We are Target tech
Technologists committed to making Target America's easiest, safest, and most joyful place to shop and work
Talking Shop with Brett Craig, Target's New Chief Information Officer
Hear from Brett on how his background and career prepared him for his new role. He also shares his perspective on how technology and data will continue to influence the Target shopping experience under his leadership, and his thoughts on how technology connects to and shapes the future of retail.
Target CISO Rich Agostino on leading customers to security
Rich Agostino recently sat down with his long time thought partner Keith Ferrazzi to discuss how the CISO role can be a source of competitive advantage for companies. Rich shared his thoughts on how cybersecurity not only protects retail consumers from cybercriminals, but also elevates the customer experience.
Target’s SVP of product engineering Nancy King featured in ZDNet
The Target tech team rose to the challenges of the pandemic through a combination of years of tech investments, tight collaboration with business teams, and relentless focus on our guests. Hear from SVP Nancy King on how our culture of support bolstered the team to not only survive but thrive in such challenging times.
Work somewhere you love.
Target’s technology team members are on the cutting-edge of retail innovation, and get to see their work in real time in stores across the country. Join us to see why we are recognized as a great place to work, and to engineer the future of retail.
Search openings and apply- “Friday Five” Featuring Kaylee Edwards, Senior Engineer – Agile and Engineering EnablementBy Tech @ Target, Jan 13, 2023This post is the first of our “Friday Five” series in which our Tech @ Target editor interviews technology team members to learn more about them, the experiences that led them to the Target tech team, what they’re currently working on or learning, and more. And a bonus question to get a little glimpse into their interests and favorite products: What’s in their Target baskets?
- Do You Know What We Did Last Summer?By Molly King, Dec 21, 2022At Target, we encourage all technology and data sciences team members to spend 50 days each year at work educating themselves on skills and ideas that can help their personal development while also allowing ourselves to create even better experiences for our team members and guests. For mobile apps engineers in summer 2022, we blocked off Friday afternoons as dedicated learning time. As the summer drew to a close, we asked a few of our engineers how having this dedicated learning time affected them. Here are three perspectives on the 50 Days of Learning mobile apps summer learning hours effort.
- Synthetics: Continuous Assurance of Detection ComponentsBy Paul Hutelmyer, Dec 13, 2022Security professionals develop and deploy signatures to detect and prevent malicious, suspicious, and anomalous patterns. These signatures, typically obtained through a vendor or created internally, are digital fingerprints that help identify and alert specific activity from occurring. They are then deployed to a security incident management to watch relevant system logs and flag if a pattern match is found.
- Target’s ECCO Platform: Achieving Resiliency and High AvailabilityBy Shesadri Parthasarathy, Dec 1, 2022Target’s purpose of delivering joy is at the center of our decision making. We strive to offer guests a delightful experience at every interaction, and the checkout process is no different. With millions of guests shopping Target in both physical and digital channels, it’s crucial to provide a similar checkout workflow no matter how and where they choose to shop: a uniform, omnichannel experience.
- Target tech x BUiLT: Technical Mentorship, ReimaginedBy Brenda Bjerke and Nii Quarshie, Nov 17, 2022Team members on Target’s technology teams are strongly encouraged to have regular development conversations with their leaders. Also, as part of Target Tech’s "50 Days of Learning," team members are encouraged to expand their horizons and look for learning opportunities outside of their typical jobs. Sometimes these personal development check-ins are to talk generally about workload, learning, career paths, and goals; other times, they can be more specific.
- Chaos Leads to ResilienceBy Deepa Kn, November 10, 2022Target has adopted a distributed, microservices architecture. With this comes with a heightened level of complexity. Changes or simple outages in interdependent services can trigger major outages in production since global testing and debugging is difficult. Consequently, an outage impacting a critical application’s reliability and availability can lead to cascading application downtime, revenue loss, and potentially a negative impact to our brand.
- Target’s Cloud JourneyBy Hari Govind, Oct 21, 2022Target began its cloud journey nearly a decade ago. Since then, Target tech teams have expanded our technology footprint to a hybrid-multi-cloud architecture. As we shared at our recent Infra Cloud Conference (ICCON), I wanted to look back at our journey so far in the hope that it may help other teams embarking on a similar journey to a hybrid cloud.
- Meet Target Tech’s Grace Hopper Conference PresentersBy Tech @ Target, September 15, 2022Target committed to achieving gender parity on our technology team back in 2016, and we have made strides towards these goals every year since. One way our team loves to celebrate women in technology is through the annual Grace Hopper Celebration (GHC).
- Strelka: Real-Time Threat Hunting ScannerBy Paul Hutelmyer, Aug 24, 2022Strelka is a real-time, container-based, file scanning system used for threat hunting, threat detection, and incident response, built by our Target cybersecurity team. A fork of Lockheed Martin's Laika BOSS project, Strelka's purpose is to perform file extraction and metadata collection at an enterprise scale. For example, if a JavaScript file is identified by Strelka, metadata such as hyperlinks, functions, and forms are extracted for analysis, storage, and aggregation. In this post, we’ll examine how Strelka works and the benefits of deploying Strelka to your network.
- Target Tech Kids: Spotlight on STEMBy Beth Miller and Rebecca Roeder, Aug 17, 2022Target Tech Kids (TTK) is a philanthropic effort that delivers STEM (science, technology, engineering, and math) education and resources for K-8 students, with a focus on underserved communities with low rates of subject matter exposure. We established the program in 2018 and this year we plan to share our passion with our biggest in-person event yet at the Minnesota State Fair's STEM Day celebration!
- How Target's Ryse Coaching Team Brings Learning Close in a Virtual WorldBy Michael "Miggs" Migliacio, August 8, 2022Ryse software engineering coaches empower Target tech team members with the knowledge and enterprise tools they need to build the future of retail technology. Ryse coaches are engineers, developers, advocates, instructors, facilitators, and cultural change agents – all in one. We tackle some of the organizations’ biggest technical alignment issues, serve as advisors and advocates for technologies and patterns in use throughout the organization, and run experiments across the company to test new ways of working and learning together.
- Developing JupyterLab ExtensionsBy Arman Shah, Aug 2, 2022Target’s technologists are encouraged to take advantage of “50 Days of Learning,” a program that enables engineers to spend time exploring new technologies or learning new languages and systems. I wanted to learn more about developing my own extensions and used some of my learning time to dive into the issue.
- 👍 Custom Emoji Management: How Target enhances its tech culture with creativity 🎨 and technology 🕹By Jay Kline, July 28, 2022When Target HQ first started to use chat systems, those systems allowed simple emoji usage, quickly turning :-) into 😀, and a few other simple faces. As chat technology evolved, Unicode standardized more sophisticated emoji. Eventually, many chat systems allowed administrators and sometimes users to add custom emoji. This gave us some leeway and ability to get creative when it came to what emoji to use when chatting internally at Target.
- Hardening the Registers: A Cascading Failure of Edge Induced Fault ToleranceBy John Engelman, June 22, 2022In 2017, Target announced that we had prioritized stores at the center of how we serve our guests – no matter how they choose to shop. To make this store-as-hubs model work, we spent several years redesigning operations and modernizing how we conduct business. We invested billions of dollars into remodeling stores, hardened our world-class supply chain, and created a robust suite of fulfillment options to meet every guest need.
- Triaging in Target's distributed Point of Sale EcosystemBy Tyghe Vallard, June 9, 2022Across Target.com and nearly 2,000 stores, we run a complex and highly distributed point of sale (POS) ecosystem. And as we invest heavily in a great omnichannel POS experience, we continue to develop and scale new features for a variety of applications including store registers and self-checkout, our team members’ handheld myDevices, and our award-winning guest mobile app. As a result, we manage more software with a growing number of interactions – a single scan of an item during checkout could mean touching a distributed tree of dozens of services, with hundreds of thousands of these done per minute.
- The journey of building a self-service platform for aggregated APIsBy Tom Rauk, May 13, 2022The digital catalog team at Target is responsible for a collection of nearly 100 aggregated APIs to provide browse data for Target.com and mobile app platforms. In early 2019, we were just coming off a large backend migration which meant we would need to version a lot of these APIs. This was a huge effort for all teams involved in standing up and moving to new API versions. With the volume of APIs that needed testing, we needed a solution that would scale and allow our teams to move more quickly.
- Executing a Documentation WorkflowBy Colin Dean, Apr 6, 2022This post is the second in a two-part series about creating a documentation workflow for data scientists and engineers. Click here to read the first post. This is an adaptation of a presentation delivered to conferences including Write the Docs Portland 2020, Ohio Linuxfest OpenLibreFree 2020, and FOSDEM 2021. The presentation source is available at GitHub and recordings are available on YouTube.
- Requirements for creating a documentation workflow loved by both Data Scientists and EngineersBy Colin Dean, Apr 6, 2022This is an adaptation of a presentation delivered to conferences including Write the Docs Portland 2020, Ohio Linuxfest OpenLibreFree 2020, and FOSDEM 2021. The presentation source is available at GitHub and recordings are available on YouTube. This is a two-part post that will share both the requirements and execution of the documentation workflow we built that is now used by many of our teammates and leaders. Read part two here.
- myTime for Target: built for Target by TargetBy Dana Klein and Scott Adcock, March 17, 2022Target has spent the last several years modernizing our technology stack and advancing our in-house development capabilities. We’ve grown to a global team of over 4,500 incredibly talented technologists and created a culture of testing, learning, and agile processes to great success. This journey has led to an uptick in fantastic new homegrown innovations that help make Target a joyful place to shop and work.
- Meet Merry Maker: How Target Protects Against Digital SkimmingBy Chris Carlson, Feb 1, 2022Credit card skimmers are custom-made additions to payment devices (like ATMs or gas pumps) that criminals build and use to steal a consumer’s payment information. The threat also exists in digital form, as malicious code covertly inserted into websites to steal credit card information. And with many more people shopping online, protecting against digital skimmers is more important than ever.
- Target Tech Patent QuarterlyBy Tech @ Target, Jan 27, 2022One of the most unique and rewarding opportunities for Target engineers is the ability to experience first-hand the impact of their work. The code we develop doesn’t just sit on a backend or behind apps. It runs in over 1,900 stores and shapes how 350,000+ team members operate and countless guests shop.
- Review ScrutinyBy Brian Muenzenmeyer, Jan 11, 2022Our team within Engineering Enablement serves our engineers so they can build the technology products that are used every day by our guests, team members, and partners. One way to do that successfully is to look for sources of friction that slow engineers down and find ways to reduce them. Case in point – our own GitHub pull request workflow for reviewing our colleagues’ changesets. Our monorepo contains 28 packages of varying scopes, from user-facing command-line tools, componentry, and configuration to documentation sites, internal modules, and tumbleweeds of dependencies.
- Redefining Traditional Pathways to Engineering Careers at TargetBy Alicia Henderson, Nov 12, 2021This past July, Target tech celebrated the first 24 team members to complete our Emerging Engineers Program. It was an important moment in time to recognize that there’s no traditional way to start a successful engineering career at Target.
- Modernizing Data Sources Using ShimsBy Janine Mechelke, Oct 26, 2021At Target we’re always evolving our business to meet the needs of our guests and team members — which means we’re also always evolving how we build technology. But even though technologists work in an environment that is rapidly changing and advancing, it can often take a long time (sometimes even years) to get to a point where we can retire legacy systems. I wanted to dig into why and explore shimming as a solution to help.
- Container Analysis and ContainmentBy Kyle Shattuck, Oct 19, 2021When containers become unhealthy in production environments, a nuclear action is often the best option. When it comes to a security alert however, a different approach is needed. Nuclear actions have been the default answer for too long – there are better ways to handle the encompassing analysis, visibility, and containment for a container that can benefit security analysts in the process. We saw a gap in industry resources that covered these parts in a whole and in the context of analysis and containment... so we created a cumulative resource for our use at Target tech, and wanted to share it out with the community.
- Using Drone for Automated Integration TestingBy Pam Vermeer and Pat Moberg, May 20, 2019Our team developed a service that reads from a Kafka topic, interacts with a Postgres database using basic CRUD operations, and calls APIs on an external service. As part of our increased focus on automated testing, getting to a higher level of testing code coverage required us to tie in the external components of our system architecture. Since we don’t control these components in production, we included these components in our CI/CD pipeline to give us a higher level of confidence that our integrated code is working as expected. We also wanted to run automated functional tests against our service, and that too required running these services in the pipeline. We use Drone as our CI/CD tooling and decided to learn how to use services in Drone to solve this problem. This short blog post runs through an example of how we started up a database service and a Kafka service in Drone and ran a test against these service, that might help others in a similar situation.
- Target Finds Cross-Site Scripting in Microsoft SharePointBy Sydney Delp, Jamie Feist, and Steven Kaun, Mar 15, 2019Cross-site scripting has been an OWASP Top 10 classic for more than a decade, but it still comes as a surprise to find it out in the wild, especially in a well-known product. During a recent penetration test, Target's Security Testing Services team found that Microsoft's SharePoint was vulnerable to a unique attack that, unlike typical cross-site scripting, could be exploited without any interaction from the victim user.
- GoAlert - Your Future Open Source, On-Call Notification ProductBy Adam Westman, Feb 25, 2019A few years ago, Target started a journey to move into a product-based organization with dedicated, durable, full-stack teams. One core belief we rallied behind was that product teams were accountable for building, running and supporting their products. Gone were the days of siloed development and operations teams. When a team introduces any change into production, it is accountable for supporting that change for as long as it lives.
- Spring Boot Service-to-Service CommunicationBy Jeffrey Bursik and Pruthvi Dintakurthi, Dec 18, 2018Scalable, nimble and efficient are terms commonly used to describe microservices, and as such, services are built to meet specific needs based on user features or application requests. However, when services need to communicate among one another, this can become somewhat convoluted and can lead to a significant amount of technical debt if not managed effectively. Target was faced with such a scenario in which it owned 40+ Spring Boot services and service-to-service communication was necessary to ensure service handoffs and SLAs were met. This post will walk through our implementation of Spring Feign Client, our learnings, and how Spring Feign Client has helped manage our inner-service communication while reducing the amount of development time.