Picmatix.com is an online tool that creates digital art by transferring styles to user pictures. This blog post outlines the serverless architecture that powers the website.
We, as humans, can accurately and precisely tell whether a picture depicts a bird or not by just having a quick glimpse at it. Computers, on the other hand, can hardly see anything meaningful in the collection of 1’s and 0’s that make a virtual image. Not long ago, these kind of visual recognition tasks that humans naturally excel at were extremely difficult for computers to even attempt to do.
Picmatix, a Machine Learning company focused on getting things done. Let’s talk.
I’m moving my blog to rodrigo.red where I’ll write about the intersection between machine learning, artificial intelligence and humans. If you are interested in these topics, feel free to follow my new blog at https://rodrigo.red/blog/
After taking the course CS7032: Agents, AI & Games at Trinity College, Dublin. We were asked to design and implement an artificial intelligence algorithm for the famous PacMan game, under the rules of pacman-vs-ghosts.net (Which seems to be down as of now) and using our knowledge of abstract architectures.
The WordPress.com stats helper monkeys prepared a 2012 annual report for this blog.
Here’s an excerpt:
4,329 films were submitted to the 2012 Cannes Film Festival. This blog had **33,000** views in 2012. If each view were a film, this blog would power 8 Film Festivals Click here to see the complete report.
Who’s guilty ?
Both Firefox and Windows are to blame for.
Firefox simplifies the process of finding the target function PR_Write as it is inside a dll, compromising the security of the web browser.
Windows lets our malicious FormGrabber interfere with the normal Firefox’s workflow without asking any questions. It lets our process execute code within Firefox’s Virtual Address Space and more importantly it lets our malicious process change segments of Firefox code.
FormGrabber Almost every sensitive information, such as passwords, login credentials, bank account numbers, credit card numbers, etc, is sent from your web browser when you fill an online “form” to a secure remote sever trough the web standard HTTPS POST.
A form grabber is a malicious code that intercepts POST data coming from web “forms” before the encryption takes place, thus avoiding the added security of the https protocol.