BT

InfoQ Homepage News Microsoft Expands the Availability of Its Cognitive Services: Anomaly Detector and Custom Vision

Microsoft Expands the Availability of Its Cognitive Services: Anomaly Detector and Custom Vision

This item in japanese

Bookmarks

Microsoft have recently announced the public preview of Anomaly Detector and general availability of Custom Vision. With both services, Microsoft further expands its Cognitive Services offering for its customers.

Anomaly Detector is a new service within the Azure Cognitive Services family allowing users to detect unusual patterns or rare events in their data that could translate to identifying problems. The Anomaly Detector stems from the Machine Learning Anomaly Detection API, and Microsoft itself relies on this service as Anand Raman, chief of staff, Data Group at Microsoft, states in a blog post:

Today, over 200 teams across Azure and other core Microsoft products rely on Anomaly Detector to boost the reliability of their systems by detecting irregularities in real-time and accelerating troubleshooting. Through a single API, developers can easily embed anomaly detection capabilities into their applications to ensure high data accuracy, and automatically surface incidents as soon as they happen.

With this service, the financial industry, for instance, can leverage the service to detect anomalies more accurately in credit card transactions or large money transfers. Older approaches by financial institutes were on, for example, rule engines to determine a deviation in a transaction – leading to false positives. However, according to Eric Ogren, an analyst at 451 Research, in a TechTarget article:

Anomaly detection usually requires a person, not a machine learning algorithm, to ultimately pass a verdict on whether something is indeed a problem.

The Azure Anomaly Detector is currently only available in West U.S. 2 and West Europe regions, and Microsoft plans to release the service in all regions upon general availability. Furthermore, the pricing in the standard tier is 0.157 dollars per 1000 transactions, while in the free tier customers are allowed 20000 transactions per month. Note that the costs will double on general availability. 

In addition to the preview of Anomaly Detector, Microsoft has graduated their Custom Vision service to general availability. With this machine learning-powered service developers can quickly build, deploy, and improve custom image classifiers to recognize content in images. As Raman states in the same blog post:

Developers can train their own classifier to recognize what matters most in their scenarios, or export these custom classifiers to run them offline and in real time on iOS (in CoreML), Android (in TensorFlow), and many other devices on the edge. The exported models are optimized for the constraints of a mobile device providing incredible throughput while still maintaining high accuracy.

 


Source: https://azure.microsoft.com/en-us/blog/new-updates-to-azure-ai-expand-ai-capabilities-for-developers/

With the GA release of Custom Vision, developers can also benefit from several enhancements, such as:

  • Easy integration of computer vision capabilities into applications with 3.0 REST APIs and SDKs
  • The ability to export classifiers to support Azure Resource Manager (ARM) for Raspberry Pi 3 and the Vision AI Dev Kit
  • An advanced training feature to specify a compute time budget, which allows the service to identify the best training and augmentation settings experimentally

An example use case of Custom Vision is from Minsur, a mining company in Peru, that uses the service for the detection of foam levels in water being treated for livestock and agriculture. The company uses the combination of Custom Vision and Azure video analytics to replace a highly manual process so that employees can focus on more strategic projects within the operation. 

Lastly, the Custom Vision is available in various US, Europe, and Asia regions, and the pricing details are available on the pricing page.

Rate this Article

Adoption
Style

Hello stranger!

You need to Register an InfoQ account or or login to post comments. But there's so much more behind being registered.

Get the most out of the InfoQ experience.

Allowed html: a,b,br,blockquote,i,li,pre,u,ul,p

Community comments

  • Micro-soft Expands the Availability of it’s Cognitive Anomaly Detector Custom Vision

    by Yvonne McGinnis /

    Your message is awaiting moderation. Thank you for participating in the discussion.

    I always welcome advances in new technologies, products, and services. In fact, I’m Inspired by the trends, innovation, or creation of many of these technological troubleshooting solutions. I’m encouraged by the competitiveness of the ‘big players’ in the tech industry because they bring us the best in technology strategies, methodologies, and best practices trending in the 21st century.

    As an administrator, I’m always looking for that one solution to add to my configuration settings that will launch a comeback, solve an unsolvable problem for one of my team members, or a resolution that will give me an edge for team/employer.

    I think in the field of technology we are all looking for the quick-fix that detects unusual patterns, false positives, rare events, or the perturbations of normal behavior that potentially can transcend to something more sinister; whether it’s the presence of intentional/unintentional intrusion(s).

    The concept of anomaly detection is an interesting one because of the various schemes available. Notwithstanding, all schemes on the surface appear to be promising when detecting “novel intrusions”, and in certain database systems.

    In comparative analysis, the question to ask is how effective is this data security solution, and is it safe enough to be reliable. To answer that question we can take a look at a number of studies on anomaly detection but I refer back to a 1998 study by DARPA. DARPA’s 1998 comparative analysis and metrics report on Anomaly Detection suggests that anomaly detection schemes are promising when detecting “novel intrusions in real network data”.

    The question for stakeholders, system administrators, developers, architects, users, and engineers is currently what advances have Microsoft and others made since 1998 that solidifies justifiably so trusting our big data solely to anomaly detection services.

Allowed html: a,b,br,blockquote,i,li,pre,u,ul,p

Allowed html: a,b,br,blockquote,i,li,pre,u,ul,p

BT

Is your profile up-to-date? Please take a moment to review and update.

Note: If updating/changing your email, a validation request will be sent

Company name:
Company role:
Company size:
Country/Zone:
State/Province/Region:
You will be sent an email to validate the new email address. This pop-up will close itself in a few moments.