How to Build a Custom Image Dataset Using Motion Detection and YOLO: A Step-by-Step GuideBuilding a high-quality image dataset tailored to your specific needs is a crucial first step in training accurate computer vision models.Aug 19, 2024Aug 19, 2024
YOLO-World Data Engine: Build Custom Vision Datasets, Hands-FreeWhen it comes to training computer vision models, data is king.Jul 23, 2024Jul 23, 2024
Send Your terraform.tfstate to a Compliant AWS S3 Backend: Checkov’s Gun Part IIIIn our previous articles, we delved into the world of Checkov S3 policies and built a strong backend as a foundation for managing your…Feb 11, 2024Feb 11, 2024
Craft Your Own AI-Powered Knowledge Base: Wordpress + Ollama + AnythingLLMNeed your knowledge base to unlock its true potential?Feb 10, 20242Feb 10, 20242
Checkov’s Gun Reloaded: Firing Up a KMS-Encrypted AWS S3 Bucket in TerraformWelcome to Part 2 of the Chekov’s Gun series.Jan 26, 2024Jan 26, 2024
GitOps Chops: Deploy Web App to EKS Cluster with Github WorkflowsThis project demonstrates a complete GitOps workflow for deploying a web application onto an Amazon EKS cluster.Jan 24, 2024Jan 24, 2024
Checkov’s Gun: Firing Up a Compliant AWS S3 Bucket in TerraformAs Chekhov’s Gun must fire in a story, a failed Checkov policy must be addressed. If ignored, it’s bound to resurface, like a lingering…Jan 21, 2024Jan 21, 2024
The Importance of Strong Passwords: How to Create and Manage ThemIn today’s digital age, passwords are a crucial part of our online security. They protect our personal information, as well as our…Jan 5, 2023Jan 5, 2023
Phishing Scams: How to Recognize and Avoid ThemPhishing scams are a common and often successful way for hackers to steal personal information and gain access to accounts. But what…Jan 4, 2023Jan 4, 2023
Stop hackers: 6 ways to protect your phoneAs smartphones become increasingly integral to our daily lives, it’s important to make sure they are secure from potential threats.Jan 3, 2023Jan 3, 2023