Skip to content

Commit

Permalink
Apply suggestions from code review
Browse files Browse the repository at this point in the history
Co-authored-by: Hiroto Funakoshi <hiroto.funakoshi.hiroto@gmail.com>
  • Loading branch information
kevindiu and hlts2 authored Jul 2, 2020
1 parent 0330604 commit ba17c84
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions docs/usecase/usage-example.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@

- Search by image
- Face recognition
- Product recommendation base on images
- Product recommendation based on images
- Image/Video analysis
- Image/Video deduplication

Expand Down Expand Up @@ -64,7 +64,7 @@

To detect the malware using Vald, you need to vectorize the malware binary file and insert into Vald first.
You can analyze your binary by performing a search to find a similar binary in Vald.
If your binary is similar with the malware binary, you can trigger the alert for users.
If your binary is similar to the malware binary, you can trigger the alert for users.

- Price optimization

Expand Down

0 comments on commit ba17c84

Please sign in to comment.