Style Transfer as a Service

March 19, 2018 · 14 minute read · Tags: Computer Vision , Deep Learning , Machine Learning , Serverless

Picmatix.com is an online tool that creates digital art by transferring styles to user pictures. This blog post outlines the serverless architecture that powers the website.

Continue reading

Neural Networks for Visual Tasks

October 22, 2017 · 3 minute read · Tags: Computer Vision , Deep Learning , Machine Learning

We, as humans, can accurately and precisely tell whether a picture depicts a bird or not by just having a quick glimpse at it. Computers, on the other hand, can hardly see anything meaningful in the collection of 1’s and 0’s that make a virtual image. Not long ago, these kind of visual recognition tasks that humans naturally excel at were extremely difficult for computers to even attempt to do.

Continue reading

Picmatix, a pragmatic Machine Learning company

April 13, 2017 · 4 minute read · Tags: Deep Learning , Machine Learning , Neural Networks

Picmatix, a Machine Learning company focused on getting things done. Let’s talk.

Continue reading

Moving to rodrigo.red

April 10, 2017 · 1 minute read · Tags: Life

Dear reader,

I’m moving my blog to rodrigo.red where I’ll write about the intersection between machine learning, artificial intelligence and humans. If you are interested in these topics, feel free to follow my new blog at https://rodrigo.red/blog/

Continue reading

MsPacMan Artificial Intelligence

March 1, 2013 · 2 minute read · Tags: AI , Pacman , artificial intelligence

After taking the course CS7032: Agents, AI & Games at Trinity College, Dublin. We were asked to design and implement an artificial intelligence algorithm for the famous PacMan game, under the rules of pacman-vs-ghosts.net (Which seems to be down as of now) and using our knowledge of abstract architectures.

Continue reading

2012 in review

January 8, 2013 · 1 minute read

The WordPress.com stats helper monkeys prepared a 2012 annual report for this blog. Here’s an excerpt: 4,329 films were submitted to the 2012 Cannes Film Festival. This blog had **33,000** views in 2012. If each view were a film, this blog would power 8 Film Festivals Click here to see the complete report.

Continue reading

Java, WebGL and cross-platform game development

November 13, 2012 · 2 minute read

WebGL

Web browsers are probably the most widely used software in desktops and mobile computers. They have become the swiss army knife of the Web 2.0 digital world and it is under this context that a Javascript API for rendering GPU-based graphics was born: WebGL.

Continue reading

Firefox FormGrabber, IV – Who's guilty and Conclusion

April 30, 2012 · 3 minute read · Tags: Firefox , Windows

Who’s guilty ?

Both Firefox and Windows are to blame for.

Firefox

Firefox simplifies the process of finding the target function PR_Write as it is inside a dll, compromising the security of the web browser.

Windows

Windows lets our malicious FormGrabber interfere with the normal Firefox’s workflow without asking any questions. It lets our process execute code within Firefox’s Virtual Address Space and more importantly it lets our malicious process change segments of Firefox code.

Continue reading

Firefox FormGrabber, III - Code Injection

April 30, 2012 · 4 minute read · Tags: Firefox , Windows

How does it work ?

Proof of concept

The proof of concept is open source and can be found here: https://github.com/recastrodiaz/formGrabber/. It includes instructions on how to run it on your machine.

Continue reading

Firefox FormGrabber, II - Definitions and Firefox internals

April 30, 2012 · 2 minute read · Tags: Firefox , Windows

FormGrabber Almost every sensitive information, such as passwords, login credentials, bank account numbers, credit card numbers, etc, is sent from your web browser when you fill an online “form” to a secure remote sever trough the web standard HTTPS POST. A form grabber is a malicious code that intercepts POST data coming from web “forms” before the encryption takes place, thus avoiding the added security of the https protocol.

Continue reading