Skip to main content

Insights

Notes, lessons, decisions.

Publications on legacy system modernization, digital trust and the responsible industrialization of AI.

  1. 8 min

    Generative AI in the enterprise: what the 2026 threat landscape changes for technical teams

    Generative AI is not only changing the threat landscape. It is also changing how teams need to think about architecture, connectors, permissions and usage governance. What technical teams actually need to frame in 2026.

    Read article
  2. 6 min

    Data breaches: why MFA is now the sine qua non of trust.

    Breaches keep coming, credentials keep circulating. In 2026, the right question is no longer how to protect your password: it is how to design authentication so that a stolen password has no operational consequence.

    Read article
  3. 10 min

    Open source and self-hosted AI models: real capabilities, real constraints

    Llama, Mistral, Qwen, Gemma: open source models have considerably reduced the gap with frontier models. But 'free' does not mean no cost, and 'open source' does not mean no constraints. What you really need to know before choosing.

    Read article
  4. 6 min

    eIDAS 2 and the European e-wallet: what it concretely changes for your user journeys

    The eIDAS 2 regulation and the European Digital Identity Wallet (EUDIW) will reshape identification and signing journeys. What CIOs need to anticipate right now.

    Read article
  5. 7 min

    New AI models in late 2025: what really changes for your production systems

    Claude Opus 4.5, GPT-5, Gemini Ultra 2... Late 2025 was marked by an acceleration in frontier model releases. Beyond the benchmarks, what really changes for teams operating AI in real conditions.

    Read article
  6. 8 min

    Electronic signature: a practical guide to choosing the right eIDAS level

    SES, AES, QES: three levels of electronic signature with very different evidential values and implementation constraints. A guide for choosing without over-engineering or under-dimensioning.

    Read article
  7. 11 min

    Technical due diligence: assessing the real technology risk behind an investment

    An investor doesn't buy a demo. They buy a system that must hold under load, under regulatory pressure, and over time. What a technical due diligence audit must actually reveal, and why the approach matters as much as the deliverables.

    Read article
  8. 7 min

    Trust Condition Maintenance: why it changes everything about application maintenance

    Classic application maintenance answers the question 'does it work?'. Trust Condition Maintenance answers a different question: 'can it be exploited, betrayed or silently fail?'. These are not the same thing.

    Read article
  9. 7 min

    AI Act: what technical teams need to anticipate right now

    The European AI regulation has entered into application. For teams developing or deploying AI systems, the concrete obligations around documentation, traceability and human oversight are closer than you think.

    Read article
  10. 6 min

    Open Banking 3 years after PSD2: where do real-world uses stand?

    Account aggregation, payment initiation, SCA: what worked, what is still stuck, and the outlook with PSD3 and the instant payments regulation.

    Read article
  11. 7 min

    LLMOps: what it really means to put an AI model in production

    Deploying an LLM is not like deploying a classic API. Governance, supervision, drift, rollback, cost: the reality of operating a language model in a critical information system.

    Read article
  12. 6 min

    AML/KYC: What the New Directives Change for Your Onboarding

    6AMLD, AMLA, PVID level 2 : the AML/KYC framework is tightening. What it means technically for identity verification in onboarding flows.

    Read article
  13. 6 min

    Modular monolith vs microservices: why we so often choose the wrong one

    Migration to microservices has become a reflex. It is often a mistake. The criteria that make a modular monolith the best answer, and the signals that indicate otherwise.

    Read article
  14. 5 min

    FIDO2 and Passkeys: What Production Deployment Actually Looks Like

    Passkeys eliminate passwords, in theory. In practice, deploying FIDO2 in a production environment raises real questions about fallback, account recovery, and device management.

    Read article
  15. 5 min

    Technical Debt: Measure It Before You Fix It

    Before modernizing, you need to understand what you're modernizing. A practical guide to quantifying technical debt and defining a data-driven remediation roadmap.

    Read article
  16. 2 min

    REELIANT awarded EcoVadis Platinum Medal

    REELIANT joins the top 1% of companies assessed by EcoVadis across all CSR criteria: environment, social, ethics, and sustainable procurement.

    Read article