{"id":8719,"date":"2022-12-26T08:00:05","date_gmt":"2022-12-26T07:00:05","guid":{"rendered":"https:\/\/www.revue-fiduciaire.com\/blog\/?p=8719"},"modified":"2022-12-08T10:39:46","modified_gmt":"2022-12-08T09:39:46","slug":"proteger-une-innovation-logicielle","status":"publish","type":"post","link":"https:\/\/www.revue-fiduciaire.com\/blog\/proteger-une-innovation-logicielle\/","title":{"rendered":"Comment prot\u00e9ger une innovation logicielle et par quels outils ?"},"content":{"rendered":"<h2>Les moyens de protection d&rsquo;une innovation logicielle<img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-8175 size-medium alignright\" src=\"https:\/\/www.revue-fiduciaire.com\/blog\/wp-content\/uploads\/Proteger-une-innovation-logicielle-194x300.png\" alt=\"Prot\u00e9ger une innovation logicielle image\" width=\"194\" height=\"300\" srcset=\"https:\/\/www.revue-fiduciaire.com\/blog\/wp-content\/uploads\/Proteger-une-innovation-logicielle-194x300.png 194w, https:\/\/www.revue-fiduciaire.com\/blog\/wp-content\/uploads\/Proteger-une-innovation-logicielle-663x1024.png 663w, https:\/\/www.revue-fiduciaire.com\/blog\/wp-content\/uploads\/Proteger-une-innovation-logicielle-768x1185.png 768w, https:\/\/www.revue-fiduciaire.com\/blog\/wp-content\/uploads\/Proteger-une-innovation-logicielle-995x1536.png 995w, https:\/\/www.revue-fiduciaire.com\/blog\/wp-content\/uploads\/Proteger-une-innovation-logicielle.png 1174w\" sizes=\"(max-width: 194px) 100vw, 194px\" \/><\/h2>\n<div class=\"ct_texte\">\n<p>&nbsp;<\/p>\n<p>Le droit de la propri\u00e9t\u00e9 intellectuelle est tr\u00e8s riche, il rec\u00e8le de nombreux outils. Ses sources sont internationales et nationales. Pour prot\u00e9ger et valoriser une innovation (notamment un logiciel), il faut passer en revue tous ces outils pour d\u00e9terminer le plus efficace en fonction des objectifs poursuivis pour chaque innovation.<\/p>\n<p>Mais quels outils sont \u00e0 votre disposition pour mettre en place cette protection ?<\/p>\n<p>El\u00e9ments de r\u00e9ponse \u00e0 travers cette infographie.<\/p>\n<p>Pour plus de d\u00e9tails n&rsquo;h\u00e9sitez-pas \u00e0 consulter notre article sur <a href=\"https:\/\/www.revue-fiduciaire.com\/blog\/quest-ce-que-la-propriete-intellectuelle\/\">la propri\u00e9t\u00e9 intellectuelle<\/a>.<\/p>\n<div class=\"ct_texte\">\n<div class=\"ct_texte_paragraphe\">\n<div class=\"ct_texte_paragraphe\">\n<div class=\"ct_texte_paragraphe\">\n<p>&nbsp;<\/p>\n<\/div>\n<div class=\"ct_texte_paragraphe\"><\/div>\n<div class=\"ct_texte_paragraphe\">\n<div class=\"ct_texte_paragraphe\">\n<div class=\"ct_texte_paragraphe\">\n<div class=\"ct_texte_paragraphe\">\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Les moyens de protection d&rsquo;une innovation logicielle &nbsp; Le droit de la propri\u00e9t\u00e9 intellectuelle est tr\u00e8s riche, il rec\u00e8le de nombreux outils. Ses sources sont internationales et nationales. Pour prot\u00e9ger et valoriser une innovation (notamment un logiciel), il faut passer en revue tous ces outils pour d\u00e9terminer le plus efficace en fonction des objectifs poursuivis &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.revue-fiduciaire.com\/blog\/proteger-une-innovation-logicielle\/\"> <span class=\"screen-reader-text\">Comment prot\u00e9ger une innovation logicielle et par quels outils ?<\/span> Lire la suite\u00a0\u00bb<\/a><\/p>\n","protected":false},"author":8,"featured_media":8177,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"site-sidebar-layout":"default","site-content-layout":"default","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":""},"categories":[7,89,5],"tags":[231,133,345,206,346,99],"class_list":["post-8719","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infographies","category-sans-profil","category-vie-des-affaires","tag-droit","tag-infographie","tag-innovation","tag-legaldesign","tag-logiciel","tag-protection"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Comment prot\u00e9ger une innovation logicielle et par quels outils ? - RF Blog<\/title>\n<meta name=\"description\" content=\"Quels outils sont \u00e0 votre disposition pour mettre en place cette protection ? D\u00e9couvrez cela dans notre infographie d\u00e9di\u00e9e.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.revue-fiduciaire.com\/blog\/proteger-une-innovation-logicielle\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Comment prot\u00e9ger une innovation logicielle et par quels outils ? - RF Blog\" \/>\n<meta property=\"og:description\" content=\"Quels outils sont \u00e0 votre disposition pour mettre en place cette protection ? D\u00e9couvrez cela dans notre infographie d\u00e9di\u00e9e.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.revue-fiduciaire.com\/blog\/proteger-une-innovation-logicielle\/\" \/>\n<meta property=\"og:site_name\" content=\"RF Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-26T07:00:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.revue-fiduciaire.com\/blog\/wp-content\/uploads\/proteger-innovation-logicielle.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"359\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"C\u00e9dric GOHMANN\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9dric GOHMANN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.revue-fiduciaire.com\\\/blog\\\/proteger-une-innovation-logicielle\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.revue-fiduciaire.com\\\/blog\\\/proteger-une-innovation-logicielle\\\/\"},\"author\":{\"name\":\"C\u00e9dric GOHMANN\",\"@id\":\"https:\\\/\\\/www.revue-fiduciaire.com\\\/blog\\\/#\\\/schema\\\/person\\\/e13137363303745a900d217b03463193\"},\"headline\":\"Comment prot\u00e9ger une innovation logicielle et par quels outils ?\",\"datePublished\":\"2022-12-26T07:00:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.revue-fiduciaire.com\\\/blog\\\/proteger-une-innovation-logicielle\\\/\"},\"wordCount\":110,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.revue-fiduciaire.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.revue-fiduciaire.com\\\/blog\\\/proteger-une-innovation-logicielle\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.revue-fiduciaire.com\\\/blog\\\/wp-content\\\/uploads\\\/proteger-innovation-logicielle.png\",\"keywords\":[\"droit\",\"infographie\",\"innovation\",\"legaldesign\",\"logiciel\",\"protection\"],\"articleSection\":[\"Infographie\",\"Sans profil\",\"Vie des affaires\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.revue-fiduciaire.com\\\/blog\\\/proteger-une-innovation-logicielle\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.revue-fiduciaire.com\\\/blog\\\/proteger-une-innovation-logicielle\\\/\",\"url\":\"https:\\\/\\\/www.revue-fiduciaire.com\\\/blog\\\/proteger-une-innovation-logicielle\\\/\",\"name\":\"Comment prot\u00e9ger une innovation logicielle et par quels outils ? - RF Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.revue-fiduciaire.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.revue-fiduciaire.com\\\/blog\\\/proteger-une-innovation-logicielle\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.revue-fiduciaire.com\\\/blog\\\/proteger-une-innovation-logicielle\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.revue-fiduciaire.com\\\/blog\\\/wp-content\\\/uploads\\\/proteger-innovation-logicielle.png\",\"datePublished\":\"2022-12-26T07:00:05+00:00\",\"description\":\"Quels outils sont \u00e0 votre disposition pour mettre en place cette protection ? D\u00e9couvrez cela dans notre infographie d\u00e9di\u00e9e.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.revue-fiduciaire.com\\\/blog\\\/proteger-une-innovation-logicielle\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.revue-fiduciaire.com\\\/blog\\\/proteger-une-innovation-logicielle\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.revue-fiduciaire.com\\\/blog\\\/proteger-une-innovation-logicielle\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.revue-fiduciaire.com\\\/blog\\\/wp-content\\\/uploads\\\/proteger-innovation-logicielle.png\",\"contentUrl\":\"https:\\\/\\\/www.revue-fiduciaire.com\\\/blog\\\/wp-content\\\/uploads\\\/proteger-innovation-logicielle.png\",\"width\":1024,\"height\":359,\"caption\":\"prot\u00e9ger innovation logicielle visuel\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.revue-fiduciaire.com\\\/blog\\\/proteger-une-innovation-logicielle\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.revue-fiduciaire.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Comment prot\u00e9ger une innovation logicielle et par quels outils ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.revue-fiduciaire.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.revue-fiduciaire.com\\\/blog\\\/\",\"name\":\"RF Blog\",\"description\":\"Le blog de la Revue Fiduciaire\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.revue-fiduciaire.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.revue-fiduciaire.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.revue-fiduciaire.com\\\/blog\\\/#organization\",\"name\":\"Revue Fiduciaire\",\"url\":\"https:\\\/\\\/www.revue-fiduciaire.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.revue-fiduciaire.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.revue-fiduciaire.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/favicon-196.png\",\"contentUrl\":\"https:\\\/\\\/www.revue-fiduciaire.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/favicon-196.png\",\"width\":196,\"height\":196,\"caption\":\"Revue Fiduciaire\"},\"image\":{\"@id\":\"https:\\\/\\\/www.revue-fiduciaire.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.revue-fiduciaire.com\\\/blog\\\/#\\\/schema\\\/person\\\/e13137363303745a900d217b03463193\",\"name\":\"C\u00e9dric GOHMANN\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Comment prot\u00e9ger une innovation logicielle et par quels outils ? - RF Blog","description":"Quels outils sont \u00e0 votre disposition pour mettre en place cette protection ? D\u00e9couvrez cela dans notre infographie d\u00e9di\u00e9e.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.revue-fiduciaire.com\/blog\/proteger-une-innovation-logicielle\/","og_locale":"fr_FR","og_type":"article","og_title":"Comment prot\u00e9ger une innovation logicielle et par quels outils ? - RF Blog","og_description":"Quels outils sont \u00e0 votre disposition pour mettre en place cette protection ? D\u00e9couvrez cela dans notre infographie d\u00e9di\u00e9e.","og_url":"https:\/\/www.revue-fiduciaire.com\/blog\/proteger-une-innovation-logicielle\/","og_site_name":"RF Blog","article_published_time":"2022-12-26T07:00:05+00:00","og_image":[{"width":1024,"height":359,"url":"https:\/\/www.revue-fiduciaire.com\/blog\/wp-content\/uploads\/proteger-innovation-logicielle.png","type":"image\/png"}],"author":"C\u00e9dric GOHMANN","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"C\u00e9dric GOHMANN","Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.revue-fiduciaire.com\/blog\/proteger-une-innovation-logicielle\/#article","isPartOf":{"@id":"https:\/\/www.revue-fiduciaire.com\/blog\/proteger-une-innovation-logicielle\/"},"author":{"name":"C\u00e9dric GOHMANN","@id":"https:\/\/www.revue-fiduciaire.com\/blog\/#\/schema\/person\/e13137363303745a900d217b03463193"},"headline":"Comment prot\u00e9ger une innovation logicielle et par quels outils ?","datePublished":"2022-12-26T07:00:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.revue-fiduciaire.com\/blog\/proteger-une-innovation-logicielle\/"},"wordCount":110,"commentCount":0,"publisher":{"@id":"https:\/\/www.revue-fiduciaire.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.revue-fiduciaire.com\/blog\/proteger-une-innovation-logicielle\/#primaryimage"},"thumbnailUrl":"https:\/\/www.revue-fiduciaire.com\/blog\/wp-content\/uploads\/proteger-innovation-logicielle.png","keywords":["droit","infographie","innovation","legaldesign","logiciel","protection"],"articleSection":["Infographie","Sans profil","Vie des affaires"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.revue-fiduciaire.com\/blog\/proteger-une-innovation-logicielle\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.revue-fiduciaire.com\/blog\/proteger-une-innovation-logicielle\/","url":"https:\/\/www.revue-fiduciaire.com\/blog\/proteger-une-innovation-logicielle\/","name":"Comment prot\u00e9ger une innovation logicielle et par quels outils ? - RF Blog","isPartOf":{"@id":"https:\/\/www.revue-fiduciaire.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.revue-fiduciaire.com\/blog\/proteger-une-innovation-logicielle\/#primaryimage"},"image":{"@id":"https:\/\/www.revue-fiduciaire.com\/blog\/proteger-une-innovation-logicielle\/#primaryimage"},"thumbnailUrl":"https:\/\/www.revue-fiduciaire.com\/blog\/wp-content\/uploads\/proteger-innovation-logicielle.png","datePublished":"2022-12-26T07:00:05+00:00","description":"Quels outils sont \u00e0 votre disposition pour mettre en place cette protection ? D\u00e9couvrez cela dans notre infographie d\u00e9di\u00e9e.","breadcrumb":{"@id":"https:\/\/www.revue-fiduciaire.com\/blog\/proteger-une-innovation-logicielle\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.revue-fiduciaire.com\/blog\/proteger-une-innovation-logicielle\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.revue-fiduciaire.com\/blog\/proteger-une-innovation-logicielle\/#primaryimage","url":"https:\/\/www.revue-fiduciaire.com\/blog\/wp-content\/uploads\/proteger-innovation-logicielle.png","contentUrl":"https:\/\/www.revue-fiduciaire.com\/blog\/wp-content\/uploads\/proteger-innovation-logicielle.png","width":1024,"height":359,"caption":"prot\u00e9ger innovation logicielle visuel"},{"@type":"BreadcrumbList","@id":"https:\/\/www.revue-fiduciaire.com\/blog\/proteger-une-innovation-logicielle\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.revue-fiduciaire.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Comment prot\u00e9ger une innovation logicielle et par quels outils ?"}]},{"@type":"WebSite","@id":"https:\/\/www.revue-fiduciaire.com\/blog\/#website","url":"https:\/\/www.revue-fiduciaire.com\/blog\/","name":"RF Blog","description":"Le blog de la Revue Fiduciaire","publisher":{"@id":"https:\/\/www.revue-fiduciaire.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.revue-fiduciaire.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.revue-fiduciaire.com\/blog\/#organization","name":"Revue Fiduciaire","url":"https:\/\/www.revue-fiduciaire.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.revue-fiduciaire.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.revue-fiduciaire.com\/blog\/wp-content\/uploads\/2020\/08\/favicon-196.png","contentUrl":"https:\/\/www.revue-fiduciaire.com\/blog\/wp-content\/uploads\/2020\/08\/favicon-196.png","width":196,"height":196,"caption":"Revue Fiduciaire"},"image":{"@id":"https:\/\/www.revue-fiduciaire.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.revue-fiduciaire.com\/blog\/#\/schema\/person\/e13137363303745a900d217b03463193","name":"C\u00e9dric GOHMANN"}]}},"_links":{"self":[{"href":"https:\/\/www.revue-fiduciaire.com\/blog\/wp-json\/wp\/v2\/posts\/8719","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.revue-fiduciaire.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.revue-fiduciaire.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.revue-fiduciaire.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.revue-fiduciaire.com\/blog\/wp-json\/wp\/v2\/comments?post=8719"}],"version-history":[{"count":3,"href":"https:\/\/www.revue-fiduciaire.com\/blog\/wp-json\/wp\/v2\/posts\/8719\/revisions"}],"predecessor-version":[{"id":8723,"href":"https:\/\/www.revue-fiduciaire.com\/blog\/wp-json\/wp\/v2\/posts\/8719\/revisions\/8723"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.revue-fiduciaire.com\/blog\/wp-json\/wp\/v2\/media\/8177"}],"wp:attachment":[{"href":"https:\/\/www.revue-fiduciaire.com\/blog\/wp-json\/wp\/v2\/media?parent=8719"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.revue-fiduciaire.com\/blog\/wp-json\/wp\/v2\/categories?post=8719"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.revue-fiduciaire.com\/blog\/wp-json\/wp\/v2\/tags?post=8719"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}