xml version="1.0" encoding="UTF-8" ?> |
|||
<trace><start t="23/02/20 18:26:13"/><end t="23/02/20 18:26:13"/></trace> |
|||
<trace><start t="23/02/20 18:52:51"/><end t="23/02/20 18:52:52"/></trace> |
Binary file not shown.
Loading…
Reference in new issue