Embeddings
Automatically translate your 3D assets into actionable data.
{
"assets": [
{
"asset_id": "EA58321",
"name": "helmet.fbx",
"embedding": [0.1234, -0.5678, ..., -0.1357]
}
]
}
Harness the world’s first 3D encoder to power search, recommendations, classification, and more.
Why teams choose Loci Embeddings
Built on the world’s largest 3D datasets
Our encoder is trained on more than 10M indexed 3D assets, making it the most accurate of its kind.
Tailor made for 3D
Loci embeddings are built on frontier computer vision research to directly encode 3D assets. Detect unique 3D properties like geometry, materials, and lighting.
Enterprise-grade security
SOC-2 certified (pending) and available to deploy via the cloud or on-premises.
Output into platform-agnostic JSON
NodeJs
Serverless
Ruby
Python
PHP
Go
Java
Elixir
Rest
REQUEST
fetch("https://loci-api.com/3d/find-similar", { body: asset, method: "POST" })
RESPONSE
{ "assets": [ { "asset_id": "EA58321", "name": "helmet.fbx", "embedding": [0.1234, -0.5678, 0.9876, -0.4321, 0.2468, ..., -0.1357] } ] }
Loci Embeddings | CONVENTIONAL ALTERNATIVES | |
---|---|---|
accuracy | Directly encodes 3D assets | Encodes image and text approximations |
speed | 1million+ per month (can be parallelized) | Variable |
security | Cloud and on-premises deployments | Data used to train 3rd party models |
support | GLB, GLTF, OBJ, FBX, BLEND, PLY, STL, USDZ, OFF, ZIP | Not supported |
OUR INFRASTRUCTURE
SaaS
Start tagging assets instantly with Loci's blazing fast API. No backend infrastructure management needed.
Best for
- Small to medium-sized businesses
- Experimenting with our models
- Non-sensitive data
CLOUD INFRASTRUCTURE
Cloud Platform
Access the Loci platform through a Dockerfile compatible with AWS, Azure, and more.
Best for
- Organizations seeking easy integration with cloud services
- Handling sensitive intellectual property
YOUR INFRASTRUCTURE
Private Deployment
Securely bring Loci's models into your own infrastructure to protect sensitive data.
Best for
- Organizations with strict security needs
- Maximum control and customization
- Handling sensitive intellectual property