Ron Bhubandspoke.amastelek.com·Jul 11, 2024🦓Best Practices are Doomed to Failure if Implemented Blindly😎In theory, there is no difference between theory and practice. But, in practice, there is." Jan LA van de Snepscheut. The prevalent view is to provide a set of best practices that span all IT disciplines. This is also often referred to as benchmarki...Discussbest practices
Ron Bhubandspoke.amastelek.com·Jul 7, 2024🚀 Cybersecurity Lessons from the Challenger Disaster: Risk Assessment & Preparedness🌐In the annals of history, the Space Shuttle Challenger disaster stands as a stark reminder of the catastrophic consequences that can arise from poor decision-making and a lack of thorough risk assessment. On that fateful day in January 1986, the shut...DiscussChallenger
Ron Bhubandspoke.amastelek.com·May 27, 2024🪛Crafting a Comprehensive Request for Information (RFI) in IT Projects ❓Requests for Information (RFIs) and Requests for Proposals (RFPs) are often extensive documents, primarily focused on procurement compliance. However, clarity on the solution's details is often lacking. In this article, we'll dive into the essential ...DiscussRequest for Information
Farhan Naqvifarhanbytemaster.hashnode.dev·Apr 2, 2024How context window of LLMS cause hindrance in RAG appsA comprehensive overview of the challenges posed by restricted context windows in Retrieval-Augmented Generation (RAG) apps:. Token Limit and Context window in RAG: Large Language Models (LLMs): RAG models often rely on pre-trained LLMs for the gene...DiscussAI
Ron Bhubandspoke.amastelek.com·Mar 30, 2024🔥Cyber Security: The Demise of Information Technology's Rusty Locks 🚀🔒In the fast-paced world of technology, the only constant is change. Mechanical hard drives, affectionately called "spinning rust," have been outpaced by sleek solid-state drives. Similarly, the cybersecurity landscape has seen a monumental shift, ren...DiscussRusty Locks
Farhan Naqvifarhanbytemaster.hashnode.dev·Mar 30, 2024Issues with RAG applicationsRetrieval-Augmented Generation (RAG) is a powerful technique, but it does come with some challenges: Finding Relevant Documents: The retrieval process is crucial, as RAG relies on identifying relevant documents to inform the generation process. If t...DiscussAI
Farhan Naqvifarhanbytemaster.hashnode.dev·Mar 29, 2024Internal working of a RAG ApplicationLarge Language Models (LLMs) are powerful tools, but their capabilities are limited by the data they're trained on. They lack access to private user data and the ever-growing stream of newly published information. This challenge along with the limita...Discussworking of rag
Keep Codingkeepcodingblog.hashnode.dev·Mar 21, 2024Brandolini's Law aka the Bullshit Asymmetry Principle.Before we start on Brandolini's Law: I can't recommend enough the seminal text by American philosopher Harry Frankfurt: "On Bullshit". Arguably one of the most important works of XX century philosophy and it's very accessible, so don't be afraid to t...DiscussProductivity
Ron Bhubandspoke.amastelek.com·Mar 19, 2024👀The Art of Eyeballing: A Necessity in Troubleshooting Technical Woes 🔧In the world of technology, nothing can replace the keen observation and hands-on approach of troubleshooting—an art often overlooked in the age of remote diagnostics. The anecdotal experiences of seasoned professionals highlight the significance of ...DiscussEyeballing
Safia M.ravenstarline.hashnode.dev·Mar 12, 2024Transitioning into the World of Information Technology 🚀💻📊tap tap is this thing on? 🎙️ Blessings Everyone! Welcome to my Blog! My name is Safia M. and I recently started my journey as a Software Programming Student at the Amber Group LimitedAmber Heart Coding Academy. Currently I am Specializing in Web Dev...Discuss·20 likes·33 readsinformation technology