AWS Media Analysis Solution
Get started with automated metadata extraction using the AWS Media Analysis Solution
You can easily get started extracting meaningful metadata from your media files by using the Media Analysis Solution on AWS.
The Media Analysis Solution provides AWS CloudFormation templates that you can use to start extracting meaningful metadata from your media files within minutes. With a web-based user interface, you can easily upload files and see the metadata that is automatically extracted.
This solution uses Amazon Rekognition for facial recognition, Amazon Transcribe to create a transcript, and Amazon Comprehend to run sentiment analysis on the transcript. You can also upload your own images to an Amazon Rekognition collection and train the solution to recognize individuals.
You only pay for the services you use when testing this solution. For 1080p HD video, launching this solution will likely cost less than $8 per hour of footage. This solution is available in various sizes based on the amount of metadata that will be indexed for your media library. Pricing for sizes ranges from $300-$1000 per month, which primarily consists of Amazon Elasticsearch Service compute and storage for indexing, searching, and storing metadata.
In this blog post, we’ll show you step-by step how to launch the solution and upload an image and video. You’ll be able to see firsthand how metadata is seamlessly extracted.
Note: This solution uses Amazon Rekognition, Amazon Comprehend, and Amazon Transcribe, which are currently available in specific AWS Regions only. Therefore, you must launch this solution in an AWS Region where these services are available. For the most current AWS service availability by Region, see AWS service offerings by region.
Step 1: Deploy the Media Analysis Solution
Sign into the AWS Management Console with your user name and password to get started. Then go to the Media Analysis Solution and choose Deploy Solution.
Step 2: Launch the AWS CloudFormation template
Choose Launch Solution under the “Launch the Stack” section in the documentation guide.
Step 3: On the Select Template page, choose Next
Step 4: On the Specify Details page, enter your email address and choose Next.
Step 5: On the Options page, choose Next
Read the acknowledge agreement at the bottom of the page, check the box: “I acknowledge that AWS CloudFormation might create IAM resources with custom names,” and choose Create.
Wait approximately 20 minutes for the stack to be deployed. When you see CREATE_COMPLETE you will receive an email with the URL to log in to the Media Analysis Solution page.
Step 6: Get your user name, temporary password, and sign in URL
If you see CREATE_COMPLETE, then you should have received an email like the one that follows. Note that after you sign in with your temporary password you will be prompted to create a new password (must include at least one capital letter).
Step 7: Sign in with your user name and temporary password to get started
After signing in, click “Upload” in the top right corner.
Step 8: Add to Amazon Rekognition collection
In addition to analyzing media, this solution enables you to upload faces to an Amazon Rekognition collection so that they are automatically recognized in any uploaded media. For this tutorial, I will upload an image of Matt Wood (click here to download).
Select Choose File (or Browse for those on a Mac) and select the image you just downloaded.
Next, name the image “mattwood” and choose Upload Face.
Step 9: Upload new media
Now, we will upload a video file to be analyzed to demonstrate how this solution automatically uses features from Amazon Rekognition, Amazon Transcribe, and Amazon Comprehend. You can upload any file up to 100 MB in the demo console, but for this tutorial we will upload footage from Matt Wood at re:Invent 2017 (click here to download).
Select Choose File (or Browse for those on a Mac) and select the video you just downloaded.
Choose Upload Media.
Note that if you want to upload a file over 100 MB, you will need to do so directly in the media analysis Amazon S3 bucket that was created as part of the AWS CloudFormation template. This 100 MB limit only occurs when using the demo console.
The analysis of the video will begin automatically after the upload is completed. Upload times will vary depending on internet connection. You can view the progress by choosing View progress in your AWS Console, or you can wait until the progress bars have turned green and choose View Results.
If you chose View progress in your AWS Console, you can see if the solution is still running under Execution details. You can also see the step functions under Visual workflow. To go back to the Media Analysis Solution page, use the back button in your browser and then choose Browse on the Media Analysis Solution page.
Choose View Results.
As you can see, extracted metadata includes labels, facial attributes, known faces, and celebrities from Amazon Rekognition; a transcript from Amazon Transcribe; and entities and phrases from Amazon Comprehend.
Choose Known Faces and you’ll see that Matt Wood has been recognized since we added him to the Amazon Rekognition collection before we analyzed this video. This feature can be extremely useful for common media use cases that require identification of multiple individuals.
Also, you can choose Entities and see that Amazon Comprehend has identified artists from Matt’s presentation, such as Rick Astley and Eric Clapton.
Step 10: Terminate resources
Open the AWS Management Console and type CloudFormation in the search bar and select it.
Choose the check box for each stack name that includes “MediaAnalysis” and then choose the Actions drop down list and select Delete Stack. Another window will appear; choose Yes, Delete. Ensure that you do this for each Stack Name that includes “MediaAnalysis” to terminate all resources that were part of this tutorial.
Next, open the AWS Management Console and type S3 in the search bar and select it. Find any S3 buckets that were created from launching this solution and delete them. First, click on the S3 bucket you want to delete, select Delete bucket, type in the name of the bucket, and then select Confirm. Do this for each of the new S3 buckets created from launching the solution and uploading the test image and video.
Conclusion
Now that you’ve seen how easy it is to extract metadata from your media files, you can use this solution to quickly start building a searchable media library, index and transcribe hours of video footage, and more.
Sunday, October 7, 2018
Top 40 Hacking Blogs
These days, you often realize that relying on yourself is simply something that you just can’t afford anymore. This is true, even when it comes to the area of information (or sometimes, misinformation). In that case, in a world where almost everything is posted online, it’s good to have a go-to source, especially when it comes to knowing which ones are the best sources around.
If your concern happens to be about learning ‘how to hack’ or anything remotely to that, you can now also look to tech blogs for that. This list gives you the lowdown on the best hacking blogs that you can possibly find, as well as their respective ratings in terms of three main categories: Originality, Design, and Social Media.
ehacking.net
EHacking has it all – from things as seemingly minor as learning to hack iTunes to things as major as discussions regarding ethical hacking (yes, there is such a thing). EHacking also discusses ways by which you can more surely secure your system from hackers. Apart from that, you can also read up on the latest news about hacking – if a particular payment system has been hacked, by whom, and many other news.
darknet.org.uk
“Don’t learn to hack; hack to learn.” Such is the motto of Darknet, a blog that basically brings together a group of like-minded individuals who share one passion – information technology. In sharing this passion, they also share ways on how to do password cracking, cracking in general, as well as cryptography and other programming techniques that are, well, darker than the average.
extremehacking.org
Extreme Hacking is a blog that’s devoted to news and updates about hacking. Not only that, it also features a lot of suggestions on how to do ethical hacking. If you’re worried that your website might not be as protected as it should be, then it’s best to get the services of an ethical hacker. Good thing Extreme Hacking also offers ethical hacking tutorials, which is yet another bonus of this blog.
tisiphone.net
Tisiphone is a blog that invests a lot in instilling a sense of urgency and interest in its topics. The way that the articles are written is in a way that does not alienate those who don’t specifically come from the field of Information Technology. The topics are simplified, phrased into questions which you might find relevant to you. Issues such as your own security, protection against malware, and many others may be found on this blog, making it very useful, indeed.
hakin9.org
There’s a certain security that the virtual world seems to be offering everyone – the security that’s granted by passwords, passkeys, and other codes that ensure your own protection. And yet, at the same time, there is a kind of insecurity in it, too. This tension between security and insecurity in terms of Information Technology is exactly the niche of the Hackin9 blog, making it a very interesting (and perhaps life-changing) read.
effecthacking.com
Thinking about securing your network more effectively? Worried about the safety of your passwords? Or maybe you’re dying to find out about the latest news about systems that have just gotten hacked (as well as the secrets behind the hacking)? All that excitement is exactly what you’ll be getting with the Effect Hacking Blog.
knowbe4.com
KnowBe4 is a blog that helps you to do exactly that – to know before you click, know before you join, know before you get victimized by unethical hacking, ultimately. There are a lot of ways by which you can educate yourself about this, and the blog itself actually makes a lot of suggestions by which you can do so. All in all, it’s a blog that’s dedicated to security awareness.
isc2.org
This blog is mainly all about increasing and heightening every user’s sense of security and safety, especially with the emergence of this virtual world. With website asking for passwords and important personal information from every possible direction, it’s also necessary that you know your rights and responsibilities as a user. Let the (ISC)² Blog help you out along these lines.
hackingtutorials.org
The Hacking Tutorials Blog is an easy case of what you see is what you get. If its title says Hacking Tutorials, then that’s exactly what you must prepare yourself for. From courses on ethical hacking to learning how to hack routers to tutorials on how to do offensive security – Hacking Tutorials has it all.
itechhacks.com
Here is a blog that will keep you full to the brim with endless tips and tricks just to maximize your use of your gadget and your software. The iTech Hacks blog teaches you, among other things, how to keep yourself protected and secured against those who would do what they can just to get a hold of your password. If that scares you, then best to read up on this blog and learn more.
thehackerblog.com
If you’re a curious egg and would like to know the secrets behind the many hacking incidents that have happened to several countries and their respective departments, The Hacker Blog is the blog you should read. Here, in this blog, the secrets are uncovered, and all you have to do is to pay attention. Truly, it’s a hacker’s haven, and it’s one that doesn’t mince with the details at all.
detectify.com
In a world that now runs on data and information, it’s necessary that you know where your data is going, as well as how your information is being used. If you’re not careful, whatever you give and supply might actually be used against you. To keep this from happening, let Detectify help you out. This blog tells you all about the secrets of hacking as well as how to make sure that it never happens to you.
gbhackers.com
Do you own a company and would like to employ an online service but you’re worried about online security? Or maybe you’d like to learn more about what makes your system vulnerable and you’d like to test its limits as best as you can? The answer and the solution to your problem is in GBHAckers. This blog gives you protection tips as well as security pointers, all of which enable you to secure your system better.
pentestlab.blog
If you’re a person who values certainty and would like to ensure that there’s no room for doubt in terms of your network and cyber security, then you’d better read up on the Penetration Testing Lab blog. In this blog, you’ll find security tips and techniques that will surely help you in protecting your system – complete with the necessary steps and screenshots.
freedomhacker.net
If keeping yourself updated is your thing, especially when it comes to news about hacking as well as the newest techniques and systems in relation to hacking, then Freedom Hacker is the perfect blog just for you. On this blog you’ll find a number of lists and recommended sites from which you can get a lot of ideas about hacking, the ethical way of course.
synack.com
The Synack Blog teaches you all about hacker-powered security. Therein lies the secret to a security system whose level is unmatched others – if you want a system with excellent security, then you must have it powered and backed by the very people who have the capacity to override it. That way, you’re getting that assurance – you’ll have less chances of getting hacked because a hacker himself has made sure of that.
cygilant.com
The Cygilant Blog prides itself on providing security as a service. Where other blogs will probably offer information and tips, Cygilant aims to give you a reason to get to know your computer system better, in such a way that you will also be able to secure it (and yourself, in the process), where security means a system that’s well thought-out and organized.
koddos.net
The KoDDoS Blog is basically a blog that gives you your daily dose of hacking news, told from all the possible angles. You may have articles that tell you about retail robots that can perform the hacking for you, or perhaps about the latest trojan attacks, and many other possible topics. This blog emphasizes the importance of keeping yourself updated, otherwise you’ll definitely be left behind, leaving yourself less secure than before.
menlosecurity.com
Menlo Security is probably one of those blogs out there that have an excellent appearance, which includes the fact that it has an exceedingly user-friendly interface. Not only will you be better informed about hacking in reading the blog, you’ll also be entertained by the aesthetics of its presentation. Truly a blog to be bookmarked for future use.
cqureacademy.com
Would you like to learn more about hacking, but you always find yourself alienated by all the Information Technology jargon that a beginner like you can’t seem to understand? Not to worry, because with the CQURE Academy Blog, you get a blog that deals with these matters, but in a language and tone that’s friendly and relatable to beginners.
drhack.net
Hackology as a blog is exactly the way it sounds – the blog makes your failures in security a lot like medical conditions or illnesses, and the Hackology blog is supposed to analyze it and provide you with a diagnosis. The diagnosis is basically the blog’s suggestion on how you can solve the problem with your own counter-hacking methods. The blog is not just informative; its presentation is also highly entertaining.
defensestorm.com
The Defense Storm Blog has one and only one priority: how to ensure your utmost security. It is this priority which the blog emphasizes in all the articles that are posted on it. All the articles are written in such a way that they are framed as solutions to your existing problems related to your online security. In a world that teaches you to take your privacy seriously, there’s no doubt that you really need a blog like this.
purehacking.com
There are perhaps very few blog titles that will perfectly capture what the blog is about. Pure Hacking is among one of those very few blogs, because that’s exactly what the blog is about: pure hacking, and nothing else. Of course, the direction of learning how to blog is still geared towards ethical practices. This means penetration testing – hacking only to test the limits of your system’s security, as well as ways by which you can protect those limits.
sensecy.com
Here is a blog that gives you the lowdown on the latest hacking news and other updates about cyber threats. The very fact that you now live in a world that constantly asks you for private information via online platforms makes the Cyber Threat Insider blog very important. The updates posted on this blog come from all over the world, which means they’ve got you covered, literally.
creedsec.net
Do you consider yourself a beginner in hacking, but you’d like to move along in your improvement? Have CreedSec help you to achieve that goal of developing your hacking skills, in an ethical way, of course. CreedSec presents its tips and suggestions in a way that’s user-friendly; there’s always a step-by-step process, which beginners can’t seem to get enough of.
hackread.com
A website based in Italy which features the latest hacking news and trends in the tech world. The articles featured keep readers well informed and up to date. When the world was trembled by the existence of viruses such as malware, this site created a special category dedicated to such. This has been followed by thousands and continues to spread information about social media platforms and technology trends.
netragard.com
“We protect you from people like us,” so goes the slogan of the Netragard Blog. As a penetration testing blog, it is basically a blog that’s devoted to nothing else but ethical hacking. Because it’s ethical hacking, it’s basically a way of hacking that allows you to see and test the limits as well as vulnerabilities of your system. In identifying these weaknesses, you can better guard yourself against the possible threats to your security. Let Netragard tell you how.
def.camp
Although a blog originally meant for an IT conference, the content of the DefCamp’8 Blog is still as helpful as ever. With articles ranging from interviews with IT experts to regulations regarding hacking, the relevance is truly something which a potential hacker can’t deny. Check out the DefCamp’8 Blog so that you can experience it for yourself.
massivealliance.com
You can’t deny it – cyber security is truly a huge issue and concern these days. One moment, you’re just having fun with your online shopping and your expectations for the door-to-door delivery, and then the next moment, you realize your bank account and information has been hacked, thereby causing you to lose your money. If you’d like to know how to avoid such problems, then go right ahead and read the Massive Blog.
manishbhardwajblog.wordpress.com
The author of this blog, whose name is also the blog title, Manish Bhardwaj, is basically a well-meaning IT expert who simply wants to share what he knows. While some companies would rather sell their information for a very dear price, Bhardwaj simply makes hacking information and tips readily accessible through this simple blog, which the author says is ‘purely for educational purposes only’.
thesolutionfirm.com
In this blog, you’re bound to discover and learn more about ethical hacking. You’ll also see just how useful and beneficial it is for individuals and companies alike to get into ethical hacking. The blog tells you that not only will you be protecting your online network, but you’re also making sure that even the threats you can expect to encounter are just manageable ones.
basicsofhacking.com
If being new to information technology never fails to intimidate you and to make you feel that you’re not up to it, then let this blog prove otherwise. Basics of Ethical Hacking allows you to see that, with the right intentions, you can definitely make it happen for yourself and for others, thereby securing any online network more surely.
hackshade.com
Hackshade is one of those blogs that successfully hit two birds with one stone: on one hand, you get to become a better and more updated ethical hacker with all the blog’s helpful content; on the other hand, you are also never going to get bored with the blog’s attractive design and user-friendly layout. Try it out for yourself.
ethicalhackersclub.com
The Ethical Hackers Club blog is everything you hope it will be, and even more. It offers trainings for ethical hacking, with the due certifications to accompany these trainings. Apart from that, the blog also gives you the latest news about hacking around the globe. As a welcome bonus, you can also get some security tips from the same blog.
hackarma.com
Interesting and catchy enough because of such creativity in formulating the word play in the blog title, Hackarma tells you all about the cause and effect of high-profile hacking attacks. What this basically means is that the blog will help you understand how and why hacking happens on a large-scale basis, as well as its likely consequences, its effects and impact on the global sphere.
top-hackingnews.blogspot.com
This blog is as transparent as transparent can get. With the name ‘Top Hacking News’, that’s precisely what the blog gives you. This way, you can assure yourself, by reading the blog, that you’re keeping yourself on your toes in terms of hacking news and current cyber security issues. In this day age, being up-to-date is truly a priority.
hackersonlineclub.com
Do you want to gear yourself up for the latest cyber news? Or maybe you just want to know what tools you ought to use to ensure maximum protection for your network? Or perhaps you’d like to get into ethical hacking so that you can test the limits of your own system’s security? For all those needs and more, check out Hackers Online Club.
toolswatch.org
It’s not everyday that a very serious sounding blog title goes hand in hand with such a cute icon as part of the blog logo. That’s probably the first thing you’ll notice about ToolsWatch. But if you look a little deeper, you’ll eventually see that there’s definitely more to ToolsWatch than meets the eye. The principle behind the blog is to present certain tools that help to secure your system against threats which will only destroy it. Thus, Toolswatch lives up to its name.
offensivesec.blogspot.com
Though the title certainly sounds too strong, the Offensive Sec 3.0 blog does not seek to offend, at all. If anything, it seeks only to ensure your protection as well as that of your network or your system, from whatever cyber threat there might lurking in every corner. In the end, you will learn that to be beat a hacker means to be one yourself, and Offensive Sec 3.0 will definitely help you in this.
terrycutler.com
Terry Cutler, the author of Terry Cutler’s blog, is a self-proclaimed ethical hacker. And he actually has the certificates and recognitions to prove it. His blog, then, is dedicated to teaching others the principles behind ethical hacking, and why it’s a major need in today’s information and technology-driven society. The blog is also used to feature Terry’s achievements as an ethical hacker, to prove that he has your best interests at heart.
Tag :
Tech News