Security

ICT技術:ICT Technology

Overview of Kubernetes, environment setup, and reference books

Overview and configuration of Kubernetes used for digital transformation, artificial intelligence and machine learning tasks, reference books (Microservices, Spinnaker, Blue, Containers, Cloud Natives, Skaffold, Clair, Security, BuildKit, Kaniko, Operator, Helm, Chart, Sock Shop, YAML, Prometheus, Grafana, Pod, Minikube)
Clojure

Security in Microservices – APIs with Auth and Pedestal in Clojure

Security in microservices leveraged for digital transformation, artificial intelligence, and machine learning tasks - APIs with Auth and Pedestal in Clojure Buddy, Buddy sign, JSON Web Tokens, JSON Web Signature, JSON Web Encryption
機械学習:Machine Learning

Protected: Speaker adaptation and speaker recognition

Speaker adaptation (HMM) to improve recognition accuracy for digital transformation and artificial intelligence tasks, and speaker recognition (maximum likelihood linear regression, MLLR, i-vector) for security and other applications.
タイトルとURLをコピーしました