top of page
Vishwanath Akuthota
Oct 17, 20234 min read
What is Retrieval-Augmented Generation(RAG)?
Retrieval-Augmented Generation(RAG)
100
Vishwanath Akuthota
Oct 11, 20237 min read
WiFi Deauthentication Attacks Using Kali Linux
Deauthentication Attack
8270
Vishwanath Akuthota
Oct 25, 20224 min read
Gender recognition by voice is a technique in which you can determine the gender category of a speak
Gender recognition can be helpful in many fields, including automatic speech recognition, in which it can help improve the performance of...
100
Drpinnacle
Aug 5, 20222 min read
Learnings from Parle-G business model
Parle G, had not changed their price for over 25 long years! Ever wondered how is that even possible? Along with many operational...
1420
Vishwanath Akuthota
Jul 27, 20227 min read
What is Machine Learning Ops
In this article, we’ll focus on dissecting the three main aspects of model deployment. These are: experiment tracking machine learning...
220
Vishwanath Akuthota
Jun 14, 20221 min read
An HTTP Toolkit For Security Research
Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro,...
2450
bottom of page