News

Documentation enhancements for Deephaven v0.14.0 | Deephaven

Documentation enhancements for Deephaven v0.14.0 | Deephaven

This summer, several interns have joined the Deephaven Community Core team! They're each taking on unique projects, ranging from Bitcoin to baseball, and writing about their experiences.In consequence, you'll find varied blog content throughout the next two months, as well as additions to our deephaven-examples repository.Highlights from our blog, user documentation and YouTube channel are discussed below.How to win $5.6 million on your summer vacation​Paul Pellegrene and Joshua Koskie have set out to accomplish what no one has yet succeeded to do: win the coveted MLB Beat the Streak prize - $5.6 million. Can Python programming and data science provide…
Read More
Getting my feet wet with Kubernetes

Getting my feet wet with Kubernetes

Recently, I’ve spent some time playing around with Kubernetes (K8s). Having never used it before, I gave it my humble first try. I used it as part of a project where I wanted to use self host some tools on a VPS and write some server code for some life automations and potentially a blog in the future. You can find the Github Repo for the project at the time of writing for it here. Did I need to use K8s? Nope. Should I have used K8s? Probably not. My situation and setup really doesn’t call for K8s nor does…
Read More
Unlocking High-Accuracy Differentially Private Image Classification through Scale

Unlocking High-Accuracy Differentially Private Image Classification through Scale

Research Published 17 June 2022 Authors Soham De, Leonard Berrada, Jamie Hayes, Samuel L. Smith, Borja Balle A recent DeepMind paper on the ethical and social risks of language models identified large language models leaking sensitive information about their training data as a potential risk that organisations working on these models have the responsibility to address. Another recent paper shows that similar privacy risks can also arise in standard image classification models: a fingerprint of each individual training image can be found embedded in the model parameters, and malicious parties could exploit such fingerprints to reconstruct the training data from…
Read More
Analyzing MLB hits 101: a quant rookie at data science Spring Training | Deephaven

Analyzing MLB hits 101: a quant rookie at data science Spring Training | Deephaven

Yogi Berra’s right: “It’s tough to make predictions, especially about the future.”To win MLB’s fantasy game Beat-the-Streak(“BTS”), you have to do precisely that.$5.6 million is yours if you can correctly identify an MLB-player that will get a hit in the next game...57 times in a row.Last week we hinted at, then more overtly described some specifics related to our goal to battle BTS this summer. My good friend, Paul, and I intend to build models and experiences to help everyone make well-informed BTS predictions, deliver web interfaces to help us all track the action, and create real-time simulators of what…
Read More
0x00. Shell, navigation

0x00. Shell, navigation

File System Organization Like Windows, the files on a Linux system are arranged in what is called a hierarchical directory structure. This means that they are organized in a tree-like pattern of directories (called folders in other systems), which may contain files and subdirectories. The first directory in the file system is called the root directory. The root directory contains files and subdirectories, which contain more files and subdirectories and so on and so on. The basic three commands include: pwd (print working directory) cd (change directory) ls (list files and directories). pwd The directory we are standing in is…
Read More
BYOL-Explore: Exploration with Bootstrapped Prediction

BYOL-Explore: Exploration with Bootstrapped Prediction

Research Published 20 June 2022 Authors Zhaohan Daniel Guo, Shantanu Thakoor, Miruna Pîslar, Bernardo Avila Pires, Florent Altché, Corentin Tallec, Alaa Saade, Daniele Calandriello, Jean-Bastien Grill, Yunhao Tang, Michal Valko, Rémi Munos, Mohammad Gheshlaghi Azar, Bilal Piot Second-person and top-down views of a BYOL-Explore agent solving Thow-Across level of DM-HARD-8, whereas pure RL and other baseline exploration methods fail to make any progress on Thow-Across. Curiosity-driven exploration is the active process of seeking new information to enhance the agent’s understanding of its environment. Suppose that the agent has learned a model of the world that can predict future events given…
Read More
Uncovering the truth about Bitcoin stock holders | Deephaven

Uncovering the truth about Bitcoin stock holders | Deephaven

In my last post, I used my understanding of Deephaven and its tools to predict some stock prices. This was a part of my more extensive study of the stock market.In March, a company called MicroStrategy took a $205 million Bitcoin-backed loan to purchase a large sum of extra Bitcoin. They wanted to protect their monetary assets from inflation. This purchase -- or rather bet -- is quite risky, as something like a margin call from low Bitcoin prices could cause them to lose a lot of their money. A possible side effect is a stock price that fluctuates based…
Read More
Leading a movement to strengthen machine learning in Africa

Leading a movement to strengthen machine learning in Africa

Life at DeepMind Published 23 June 2022 Avishkar Bhoopchand, a research engineer on the Game Theory and Multi-agent team, shares his journey to DeepMind and how he’s working to raise the profile of deep learning across Africa.Find out more about Deep Learning Indaba 2022, the annual gathering of the African AI community – taking place in Tunisia this August.What’s a typical day like at work?As a research engineer and technical lead, no day is the same. I usually start my day by listening to a podcast or audiobook on my commute into the office. After breakfast, I focus on emails…
Read More
Popular Anker power bank and Soundcore speaker recalled over potential fire risk

Popular Anker power bank and Soundcore speaker recalled over potential fire risk

Some Anker and Soundcore products are being recalled due to a manufacturing defect that could cause fires. Anker issued a recall for its (PowerCore 5K, A1112) this week, saying, “The lithium-ion battery in the affected power banks can overheat, potentially causing melting of plastic components, smoke and fire hazards.” Its audio brand, Soundcore, issued a recall for its in Black as well.The company has apparently started notifying who may own one of the affected devices via email, but you can double check the serial numbers — which are printed on the bottom of each device — using the above links…
Read More
Who’s who?: real-time face recognition | Deephaven

Who’s who?: real-time face recognition | Deephaven

Facial recognition technology is a powerful tool - computer vision can identify a person simply by scanning their face. You've encountered this whenever your phone recognizes friends to help you organize your photos, or if you need a face scan to enter your top secret laboratory. More seriously, facial recognition technology serves important purposes for law enforcement and surveillance experts. We'll leave that to the professionals. In this blog, I implement facial recognition in real time on the movie Avengers: Endgame, using Deephaven's powerful real-time analytic tools. We'll show you how to easily ingest the data into a platform where…
Read More
No widgets found. Go to Widget page and add the widget in Offcanvas Sidebar Widget Area.