Vishwanath AkuthotaOct 17, 20234 min readWhat is Retrieval-Augmented Generation(RAG)?Retrieval-Augmented Generation(RAG)
Vishwanath AkuthotaOct 11, 20237 min readWiFi Deauthentication Attacks Using Kali LinuxDeauthentication Attack
Vishwanath AkuthotaOct 25, 20224 min readGender recognition by voice is a technique in which you can determine the gender category of a speakGender recognition can be helpful in many fields, including automatic speech recognition, in which it can help improve the performance of...
DrpinnacleAug 5, 20222 min readLearnings from Parle-G business modelParle G, had not changed their price for over 25 long years! Ever wondered how is that even possible? Along with many operational...
Vishwanath AkuthotaJul 27, 20227 min readWhat is Machine Learning Ops In this article, we’ll focus on dissecting the three main aspects of model deployment. These are: experiment tracking machine learning...
Vishwanath AkuthotaJun 14, 20221 min readAn HTTP Toolkit For Security ResearchHetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro,...