Zephyrnet Logo

Tag: Detection

Build your own Deep Learning powered Screen Crack Detection App

As the field of AI advances, so do the tools, platform and means we use to train such revolutionary (or sometimes silly) systems....

Live! XDF Xclusive News

Victor’s keynote kickoff Our 3rd annual Xilinx Developer Forum (XDF) 2019 kicked off today with our CEO Victor Peng’s opening keynote, addressing the more...

Monitoring the model with Watson OpenScale

In this Code Pattern, we will use German Credit data to train, create, and deploy a machine learning model using IBM Watson Machine Learning on IBM Cloud Pak for Data. We will create a data mart for this model with Watson OpenScale and configure OpenScale to monitor that deployment, then inject seven days' worth of historical records and measurements for viewing in the OpenScale Insights dashboard.

Many New AI Product Updates – Available now!

We are very excited to let you know that six AI products have been updated and publicly released. This is the first time...

GPT-2: 6-Month Follow-Up

We’re releasing the 774 million parameter GPT-2 language model after the release of our small 124M model in February, staged release of our...

Create a real-time object detection app using Watson Machine Learning

Learn how you can use machine learning to train your own custom model without substantive computing power and time.

The 5 Most Common Pitfalls in Your Security Stack That Put You at Risk for a Breach

Reading Time: 3 minutesThe 5 Most Common Pitfalls in Your Security Stack That Put You at Risk for a Breach It can take 6...

Create a banking chatbot

This article is part of the Watson Assistant learning path. See the Watson Assistant page for more information on features and getting...

Using AI to give doctors a 48-hour head start on life-threatening illness

Feedback from the qualitative study was positive, with healthcare professionals emphasising the ways in which the app accelerated the detection of patients in need, saved...

Legacy Cybersecurity Solutions Are Broken: Here’s Why

Reading Time: 5 minutesToday’s businesses are spending more than ever before on cybersecurity solutions. But, all this spending is doing little to curtail...

Locate and count items with object detection

This code pattern is part of the Getting started with IBM Visual Insights learning path. Summary Object detection has different uses and different...

CyberSecurity Doesn’t Get a Vacation: Three Tips for (Secure) Fun in the Sun

Reading Time: 3 minutesFor millions of Americans, the Fourth of July means fireworks, picnics and barbecues, and the chance to take...

Latest Intelligence

spot_img
spot_img