Isabel Tallam | Sw Eng, Real Time Analytics; Charles Wu | Sw Eng, Real Time Analytics; Kapil Bajaj | Eng Manager, Real Time AnalyticsDetecting anomalous events has been becoming increasingly essential in recent times...
Visualizing the performance of Fast RCNN, Faster RCNN, Mask RCNN, RetinaNet, and FCOSEach of our two-stage object detection models (in green and lightweight blue above) far out-perform the single-stage models in mean average precision,...
Ritz here. You understand, I’ve been across the block a time or two in terms of working with object detection models. So once I heard about this hot latest thing called YOLO-NAS, I knew...
Constructing ML Models with Observability at ScaleBy Rajeev Prabhakar, Han Wang, Anindya SahaThe highlighted red lines (anomalous hours from the prediction data) co-inside with a spike and drop in request latency, causing anomalies within...
Streamline Audio Evaluation with State-of-the-Art Speech Recognition and Speaker Attribution TechnologiesIn our fast-paced world, we generate enormous amounts of audio data. Take into consideration your favorite podcast or conference calls at work. The information...
Written by Sara Verbič. Work performed by Sara Verbič, Devis Peressutti, Nejc Vesel, Matej Batič, Žiga Lukšič, Jan Geršak, Matic Lubej and Nika Oman Kadunc.We desired to create a big training dataset for automated...
How a posh and cutting-edge approach, creatively borrowed from computer vision, may be implemented in only just a few clicks.ConclusionThis text demonstrates how a reasonably sophisticated time-series anomaly detection algorithm, inspired by computer vision,...
Information overload — and false positives — are major challenges in the everyday incident response organization. Due to the plethora of various security platforms, applications, and tools, security teams with limited resources must sift...