Exploring a predictive maintenance use case on GCP using hard drive data from BackBlaze
☆12Mar 12, 2020Updated 6 years ago
Alternatives and similar repositories for predictive-maintenance-demo
Users that are interested in predictive-maintenance-demo are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Looker block for analysing Google Cloud Platform Billing and BigQuery data access logs☆35Jan 6, 2022Updated 4 years ago
- ☆10Mar 31, 2021Updated 5 years ago
- Using the Yelp Fusion API to find local businesses without an online presence☆12Jun 2, 2021Updated 4 years ago
- ☆10Apr 14, 2018Updated 8 years ago
- demo of a predictive maintenance strategy on mock data for upstream oil & gas☆17Apr 22, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Rapid RNA-seq pipeline using AWS lambda functions for alignment☆13Mar 22, 2019Updated 7 years ago
- Sample code demonstrating Prometheus metrics ingestion into Amazon CloudWatch☆17Mar 4, 2022Updated 4 years ago
- 🧬📈 Turn DNA sequences into interactive visualizations☆13Jan 20, 2023Updated 3 years ago
- This nodejs module will read and archive files in AWS S3 bucket using stream, and store the archive file in S3 as well.☆12Aug 17, 2021Updated 4 years ago
- Public (anonymized) predictive maintenance datasets from Huawei German Research Center.☆12Feb 7, 2020Updated 6 years ago
- Anomaly detection in industrial IoT sensors (Collecting data for predictive maintenance)☆11Mar 3, 2020Updated 6 years ago
- 🖥 Approaching predictive maintenance and engine failure detection, based on open datasets.☆10Feb 1, 2018Updated 8 years ago
- Example of a basic blockchain within the Oracle Database☆19Dec 16, 2017Updated 8 years ago
- Train a bidirectional or normal LSTM recurrent neural network to generate text on a free GPU using any dataset. Just upload your text fil…☆12Jan 29, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆16Jul 30, 2020Updated 5 years ago
- Terraform module that creates a lambda to destroy all resources in an AWS account.☆20Feb 18, 2026Updated last month
- DIY commercial datasets on Google Cloud Platform☆92Apr 8, 2026Updated last week
- ☆12Feb 16, 2024Updated 2 years ago
- ☆28Mar 17, 2025Updated last year
- This repository is for the breast cancer classification video on Hello World HD (youtube channel)☆16Apr 20, 2019Updated 6 years ago
- crawls and stores list of torrent links☆26May 22, 2023Updated 2 years ago
- A simple website to interact with the Pokemon Go friend codes posted in the r/PokemonGoFriends subreddit☆26Jan 5, 2023Updated 3 years ago
- Variational Adversarial Deep Domain Adaptation implementation (TensorFlow 1.x)☆12Jan 14, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- HiddenVM is a futuristic tool powered by KVM designed to combine the powerful amnesic nature of Tails and the impenetrable design of Whon…☆11Jul 22, 2022Updated 3 years ago
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆16Feb 10, 2023Updated 3 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 10 months ago
- RandomWarpingSeries (RWS) is a simple code for generating the vector representation of time-series for time-series classification, cluste…☆21Jan 21, 2019Updated 7 years ago
- Tracks collect 'em all achievement in The Witcher 3 by reading save file☆16Nov 15, 2023Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆15Jan 9, 2019Updated 7 years ago
- GRAND: Group-based Anomaly Detection for Large-Scale Monitoring of Complex Systems☆15Oct 25, 2020Updated 5 years ago
- Automatically perform advanced NTLM hash relay attacks☆15Nov 4, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A Ble Fingerprint Sniffer based on SDR.☆19May 13, 2020Updated 5 years ago
- Hybrid ES-RNN models for time series forecasting☆19May 14, 2021Updated 4 years ago
- [Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection☆11Nov 14, 2022Updated 3 years ago
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago
- ☆12Jun 12, 2021Updated 4 years ago
- Web app built with Python backend and ReactJS frontend to be used as a starter template.☆28Oct 22, 2018Updated 7 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago