{"id":4744,"date":"2024-04-18T18:46:27","date_gmt":"2024-04-19T01:46:27","guid":{"rendered":"https:\/\/blog.sociamonials.com\/glossary\/instant-messaging\/"},"modified":"2024-04-18T18:46:27","modified_gmt":"2024-04-19T01:46:27","slug":"instant-messaging","status":"publish","type":"glossary","link":"https:\/\/blog.sociamonials.com\/fr\/glossary\/messagerie-instantanee\/","title":{"rendered":"Messagerie instantan\u00e9e"},"content":{"rendered":"<p>Instant Messaging (IM) represents a mode of digital communication that facilitates the instantaneous exchange of textual messages across <a class=\"glossaryLink\"  href=\"https:\/\/blog.sociamonials.com\/fr\/glossary\/internet\/\"  target=\"_blank\"  data-mobile-support=\"0\"  data-gt-translate-attributes='[{\"attribute\":\"data-cmtooltip\", \"format\":\"html\"}]' tabindex='0' role='link'>internet<\/a><span id=\"cmttFootnoteLink2-0\" class=\"cmtt-footnote\"><sup><a class=\"et_smooth_scroll_disabled cmtt_footnote_link cmtt-footnote-deflink\" href=\"#cmttFootnoteLink2\" style=\"font-size: 14px; color: #325afb; font-style : none ;\">[2]<\/a><\/sup><\/span> or computer networks. Unlike its <a class=\"glossaryLink\"  href=\"https:\/\/blog.sociamonials.com\/fr\/glossary\/courriel\/\"  target=\"_blank\"  data-mobile-support=\"0\"  data-gt-translate-attributes='[{\"attribute\":\"data-cmtooltip\", \"format\":\"html\"}]' tabindex='0' role='link'>email<\/a><span id=\"cmttFootnoteLink3-0\" class=\"cmtt-footnote\"><sup><a class=\"et_smooth_scroll_disabled cmtt_footnote_link cmtt-footnote-deflink\" href=\"#cmttFootnoteLink3\" style=\"font-size: 14px; color: #325afb; font-style : none ;\">[3]<\/a><\/sup><\/span> counterpart, IM encourages prompt, engaging dialogues, often enriched with emojis, file sharing capabilities, voice-over IP, and video conferencing. IM systems can operate autonomously or as a component of a broader social media framework. They have undergone substantial evolution since the inception of early platforms like Talkomatic and CompuServe CB Simulator, maturing into graphical user interfaces with an array of functionalities. Contemporary popular services such as Signal, Telegram, WhatsApp, and Snapchat provide private and group messaging, advanced security protocols like <a class=\"glossaryLink\" href=\"https:\/\/blog.sociamonials.com\/fr\/glossary\/chiffrement-de-bout-en-bout\/\" target=\"_blank\" data-mobile-support=\"0\" data-gt-translate-attributes='[{\"attribute\":\"data-cmtooltip\", \"format\":\"html\"}]' tabindex=\"0\" role=\"link\">end-to-end encryption<\/a><span id=\"cmttFootnoteLink1-0\" class=\"cmtt-footnote\"><sup><a class=\"et_smooth_scroll_disabled cmtt_footnote_link cmtt-footnote-deflink\" href=\"#cmttFootnoteLink1\" style=\"font-size: 14px; color: #325afb; font-style : none ;\">[1]<\/a><\/sup><\/span>, and social network integration. They serve a crucial function in personal and business communication arenas, enabling efficient real-time dialogue with conversation archives for subsequent reference.<\/p>\n<div class=\"cmtt-footnotes-block\"><div class=\"cmtt-footnote-header\">Terms definitions<\/div><div class=\"cmtt-footnote-header-border\"><\/div><div class=\"cmtt-footnote-def \" id=\"cmttFootnoteLink1\"><span class=\"cmtt-footnote-def-number\">1. <\/span><span class=\"cmtt-footnote-def-back\"><a class=\"cmtt_footnote_link cmtt-footnote-backlink\" href=\"#cmttFootnoteLink1-0\" style=\"font-size: 14px; color: #325afb; font-style : none ;\"> &#8593; <\/a><\/span><span class=\"cmtt-footnote-def-key\"> <a aria-describedby=\"tt\" href=\"https:\/\/blog.sociamonials.com\/fr\/glossary\/chiffrement-de-bout-en-bout\/\" class=\"glossaryLink\" target=\"_blank\">End-to-end encryption<\/a> ( end-to-end encryption ) <\/span><span class=\"cmtt-footnote-def-content\"> End-to-end encryption (E2EE) is a crucial security feature in today's digital era. It's a secure communication method that safeguards data from third-party access as it moves from one system to another. Essentially, E2EE operates by transforming the sender's message into a coded format, which can only be deciphered by the designated recipient. This ensures the data stays private while traversing networks. However, E2EE does encounter hurdles such as susceptibility to man-in-the-middle attacks, endpoint authentication demands, and regulatory compliance issues. Additionally, backdoors, capable of circumventing encryption, present substantial security risks. Despite these challenges, E2EE is extensively used in diverse communication platforms and file-sharing services to bolster data security. Regardless of these obstacles, the importance of E2EE in preserving privacy in our increasingly digital world cannot be overstated. <\/span><\/div><div class=\"cmtt-footnote-def \" id=\"cmttFootnoteLink2\"><span class=\"cmtt-footnote-def-number\">2. <\/span><span class=\"cmtt-footnote-def-back\"><a class=\"cmtt_footnote_link cmtt-footnote-backlink\" href=\"#cmttFootnoteLink2-0\" style=\"font-size: 14px; color: #325afb; font-style : none ;\"> &#8593; <\/a><\/span><span class=\"cmtt-footnote-def-key\"> <a aria-describedby=\"tt\" href=\"https:\/\/blog.sociamonials.com\/fr\/glossary\/internet\/\" class=\"glossaryLink\" target=\"_blank\">internet<\/a>. <\/span><span class=\"cmtt-footnote-def-content\"> The Internet, a global network of interconnected computer systems, utilizes standardized communication protocols, predominantly TCP\/IP, to connect devices across the globe. The term 'Internet' has its roots in the 1849 term 'internetted' and was later adopted by the US War Department in 1945. The inception of the Internet can be traced back to the 1960s when computer scientists developed time-sharing systems, which eventually led to the creation of ARPANET in 1969. The Internet operates autonomously, without any central control, and the Internet Corporation for Assigned Names and Numbers (ICANN) manages its primary name spaces. It has revolutionized traditional communication methods and has seen an exponential growth, with the number of internet users growing by 20% to 50% every year. In 2019, more than half of the global population was using the Internet. The Internet protocol suite, comprising TCP\/IP and four conceptual layers, directs internet packets to their intended destinations. Fundamental services such as email and Internet telephony function on the Internet. The World Wide Web, an extensive network of interconnected documents, serves as a crucial element of the Internet. <\/span><\/div><button class=\"cmtt-footnote-showmore-btn\">Show more<\/button><div class=\"cmtt-footnote-def hidden\" id=\"cmttFootnoteLink3\"><span class=\"cmtt-footnote-def-number\">3. <\/span><span class=\"cmtt-footnote-def-back\"><a class=\"cmtt_footnote_link cmtt-footnote-backlink\" href=\"#cmttFootnoteLink3-0\" style=\"font-size: 14px; color: #325afb; font-style : none ;\"> &#8593; <\/a><\/span><span class=\"cmtt-footnote-def-key\"> <a aria-describedby=\"tt\" href=\"https:\/\/blog.sociamonials.com\/fr\/glossary\/courriel\/\" class=\"glossaryLink\" target=\"_blank\">email<\/a>. <\/span><span class=\"cmtt-footnote-def-content\"> Email, a vital communication tool since its introduction in 1975, has become an integral part of our daily lives. This system functions over computer networks and the internet, enabling global message transmission and reception. While 'email' is the commonly accepted term in style guides, variations such as 'E-mail' are occasionally used, especially in American and British English contexts. The process of this system includes a sender composing a message via a Mail User Agent (MUA), which then sends it to the recipient's mail exchange server. The recipient's MUA subsequently retrieves the message. Thanks to the Multipurpose Internet Mail Extension (MIME), emails can now include multimedia content. For safety, email systems employ a store-and-forward model, whereby email servers receive, forward, store, and deliver messages. This method facilitates email exchanges without requiring users to be online simultaneously. <\/span><\/div><\/div><div class=\"cmtt-footnote-bottom-border\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Instant Messaging (IM) represents a mode of digital communication that facilitates the instantaneous exchange of textual messages across internet or computer networks. Unlike its email counterpart, IM encourages prompt, engaging dialogues, often enriched with emojis, file sharing capabilities, voice-over IP, and video conferencing. IM systems can operate autonomously or as a component of a broader [&hellip;]<\/p>\n<div class=\"cmtt-footnotes-block\">\n<div class=\"cmtt-footnote-header\">Terms definitions<\/div>\n<div class=\"cmtt-footnote-header-border\"><\/div>\n<div class=\"cmtt-footnote-def \" id=\"cmttFootnoteLink1\"><span class=\"cmtt-footnote-def-number\">1. <\/span><span class=\"cmtt-footnote-def-back\"><a class=\"cmtt_footnote_link cmtt-footnote-backlink\" href=\"#cmttFootnoteLink1-0\" style=\"font-size: 14px; color: #325afb; font-style : none ;\"> &uarr; <\/a><\/span><span class=\"cmtt-footnote-def-key\"> <a aria-describedby=\"tt\" href=\"https:\/\/blog.sociamonials.com\/fr\/glossary\/chiffrement-de-bout-en-bout\/\" class=\"glossaryLink\" target=\"_blank\">End-to-end encryption<\/a> ( end-to-end encryption ) <\/span><span class=\"cmtt-footnote-def-content\"> End-to-end encryption (E2EE) is a crucial security feature in today&rsquo;s digital era. It&rsquo;s a secure communication method that safeguards data from third-party access as it moves from one system to another. Essentially, E2EE operates by transforming the sender&rsquo;s message into a coded format, which can only be deciphered by the designated recipient. This ensures the data stays private while traversing networks. However, E2EE does encounter hurdles such as susceptibility to man-in-the-middle attacks, endpoint authentication demands, and regulatory compliance issues. Additionally, backdoors, capable of circumventing encryption, present substantial security risks. Despite these challenges, E2EE is extensively used in diverse communication platforms and file-sharing services to bolster <a class=\"glossaryLink\" href=\"https:\/\/blog.sociamonials.com\/fr\/glossary\/la-securite-des-donnees\/\" target=\"_blank\" data-mobile-support=\"0\" data-gt-translate-attributes='[{\"attribute\":\"data-cmtooltip\", \"format\":\"html\"}]' tabindex=\"0\" role=\"link\">data security<\/a><span id=\"cmttFootnoteLink5-0\" class=\"cmtt-footnote\"><sup><a class=\"et_smooth_scroll_disabled cmtt_footnote_link cmtt-footnote-deflink\" href=\"#cmttFootnoteLink5\" style=\"font-size: 14px; color: #325afb; font-style : none ;\">[5]<\/a><\/sup><\/span>. Regardless of these obstacles, the importance of E2EE in preserving privacy in our increasingly digital world cannot be overstated. <\/span><\/div>\n<div class=\"cmtt-footnote-def \" id=\"cmttFootnoteLink2\"><span class=\"cmtt-footnote-def-number\">2. <\/span><span class=\"cmtt-footnote-def-back\"><a class=\"cmtt_footnote_link cmtt-footnote-backlink\" href=\"#cmttFootnoteLink2-0\" style=\"font-size: 14px; color: #325afb; font-style : none ;\"> &uarr; <\/a><\/span><span class=\"cmtt-footnote-def-key\"> <a aria-describedby=\"tt\" href=\"https:\/\/blog.sociamonials.com\/fr\/glossary\/internet\/\" class=\"glossaryLink\" target=\"_blank\">internet<\/a>. <\/span><span class=\"cmtt-footnote-def-content\"> The Internet, a global network of interconnected computer systems, utilizes standardized communication protocols, predominantly TCP\/IP, to connect devices across the globe. The term &lsquo;Internet&rsquo; has its roots in the 1849 term &lsquo;internetted&rsquo; and was later adopted by the US War Department in 1945. The inception of the Internet can be traced back to the 1960s when computer scientists developed time-sharing systems, which eventually led to the creation of ARPANET in 1969. The Internet operates autonomously, without any central control, and the Internet Corporation for Assigned Names and Numbers (ICANN) manages its primary name spaces. It has revolutionized traditional communication methods and has seen an exponential growth, with the number of internet users growing by 20% to 50% every year. In 2019, more than half of the global population was using the Internet. The <a class=\"glossaryLink\" href=\"https:\/\/blog.sociamonials.com\/fr\/glossary\/protocole-internet\/\" target=\"_blank\" data-mobile-support=\"0\" data-gt-translate-attributes='[{\"attribute\":\"data-cmtooltip\", \"format\":\"html\"}]' tabindex=\"0\" role=\"link\">Internet protocol<\/a><span id=\"cmttFootnoteLink4-0\" class=\"cmtt-footnote\"><sup><a class=\"et_smooth_scroll_disabled cmtt_footnote_link cmtt-footnote-deflink\" href=\"#cmttFootnoteLink4\" style=\"font-size: 14px; color: #325afb; font-style : none ;\">[4]<\/a><\/sup><\/span> suite, comprising TCP\/IP and four conceptual layers, directs internet packets to their intended destinations. Fundamental services such as email and Internet telephony function on the Internet. The World Wide Web, an extensive network of interconnected documents, serves as a crucial element of the Internet. <\/span><\/div>\n<p><button class=\"cmtt-footnote-showmore-btn\">Show more<\/button><\/p>\n<div class=\"cmtt-footnote-def hidden\" id=\"cmttFootnoteLink3\"><span class=\"cmtt-footnote-def-number\">3. <\/span><span class=\"cmtt-footnote-def-back\"><a class=\"cmtt_footnote_link cmtt-footnote-backlink\" href=\"#cmttFootnoteLink3-0\" style=\"font-size: 14px; color: #325afb; font-style : none ;\"> &uarr; <\/a><\/span><span class=\"cmtt-footnote-def-key\"> <a aria-describedby=\"tt\" href=\"https:\/\/blog.sociamonials.com\/fr\/glossary\/courriel\/\" class=\"glossaryLink\" target=\"_blank\">email<\/a>. <\/span><span class=\"cmtt-footnote-def-content\"> Email, a vital communication tool since its introduction in 1975, has become an integral part of our daily lives. This system functions over computer networks and the internet, enabling global message transmission and reception. While &rsquo;email&rsquo; is the commonly accepted term in style guides, variations such as &lsquo;E-mail&rsquo; are occasionally used, especially in American and British English contexts. The process of this system includes a sender composing a message via a Mail User Agent (MUA), which then sends it to the recipient&rsquo;s mail exchange server. The recipient&rsquo;s MUA subsequently retrieves the message. Thanks to the Multipurpose Internet Mail Extension (MIME), emails can now include multimedia content. For safety, email systems employ a store-and-forward model, whereby email servers receive, forward, store, and deliver messages. This method facilitates email exchanges without requiring users to be online simultaneously. <\/span><\/div>\n<\/div>\n<div class=\"cmtt-footnote-bottom-border\"><\/div>\n<div class=\"cmtt-footnotes-block\"><div class=\"cmtt-footnote-header\">Terms definitions<\/div><div class=\"cmtt-footnote-header-border\"><\/div><div class=\"cmtt-footnote-def \" id=\"cmttFootnoteLink1\"><span class=\"cmtt-footnote-def-number\">1. <\/span><span class=\"cmtt-footnote-def-back\"><a class=\"cmtt_footnote_link cmtt-footnote-backlink\" href=\"#cmttFootnoteLink1-0\" style=\"font-size: 14px; color: #325afb; font-style : none ;\"> &#8593; <\/a><\/span><span class=\"cmtt-footnote-def-key\"> <a aria-describedby=\"tt\" href=\"https:\/\/blog.sociamonials.com\/fr\/glossary\/chiffrement-de-bout-en-bout\/\" class=\"glossaryLink\" target=\"_blank\">End-to-end encryption<\/a> ( end-to-end encryption ) <\/span><span class=\"cmtt-footnote-def-content\"> End-to-end encryption (E2EE) is a crucial security feature in today's digital era. It's a secure communication method that safeguards data from third-party access as it moves from one system to another. Essentially, E2EE operates by transforming the sender's message into a coded format, which can only be deciphered by the designated recipient. This ensures the data stays private while traversing networks. However, E2EE does encounter hurdles such as susceptibility to man-in-the-middle attacks, endpoint authentication demands, and regulatory compliance issues. Additionally, backdoors, capable of circumventing encryption, present substantial security risks. Despite these challenges, E2EE is extensively used in diverse communication platforms and file-sharing services to bolster data security. Regardless of these obstacles, the importance of E2EE in preserving privacy in our increasingly digital world cannot be overstated. <\/span><\/div><div class=\"cmtt-footnote-def \" id=\"cmttFootnoteLink2\"><span class=\"cmtt-footnote-def-number\">2. <\/span><span class=\"cmtt-footnote-def-back\"><a class=\"cmtt_footnote_link cmtt-footnote-backlink\" href=\"#cmttFootnoteLink2-0\" style=\"font-size: 14px; color: #325afb; font-style : none ;\"> &#8593; <\/a><\/span><span class=\"cmtt-footnote-def-key\"> <a aria-describedby=\"tt\" href=\"https:\/\/blog.sociamonials.com\/fr\/glossary\/internet\/\" class=\"glossaryLink\" target=\"_blank\">internet<\/a>. <\/span><span class=\"cmtt-footnote-def-content\"> The Internet, a global network of interconnected computer systems, utilizes standardized communication protocols, predominantly TCP\/IP, to connect devices across the globe. The term 'Internet' has its roots in the 1849 term 'internetted' and was later adopted by the US War Department in 1945. The inception of the Internet can be traced back to the 1960s when computer scientists developed time-sharing systems, which eventually led to the creation of ARPANET in 1969. The Internet operates autonomously, without any central control, and the Internet Corporation for Assigned Names and Numbers (ICANN) manages its primary name spaces. It has revolutionized traditional communication methods and has seen an exponential growth, with the number of internet users growing by 20% to 50% every year. In 2019, more than half of the global population was using the Internet. The Internet protocol suite, comprising TCP\/IP and four conceptual layers, directs internet packets to their intended destinations. Fundamental services such as email and Internet telephony function on the Internet. The World Wide Web, an extensive network of interconnected documents, serves as a crucial element of the Internet. <\/span><\/div><button class=\"cmtt-footnote-showmore-btn\">Show more<\/button><div class=\"cmtt-footnote-def hidden\" id=\"cmttFootnoteLink3\"><span class=\"cmtt-footnote-def-number\">3. <\/span><span class=\"cmtt-footnote-def-back\"><a class=\"cmtt_footnote_link cmtt-footnote-backlink\" href=\"#cmttFootnoteLink3-0\" style=\"font-size: 14px; color: #325afb; font-style : none ;\"> &#8593; <\/a><\/span><span class=\"cmtt-footnote-def-key\"> <a aria-describedby=\"tt\" href=\"https:\/\/blog.sociamonials.com\/fr\/glossary\/courriel\/\" class=\"glossaryLink\" target=\"_blank\">email<\/a>. <\/span><span class=\"cmtt-footnote-def-content\"> Email, a vital communication tool since its introduction in 1975, has become an integral part of our daily lives. This system functions over computer networks and the internet, enabling global message transmission and reception. While 'email' is the commonly accepted term in style guides, variations such as 'E-mail' are occasionally used, especially in American and British English contexts. The process of this system includes a sender composing a message via a Mail User Agent (MUA), which then sends it to the recipient's mail exchange server. The recipient's MUA subsequently retrieves the message. Thanks to the Multipurpose Internet Mail Extension (MIME), emails can now include multimedia content. For safety, email systems employ a store-and-forward model, whereby email servers receive, forward, store, and deliver messages. This method facilitates email exchanges without requiring users to be online simultaneously. <\/span><\/div><div class=\"cmtt-footnote-def hidden\" id=\"cmttFootnoteLink4\"><span class=\"cmtt-footnote-def-number\">4. <\/span><span class=\"cmtt-footnote-def-back\"><a class=\"cmtt_footnote_link cmtt-footnote-backlink\" href=\"#cmttFootnoteLink4-0\" style=\"font-size: 14px; color: #325afb; font-style : none ;\"> &#8593; <\/a><\/span><span class=\"cmtt-footnote-def-key\"> <a aria-describedby=\"tt\" href=\"https:\/\/blog.sociamonials.com\/fr\/glossary\/protocole-internet\/\" class=\"glossaryLink\" target=\"_blank\">Internet Protocol<\/a> ( Internet protocol ) <\/span><span class=\"cmtt-footnote-def-content\"> The Internet Protocol (IP) is a vital technology that fuels the internet. This protocol establishes the regulations for transmitting data over a network. It handles the assignment of addresses to host interfaces, the encapsulation of data into 'datagrams', and the routing of these datagrams across different networks. IP employs a unique packet structure and addressing scheme. A key feature of its operation is the sourcing and targeting of IP addresses. Over time, the IP has evolved through several versions, such as IPv4 and IPv6, with the latter offering expansive 128-bit addresses. Despite being deemed unreliable due to network infrastructure, the IP strives to deliver 'best-effort delivery'. It also contributes to the management of link capacity and data transmission, including data packet sizes. As the years pass, the security and evolution of IP have emerged as crucial aspects, with ongoing initiatives to tackle vulnerabilities and suggest improvements. <\/span><\/div><div class=\"cmtt-footnote-def hidden\" id=\"cmttFootnoteLink5\"><span class=\"cmtt-footnote-def-number\">5. <\/span><span class=\"cmtt-footnote-def-back\"><a class=\"cmtt_footnote_link cmtt-footnote-backlink\" href=\"#cmttFootnoteLink5-0\" style=\"font-size: 14px; color: #325afb; font-style : none ;\"> &#8593; <\/a><\/span><span class=\"cmtt-footnote-def-key\"> <a aria-describedby=\"tt\" href=\"https:\/\/blog.sociamonials.com\/fr\/glossary\/la-securite-des-donnees\/\" class=\"glossaryLink\" target=\"_blank\">data security<\/a>. <\/span><span class=\"cmtt-footnote-def-content\"> Data protection is a critical component of IT, encompassing a range of technologies and strategies. It involves the application of disk encryption technologies designed to secure data stored on hard drives, which can be implemented via software or hardware techniques. A variety of security measures are in place, such as software encryption, hardware security tokens, and two-factor authentication, all designed to shield sensitive data from breaches and cyber threats. It's crucial for staff to receive training in security procedures and adhere to organizational policies to ensure robust data protection. The future of data protection will see the integration of AI, biometric authentication, blockchain technology, and a heightened focus on data privacy laws. The importance of data protection extends beyond mere financial loss prevention, it's also about fostering customer trust and regulatory compliance. <\/span><\/div><\/div><div class=\"cmtt-footnote-bottom-border\"><\/div>","protected":false},"author":4,"featured_media":0,"menu_order":0,"template":"","meta":{"footnotes":""},"glossary-categories":[],"glossary-tags":[],"glossary-languages":[],"class_list":["post-4744","glossary","type-glossary","status-publish","hentry"],"post_title":"Instant messaging","post_content":"Instant Messaging (IM) represents a mode of digital communication that facilitates the instantaneous exchange of textual messages across internet or computer networks. Unlike its email counterpart, IM encourages prompt, engaging dialogues, often enriched with emojis, file sharing capabilities, voice-over IP, and video conferencing. IM systems can operate autonomously or as a component of a broader social media framework. They have undergone substantial evolution since the inception of early platforms like Talkomatic and CompuServe CB Simulator, maturing into graphical user interfaces with an array of functionalities. Contemporary popular services such as Signal, Telegram, WhatsApp, and Snapchat provide private and group messaging, advanced security protocols like end-to-end encryption, and social network integration. They serve a crucial function in personal and business communication arenas, enabling efficient real-time dialogue with conversation archives for subsequent reference.","_links":{"self":[{"href":"https:\/\/blog.sociamonials.com\/fr\/wp-json\/wp\/v2\/glossary\/4744","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.sociamonials.com\/fr\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/blog.sociamonials.com\/fr\/wp-json\/wp\/v2\/types\/glossary"}],"author":[{"embeddable":true,"href":"https:\/\/blog.sociamonials.com\/fr\/wp-json\/wp\/v2\/users\/4"}],"version-history":[{"count":0,"href":"https:\/\/blog.sociamonials.com\/fr\/wp-json\/wp\/v2\/glossary\/4744\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.sociamonials.com\/fr\/wp-json\/wp\/v2\/media?parent=4744"}],"wp:term":[{"taxonomy":"glossary-categories","embeddable":true,"href":"https:\/\/blog.sociamonials.com\/fr\/wp-json\/wp\/v2\/glossary-categories?post=4744"},{"taxonomy":"glossary-tags","embeddable":true,"href":"https:\/\/blog.sociamonials.com\/fr\/wp-json\/wp\/v2\/glossary-tags?post=4744"},{"taxonomy":"glossary-languages","embeddable":true,"href":"https:\/\/blog.sociamonials.com\/fr\/wp-json\/wp\/v2\/glossary-languages?post=4744"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}