Skip to content
icon icon

Building AI Intuition

Connecting the dots...

icon icon

Building AI Intuition

Connecting the dots...

  • Home
  • ML Basics
  • Model Intuition
  • Encryption
  • Privacy Tech
  • Concepts
  • Musings
  • About
  • Home
  • ML Basics
  • Model Intuition
  • Encryption
  • Privacy Tech
  • Concepts
  • Musings
  • About
Close

Search

Subscribe
icon icon

Building AI Intuition

Connecting the dots...

icon icon

Building AI Intuition

Connecting the dots...

  • Home
  • ML Basics
  • Model Intuition
  • Encryption
  • Privacy Tech
  • Concepts
  • Musings
  • About
  • Home
  • ML Basics
  • Model Intuition
  • Encryption
  • Privacy Tech
  • Concepts
  • Musings
  • About
Close

Search

Subscribe
Recent Posts
April 7, 2026
Exploring “Linear” in Linear Regression
April 7, 2026
The curious case of R-Squared: Keep Guessing
March 11, 2026
[C1] What Machines Actually Do (And What They Don’t)
March 11, 2026
[ML x] Machine Decision: From One Tree to a Forest
November 2, 2024
[ML 1] AI Paradigm Shift: From Rules to Patterns
November 5, 2025
[ML 1.a] ML Foundations – Linear Combinations to Logistic Regression
November 14, 2025
[ML 1.b] Teaching AI Models: Gradient Descent
November 19, 2025
[ML 2] Making Sense Of Embeddings
November 22, 2025
[ML 2.a] Word2Vec: Start of Dense Embeddings
November 28, 2025
[ML 2.b] Measuring Meaning: Cosine Similarity
December 3, 2025
[ML 2.c] Needle in the Haystack: Embedding Training and Context Rot
February 16, 2026
[MI 3] Seq2Seq Models: Basics behind LLMs
February 13, 2026
[MU 1] Advertising in the Age of AI
December 9, 2025
[EN 1.a] Breaking the “Unbreakable” Encryption – 1
December 13, 2025
[EN 1.b] Breaking the “Unbreakable” Encryption – 2
December 18, 2025
[PET 1] Privacy Enhancing Technologies – Introduction
December 21, 2025
[PET 1.a] Privacy Enhancing Technologies (PETs) — Part 1
December 25, 2025
[PET 1.b] Privacy Enhancing Technologies (PETs) — Part 2
December 30, 2025
[PET 1.c] Privacy Enhancing Technologies (PETs) — Part 3
February 2, 2026
[MI 1] An Intuitive Guide to CNNs and RNNs
November 9, 2025
[MI 2] How CNNs Actually Work
January 16, 2026
How Smart Vector Search Works
Machine Learning Basics

[ML 2.c] Needle in the Haystack: Embedding Training and Context Rot

You’ve probably experienced this: you paste a 50-page document into ChatGPT or Claude, ask a specific question…

Privacy Tech

[PET 1.a] Privacy Enhancing Technologies (PETs) — Part 1

How Your Data Gets Protected Every time you browse a website, click an ad, or make a purchase, data flows through…

Model Intuition

[MI 3] Seq2Seq Models: Basics behind LLMs

When you use Google Translate to turn a complex English sentence into Spanish, or when you ask Gemini to summarize a…

Encryption

[EN 1.b] Breaking the “Unbreakable” Encryption – 2

In Part 1, we covered the “Safe” (Symmetric) and the “Mailbox” (Asymmetric). The TL;DR: we use…

Machine Learning Basics

How Smart Vector Search Works

In the ever-evolving world, the art of forging genuine connections remains timeless. Whether it’s with colleagues,…

Encryption

[EN 1.a] Breaking the “Unbreakable” Encryption – 1

If you’ve spent any time in tech, you’ve heard of AES, RSA, and Diffie-Hellman. We treat them like digital…

Recent Posts

  • Exploring “Linear” in Linear Regression
    Linear regression is one of those things you learn early, use forever, and never quite slow down to inspect. So here’s a slow inspection —… Read more: Exploring “Linear” in Linear Regression
  • The curious case of R-Squared: Keep Guessing
    Most explanations of R-squared start with a formula: Then they say something like “the proportion of variance explained by the model” and move on. And… Read more: The curious case of R-Squared: Keep Guessing
  • [C1] What Machines Actually Do (And What They Don’t)
    Every time you use Google Maps at 5:30 PM, something remarkable happens — and it has nothing to do with intelligence. The app doesn’t “know”… Read more: [C1] What Machines Actually Do (And What They Don’t)
  • [ML x] Machine Decision: From One Tree to a Forest
    Every time a bank approves or denies a loan in milliseconds, every time Netflix decides what to recommend next, every time a fraud detection system… Read more: [ML x] Machine Decision: From One Tree to a Forest
  • [MI 3] Seq2Seq Models: Basics behind LLMs
    When you use Google Translate to turn a complex English sentence into Spanish, or when you ask Gemini to summarize a long email, the computer… Read more: [MI 3] Seq2Seq Models: Basics behind LLMs
  • [MU 1] Advertising in the Age of AI
    When you search for a product today, ads quietly shape what you notice. When you scroll Instagram, ads compete for slices of your attention. For… Read more: [MU 1] Advertising in the Age of AI
  • [MI 1] An Intuitive Guide to CNNs and RNNs
    When your phone recognizes “Hey Siri,” a CNN is probably listening. When Google Translate converts your sentence into French, an RNN (or its descendants) is… Read more: [MI 1] An Intuitive Guide to CNNs and RNNs
  • How Smart Vector Search Works
    In the ever-evolving world, the art of forging genuine connections remains timeless. Whether it’s with colleagues, clients, or partners, establishing a genuine rapport paves the way for collaborative success.
  • [PET 1.c] Privacy Enhancing Technologies (PETs) — Part 3
    Privacy-Preserving Computation and Measurement In Part 1, we covered how organizations protect data internally — minimization, anonymization, query controls, and differential privacy. In Part 2,… Read more: [PET 1.c] Privacy Enhancing Technologies (PETs) — Part 3
  • [PET 1.b] Privacy Enhancing Technologies (PETs) — Part 2
    Secure Collaboration Without Sharing Raw Data In Part 1, we covered how individual organizations protect data internally — minimization, anonymization, query controls, and differential privacy.… Read more: [PET 1.b] Privacy Enhancing Technologies (PETs) — Part 2
  • [PET 1.a] Privacy Enhancing Technologies (PETs) — Part 1
    How Your Data Gets Protected Every time you browse a website, click an ad, or make a purchase, data flows through dozens of systems. Companies… Read more: [PET 1.a] Privacy Enhancing Technologies (PETs) — Part 1
  • [PET 1] Privacy Enhancing Technologies – Introduction
    Every time you browse a website, click an ad, make a purchase, or train an ML model, data flows through systems. Companies need this data… Read more: [PET 1] Privacy Enhancing Technologies – Introduction
  • [EN 1.b] Breaking the “Unbreakable” Encryption – 2
    In Part 1, we covered the “Safe” (Symmetric) and the “Mailbox” (Asymmetric). The TL;DR: we use high-speed symmetric safes to store our data, but we… Read more: [EN 1.b] Breaking the “Unbreakable” Encryption – 2
  • [EN 1.a] Breaking the “Unbreakable” Encryption – 1
    If you’ve spent any time in tech, you’ve heard of AES, RSA, and Diffie-Hellman. We treat them like digital duct tape—they just work, they keep… Read more: [EN 1.a] Breaking the “Unbreakable” Encryption – 1
  • [ML 2.c] Needle in the Haystack: Embedding Training and Context Rot
    You’ve probably experienced this: you paste a 50-page document into ChatGPT or Claude, ask a specific question about something buried on page 37, and the… Read more: [ML 2.c] Needle in the Haystack: Embedding Training and Context Rot
  • [ML 2.b] Measuring Meaning: Cosine Similarity
    In the previous posts, we established that embeddings turn everything into points in space and that Word2Vec showed how to learn those points from context.… Read more: [ML 2.b] Measuring Meaning: Cosine Similarity
  • [ML 2.a] Word2Vec: Start of Dense Embeddings
    When you type a search query into Google or ask Spotify to find “chill acoustic covers,” the system doesn’t just look for those exact letters.… Read more: [ML 2.a] Word2Vec: Start of Dense Embeddings
  • [ML 2] Making Sense Of Embeddings
    When you search on Amazon for “running shoes,” the system doesn’t just look for those exact words – it also shows you “jogging sneakers,” “athletic… Read more: [ML 2] Making Sense Of Embeddings
  • [ML 1.b] Teaching AI Models: Gradient Descent
    In the last post, we established the big idea: machine learning is about finding patterns from data instead of writing rules by hand. But we… Read more: [ML 1.b] Teaching AI Models: Gradient Descent
  • [MI 2] How CNNs Actually Work
    In the ever-evolving world, the art of forging genuine connections remains timeless. Whether it’s with colleagues, clients, or partners, establishing a genuine rapport paves the way for collaborative success.
  • [ML 1.a] ML Foundations – Linear Combinations to Logistic Regression
    Every machine learning model — from simple house price predictors to neural networks with billions of parameters — starts with the same fundamental building block:… Read more: [ML 1.a] ML Foundations – Linear Combinations to Logistic Regression
  • [ML 1] AI Paradigm Shift: From Rules to Patterns
    Every piece of software you’ve ever shipped works the same way. A developer thinks through the logic and writes explicit rules — if the user… Read more: [ML 1] AI Paradigm Shift: From Rules to Patterns

Related Posts:

  • [ML 2.c] Needle in the Haystack: Embedding Training…
  • [ML 2] Making Sense Of Embeddings
  • [ML 1.a] ML Foundations - Linear Combinations to…
  • [ML 2.b] Measuring Meaning: Cosine Similarity

Categories

icons8 pencil 100
ML Basics

Back to the basics

screenshot 1
Model Intuition

Build model intuition

icons8 lock 100 (1)
Encryption

How encryption works

icons8 gears 100
Privacy Tech

What protects privacy

screenshot 4
Musings

Writing is thinking

Recent Posts

  • Exploring “Linear” in Linear Regression
  • The curious case of R-Squared: Keep Guessing
  • [C1] What Machines Actually Do (And What They Don’t)
  • [ML x] Machine Decision: From One Tree to a Forest
  • [MI 3] Seq2Seq Models: Basics behind LLMs
  • [MU 1] Advertising in the Age of AI
  • [MI 1] An Intuitive Guide to CNNs and RNNs
  • How Smart Vector Search Works
  • [PET 1.c] Privacy Enhancing Technologies (PETs) — Part 3
  • [PET 1.b] Privacy Enhancing Technologies (PETs) — Part 2

You May Have Missed

Concepts

Exploring “Linear” in Linear Regression

Archit Sharma
By Archit Sharma
April 7, 2026
Concepts

The curious case of R-Squared: Keep Guessing

Archit Sharma
By Archit Sharma
April 7, 2026
Machine Learning Basics

[C1] What Machines Actually Do (And What They Don’t)

Archit Sharma
By Archit Sharma
March 11, 2026
Model Intuition

[ML x] Machine Decision: From One Tree to a Forest

Archit Sharma
By Archit Sharma
March 11, 2026
Model Intuition

[MI 3] Seq2Seq Models: Basics behind LLMs

Archit Sharma
By Archit Sharma
February 16, 2026
Musings

[MU 1] Advertising in the Age of AI

Archit Sharma
By Archit Sharma
February 13, 2026
Model Intuition

[MI 1] An Intuitive Guide to CNNs and RNNs

Archit Sharma
By Archit Sharma
February 2, 2026
Machine Learning Basics

How Smart Vector Search Works

Archit Sharma
By Archit Sharma
January 16, 2026
Privacy Tech

[PET 1.c] Privacy Enhancing Technologies (PETs) — Part 3

Archit Sharma
By Archit Sharma
December 30, 2025
Copyright 2026 — Building AI Intuition. All rights reserved. Blogsy WordPress Theme