{"id":63,"date":"2014-10-02T11:37:18","date_gmt":"2014-10-02T10:37:18","guid":{"rendered":"http:\/\/www.2py.fr\/2py\/?page_id=63"},"modified":"2021-06-26T19:58:44","modified_gmt":"2021-06-26T18:58:44","slug":"solutions","status":"publish","type":"page","link":"https:\/\/www.2py.fr\/2py\/?page_id=63","title":{"rendered":"GED"},"content":{"rendered":"<p>L&rsquo;intelligence documentaire<\/p>\n<p>2PY a choisi de combiner ses expertises technologiques et sa connaissance des processus fonctionnels pour proposer des solutions GED \/ BPM simples \u00e0 mettre en oeuvre et simples \u00e0 exploiter. <a href=\"https:\/\/www.2py.fr\/2py\/wp-content\/uploads\/2014\/10\/IMG_2548.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignright wp-image-148 size-full\" src=\"https:\/\/www.2py.fr\/2py\/wp-content\/uploads\/2014\/10\/IMG_2548.jpg\" alt=\"IMG_2548\" width=\"400\" height=\"267\" \/><\/a><\/p>\n<p>Les GED op\u00e9r\u00e9es par 2PY\u00a0 garantissent\u00a0 la s\u00e9curit\u00e9 et la confidentialit\u00e9 des documents ; chaque utilisateur ne voit que les documents qu&rsquo;il est autoris\u00e9 \u00e0 voir et ne peut ex\u00e9cuter dessus que les op\u00e9rations (modification, insertion destruction, validation, transfert etc&#8230;)\u00a0 qui lui sont autoris\u00e9es.<\/p>\n<p>Le p\u00e9rim\u00e8tre de comp\u00e9tences de 2PY, issues de v\u00e9ritables exp\u00e9riences op\u00e9rationnelles, est volontairement limit\u00e9 :<\/p>\n<ul>\n<li>La fonction Finance<\/li>\n<li>La fonction Ressources Humaines<\/li>\n<li>La fonction Moyens G\u00e9n\u00e9raux<\/li>\n<\/ul>\n<p>Dans ces domaines, 2PY propose des solutions compl\u00e8tes de GED, de workflow documentaire et d&rsquo;int\u00e9gration dans les syst\u00e8mes d&rsquo;information. Exploitant une biblioth\u00e8que de briques logicielles propri\u00e9taires, 2PY construit une solution parfaitement adadpt\u00e9e au contexte du client.<br \/>\nLa solution est h\u00e9berg\u00e9 sur les serveurs 2PY ou ceux du client ou d&rsquo;un de ses prestataires.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>L&rsquo;intelligence documentaire 2PY a choisi de combiner ses expertises technologiques et sa connaissance des processus fonctionnels pour proposer des solutions GED \/ BPM simples \u00e0 mettre en oeuvre et simples \u00e0 exploiter. Les GED op\u00e9r\u00e9es par 2PY\u00a0 garantissent\u00a0 la s\u00e9curit\u00e9 et la confidentialit\u00e9 des documents ; chaque utilisateur ne voit que les documents qu&rsquo;il est &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/www.2py.fr\/2py\/?page_id=63\">Lire la suite<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":112,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.2py.fr\/2py\/index.php?rest_route=\/wp\/v2\/pages\/63"}],"collection":[{"href":"https:\/\/www.2py.fr\/2py\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.2py.fr\/2py\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.2py.fr\/2py\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.2py.fr\/2py\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=63"}],"version-history":[{"count":9,"href":"https:\/\/www.2py.fr\/2py\/index.php?rest_route=\/wp\/v2\/pages\/63\/revisions"}],"predecessor-version":[{"id":836,"href":"https:\/\/www.2py.fr\/2py\/index.php?rest_route=\/wp\/v2\/pages\/63\/revisions\/836"}],"up":[{"embeddable":true,"href":"https:\/\/www.2py.fr\/2py\/index.php?rest_route=\/wp\/v2\/pages\/112"}],"wp:attachment":[{"href":"https:\/\/www.2py.fr\/2py\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=63"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}