Talend provides a number of Machine Learning components that can be used for a variety of purposes. I have previously described some of these various components, some in more detail than others, as well as outlining what they can do. However, one question remains, what use cases can be solved by using these Machine Learning components?
Hidden treasure holds a deep fascination and the promise of great wealth. Did you know that there are still dozens of significant treasure hauls still waiting to be found across the globe? Gold bars and coins, pearls, jewels, and precious artifacts. Then there’s Forrest Fenn’s treasure (he’s still alive today). Fenn has buried his Pompeiian artifacts and other treasures worth approximately $2 million in the mountains north of Santa Fe, New Mexico.
With the 1.3 release, Kong is now able to natively manage and proxy gRPC services. In this blog post, we’ll explain what gRPC is and how to manage your gRPC services with Kong.
Service mesh is redefining the way we think about security, reliability, and observability when it comes to service-to-service communication. In a previous blog post about service mesh, we took a deep dive into our definition of this new pattern for inter-service communication. Today, we’re going to take you through how to use Istio, an open source cloud native service mesh for connecting and securing east-west traffic.
Recently, I read an article called “For IoT, think about creating a minimum viable ecosystem” on Stacey on IoT blog, which got me thinking about what we ourselves have been observing in the SaaS sector. In particular, the article says: “With the internet of things, companies are no longer trying to create a product to offer value, but rather establish relationships between companies and individuals to create value.
Would you imagine e-commerce without an electronic catalog or the web without search engines? Digital transformation requires single points of access to enable a wider range of people to access a wider range of information.