Loading...
 
Skip to main content

View Articles

List Articles

Dépannage de Tiki Wiki, exigences et paramètres du serveur

Bernard Sfez - 2026-05-06 21:20

Dans ce tutoriel Tiki Express, nous verrons ensemble où trouver les exigences de Tiki et comment afficher les paramètres PHP, MySQL et du serveur depuis Tiki23.

Il s’agit du premier épisode d’une mini-série destinée à aider les administrateurs lorsque leur Tiki ne fonctionne pas comme prévu.

Dans ce tutoriel TikiWiki, nous nous concentrerons sur les exigences et la vérification du serveur Tiki.

La souveraineté numérique en 2026 entre la théorie et le quotidien ?

Bernard Sfez - 2026-04-29 08:49

Entre notre premier article en février et aujourd'hui, il s'est passé plus de choses en matière de souveraineté numérique que durant les cinq années précédentes. La France annonce la migration de 2,5 millions de postes vers Linux, l'Europe cible les algorithmes de recommandation, 80 000 agents de l'Assurance maladie basculent vers des outils souverains. Mais dans le même temps, les fuites de données explosent : 19 millions de Français exposés par le piratage de l'ANTS, la France devenue deuxième pays le plus touché au monde, trois comptes compromis chaque seconde. Les gouvernements bougent, tant mieux. Mais que font ceux qui n'ont ni DSI ni budget ministériel ?

Ce quatrième volet vous propose un tour d'horizon de ce qui a changé en quatre mois, un état des lieux des menaces qui s'accumulent, et surtout une checklist d'actions concrètes, classées par temps et par effort, que chacun peut entreprendre pour commencer à protéger ses données et celles de ses clients. Des mesures simples, accessibles, avec vos moyens et à votre échelle.

Breaking free from digital dependency: from audit to infrastructure

Bernard Sfez - 2026-03-23 15:50

What do you actually depend on? Which devices, servers and cloud services are outside your control, and under which jurisdiction do they operate? Do you know what your staff use beyond the officially approved tools? This third article in our series on digital sovereignty provides a practical method to audit your dependencies, assess your exposure and identify the first building blocks to reclaim.

Independent alternatives exist, they are mature and the first steps are within reach without disrupting your operations. From network hardware to servers, from hosting to cybersecurity, we detail how to lay a solid infrastructure foundation, step by step, without paralysing your activity. After storming the Bastille, you need to lay the foundations of your citadel.

Digital Sovereignty: How European Governments Undermine What They Claim to Build.

Bernard Sfez - 2026-02-20 08:15

Europe has the laws, the labels, and the rhetoric for digital sovereignty. What it lacks is consistency. Between legislation passed and contracts signed, a stubborn gap undermines the credibility of the whole project. From government procurement to school IT, tangible progress coexists with concessions that are hard to defend. Most troubling: it is in classrooms, year after year, that an addiction to closed ecosystems is being quietly built on the taxpayer's dime.

We examine what works, what doesn't, and why coherence remains the weakest link in an otherwise ambitious strategy. Sovereign alternatives exist and are proven. The only missing ingredient is the political will to scale them, from the classroom to the data-center.

Digital Dominance: Understanding How we all depend on U.S. Tech

Bernard Sfez - 2026-02-09 19:17

In May 2025, the International Criminal Court lost access to its email system. Not because of a cyberattack or technical failure, but because Microsoft suspended the email account of ICC Chief Prosecutor Karim Khan after the U.S. President imposed sanctions on him. With a single executive order from Washington, an American corporation reached into a European institution based in The Hague and flipped the switch. This isn't a hypothetical scenario. This digital dependency touches everyone – even Europe's most sensitive institutions, designed to protect citizens and uphold justice, operate on American infrastructure that can be shut down instantly.

Review the events of your daily life and you'll feel dizzy. You turn on your computer, check your smartwatch, ask Siri or Alexa to play music, start your car, make a phone call, send an email, calculate a route... Each time, you go through a service, a server, a technology made in the USA. From hardware (Intel, AMD, NVIDIA) to systems (Windows, iOS, Android) to applications (Microsoft 365, Google Workspace, Zoom), the dependency is systemic. And your habits, your life, your information, your photos... everything that goes online is no longer yours or your company's... How did we get here?

Don't waste budget on junk traffic. Block hostile regions and reclaim your server resources for the users who actually matter.

Bernard Sfez - 2026-01-27 21:19

Why finance technological resources and pay technicians to manage resource consumption by bots or users who will never use your services because they are on the other side of the world? For any organization or business, leaving your servers open to the four winds is often an economic and security oversight that unnecessarily overloads your infrastructure. GeoIP Fencing, while not a requirement, becomes an attractive solution to transform your firewall into an intelligent digital "customs" gate. By filtering your incoming traffic by country, you eliminate a massive portion of network pollution and intrusion attempts from hostile nations, ensuring that every Euro invested is dedicated to an optimal, fluid, and secure experience for those who make up your legitimate audience.

  • «
  • 1 (current)
  • 2