CSS methodologies. Part 1

In the series of posts on the CSS methodologies we will bring closer the ideas, concepts and discuss the use of specific examples. The plan on CSS methodologies series is as … Continue reading “CSS methodologies. Part 1”

Serverless Architectures

While Serverless is not exactly a new idea, it has certainly been gaining traction in recent months. In this article I will explain what Serverless Architecture is and what are … Continue reading “Serverless Architectures”

Better testing thanks to better education. After the testerzy.pl conference

Testerzy.pl conference is a new event on the Polish map of tester meetings. The first edition took place on March 1 in the Gdańsk Science and Technology Park, which is … Continue reading “Better testing thanks to better education. After the testerzy.pl conference”

From an intern to a team leader. The story of Maja Bieńko

It’s the dream of every trainee to stay in a company that meets their requirements. This was the case with Maja Bieńko, who joined Aspire Systems Poland (previously Goyello) as … Continue reading “From an intern to a team leader. The story of Maja Bieńko”

Image Recognition with Neural Networks (part 2)

Welcome to the part 2 of our Image Recognition with Neural Networks on Cloud TPUs series. In the previous article we’ve made necessary preparations for 3 important processes that we … Continue reading “Image Recognition with Neural Networks (part 2)”

Testing is in our DNA. After the test:fest 2019 conference

Every edition of the test:fest conference in Wrocław sets the bar high for all other events taking place throughout the year. This is a good information for all participants because … Continue reading “Testing is in our DNA. After the test:fest 2019 conference”

Image Recognition with Neural Networks (part 1)

This article is the first of 2-part series explaining how to build an image recognition neural network. The code below is available also as a Google CoLaboratory interactive notebook. I … Continue reading “Image Recognition with Neural Networks (part 1)”

Google TensorFlow. Artificial Intelligence Made Easy(ier)

In this article I will explain what the real live neural network solving real problems could look like. And what options and tools you have for consideration when building your … Continue reading “Google TensorFlow. Artificial Intelligence Made Easy(ier)”

OAuth2 Threat Model Analysis

There is a saying in cyber security that there are only 3 types of systems. Those that have been hacked, those that will be hacked and those that don’t know … Continue reading “OAuth2 Threat Model Analysis”

OAuth vs OIDC vs SAML. Security Battle Royale

A computer lets you make more mistakes faster than any invention in human history – with the possible exceptions of handguns and tequila. – Mitch Ratliff In order to fully … Continue reading “OAuth vs OIDC vs SAML. Security Battle Royale”