Главная
Study mode:
on
1
Intro
2
Developing the Rock
3
Our approach
4
Facial authentication requirements
5
Spoof detection (liveness check)
6
The most common physical security breach
7
What is tailgating?
8
Challenges to make tailgating accurate
9
Backend for the fleet
10
Cloud first to on premise pivot
11
How Alcatraz overcomes the integration challenges
12
On premises deployments
13
Privacy by Design
14
Testing in Alcatraz Al
15
Face Detection & Recognition
16
Data Collection for ML Algorithm Training
17
Data Collection - Execution
18
Training ML Algorithms
19
Spoof Attack Levels
20
Spoofing prevention
21
Testing the platform
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore a comprehensive conference talk on developing and scaling DeepTech products for large enterprises, focusing on biometric solutions. Learn about the journey from early inception to real-world deployments, covering algorithmic development, customer-facing features, privacy and security compliance, and end-to-end testing. Discover insights on facial authentication, spoof detection, tailgating prevention, backend infrastructure, and privacy-by-design principles. Gain valuable knowledge on data collection for ML algorithm training, testing methodologies, and overcoming integration challenges in on-premises deployments.

DeepTech Product Development for Large Enterprise - From Idea to Scaling

ISTA Conference
Add to list
0:00 / 0:00