Sharing Our Experience In Managing Technical Debt
How we started to address technical debt on a concrete case The first step was to start identifying the technical debt initial state. The approach we took was to create…
The Top 6 Perspectives for Managing Technical Debt
Some real-world analogies for describing technical debt A debt is usually something we do not enjoy. The de-facto association is with a financial debt, where we trade money now versus…
How We Test Our Event-Driven Microservices
What was our first strategic event-driven microservices project The project scope was at the heart of our back-office: The parcel and transportation management. The existing systems became a limiting business…
How We Reach Our Production-Ready Kubernetes Foundations – Part 1
We had to accelerate our business transformation When we decided to accelerate our Business Transformation with Kubernetes, we questioned ourselves: how will we do this? The first answer was: We…
What is Security Information and Event Management? (SIEM)
What is a SIEM? The term SIEM (Security Information and Event Management) defined by Nicolett and Willliams in 2005 comes from combining two concepts: Security Information Management (SIM) – is…
Evolving Legacy Systems to EDA with Kafka CDC
Kafka Connect allowing Change Data Capture Kafka connect is a core component of Apache Kafka that enables streaming integration both in and out of Kafka. It provides scalable and resilient…
Accelerate our Business with Modern Technology Foundations
Architecture evolved to accelerate software delivery Existing companies usually rely on a mix of architecture patterns they are transforming towards modern technological foundations. The traditional Monolith architecture coming from the…
Hands-on Process Mining: Event Visualisation with ProM
From mixed data sources to Process Mining analysis The data from processes is available in a panoply of IT systems, as typical as relational databases, CSV files, spreadsheets, transactional and…
La Reboucle, Our C2C Digital Offer Leveraging APIs
The platform requirements clarified what we wanted to achieve First things first, the functional requirements for the C2C platform solution were: • Offer a branded La Redoute web store to…
PenTest: Vulnerability Analysis and Exploitation
Identify interesting information There are many types of vulnerabilities ranging from simple disclosure of information to remote code execution, and it could be either harmful or critical for the information…