Homepage
Open in app
Sign in
Get started
COMPUTER VISION
NLP
ML
End-to-end ML project
TRENDING
ABOUT
AUTHOR RESOURCES
NEWSLETTER
Follow
Hack-Proof Your Workforce: A Foolproof Guide to Cybersecurity Awareness Training
Hack-Proof Your Workforce: A Foolproof Guide to Cybersecurity Awareness Training
A successful cybersecurity awareness program is essential for safeguarding your organization from internal and external threats.
K.A.Malikoo
Aug 22
Intrusion Detection Systems (IDS): A Closer Look
Intrusion Detection Systems (IDS): A Closer Look
An Intrusion Detection System (IDS) stands as a vigilant sentinel, monitoring network traffic for malicious activity or policy violations…
K.A.Malikoo
Aug 22
Build a Classification Learning Network — Softmax Regression (2)
Build a Classification Learning Network — Softmax Regression (2)
Building a Softmax Regression Model from Scratch: A Step-by-Step Guide with Python and MNIST.
Troy Chuang
Aug 21
Build a Classification Learning Network — Softmax Regression (1)
Build a Classification Learning Network — Softmax Regression (1)
Previously, I discussed how to construct a Linear Regression Model as a neural network. The linear regression model is capable of…
Troy Chuang
Aug 20
Web Development vs. Data Science: Key Differences and Similarities
Web Development vs. Data Science: Key Differences and Similarities
Explore the key differences and surprising similarities between web development and data science. Discover which field suits you best.
Abhishek Tyagi
Aug 20
vLLM and LLM-compressor are here
vLLM and LLM-compressor are here
Its very easy (and not so cheap) to use LLMs with your application. But only if you use a SaaS, like ChatGPT or Gemini. What happens if you…
Vassilios Karakoidas
Aug 19
The Quest for Fire and AI: Igniting the Future
The Quest for Fire and AI: Igniting the Future
Disclaimer: This essay is not intended to be a scientific or technical analysis but rather a reflective exploration of the parallels…
Everton Gomede, PhD
Aug 18
Growing Your AI — A Mango Tree Guide to Ethical Scaling
Growing Your AI — A Mango Tree Guide to Ethical Scaling
AI is growing at an unprecedented rate, but are we nurturing it responsibly? Just like cultivating a magnificent mango tree, scaling AI…
Aytijha Chakraborty
Aug 17
Insider Threats: A Silent Danger!
Insider Threats: A Silent Danger!
Insider threats pose a unique and often overlooked risk to organizations. Unlike external attacks, insider threats originate from within…
K.A.Malikoo
Aug 17
Generative AI with LLM Complete Interview Guide: Part 1
Generative AI with LLM Complete Interview Guide: Part 1
Generative AI, and LLMs specifically, is a General Purpose Technology that is useful for a variety of applications.
Narender Kumar
Aug 16
Top 50 Frequently-asked JavaScript Interview Questions
Top 50 Frequently-asked JavaScript Interview Questions
JavaScript is a flexible and widely used programming language that is needed to build websites.
Kiran Maan
Aug 16
The New Wave Data Scientist
The New Wave Data Scientist
In one of the earlier pieces, “The Role of the Data Scientist” we delved into the multifaceted responsibilities that come with this job…
Andrei Damian
Aug 16
How to Integrate Apache DolphinScheduler with AWS EMR&Redshift
How to Integrate Apache DolphinScheduler with AWS EMR&Redshift
In this article, we will share the practice of integrating DolphinScheduler with AWS’s EMR and Redshift.
Apache DolphinScheduler
Aug 15
Building CLIP Model from scratch using PyTorch | Contrastive Language-Image Pre-Training
Building CLIP Model from scratch using PyTorch | Contrastive Language-Image Pre-Training
Hey 👋
Shubh Mishra
Aug 13
Hacking websites with PHP Deserialization + LFI + PHP
Hacking websites with PHP Deserialization + LFI + PHP
Using PHP(S) files -> source files instead of PHP to bypass WAF to access source code. From there a deserialization vulnerability can be…
Alimuhammadsecured
Aug 13
Someone innovates, someone regulates
Someone innovates, someone regulates
I heard some time ago, the quote:
Vassilios Karakoidas
Aug 13
What Is Perceptron?
What Is Perceptron?
The Building Block Of Neural Networks
Kevalsakhiya
Aug 12
Leveraging Social Media Data
Leveraging Social Media Data
The goal of every business is to maximize profit with minimal investment. If you’re not utilizing social media data for your business…
Ayomitan Adesua
Aug 11
Persona Hub: The Methodology of Persona-Driven Data Synthesis
Persona Hub: The Methodology of Persona-Driven Data Synthesis
A Look into “Scaling Synthetic Data Creation with 1,000,000,000 Personas” by Chan, Wang, Yu, Mi, and Yu (2024)
Milani Mcgraw
Aug 11
Introducing JSON Schemas for AI Data Integrity
Introducing JSON Schemas for AI Data Integrity
As AI models, particularly large language models (LLMs), become integrated into business critical applications, developers face the…
Stephen Collins
Aug 11
A Practical Introduction to Predictive Analytics
A Practical Introduction to Predictive Analytics
We live in an age where data is often regarded as a gold mine, or ‘the new oil’, businesses are increasingly turning to predictive…
Ayomitan Adesua
Aug 11
RAG Foundry: A Framework for Enhancing LLMs for RAG
RAG Foundry: A Framework for Enhancing LLMs for RAG
In recent years, the field of artificial intelligence has gone through a lot of advancements, particularly in the domain of Large Language…
Keyur Ramoliya
Aug 9
Don’t Be the Baker Who Can’t Smell the Cake
Don’t Be the Baker Who Can’t Smell the Cake
TL;DR: Whether you’re developing a product or selling it, understanding the fundamentals is essential.
Andrei Damian
Aug 9
I cloned my cousin’s drawing style
I cloned my cousin’s drawing style
easy with Dreambooth
Arthur Lagacherie
Aug 9
Panda Power: How Data Science Transforms Creative Writing and Reading
Panda Power: How Data Science Transforms Creative Writing and Reading
Picture this: A panda, not the furry black-and-white kind munching on bamboo, but a data-crunching, code-savvy panda wielding the power of…
Taeja Williams
Aug 7
About The Deep Hub
Latest Stories
Archive
About Medium
Terms
Privacy
Teams