{"type":"rich","version":"1.0","title":"L\u2019approche RAG pour la cyber-s\u00e9curit\u00e9","author_name":"David Pilato","author_url":"https:\/\/noti.st\/dadoonet","provider_name":"Notist","provider_url":"https:\/\/noti.st","cache_age":604800,"thumbnail_url":"https:\/\/on.notist.cloud\/slides\/deck13958\/large-0.jpg","thumbnail_width":1600,"thumbnail_height":900,"html":"<p data-notist=\"dadoonet\/VU9xiG\">View <a href=\"https:\/\/noti.st\/dadoonet\/VU9xiG\">L\u2019approche RAG pour la cyber-s\u00e9curit\u00e9<\/a> on Notist.<\/p><script async src=\"https:\/\/on.notist.cloud\/embed\/002.js\"><\/script>","width":960,"height":540}