The Active Brain: How Google’s “ATLAS” Rewires Itself to Master Infinite Context

In my last article, we explored how DeepSeek’s Engram effectively gave AI a hippocampus—offloading static facts into a massive, efficient lookup table. It was a breakthrough in separating memory from reasoning. But what if the model didn’t just “look up” memories? What if it actually rewired its own brain while it was reading, optimizing its … Read more

The Future of AI Architecture: How DeepSeek’s “Engram” Module Mimics Human Memory to Supercharge LLMs

AI’s "Hippocampus" Moment: Bridging Biological Memory and Machine Learning Architecture

The race for Artificial General Intelligence (AGI) has hit a bottleneck: efficiency. Standard Large Language Models (LLMs) are “computationally heavy” because they don’t know how to separate thinking from remembering. A groundbreaking research paper from Peking University and DeepSeek-AI—“Conditional Memory via Scalable Lookup: A New Axis of Sparsity for Large Language Models” (arXiv:2601.07372)—is changing the … Read more

An easy introduction to LLM agents – structure and components

Components of an autonomous AI Agent

LLM based autonomous agents can use Generative AI to automate processes without needing human intervention. There is a subtle distinction between autonomous agents and workflows as explained in this anthropic blog. If you know the series of steps needed to automate a process, then you can use a workflow. However, if you need a system … Read more

Understand CLIP (Contrastive Language-Image Pre-Training) — Visual Models from NLP

CLIP introduces a model that enables zero shot learning for a new dataset (in addition to a new example) by using NLP to supervise pre-training. i.e., To identify an object, you can provide the name or description of a new object that the model has not seen before. Traditionally a computer vision model was trained … Read more

Amazon S3 lifecycle policies

Why S3 lifecycle policies S3 lifecycle policies allow you to do two things: Reduce cost by deleting data that is not longer required. Implement your security policies by : Retaining data for the required duration and reducing cost by moving it to low cost storage. Deleting data that you are not allowed to retain for … Read more

Amazon S3 encryption

Encryption allows you to store objects in such a way that only an entity that has the encryption key, or access to the encryption key can access that object. S3 Encryption types There are five ways in which you can encrypt objects that you write to S3. S3 Server Side Encryption using Amazon S3 Managed … Read more

Amazon S3 access control and permissions

There are three ways to control access to s3 bucket and its objects Using bucket policies. Using bucket Access Control Lists (ACL) Using User policies ACL is used only in cases where Objects are not owned by the bucket owner. I.e. objects are uploaded by another account and the bucket owner does not own these … Read more