This document provides an overview of DevOps on AWS. It discusses DevOps culture and goals of speed, reliability, and improved collaboration. It then explains why AWS is suitable for DevOps with managed services, scale, automation, and security. The document outlines components of DevOps practices including continuous integration (CI), continuous delivery (CD), infrastructure as code, and continuous monitoring. It also reviews deployment strategies and AWS developer tools to support CI/CD workflows such as CodeCommit, CodeBuild, CodeDeploy, CodePipeline, Cloud9, and CodeStar.
This document provides an introduction and overview of Amazon's AI services including Amazon Polly, Amazon Lex, and Amazon Rekognition. Amazon Polly is a text-to-speech service that converts text into natural-sounding speech for 47 voices across 24 languages. Amazon Lex builds conversational interfaces using natural language understanding. Amazon Rekognition provides deep learning capabilities for image analysis, including object detection, facial analysis, face comparison and face recognition.
An Overview to Artificial Intelligence Services at AWSKristana Kane
The document provides an overview of artificial intelligence capabilities on AWS, including Amazon Polly for text-to-speech, Amazon Rekognition for computer vision, Apache MXNet as a deep learning framework, and Amazon Lex for building conversational bots. It describes their features and common use cases, such as using computer vision for facial analysis and recognition, building conversational interfaces for devices with Amazon Lex, and more.
Jimmy Dahlqvist gave a presentation on building a serverless AI-powered translation bot using AWS services. He discussed generative AI and how it can create new content using large foundation models trained on massive datasets. The presentation covered Amazon Translate for text translation, Amazon Polly for text-to-speech, and Amazon Comprehend for natural language processing. Dahlqvist also discussed services like Amazon API Gateway, Amazon EventBridge, AWS Step Functions and AWS Lambda that could be used to build a serverless architecture for an AI translation bot application on AWS. He concluded with an overview of the architecture for such a translation service using various AWS AI and serverless services.
AWS Machine Learning Language Services (May 2018)Julien SIMON
This document summarizes Amazon Web Services machine learning language services, including Amazon Transcribe, Translate, Polly, Comprehend, and Lex. It provides examples of how companies like Duolingo, Hotels.com, RingDNA, and ClearView Social use these services. The document also discusses how to get started with Amazon's machine learning stack and language APIs.
Zenyk Matchyshyn "Doing Machine Learning on Amazon Stack"Lviv Startup Club
The document discusses Amazon's machine learning stack, including services like Amazon SageMaker, Rekognition, Lex, and Greengrass. It notes Amazon's stack provides an integrated set of tools for end-to-end machine learning development from building and training models to deploying them. Key services highlighted include SageMaker for organizing ML development, Rekognition for computer vision tasks, and Greengrass for deploying models to edge devices. The document argues Amazon has caught up to competitors by innovating not just on frameworks but also tools, integrations, and capabilities for conversational interfaces and edge computing.
AWS reinvent 2019 recap - Riyadh - Containers and Serverless - Paul MaddoxAWS Riyadh User Group
This document provides an overview and agenda for an AWS storage, compute, containers, serverless, and management tools presentation. It includes summaries of several upcoming AWS services and features related to EBS, S3, EC2, EKS, Fargate, Lambda, and AWS Cost Optimizer. The speaker is introduced as Paul Maddox, Principal Architect at AWS, with a background in development, SRE, and systems architecture.
AWS reinvent 2019 recap - Riyadh - Database and Analytics - Assif AbbasiAWS Riyadh User Group
Amazon Web Services hosted a recap of their re:Invent conference focusing on databases and analytics. The presentation discussed how companies are increasingly data-driven and emphasized modernizing data infrastructure to extract more value from data. It promoted moving to managed database services, building data-driven applications, and transforming data into insights.
AWS reinvent 2019 recap - Riyadh - Network and Security - Anver VankerAWS Riyadh User Group
The document outlines an agenda for a two-day AWS conference taking place on March 9-10, 2020 in Riyadh. Day one will feature presentations on networking and security by Anver Vanker and storage, compute and serverless updates by Paul Maddox. Day two presentations will cover big data and analytics by Asif Abbasi and AI and ML by Ahmed Raafat.
Amazon Web Services provides several machine learning services and tools to help developers build, train, deploy, and manage machine learning models at scale. These include Amazon SageMaker for developing and hosting models, Amazon Rekognition for computer vision tasks, and Amazon Transcribe for speech-to-text. AWS aims to put machine learning in the hands of every developer through these fully managed services.
How we got to where we are?
What's Serverless
Serverless Principles
Pros and cons
Serverless architectures
Lambda Anatomy
Demos
AWS SAM
Demo
By : Ahmed Samir
AWS Technical Day Riyadh Nov 2019 - The art of mastering data protection on awsAWS Riyadh User Group
This document discusses various techniques for securing data stored in Amazon S3 buckets, including:
- Using IAM policies and S3 bucket policies to control access to buckets and objects
- The S3 Block Public Access setting to prevent public access
- Encryption using AWS KMS to encrypt data at rest
- Authorization processes where S3 checks IAM, bucket, and object policies to authorize requests
- Managing cross-account access using IAM roles
- Replication ownership override for business continuity between regions
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in awsAWS Riyadh User Group
The document discusses scaling threat detection and response on AWS. It provides an overview of AWS security services for threat detection such as GuardDuty, Macie, and Security Hub which analyze log data using machine learning. It also discusses tools for threat response including Lambda, Inspector, and Systems Manager. The document outlines an attacker lifecycle and how findings map to stages. It provides examples of automated detection and response playbooks and remediation actions.
The document discusses AWS migration tools and strategies. It provides an overview of AWS services like Application Discovery Service and Migration Hub that help with discovery, planning, and tracking migrations. It also summarizes common migration patterns and challenges, and highlights how tools like ADS can help with discovery of on-premises assets and costs to better plan a migration. Example customer migrations are provided that leveraged AWS to reduce costs while improving agility.
AWS Amplify is a JavaScript library and toolchain that makes it easy to build mobile and web applications that use cloud services. It supports frameworks like React, Vue, Angular and Ionic. It provides a CLI to create and configure AWS services like databases, APIs, authentication, analytics and hosting. Behind the scenes, it automates the creation of resources like Cognito for authentication, DynamoDB tables, Lambda functions, API Gateway, S3 and more. It also provides a JavaScript library to connect front-end apps to these cloud services. The demo shows how to create a React app, add Amplify, add features like authentication and hosting, connect the app to GitHub, deploy features to different environments
The document provides information about AWS services including EC2, S3, and CloudFront. It discusses EC2 instance types, pricing models, and storage options. It describes S3's 99.999999999% durability, storage tiers including standard, infrequent access, and glacier, and encryption options. CloudFront is introduced as a CDN that caches content at edge locations to improve distribution.
This document provides an overview of blockchain technology and its applications. It begins with definitions of blockchain and how it works using cryptography to link transaction records in distributed blocks. It then discusses pillars like decentralization and immutability. Use cases for blockchain include smart contracts, voting, and banking. AWS services for blockchain include Amazon Quantum Ledger Database (QLDB) for managing an immutable transaction ledger, and Amazon Managed Blockchain for creating and managing blockchain networks. Pricing models are also summarized.
- The document discusses Infrastructure as Code (IaaC) and AWS CloudFormation (CFN). CFN allows users to model and provision AWS resources from templates to focus on applications rather than managing resources.
- Examples are provided demonstrating how to create a LAMP stack on EC2 using CFN templates in JSON and YAML formats. Issues with reusability and portability in templates are highlighted and solutions proposed using dynamic values, mappings, and intrinsic functions.
- Later examples show how to handle dependencies and output values using CFN. References are listed for further reading on CFN features.
The document provides an agenda for an AWS Security User Group meeting in Riyadh on May 1, 2019. The agenda includes discussions on cloud security, security terminology, cloud security threats, best practices for cloud security, AWS security services, identity and access management, and security of infrastructure. It also provides overviews and descriptions of AWS products and services related to security such as IAM, Inspector, Key Management Service, Macie, Organizations, Shield, Secrets Manager, SSO, WAF, and more.
The document summarizes messaging services on AWS. It provides overviews and details of Amazon MQ, Amazon SQS, Amazon Kinesis, Amazon SNS, Amazon PinPoint, and AWS IoT Message Broker. These services enable event-driven architectures and the exchange of information between distributed systems and microservices through queuing, streaming, and publishing of messages. Key features highlighted include scalability, reliability, encryption, and integration with other AWS services.
The document outlines the agenda for a user group meeting on AWS VPC topics. The agenda includes reviewing default and custom VPCs, NAT instances and gateways, VPC peering, flow logs, endpoints, VPN connections, Direct Connect, limits and pricing, and exam tips. It also lists past topics such as storage, compute, databases, and networking services, as well as upcoming topics such as Lambda, cost optimization, and machine learning.
The document discusses a presentation given to the AWS Riyadh User Group on networking concepts and Amazon VPC components. It provides an overview of VPCs and their usage, including how to create a VPC, subnets, route tables, internet gateways, NAT gateways, network access control lists, and security groups. It also describes common networking concepts like the OSI model, IPv4 vs IPv6, subnetting, and NAT. The presentation concludes with instructions for a hands-on lab to build a sample VPC configuration.
a session in AWS Riyadh User Group to discuss AWS RDS >> which is fully managed service to handle all Database management and administrations tasks with multiple engines support
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfSoftware Company
Explore the benefits and features of advanced logistics management software for businesses in Riyadh. This guide delves into the latest technologies, from real-time tracking and route optimization to warehouse management and inventory control, helping businesses streamline their logistics operations and reduce costs. Learn how implementing the right software solution can enhance efficiency, improve customer satisfaction, and provide a competitive edge in the growing logistics sector of Riyadh.
AWS reinvent 2019 recap - Riyadh - Containers and Serverless - Paul MaddoxAWS Riyadh User Group
This document provides an overview and agenda for an AWS storage, compute, containers, serverless, and management tools presentation. It includes summaries of several upcoming AWS services and features related to EBS, S3, EC2, EKS, Fargate, Lambda, and AWS Cost Optimizer. The speaker is introduced as Paul Maddox, Principal Architect at AWS, with a background in development, SRE, and systems architecture.
AWS reinvent 2019 recap - Riyadh - Database and Analytics - Assif AbbasiAWS Riyadh User Group
Amazon Web Services hosted a recap of their re:Invent conference focusing on databases and analytics. The presentation discussed how companies are increasingly data-driven and emphasized modernizing data infrastructure to extract more value from data. It promoted moving to managed database services, building data-driven applications, and transforming data into insights.
AWS reinvent 2019 recap - Riyadh - Network and Security - Anver VankerAWS Riyadh User Group
The document outlines an agenda for a two-day AWS conference taking place on March 9-10, 2020 in Riyadh. Day one will feature presentations on networking and security by Anver Vanker and storage, compute and serverless updates by Paul Maddox. Day two presentations will cover big data and analytics by Asif Abbasi and AI and ML by Ahmed Raafat.
Amazon Web Services provides several machine learning services and tools to help developers build, train, deploy, and manage machine learning models at scale. These include Amazon SageMaker for developing and hosting models, Amazon Rekognition for computer vision tasks, and Amazon Transcribe for speech-to-text. AWS aims to put machine learning in the hands of every developer through these fully managed services.
How we got to where we are?
What's Serverless
Serverless Principles
Pros and cons
Serverless architectures
Lambda Anatomy
Demos
AWS SAM
Demo
By : Ahmed Samir
AWS Technical Day Riyadh Nov 2019 - The art of mastering data protection on awsAWS Riyadh User Group
This document discusses various techniques for securing data stored in Amazon S3 buckets, including:
- Using IAM policies and S3 bucket policies to control access to buckets and objects
- The S3 Block Public Access setting to prevent public access
- Encryption using AWS KMS to encrypt data at rest
- Authorization processes where S3 checks IAM, bucket, and object policies to authorize requests
- Managing cross-account access using IAM roles
- Replication ownership override for business continuity between regions
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in awsAWS Riyadh User Group
The document discusses scaling threat detection and response on AWS. It provides an overview of AWS security services for threat detection such as GuardDuty, Macie, and Security Hub which analyze log data using machine learning. It also discusses tools for threat response including Lambda, Inspector, and Systems Manager. The document outlines an attacker lifecycle and how findings map to stages. It provides examples of automated detection and response playbooks and remediation actions.
The document discusses AWS migration tools and strategies. It provides an overview of AWS services like Application Discovery Service and Migration Hub that help with discovery, planning, and tracking migrations. It also summarizes common migration patterns and challenges, and highlights how tools like ADS can help with discovery of on-premises assets and costs to better plan a migration. Example customer migrations are provided that leveraged AWS to reduce costs while improving agility.
AWS Amplify is a JavaScript library and toolchain that makes it easy to build mobile and web applications that use cloud services. It supports frameworks like React, Vue, Angular and Ionic. It provides a CLI to create and configure AWS services like databases, APIs, authentication, analytics and hosting. Behind the scenes, it automates the creation of resources like Cognito for authentication, DynamoDB tables, Lambda functions, API Gateway, S3 and more. It also provides a JavaScript library to connect front-end apps to these cloud services. The demo shows how to create a React app, add Amplify, add features like authentication and hosting, connect the app to GitHub, deploy features to different environments
The document provides information about AWS services including EC2, S3, and CloudFront. It discusses EC2 instance types, pricing models, and storage options. It describes S3's 99.999999999% durability, storage tiers including standard, infrequent access, and glacier, and encryption options. CloudFront is introduced as a CDN that caches content at edge locations to improve distribution.
This document provides an overview of blockchain technology and its applications. It begins with definitions of blockchain and how it works using cryptography to link transaction records in distributed blocks. It then discusses pillars like decentralization and immutability. Use cases for blockchain include smart contracts, voting, and banking. AWS services for blockchain include Amazon Quantum Ledger Database (QLDB) for managing an immutable transaction ledger, and Amazon Managed Blockchain for creating and managing blockchain networks. Pricing models are also summarized.
- The document discusses Infrastructure as Code (IaaC) and AWS CloudFormation (CFN). CFN allows users to model and provision AWS resources from templates to focus on applications rather than managing resources.
- Examples are provided demonstrating how to create a LAMP stack on EC2 using CFN templates in JSON and YAML formats. Issues with reusability and portability in templates are highlighted and solutions proposed using dynamic values, mappings, and intrinsic functions.
- Later examples show how to handle dependencies and output values using CFN. References are listed for further reading on CFN features.
The document provides an agenda for an AWS Security User Group meeting in Riyadh on May 1, 2019. The agenda includes discussions on cloud security, security terminology, cloud security threats, best practices for cloud security, AWS security services, identity and access management, and security of infrastructure. It also provides overviews and descriptions of AWS products and services related to security such as IAM, Inspector, Key Management Service, Macie, Organizations, Shield, Secrets Manager, SSO, WAF, and more.
The document summarizes messaging services on AWS. It provides overviews and details of Amazon MQ, Amazon SQS, Amazon Kinesis, Amazon SNS, Amazon PinPoint, and AWS IoT Message Broker. These services enable event-driven architectures and the exchange of information between distributed systems and microservices through queuing, streaming, and publishing of messages. Key features highlighted include scalability, reliability, encryption, and integration with other AWS services.
The document outlines the agenda for a user group meeting on AWS VPC topics. The agenda includes reviewing default and custom VPCs, NAT instances and gateways, VPC peering, flow logs, endpoints, VPN connections, Direct Connect, limits and pricing, and exam tips. It also lists past topics such as storage, compute, databases, and networking services, as well as upcoming topics such as Lambda, cost optimization, and machine learning.
The document discusses a presentation given to the AWS Riyadh User Group on networking concepts and Amazon VPC components. It provides an overview of VPCs and their usage, including how to create a VPC, subnets, route tables, internet gateways, NAT gateways, network access control lists, and security groups. It also describes common networking concepts like the OSI model, IPv4 vs IPv6, subnetting, and NAT. The presentation concludes with instructions for a hands-on lab to build a sample VPC configuration.
a session in AWS Riyadh User Group to discuss AWS RDS >> which is fully managed service to handle all Database management and administrations tasks with multiple engines support
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfSoftware Company
Explore the benefits and features of advanced logistics management software for businesses in Riyadh. This guide delves into the latest technologies, from real-time tracking and route optimization to warehouse management and inventory control, helping businesses streamline their logistics operations and reduce costs. Learn how implementing the right software solution can enhance efficiency, improve customer satisfaction, and provide a competitive edge in the growing logistics sector of Riyadh.
How Can I use the AI Hype in my Business Context?Daniel Lehner
𝙄𝙨 𝘼𝙄 𝙟𝙪𝙨𝙩 𝙝𝙮𝙥𝙚? 𝙊𝙧 𝙞𝙨 𝙞𝙩 𝙩𝙝𝙚 𝙜𝙖𝙢𝙚 𝙘𝙝𝙖𝙣𝙜𝙚𝙧 𝙮𝙤𝙪𝙧 𝙗𝙪𝙨𝙞𝙣𝙚𝙨𝙨 𝙣𝙚𝙚𝙙𝙨?
Everyone’s talking about AI but is anyone really using it to create real value?
Most companies want to leverage AI. Few know 𝗵𝗼𝘄.
✅ What exactly should you ask to find real AI opportunities?
✅ Which AI techniques actually fit your business?
✅ Is your data even ready for AI?
If you’re not sure, you’re not alone. This is a condensed version of the slides I presented at a Linkedin webinar for Tecnovy on 28.04.2025.
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...Alan Dix
Talk at the final event of Data Fusion Dynamics: A Collaborative UK-Saudi Initiative in Cybersecurity and Artificial Intelligence funded by the British Council UK-Saudi Challenge Fund 2024, Cardiff Metropolitan University, 29th April 2025
https://alandix.com/academic/talks/CMet2025-AI-Changes-Everything/
Is AI just another technology, or does it fundamentally change the way we live and think?
Every technology has a direct impact with micro-ethical consequences, some good, some bad. However more profound are the ways in which some technologies reshape the very fabric of society with macro-ethical impacts. The invention of the stirrup revolutionised mounted combat, but as a side effect gave rise to the feudal system, which still shapes politics today. The internal combustion engine offers personal freedom and creates pollution, but has also transformed the nature of urban planning and international trade. When we look at AI the micro-ethical issues, such as bias, are most obvious, but the macro-ethical challenges may be greater.
At a micro-ethical level AI has the potential to deepen social, ethnic and gender bias, issues I have warned about since the early 1990s! It is also being used increasingly on the battlefield. However, it also offers amazing opportunities in health and educations, as the recent Nobel prizes for the developers of AlphaFold illustrate. More radically, the need to encode ethics acts as a mirror to surface essential ethical problems and conflicts.
At the macro-ethical level, by the early 2000s digital technology had already begun to undermine sovereignty (e.g. gambling), market economics (through network effects and emergent monopolies), and the very meaning of money. Modern AI is the child of big data, big computation and ultimately big business, intensifying the inherent tendency of digital technology to concentrate power. AI is already unravelling the fundamentals of the social, political and economic world around us, but this is a world that needs radical reimagining to overcome the global environmental and human challenges that confront us. Our challenge is whether to let the threads fall as they may, or to use them to weave a better future.
Role of Data Annotation Services in AI-Powered ManufacturingAndrew Leo
From predictive maintenance to robotic automation, AI is driving the future of manufacturing. But without high-quality annotated data, even the smartest models fall short.
Discover how data annotation services are powering accuracy, safety, and efficiency in AI-driven manufacturing systems.
Precision in data labeling = Precision on the production floor.
Technology Trends in 2025: AI and Big Data AnalyticsInData Labs
At InData Labs, we have been keeping an ear to the ground, looking out for AI-enabled digital transformation trends coming our way in 2025. Our report will provide a look into the technology landscape of the future, including:
-Artificial Intelligence Market Overview
-Strategies for AI Adoption in 2025
-Anticipated drivers of AI adoption and transformative technologies
-Benefits of AI and Big data for your business
-Tips on how to prepare your business for innovation
-AI and data privacy: Strategies for securing data privacy in AI models, etc.
Download your free copy nowand implement the key findings to improve your business.
Mobile App Development Company in Saudi ArabiaSteve Jonas
EmizenTech is a globally recognized software development company, proudly serving businesses since 2013. With over 11+ years of industry experience and a team of 200+ skilled professionals, we have successfully delivered 1200+ projects across various sectors. As a leading Mobile App Development Company In Saudi Arabia we offer end-to-end solutions for iOS, Android, and cross-platform applications. Our apps are known for their user-friendly interfaces, scalability, high performance, and strong security features. We tailor each mobile application to meet the unique needs of different industries, ensuring a seamless user experience. EmizenTech is committed to turning your vision into a powerful digital product that drives growth, innovation, and long-term success in the competitive mobile landscape of Saudi Arabia.
What is Model Context Protocol(MCP) - The new technology for communication bw...Vishnu Singh Chundawat
The MCP (Model Context Protocol) is a framework designed to manage context and interaction within complex systems. This SlideShare presentation will provide a detailed overview of the MCP Model, its applications, and how it plays a crucial role in improving communication and decision-making in distributed systems. We will explore the key concepts behind the protocol, including the importance of context, data management, and how this model enhances system adaptability and responsiveness. Ideal for software developers, system architects, and IT professionals, this presentation will offer valuable insights into how the MCP Model can streamline workflows, improve efficiency, and create more intuitive systems for a wide range of use cases.
Buckeye Dreamin 2024: Assessing and Resolving Technical DebtLynda Kane
Slide Deck from Buckeye Dreamin' 2024 presentation Assessing and Resolving Technical Debt. Focused on identifying technical debt in Salesforce and working towards resolving it.
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc
Most consumers believe they’re making informed decisions about their personal data—adjusting privacy settings, blocking trackers, and opting out where they can. However, our new research reveals that while awareness is high, taking meaningful action is still lacking. On the corporate side, many organizations report strong policies for managing third-party data and consumer consent yet fall short when it comes to consistency, accountability and transparency.
This session will explore the research findings from TrustArc’s Privacy Pulse Survey, examining consumer attitudes toward personal data collection and practical suggestions for corporate practices around purchasing third-party data.
Attendees will learn:
- Consumer awareness around data brokers and what consumers are doing to limit data collection
- How businesses assess third-party vendors and their consent management operations
- Where business preparedness needs improvement
- What these trends mean for the future of privacy governance and public trust
This discussion is essential for privacy, risk, and compliance professionals who want to ground their strategies in current data and prepare for what’s next in the privacy landscape.
Automation Hour 1/28/2022: Capture User Feedback from AnywhereLynda Kane
Slide Deck from Automation Hour 1/28/2022 presentation Capture User Feedback from Anywhere presenting setting up a Custom Object and Flow to collection User Feedback in Dynamic Pages and schedule a report to act on that feedback regularly.
Hands On: Create a Lightning Aura Component with force:RecordDataLynda Kane
Slide Deck from the 3/26/2020 virtual meeting of the Cleveland Developer Group presentation on creating a Lightning Aura Component using force:RecordData.
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Impelsys Inc.
Impelsys provided a robust testing solution, leveraging a risk-based and requirement-mapped approach to validate ICU Connect and CritiXpert. A well-defined test suite was developed to assess data communication, clinical data collection, transformation, and visualization across integrated devices.
Learn the Basics of Agile Development: Your Step-by-Step GuideMarcel David
New to Agile? This step-by-step guide is your perfect starting point. "Learn the Basics of Agile Development" simplifies complex concepts, providing you with a clear understanding of how Agile can improve software development and project management. Discover the benefits of iterative work, team collaboration, and flexible planning.
3. Artificial Intelligence
• Artificial intelligence (AI) is an area of computer
science that emphasizes the creation of intelligent
machines that work and react like humans.
4. Machine Learning
• Is the ability for machine to learn without being
programmed by input.
5. Deep Learning
• Teaches computers to do what comes naturally to
humans, learn by example(ANN).
9. AWS Polly
• Amazon Polly is a service that turns text into lifelike
speech.
• You can control various aspects of speech such as pronunciation, volume, pitch, speech
rate, etc.
• Standardized Speech Synthesis Markup Language (SSML).
• Speech Marks are designed to complement the synthesized speech that is
generated from the input text.
10. AWS Comprehend
• Amazon Comprehend is a natural language processing
(NLP) service that uses machine learning to find
insights and relationships in text.
• Keyphrase Extraction.
• Sentiment Analysis (Positive, Negative, Neutral, or Mixed).
• Syntax Analysis (Verb, Pronoun, Proper noun, etc).
• Entity Recognition.
• Custom Entities (domain-specific).
• Language Detection.
11. AWS Rekognition
• Amazon Rekognition makes it easy to add image and
video analysis to your applications.
• Real-time Analysis of Streaming Video.
• Person Identification and Pathing .
• Face Recognition.
• Facial Analysis.
• Inappropriate Video Detection.
• Celebrity Recognition.
12. AWS Transcribe
• Amazon Transcribe is an automatic speech recognition
(ASR) service that makes it easy for developers to add
speech-to-text capability to their applications.
• Easy-to-Read Transcriptions (text with punctuation).
• Timestamp Generation.
• Recognize Multiple Speakers.
• Streaming Transcription.
13. AWS Translate
• Amazon Translate is a neural machine translation
service that delivers fast, high-quality, and affordable
language translation.
• Broad Language Coverage (21 languages).
• Neural Network-Based.
• Language Identification.
• Real-Time Translations.
14. AWS Lex
• Amazon Lex is a service for building conversational
interfaces into any application using voice and text.
• High quality speech recognition and
natural language understanding.
• Multi-turn conversations.
• Integration with AWS Lambda.
• Connect to Enterprise Systems.
• One-click Deployment.
• Powerful Lifecycle Management
Capabilities.
• 8 kHz Telephony Audio Support.
#19: You can safely remove this slide. This slide design was provided by SlideModel.com – You can download more templates, shapes and elements for PowerPoint from http://slidemodel.com