Wire Wire: A West African Cyber Threat — fascinating look inside the malware Nigerian scammers use. Amusingly, the security researchers were able to study what the scammers do because the scammers inadvertently installed their malware on their own boxes, so their keystrokes were logged to command-and-control machines. Dog-fooding your malware is just not best practice, guys. (via BoingBoing)
Learn faster. Dig deeper. See farther.
Join the O'Reilly online learning platform. Get a free trial today and find answers on the fly, or master something new and useful.
Latent Predictor Networks for Code Generation (PDF) — Using this framework, we address the problem of generating programming code from a mixed natural language and structured specification. We create two new data sets for this paradigm derived from the collectible trading card games Magic the Gathering and Hearthstone. On these, and a third preexisting corpus, we demonstrate that marginalizing multiple predictors allows our model to outperform strong benchmarks.
Omote Demonstration (YouTube) — stunning real-time face tracking and projection mapping system. Starts out as makeup and then gets so much more wow. Demo two is where the acid kicks in. (via BoingBoing)