Recent Posts - Page 6
What are the best practices when you need to use logs? This article may hep you, with the help of Logstash
Aperçu des nouveautés apportées par ElasticSearch 6.0
Exploration of anomaly detection with profiling kernel tools
Can we forget about SQL data storage engines? How to use a standard SQL engine to store efficiently a lot of data?
Java 9 is coming soon with a brand new (and long awaited) modular system. Let’s see its promises and challenges …
OWASP AppSec is a major conference in Europe for developers and security experts. This article offers a detailed feedback on 2017 edition that took place in ...
The 7th MiXiT edition standed on April 20&21th in Lyon (France) inside CPE building. Let’s review some talks!
An introduction to Property Based Testing in Scala, in the practical case of Google Hashcode 2017
Aperçu des nouveautés apportées par ElasticSearch 5.0
Many people consider that they do not need HTTPS if they do not host any confidential data. But TLS does not only grant confidentiality in the data transmiss...