Systems | Development | Analytics | API | Testing

%term

Democratizing Machine Learning Capabilities With Qlik Sense and Amazon SageMaker

The ability to discover insights from past events, transactions and interactions is how many customers currently utilize Qlik. Qlik’s unique approach to Business Intelligence (BI) using an in-memory engine and intuitive interface has democratized BI for typical business users, who usually have little to no technical savvy. But, for many years, organizations have only been able to analyze metrics or KPIs of “what has happened” (i.e., descriptive analytics).

Democratizing Machine Learning Capabilities With Qlik Sense and Amazon SageMaker

The ability to discover insights from past events, transactions and interactions is how many customers currently utilize Qlik. Qlik’s unique approach to Business Intelligence (BI) using an in-memory engine and intuitive interface has democratized BI for typical business users, who usually have little to no technical savvy. But, for many years, organizations have only been able to analyze metrics or KPIs of “what has happened” (i.e., descriptive analytics).

How Papa John's Fast-Tracked External API Innovation With Kong

To keep pace with the company’s rapidly growing menu innovation strategy and expansion to digital channels, elevating the API strategy became a priority at Papa John’s. Learn how the team reduced time to market and enabled API innovation with the growing list of external channels. This session will discuss deploying Kong in a hybrid environment, making use of the Kong Developer Portal and integrating to a CI/CD pipeline to automate deployments.

Outlier Detection: The Different Types of Outliers

Time series anomaly detection is a tool that detects unusual behavior, whether it's hurtful or advantageous for the business. In either case, quick outlier detection and outlier analysis can enable you to adjust your course quickly, before you lose customers, revenue, or an opportunity. The first step is knowing what types of outliers you’re up against. Chief Data Scientist Ira Cohen, co-founder of Autonomous Business Monitoring platform Anodot, covers the three main categories of outliers and how you'll see them arise in a business context.

How to Achieve Zero-Trust Security With Service Mesh | Kong Summit 2020

Are you an enterprise architect who is currently facing the challenge to secure and observe service connectivity across every cloud and every cluster? Kong Mesh, built on top of CNCF’s Kuma and Envoy, is a universal service mesh tailored to the enterprise architect that must provide modern and secure connectivity to the applications that the teams are building.