360 enters the SMB market with multiple new AI products
When artificial intelligence is undergoing new changes every week, the limitations of traditional deep learning algorithms in security scenarios have become more and more prominent. How to make AI safer and more popular and implemented in vertical scenarios has become a concern. The problem.
On May 31st, the 360 Smart Life Visual Model and AI Hardware New Product Launch Conference was held. With the theme of "Security Guarding, Wisdom Seeing the Future", the 360 Smart Brain Visual Model and a variety of new AI hardware products were launched. It also announced that 360 Smart Life has officially entered the SMB market, achieving a major leap from home scenarios to enterprise commercial use.
The combination of multi-modal large models and the Internet of Things will become the next trend
Zhou Hongyi, founder of 360 Group, said that large language models will bring about a new industrial revolution, and predicted that the combination of multi-modal large models and the Internet of Things will become the next trend, and large models will lead intelligent hardware into the AIoT era. .
Image source: 360 smart life visual model and AI hardware new product launch conference
Sun Hao, general manager of the 360 Visual Cloud business line, said in an interview that after integrating visual capabilities and text alignment into a language model, it can use the capabilities of the large language model to understand, reason, and make decisions. Therefore, the large language model actually plays the role of a brain in a multi-modal model. Only when the large language model is strong can the ability of the large visual model be strong.
Image source: 360 smart life visual model and AI hardware new product launch conference
According to Sun Hao, the 360 Intelligent Brain Vision model currently has three core capabilities:
1. Open Object Detection (OVD), by learning a large amount of image and text data on the Internet, allows the model to comprehensively learn more target categories;
2. Image title generation is an advanced form of understanding images, which can meet the user's need to obtain information quickly and accurately;
3. Visual Question Answering (VQA), based on the recognition, understanding, and reasoning of images, answers various questions raised using natural language.
Image source: 360 smart life visual model and AI hardware new product launch conference
When talking about the connection between the large visual model and the 360 Intelligent Brain, Sun Hao said: "The large language model is a very important component in the multi-modal field. For our large visual model we It is image and text data training based on the Internet, but one of the core of its intelligence is that we have integrated the large language model of 360 Intelligent Brain. Therefore, our relationship with the large language model of 360 Intelligent Brain is logically parallel, but in terms of capabilities In fact, it is a help and supplement. In the future, we will all be an important component of the 360 Intelligent Brain multi-modal model."
"Large models, to a certain extent, are originally trained and learned based on massive amounts of data. Why is it that multi-modal large models combined with the Internet of Things may be the next trend, because it can further integrate the data sensed by the Internet of Things , learning, so that it can generate further analysis and decision-making for our production and operation and life, and generate greater value." Sun Hao said in the interview.
Formally enter the SMB market
In specific implementation applications, 360 Smart Life has been explored for many years. 360 Vision Cloud is an intelligent security SaaS platform with scenario-based artificial intelligence as the core. It was launched last year. At present, 360 core intelligent security products have been connected to 360 Vision Cloud and can be seamlessly connected in the same scene to form a data visualization solution.
Sun Hao introduced that the combination of 360 Intelligent Brain·Vision large model and hardware should be a step-by-step process. For example, 360 first integrated the visual capabilities of the camera, and then combined the end-side algorithm with the cloud, so that it is possible It has the visual implementation capability of device-cloud collaboration. If the large model is further optimized and can run on the edge, it will gradually be moved to the edge. Next, by extracting and analyzing the cloud information, we can gradually integrate the perception of the voice modality. It is conceivable that the future will be a process of gradual penetration and reshaping.
Image source: 360 smart life visual model and AI hardware new product launch conference
At this press conference, 360 also officially announced a series of new products: 360 outdoor ball machine 6 Pro, 360 Dazzling outdoor gun and ball all-in-one machine, 360 binocular splicing panoramic camera, 360 Dazzling smart NVR, etc., to achieve From indoor to outdoor, from home to commercial, from online to offline, all scene channels are covered. Empowered by the 360 Intelligent Brain·Visual large model, a richer product matrix can better meet the multi-scenario needs of To C and small, medium and micro enterprises, and can achieve wider compatibility. At the same time, 360 also officially announced that 360 Smart Life has entered the SMB market.
Sun Hao said in the interview that the first scenario chosen by 360 Security to enter the B-side was the SMB market because small, medium and micro enterprises have many special needs. "At present, the scenario boundaries of many small, medium and micro enterprises are not so clear. Many users choose 360 products in their own business scenarios because they value the ability of 360 products to be simple and easy to use in home scenarios. Our products are easy to install and use. Decentralized deployment, centralized management, and the ability to take out the device and check the situation anytime and anywhere can make the digital implementation threshold for small, medium and micro enterprises extremely low, which is the core reason why we chose to enter the SMB market." He said.
In the future, 360 Smart Life will continue to delve into the frontier areas of intelligent security, explore the application of AI large models in security scenarios, and use inclusive AI to empower the digital upgrade of small, medium and micro enterprises.
The above is the detailed content of 360 enters the SMB market with multiple new AI products. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



In Debian systems, the readdir function is used to read directory contents, but the order in which it returns is not predefined. To sort files in a directory, you need to read all files first, and then sort them using the qsort function. The following code demonstrates how to sort directory files using readdir and qsort in Debian system: #include#include#include#include#include//Custom comparison function, used for qsortintcompare(constvoid*a,constvoid*b){returnstrcmp(*(

This article describes how to adjust the logging level of the ApacheWeb server in the Debian system. By modifying the configuration file, you can control the verbose level of log information recorded by Apache. Method 1: Modify the main configuration file to locate the configuration file: The configuration file of Apache2.x is usually located in the /etc/apache2/ directory. The file name may be apache2.conf or httpd.conf, depending on your installation method. Edit configuration file: Open configuration file with root permissions using a text editor (such as nano): sudonano/etc/apache2/apache2.conf

In Debian systems, readdir system calls are used to read directory contents. If its performance is not good, try the following optimization strategy: Simplify the number of directory files: Split large directories into multiple small directories as much as possible, reducing the number of items processed per readdir call. Enable directory content caching: build a cache mechanism, update the cache regularly or when directory content changes, and reduce frequent calls to readdir. Memory caches (such as Memcached or Redis) or local caches (such as files or databases) can be considered. Adopt efficient data structure: If you implement directory traversal by yourself, select more efficient data structures (such as hash tables instead of linear search) to store and access directory information

Configuring a Debian mail server's firewall is an important step in ensuring server security. The following are several commonly used firewall configuration methods, including the use of iptables and firewalld. Use iptables to configure firewall to install iptables (if not already installed): sudoapt-getupdatesudoapt-getinstalliptablesView current iptables rules: sudoiptables-L configuration

The steps to install an SSL certificate on the Debian mail server are as follows: 1. Install the OpenSSL toolkit First, make sure that the OpenSSL toolkit is already installed on your system. If not installed, you can use the following command to install: sudoapt-getupdatesudoapt-getinstallopenssl2. Generate private key and certificate request Next, use OpenSSL to generate a 2048-bit RSA private key and a certificate request (CSR): openss

The readdir function in the Debian system is a system call used to read directory contents and is often used in C programming. This article will explain how to integrate readdir with other tools to enhance its functionality. Method 1: Combining C language program and pipeline First, write a C program to call the readdir function and output the result: #include#include#include#includeintmain(intargc,char*argv[]){DIR*dir;structdirent*entry;if(argc!=2){

In Debian systems, OpenSSL is an important library for encryption, decryption and certificate management. To prevent a man-in-the-middle attack (MITM), the following measures can be taken: Use HTTPS: Ensure that all network requests use the HTTPS protocol instead of HTTP. HTTPS uses TLS (Transport Layer Security Protocol) to encrypt communication data to ensure that the data is not stolen or tampered during transmission. Verify server certificate: Manually verify the server certificate on the client to ensure it is trustworthy. The server can be manually verified through the delegate method of URLSession

This guide will guide you to learn how to use Syslog in Debian systems. Syslog is a key service in Linux systems for logging system and application log messages. It helps administrators monitor and analyze system activity to quickly identify and resolve problems. 1. Basic knowledge of Syslog The core functions of Syslog include: centrally collecting and managing log messages; supporting multiple log output formats and target locations (such as files or networks); providing real-time log viewing and filtering functions. 2. Install and configure Syslog (using Rsyslog) The Debian system uses Rsyslog by default. You can install it with the following command: sudoaptupdatesud
