Farhan Naqvifarhanbytemaster.hashnode.dev·Apr 2, 2024How context window of LLMS cause hindrance in RAG appsA comprehensive overview of the challenges posed by restricted context windows in Retrieval-Augmented Generation (RAG) apps:. Token Limit and Context window in RAG: Large Language Models (LLMs): RAG models often rely on pre-trained LLMs for the gene...DiscussAI
Farhan Naqvifarhanbytemaster.hashnode.dev·Mar 30, 2024Issues with RAG applicationsRetrieval-Augmented Generation (RAG) is a powerful technique, but it does come with some challenges: Finding Relevant Documents: The retrieval process is crucial, as RAG relies on identifying relevant documents to inform the generation process. If t...DiscussAI
Farhan Naqvifarhanbytemaster.hashnode.dev·Mar 29, 2024Internal working of a RAG ApplicationLarge Language Models (LLMs) are powerful tools, but their capabilities are limited by the data they're trained on. They lack access to private user data and the ever-growing stream of newly published information. This challenge along with the limita...Discussworking of rag
Keep Codingkeepcodingblog.hashnode.dev·Mar 21, 2024Brandolini's Law aka the Bullshit Asymmetry Principle.Before we start on Brandolini's Law: I can't recommend enough the seminal text by American philosopher Harry Frankfurt: "On Bullshit". Arguably one of the most important works of XX century philosophy and it's very accessible, so don't be afraid to t...DiscussProductivity
Safia M.ravenstarline.hashnode.dev·Mar 12, 2024Transitioning into the World of Information Technology 🚀💻📊tap tap is this thing on? 🎙️ Blessings Everyone! Welcome to my Blog! My name is Safia M. and I recently started my journey as a Software Programming Student at the Amber Group LimitedAmber Heart Coding Academy. Currently I am Specializing in Web Dev...Discuss·20 likes·33 readsinformation technology
Garvit Singhgarvit05.hashnode.dev·Mar 8, 2024Protection & Security In Operating SystemsProtection & Security in Operating Systems IntroductionIn the digital world, operating systems (OS) act as the foundation for secure computing. Protection and security are crucial aspects of an OS, safeguarding its resources and ensuring seamless, re...Discuss·20 likestechnology
Garvit Singhgarvit05.hashnode.dev·Mar 4, 2024File System In Operating SystemsFile System In Operating System File system manages how data is to be stored or fetched. Files are logically divided into blocks and these blocks are then mapped onto the sectors in a hard disk. This mapping may or may not be contiguous. File Attribu...Discuss·10 likesComputer Science
Janhavi Khambejanhavi785.hashnode.dev·Mar 2, 2024Heap TreeApplications and its Types ∆ Exploring Heap Trees: Heap trees are a vital part of computer science, often utilized for their efficiency in managing data. They offer a flexible and powerful way to organize and prioritize elements. In this blog, we'll ...Discussinformation technology
Aditya Kumbharheaptreee.hashnode.dev·Mar 1, 2024Heap tree 🌲Applications and its Types ∆ Exploring Heap Trees: Heap trees are a vital part of computer science, often utilized for their efficiency in managing data. They offer a flexible and powerful way to organize and prioritize elements. In this blog, we'll ...Discussinformation technology
Garvit Singhgarvit05.hashnode.dev·Feb 29, 2024Disk Architecture, Management & SchedulingHard Disk Architecture In Operating Systems Multiple platters are connected together by a spindle and spin together in either clockwise or anticlockwise direction. Each platter has an upper surface and a lower surface. Each platter has a read/write ...Discuss·10 likesComputer Science