Homepage
Open in app
Sign in
Get started
Sport for All, enabled by Technology
From securing teammates smartphones to building new ways to empower athletes with connected sport products, we engineer software, data, security and robotics solutions to empower our 100 000+ teammates and 400 millions users worldwide
AI & DATA
Open Source
Sustainability
Sport tech
Cybersecurity
JOIN US
Follow
Popular stories
BFF: A design pattern helping teams gain ownership
BFF: A design pattern helping teams gain ownership
Part 1: A Leverage for Smoothing Organizations’ Dependencies
Raphaël Tahar
Oct 18, 2023
Incident management at major sporting goods e-commerce
Incident management at major sporting goods e-commerce
In the fast-paced realm of incident management, the absence of a structured process can invite chaos. Here’s how Decathlon managed it.
Valentin Martin
Apr 24
BFF: What technical benefits?
BFF: What technical benefits?
Part 2: A Leverage for Better Performances, Security & Productivity
Raphaël Tahar
Oct 18, 2023
Latest stories
Using a RNN recommendation engine on a daily basis: feedback, tweaks & lessons learned
Using a RNN recommendation engine on a daily basis: feedback, tweaks & lessons learned
In a previous post, Building a RNN Recommendation Engine with TensorFlow, details were given on a recommender system used at Decathlon…
Nicolas Seichepine
Feb 9
Seamless data exchange with Kafka Connect and Strimzi on Kubernetes at Decathlon
Seamless data exchange with Kafka Connect and Strimzi on Kubernetes at Decathlon
Decathlon Supply Chain and data streaming
Thomas Dangleterre
Jan 30
Predicting the daily number of e-commerce orders for logistic success
Predicting the daily number of e-commerce orders for logistic success
What if it were possible to accurately forecast e-commerce order volumes to optimize warehouse staff planning? Good news, it’s possible…
Yassine ZINESSABAH
Jan 24
Take control of your Fitness machines
Take control of your Fitness machines
In this article we will show you an introduction to the connection to fitness machines to develop a digital experience, you will have the…
Charles Anssens
Jan 16
A story of code at Decathlon
A story of code at Decathlon
Part 1 : From chaos to clarity
Merlin Julien
Jan 9
Beyond the basics: techniques every pentester should know to exploit AWS Infrastructure — Part 2/X
Beyond the basics: techniques every pentester should know to exploit AWS Infrastructure — Part 2/X
The first part can be found here.
David Peltier
Dec 6, 2023
Beyond the basics: techniques every pentester should know to exploit AWS Infrastructure — Part 1/X
Beyond the basics: techniques every pentester should know to exploit AWS Infrastructure — Part 1/X
Introduction
David Peltier
Nov 27, 2023
BFF: Alternatives & decision tree
BFF: Alternatives & decision tree
Part 4: Picking the right solution for your team
Raphaël Tahar
Oct 18, 2023
BFF: How to scale and avoid pitfalls?
BFF: How to scale and avoid pitfalls?
Part 3: A Design Pattern with Challenges and Best Practices
Raphaël Tahar
Oct 18, 2023
Why combine asynchronous and distributed calculations to tackle the biggest data quality challenges?
Why combine asynchronous and distributed calculations to tackle the biggest data quality challenges?
In this article, co-written by Ayoub FAKIR, we’ll explain how ZIO and Spark can solve some difficult situations in data pipelines.
Martin Delobel
Oct 10, 2023
Product Manager on a backend application
Product Manager on a backend application
As microservices architecture is becoming a popular way to develop systems, the structure of these systems has evolved into a collection of…
Clemence Laudren
Oct 3, 2023
Making your data labeling workflow 7x faster by model-assisted and human labeling
Making your data labeling workflow 7x faster by model-assisted and human labeling
Learn how at Décathlon Canada we use machine learning models along with human expertise to streamline and significantly speed up our data…
Hasib Zunair
Sep 21, 2023
Align to Accelerate: an approach to change culture and practices through Digital transformation
Align to Accelerate: an approach to change culture and practices through Digital transformation
Initiate — Invest — Improve
Matthieu PEPIN
Jul 4, 2023
JOSE, Cryptography In Action
JOSE, Cryptography In Action
This blog post intends to complete my previous articles by providing more insights and clues to understand Cryptography topics in…
alexandre faria
May 17, 2023
Easy measures to observe our software quality efficiency
Easy measures to observe our software quality efficiency
Without measurement, there is no experimentation and consequently no hypothesis can be confirmed or invalidated. Measurement, when it is…
Julien BARLET
Mar 6, 2023
How to optimize database configuration for batching
How to optimize database configuration for batching
Written by Steve Burghgraeve and Ibrahim Hammani
Decathlon Technology
Jan 16, 2023
How to optimize database configuration for batching
How to optimize database configuration for batching
Having hibernate super fast in batch processing by doing the right configuration
Ibrahim HAMMANI
Jan 12, 2023
How do you build “digital culture and rituals” in a traditional company?
How do you build “digital culture and rituals” in a traditional company?
We hear more and more about the tech culture of digital native companies. The concept is not new, but it is not obvious to traditional…
Adina Edme
Dec 9, 2022
Security incident on Public Cloud, are you ready?
Security incident on Public Cloud, are you ready?
More and more companies are using the Public Cloud. But are you ready to face Cloud security incidents?
Adeline VILLETTE
Nov 30, 2022
#CYBERSECURITY IS LIKE A SPORT — Sport and fun to raise awareness at Decathlon Technology
#CYBERSECURITY IS LIKE A SPORT — Sport and fun to raise awareness at Decathlon Technology
The European #CyberSecMonth 2022 is here and Decathlon Technology is back with a fresh internal awareness campaign!
Adina Edme
Nov 21, 2022
Getting a Overview of the Secrets Stored as Plaintext in Your Github Private Organization
Getting a Overview of the Secrets Stored as Plaintext in Your Github Private Organization
Summary
Jérôme Dupuis
Oct 27, 2022
Security Operations Automation — Making it real
Security Operations Automation — Making it real
Performing Security Operations automation is somewhat fascinating. Whether you want to automate use-cases end-to-end or supercharge your…
Fabien Bloume
Oct 20, 2022
API Security, Diving into Authentication and Json Web Token
API Security, Diving into Authentication and Json Web Token
Authentication and JWT best practices
alexandre faria
Oct 17, 2022
How to manage the lifecycle of CSPM policies ?
How to manage the lifecycle of CSPM policies ?
As a mature cloud organization, you have already implemented a Cloud Security Posture Management (CSPM) with a set of security policies…
David Peltier
Oct 12, 2022
About Decathlon Digital
Latest Stories
Archive
About Medium
Terms
Privacy
Teams