top of page


What is Retrieval-Augmented Generation(RAG)?
Retrieval-Augmented Generation(RAG)
Vishwanath Akuthota
Oct 17, 20234 min read
11
0


WiFi Deauthentication Attacks Using Kali Linux
Deauthentication Attack
Vishwanath Akuthota
Oct 11, 20237 min read
1,041
0

The Most Important Libraries For Python 🐍
As such, the programming language has numerous applications and has been widely adopted by all sorts of communities, from data science...
Vishwanath Akuthota
Jan 10, 20232 min read
7
0

Gender recognition by voice is a technique in which you can determine the gender category of a speak
Gender recognition can be helpful in many fields, including automatic speech recognition, in which it can help improve the performance of...
Vishwanath Akuthota
Oct 25, 20224 min read
10
0


Learnings from Parle-G business model
Parle G, had not changed their price for over 25 long years! Ever wondered how is that even possible? Along with many operational...
Drpinnacle
Aug 5, 20222 min read
143
0

What is Machine Learning Ops
In this article, we’ll focus on dissecting the three main aspects of model deployment. These are: experiment tracking machine learning...
Vishwanath Akuthota
Jul 27, 20227 min read
22
0

An HTTP Toolkit For Security Research
Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro,...
Vishwanath Akuthota
Jun 14, 20221 min read
280
0
bottom of page