Image Recognition

Image Recognition with Neural Networks (part 1)

This article is the first of 2-part series explaining how to build an image recognition neural network. The code below is available also as a Google CoLaboratory interactive notebook. I will pass the link at the very end of part 2, so that you…
Artificial Intelligence

Google TensorFlow. Artificial Intelligence Made Easy(ier)

In this article I will explain what the real live neural network solving real problems could look like. And what options and tools you have for consideration when building your neural network model. I will also tell you a bit about Google’s…
OAuth2

OAuth2 Threat Model Analysis

There is a saying in cyber security that there are only 3 types of systems. Those that have been hacked, those that will be hacked and those that don't know they’ve been hacked. So it’s a matter of time before your brand-new system falls…
security

OAuth vs OIDC vs SAML. Security Battle Royale

A computer lets you make more mistakes faster than any invention in human history - with the possible exceptions of handguns and tequila. - Mitch Ratliff In order to fully understand your choices and risks when selecting your security components…
, ,

From programmer to leader. Paweł Bejger on working at Aspire Systems Poland

Goyello joined the Aspire Systems group last year. What changed when the Tri-City company became the European hub of a global organization? Adam Łopusiewicz from Just Join IT asked Paweł Bejger, Operational Director at Aspire Systems Poland,…
, ,

Our values won’t change. Peter Horsten on the history of Goyello and Aspire Systems merger

Peter Horsten, VP Software Development Europe of Aspire Systems, came to Poland for the first time in 1995. He fell in love with the country, and after many years decided to open a company here. He talks about the history of Goyello and its…