Image Recognition with Neural Networks (part 1)

This article is the first of 2-part series explaining how to build an image recognition neural network. The code below is available also as a Google CoLaboratory interactive notebook. I … Continue reading “Image Recognition with Neural Networks (part 1)”

Google TensorFlow. Artificial Intelligence Made Easy(ier)

In this article I will explain what the real live neural network solving real problems could look like. And what options and tools you have for consideration when building your … Continue reading “Google TensorFlow. Artificial Intelligence Made Easy(ier)”

OAuth2 Threat Model Analysis

There is a saying in cyber security that there are only 3 types of systems. Those that have been hacked, those that will be hacked and those that don’t know … Continue reading “OAuth2 Threat Model Analysis”

OAuth vs OIDC vs SAML. Security Battle Royale

A computer lets you make more mistakes faster than any invention in human history – with the possible exceptions of handguns and tequila. – Mitch Ratliff In order to fully … Continue reading “OAuth vs OIDC vs SAML. Security Battle Royale”

From programmer to leader. Paweł Bejger on working at Aspire Systems Poland

Goyello joined the Aspire Systems group last year. What changed when the Tri-City company became the European hub of a global organization? Adam Łopusiewicz from Just Join IT asked Paweł Bejger, Operational … Continue reading “From programmer to leader. Paweł Bejger on working at Aspire Systems Poland”

Our values won’t change. Peter Horsten on the history of Goyello and Aspire Systems merger

Peter Horsten, VP Software Development Europe of Aspire Systems, came to Poland for the first time in 1995. He fell in love with the country, and after many years decided … Continue reading “Our values won’t change. Peter Horsten on the history of Goyello and Aspire Systems merger”