Semen
Development Leader
As part of the Apriorit team, I aim at providing firsthand insights on tech and business, focusing on the true value of technologies and concepts and discussing pros and cons of applying them in IT projects.
More articles from author
How to Secure and Manage File Access with SELinux
Monitoring and restricting access to a potentially malicious file can save your product from hacks, data leaks, and breaches. To do it in a Linux-base...
How to Fix Image Distortions Using the OpenCV Library
Quality images are crucial for various solutions including security and vehicle camera systems, as well as for developing and training machine learnin...
Secure and Anonymous Virtual Networking Infrastructure: How It Works, How to Implement It, and What’s Next
The ongoing remote work trend makes organizations heavily rely on virtual infrastructure and invest in virtual private networks (VPNs). They are quite...
3 Secure and Effective Strategies for Migrating Corporate Applications to the Cloud
With the increased demand for remote work due to the pandemic, many businesses have turned their attention to the cloud. According to International Da...
How to Develop a Minimal OS for Raspberry Pi 3 in Rust
Kernel development for embedded systems is like heart surgery: it requires knowledge and experience, attention to details, and the ability to achieve...
Applying Long Short-Term Memory for Video Classification
In one of our previous posts, we discussed the problem of classifying separate images. When we tried to separate a commercial from a football gam...
Using Modified Inception V3 CNN for Video Processing and Video Classification
Artificial intelligence and neural networks are bringing image processing to a whole new level. Processes that used to take days or weeks can now be p...
Most Common Embedded Linux System Project Estimation Issues
Estimating your Linux embedded project is like starting a full renovation of your house: there are just too many things you need to take into account...
How to Use Google Colaboratory for Video Processing
Did you know that a set of computer algorithms can process a video stream in a way that allows them to detect criminal activity, control traffic jams...