PinnedDr. Ashish Bamania‘AI In 100 Images’: I’m Making My New Book Available For FreeHere’s a Collection of 100 Stunning Visuals with Clear, Concise & No-fluff Explanations of 100 Must-Know Concepts in AI todayJun 72Jun 72
PinnedDr. Ashish BamaniaMy Most Viewed Medium Stories (Updated Weekly)My Story Stats On MediumAug 6, 20233Aug 6, 20233
Dr. Ashish BamaniainLevel Up CodingA Squad Of Open-Source LLMs Can Now Beat OpenAI’s Closed-Source GPT-4oA deep dive into how the Mixture-of-Agents (MoA) model leverages the collective strengths of multiple open-source LLMs and beats GPT-4o14h ago114h ago1
Dr. Ashish BamaniainLevel Up CodingKolmogorov-Arnold Networks (KANs) Are Being Used To Boost Graph Deep Learning Like Never BeforeA deep dive into how Graph Kolmogorov-Arnold Networks (GKANs) are improving Graph Deep Learning to surpass traditional approaches4d ago34d ago3
Dr. Ashish BamaniainLevel Up CodingSuperfast Matrix-Multiplication-Free LLMs Are Finally HereA deep dive into Matrix-Multiplication-Free LLMs that might drastically decrease the use of GPUs in AI, unlike todayJun 206Jun 206
Dr. Ashish BamaniainLevel Up CodingGoogle’s New Algorithms Just Made Searching Vector Databases Faster Than EverA Deep Dive into how Google’s ScaNN and SOAR Search algorithms supercharge the performance of Vector DatabasesJun 181Jun 181
Dr. Ashish BamaniainLevel Up CodingFollowing Apple & Signal, Zoom Moves To Post-Quantum Cryptography. Is Classical Cryptography Dying?A Deep Dive into Classical Cryptography, How Quantum Computers Break It and How Post-Quantum Cryptography Saves the Internet with Their…May 281May 281
Dr. Ashish BamaniainLevel Up CodingBend — A Rust-Backed Language That Supercharges Parallel Computing Like Never BeforeA programming language that feels like Python and scales like CUDA, without needing any effort to make your code parallel, is here.May 187May 187
Dr. Ashish BamaniainLevel Up CodingA Deep Dive into SHA-256 By Learning To Hash by HandA thorough exploration of the fundamental details of the algorithm that preserves the security of today’s computer systemsMay 141May 141