Quality at Speed for our Mobile Application
La Redoute mobile application increasing in adoption Currently, for us, IOS and Android applications have a better “conversion rate” than our website. The business volume also increases faster than the…
Managing Transitions in 10 Actionable Steps
#1 Defining transitions to be able to drive them Managing a transition requires to secure three successive and progressive phases that compose it. The first phase of “Let go” consists…
Create your Business Dashboard in 3 steps
Business overview As seen on a previous article, the business process is one of 3 levels of dashboards we have. In this type of dashboard, we represent the flow between…
Omnichannel customer journey at La Redoute with Trig’R Module
One platform to provide personal experience them all The module is a specific component of the Adobe Campaign, ex-Neolane solution, implemented by the La Redoute Marketing IT and Data teams,…
KSQL: 3 Key Use-Cases to Capture Value
Examples that will be covered on this article 1. Real-time monitoring meets real-time analytics 2. Security and anomaly detection 3. Online data integration Hope you enjoy it! Requirements To demonstrate…
How the 4 Golden Signals support your Business Observability
The Four Golden Signals The four golden signals of SRE and monitoring were introduced in the Google SRE book. Latency With the latency signal, we want to measure the time,…
5 Practices for Developing Remote and Distributed Teams
Organisational performance is supported by human interactions Software engineering ultimate measure of performance is driven by the business value delivered. The latest mainly resides in the capacity of an organisation…
Why, How and When to use KSQL
The problem Can anyone process data that comes into Apache Kafka ® ? Kafka handles data in real-time, and even provides a set of libraries to analyze and transform data…
How to Tackle System Hardening using Security Benchmarks
What is Hardening? According to the National Institute of Standards and Technology (NIST), Hardening is defined as “a process intended to eliminate a means of attack by patching vulnerabilities and…
Kafka 101: All the Basics You Need to Know
The evergrowing data and the need for real-time processing About a decade ago the term “real-time data processing” started to come about when companies started to realize the large amount…