Blogs

How to Set up and Use Object Detection Endpoints

Written by Timothe Coloniel, Junior Software Engineer, TrackIt Object detection is a fundamental task in computer vision that involves identifying and locating objects within an image. This technology has a wide range of applications, including autonomous driving,...

Building a Custom Object Detection Model with YOLOv8

Written by Maram Ayari, DevOps Engineer What is Object Detection? How is it Different from Object Localization and Classification? Object detection is a key task in computer vision, essential for enabling machines to analyze and understand visual data. In various...

What is Infrastructure as Code (IaC)?

Infrastructure as Code (IaC) is a methodology that allows organizations to manage and provision infrastructure through machine-readable files rather than manually configuring hardware or using interactive configuration tools. As the name suggests, this approach treats...
How to Send Sensu Events to Elasticsearch

How to Send Sensu Events to Elasticsearch

When we talk about log management, we talk about dealing with a large amount of computer-generated files and how to collect them, how to centralize them, how to aggregate them and how to analyze them. Logs can be produced everywhere by different types of systems....

read more
Use Salt-Cloud to Automatically Deploy New AWS instances

Use Salt-Cloud to Automatically Deploy New AWS instances

This article is the second one of a series showing how to use cloud-computing in media and entertainment (M&E workflow). The first article explained you how to complete a very basic setup of your AWS infrastructure and create a bastion/jump server. Now, we will...

read more
Discover the Power of Cloud Computing with AWS and Salt

Discover the Power of Cloud Computing with AWS and Salt

This article is the first one of a series showing how to use cloud-computing in media and entertainment (M&E workflow). Cloud-computing represents the future of infrastructure. Every day, dozens of companies are moving from a traditional infrastructure to a...

read more
6 Best Practices for AWS Security Groups

6 Best Practices for AWS Security Groups

AWS Security groups are a perfect way to manage security, they provide a powerful firewall. However there are some basics rules you need to follow. By not implementing strict security controls, the security of an entire application may be compromised. 1) Create a...

read more