company resources to look at inappropriate, restricted, or prohibited images. For
example, the images might be related to airplanes, certain buildings, or locations
that are targets for security breaches.
With image analysis, you can view the most relevant images from one or more
documents in one or more packet capture files in one display instead of being
forced to open each document and viewing the images.
Do'stlaringiz bilan baham: