Dokumentasi Product Search Vision API
Dengan Product Search Vision API, retailer dapat membuat produk, masing-masing berisi gambar referensi yang secara visual menjelaskan produk dari serangkaian sudut pandang. Retailer kemudian dapat menambahkan produk-produk ini ke set produk. Saat ini, Product Search Vision API mendukung kategori produk berikut: perlengkapan rumah, pakaian, mainan, barang kemasan, dan umum.
Saat pengguna membuat kueri untuk set produk dengan gambar mereka sendiri, Product Search Vision API menerapkan machine learning untuk membandingkan produk dalam gambar kueri pengguna dengan gambar dalam set produk retailer, lalu menampilkan daftar berperingkat dari hasil yang mirip secara visual dan semantik.
Mulai project baru Anda dengan kredit gratis senilai $300
Buat dan uji bukti konsep dengan kredit uji coba gratis dan penggunaan gratis bulanan untuk lebih dari 20 produk.
Referensi dokumentasi
Panduan
-
Panduan memulai: Membuat set produk dan menelusuri produk
-
Memformat CSV impor massal
-
Menelusuri Produk
-
Mendapatkan dan mencantumkan resource
-
Membuat pengindeksan & gambar referensi
-
Mengautentikasi ke Cloud Vision API
-
Membuat set produk
-
Memahami respons penelusuran & multi-deteksi
-
Menghapus beberapa resource
-
Resource
Video terkait
New Way Now: Generali Italia is simplifying insurance and improving customer service with gen AI
*Summary:* With Immagina Adesso, Generali Italia offers a flexible insurance plan where customers can build a customized package and adjust it as their needs change. To help their salespeople quickly learn the details of this comprehensive product
Identities as the bedrock for Google Cloud security
Join our experts to learn more about your identity choices with Google Cloud. We will deep-dive into workload identity federation and support for GCE and workforce identity federation for Azure AD, Okta, and other IdPs, secure your environments with
Responsibly driving student success with AI
The pace of change is accelerating more than ever before. How can responsible artificial intelligence (AI) tools help educators invest more time with students to spark creativity in ways we never thought possible? How can institutions responsibly
How to configure rules and policies in Google Cloud Armor
Previous video → https://goo.gle/3OvKs4M Set up IAM permissions for Google Cloud Armor security policies → https://goo.gle/3guyUCm Configure custom rules language attributes → https://goo.gle/3Ub7b7O Need to maintain a consistent security posture
Effortless debugging with Policy Troubleshooter
Policy Intelligence → https://goo.gle/3rsA3wo Full resource names → https://goo.gle/3RyppPb Policy Troubleshooter empowers admins to quickly and easily understand why specific actions are (or are not) allowed by the IAM policies. In this episode of
What is IAM Recommender?
Policy Intelligence → https://goo.gle/3xnhltH Curious about the principle of least privilege? Want to learn how to implement this principle at scale? In this episode of Optimize with Active Assist, we cover IAM Recommender: a Google Cloud tool that
Getting started with Policy Analyzer
Policy Analyzer guide → https://goo.gle/3NRWGDy Understand policies and usage → https://goo.gle/3PVeGP3 Policy Intelligence → https://goo.gle/3zeZUwA How can you streamline security audits and access reviews to be less time-consuming and demanding?
Safe policy rollouts with Policy Simulator
Intelligence toolbox → https://goo.gle/3aiLJMJ Policy Simulator → https://goo.gle/3aoLrUs How can you be certain that pushing changes to access policies won’t break production? Policy Simulator helps you test future impacts of new access policy
What is Policy Intelligence?
Policy Intelligence → https://goo.gle/3MPd87n The principle of least privilege allows an organization to balance security and developer productivity. However, with dozens of individual permissions and a wide array of services this task quickly
How to secure your cloud with Active Assist
Policy Intelligence → https://goo.gle/34pX4Im Enforce least privilege with role recommendations → https://goo.gle/3hL0qsf Active Assist → https://goo.gle/3IU91EW Welcome back to Optimize with Active Assist! In the previous episode we discussed
How Target has operationalized policy intelligence tools
How Target operationalizes policy intelligence tools to safely remove millions of permissions. Learn how to mitigate unnecessary work when debugging access issues and safely rollout IAM changes. Resources: Visit the Next '21 website →
Production-grade build security for developer workflows
Watch this demonstration on how to create a secure pipeline, from source to production. Learn how to apply vulnerability scanning, code signing, attestations, and policy-driven admission controls. Use these applications on Cloud Build, Artifact
Cloud IAM in a minute
IAM → https://goo.gle/3krSNcM Resource Manager → https://goo.gle/3zjWMwz Policy Intelligence → https://goo.gle/3ihobZ0 Cloud Identity and Access Management allows you to grant fine-grained access to cloud resources and gives you tools to bring ease
Using Policy Intelligence to achieve least privilege access
Maintaining control over access to cloud resources can at times seem like a never-ending task where failure can have high consequences. Security teams are often faced with an overwhelming amount of information to process to keep these resources safe.
Maintain Control Over Hybrid Workloads With Devops Best Practices from Google Cloud (Cloud Next '19)
Maintaining visibility, control, and compliance of hybrid workloads is increasingly complex. Administrators need to navigate and upkeep multiple tools, configs, policy systems and languages to ensure that their security and compliance requirements
Health Taxonomy: Natural Language Processing to Understand Health Research (Cloud Next '18)
Our ongoing project increases navigability and distribution of health research using Google’s Natural Language API. Our Machine Learning process for taxonomy delivered meaningful improvement for executives and policy makers looking to read breaking
Better Practices for Cloud IAM (Cloud Next '18)
Making sure that right users have the right access to the right resources to do their jobs can become complex and unmanageable. GCP customers will share “better practices” for combining multiple security features to implement the principle of least