Systems | Development | Analytics | API | Testing

%term

WTF is a Convolutional Neural Network?

If you are a software engineer, there's a good chance that deep learning will inevitably become part of your job in the future. Even if you're not building the models that directly use CNNs, you might have to collaborate with data scientists or help business partners better understand what is going on under the hood. In this article, Julie Kent dives into the world of convolutional neural networks and explains it all in a not-so-scary way.

Closer Integration Announced For Azure Event Hub

We're happy to announce that we have just launched our improved integration for the Azure Event Hub, allowing DevOps & Security professionals to send log data for analysis easier than ever. This announcement comes as Microsoft’s Azure Event Hub reaches its highest global popularity as a data ingestion service. The integration ensures best-in-class performance across a variety of use cases using Azure.

App Store Connect API on Bitrise

Now there is a new way to connect your Bitrise account to Apple Developer Connection: the authorization will happen via a JSON Web Token. AppStore Connect API was introduced last year, and we'll also use the official solution only calling API endpoints. The good news is that now you don't have to use the whole account for authentication and you'll be able to set access levels for the keys.

Apache Pulsar walks into a data bar

Some time ago, the concept of event streaming was not that widespread. In addition to that, the platforms provided were much fewer than today, and required more technical depth to set up and operate. However, as time passed, those platforms matured, community grew, the documentation was improved and the rest of the world started to wake up to the advantages these platforms can bring to address the real-time experiences businesses need. And Apache Pulsar is a great example.

How To Pick The Right Type of Log Data Visualisation

Data visualisations allow users to organise and present log data in a practical, usable, and sensible manner. This tool in log management ensures that the data collected communicates real-time, actionable insights that will support timely and informed decision-making. Knowing which types of visualisation best suits a particular data set is critical in giving data visualisation optimal business value. Here is how to pick the right type of log data visualisation. Pie charts

How to Secure REST APIs: API Keys Vs. OAuth

REST, a.k.a. Representational State Transfer, is an architectural style commonly used in software development. Applications built via REST-style development tend to be excellent examples of distributed hypermedia applications. However, they don’t often have excellent innate security options. That’s where API keys and OAuth tokens come in. As Dr.