top of page
Vishwanath Akuthota
Oct 17, 20234 min read
What is Retrieval-Augmented Generation(RAG)?
Retrieval-Augmented Generation(RAG)
100
Vishwanath Akuthota
Oct 11, 20237 min read
WiFi Deauthentication Attacks Using Kali Linux
Deauthentication Attack
8270
Vishwanath Akuthota
Oct 9, 20233 min read
Understanding the Fundamental Differences Between Computers and Servers
In the world of technology, the terms "computer" and "server" are often used interchangeably, leading to confusion for many. While both...
150
Vishwanath Akuthota
Aug 29, 20232 min read
What Machine Learning is NOT good at
Introduction: Machine Learning (ML) has witnessed remarkable advancements and is powering innovations across various industries. However,...
80
Vishwanath Akuthota
Aug 19, 20233 min read
The Challenges and Outcomes of Implementing Customer Clustering for Banks Using Machine Learning
Customer clustering is a machine learning technique that can be used to group customers together based on their similarities. This can be...
90
Vishwanath Akuthota
Aug 5, 20232 min read
AI combats Ageism
Harnessing the Power of AI to Combat Ageism Introduction: Ageism, the discrimination or stereotyping based on age, remains a significant...
70
Vishwanath Akuthota
Jul 21, 20232 min read
Safeguarding Large Language Models: Understanding and Mitigating Potential Attacks
Large language models have revolutionized the field of Natural Language Processing (NLP) and Artificial Intelligence (AI), empowering us...
70
Vishwanath Akuthota
Jul 15, 20233 min read
Empowering Human Knowledge Growth: AI/ML Use Cases and Implementation Framework for Organisations
In today's data-driven world, organisations are increasingly turning to Artificial Intelligence (AI) and Machine Learning (ML) to unlock...
180
bottom of page