Skip to content

Commit

Permalink
Apply suggestions from code review
Browse files Browse the repository at this point in the history
Co-authored-by: Hiroto Funakoshi <hiroto.funakoshi.hiroto@gmail.com>
  • Loading branch information
2 people authored and actions-user committed Jul 6, 2020
1 parent 0e6f2ce commit c1a73f4
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions docs/usecase/usage-example.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@

- Search by image
- Face recognition
- Product recommendation base on images
- Product recommendation based on images
- Image/Video analysis
- Image/Video deduplication

Expand Down Expand Up @@ -64,7 +64,7 @@

To detect the malware using Vald, you need to vectorize the malware binary file and insert into Vald first.
You can analyze your binary by performing a search to find a similar binary in Vald.
If your binary is similar with the malware binary, you can trigger the alert for users.
If your binary is similar to the malware binary, you can trigger the alert for users.

- Price optimization

Expand Down

0 comments on commit c1a73f4

Please sign in to comment.