đź’Ş
3 Week Bootcamp: Building Realtime LLM Application
  • Introduction
    • Timelines and Structure
    • Course Syllabus
    • Meet your Instructors
    • Action Items
  • Basics of LLM
    • What is Generative AI?
    • What is a Large Language Model?
    • Advantages and Applications of Large Language Models
    • Bonus Resource: Multimodal LLMs and Google Gemini
  • Word Vectors Simplified
    • What is a Word Vector
    • Word Vector Relationships
    • Role of Context in LLMs
    • Transforming Vectors into LLM Responses
      • Neural Networks and Transformers (Bonus Module)
      • Attention and Transformers (Bonus Module)
      • Multi-Head Attention, Transformers Architecture, and Further Reads (Bonus Module)
    • Graded Quiz 1
  • Prompt Engineering
    • What is Prompt Engineering
    • Prompt Engineering and In-context Learning
    • Best Practices to Follow in Prompt Engineering
    • Token Limits in Prompts
    • Ungraded Prompt Engineering Excercise
      • Story for the Excercise: The eSports Enigma
      • Your Task
  • Retrieval Augmented Generation and LLM Architecture
    • What is Retrieval Augmented Generation (RAG)?
    • Primer to RAG: Pre-Trained and Fine-Tuned LLMs
    • In-Context Learning
    • High-level LLM Architecture Components for In-context Learning
    • Diving Deeper: LLM Architecture Components
    • LLM Architecture Diagram and Various Steps
    • RAG versus Fine-Tuning and Prompt Engineering
    • Versatility and Efficiency in Retrieval-Augmented Generation (RAG)
    • Key Benefits of RAG for Enterprise-Grade LLM Applications
    • Similarity Search in Vectors (Bonus Module)
    • Using kNN and LSH to Enhance Similarity Search in Vector Embeddings (Bonus Module)
    • Graded Quiz 2
  • Hands-on Development
    • Prerequisites
    • Dropbox Retrieval App in 15 Minutes
      • Building the app without Dockerization
      • Understanding Docker
      • Building the Dockerized App
    • Amazon Discounts App
      • How the Project Works
      • Repository Walkthrough
    • How to Run 'Examples'
  • Bonus Resource: Recorded Interactions from the Archives
  • Bootcamp Keynote Session on Vision Transformers
  • Final Project + Giveaways
    • Prizes and Giveaways
    • Tracks for Submission
    • Final Submission
Powered by GitBook
On this page
  1. Prompt Engineering
  2. Ungraded Prompt Engineering Excercise

Story for the Excercise: The eSports Enigma

PreviousUngraded Prompt Engineering ExcerciseNextYour Task

Last updated 1 year ago

In Lyon's bustling technology district, Valérie Leroux was a sorceress of software, a conjurer of code. She had created an analytics program that could break down and analyze real-time strategy for the hyper-competitive game "WarScape Online." Yet, a dark cloud hovered over her digital utopia; someone had infiltrated the sacred realms of her software, sowing discord in its algorithms and threatening to upheave the imminent World Championship.

Valérie knew she needed specialized help. That's where Detective Sophie Martin came into the picture—a school friend turned cybersecurity sleuth, who could trace digital footprints like a bloodhound. Sophie's interest piqued immediately; this was no ordinary hack. The integrity of eSports, a burgeoning industry with more at stake than just pixels and points, hung in the balance.

Sophie arrived at Valérie's whimsical office, where tech gadgets met old-world elegance. "If I understand correctly," Sophie said, half-amused, "your software is essentially the Professor McGonagall of eSports—stern but invaluable?"

"Very much so," Valérie responded. "Except someone has confounded McGonagall into giving rather questionable advice."

---

The World Championship transformed the local stadium into a cathedral of digital warfare. Fans donned vibrant costumes, clutching merchandise like talismans. Valérie and Sophie occupied a discreet corner, scrutinizing the spectators, players, and support staff. One person caught their attention—Jean-Pierre, a competitor in the analytics sector. He was glued to his phone, a sentinel of secrets, scheming in silence.

As the matches unfolded, Valérie's software hiccuped, whispering faulty strategies into the ears of players. Sophie and Valérie exchanged worried glances; their nemesis had struck again.

---

In a secluded chamber, Sophie leaned in, "We're hunting a phantom, someone who knows how to erase their traces. What can we find that they've left behind?"

Armed with her laptop, Valérie navigated the labyrinthine logs of her software. The hacker had disguised their moves meticulously, but a sliver of evidence gleamed—a distinctive encryption pattern that Jean-Pierre had championed in professional talks. It was circumstantial but pointed.

Sophie contacted her sources. Jean-Pierre had a solid alibi—he'd been hosting a webinar during the time of the original hack. However, upon deeper probing, Sophie uncovered something fascinating. Jean-Pierre had recently acquired software capable of initiating a delayed, remote hack. He could set up the intrusion ahead of time and have an alibi for when it occurred.

Confronted with this evidence, Jean-Pierre's resistance shattered. Financial desperation had led him into the murky waters of sabotage. Though he tried to justify his actions, the weight of ethical betrayal was inescapable.

---

As they parted ways after the case, Sophie reflected, "Every technology is a Pandora's Box, isn't it? Filled with wonders and horrors alike."

Valérie agreed, solemnly. "Yes, but the key is recognizing which is which and acting accordingly."

Sophie drove back to her precinct, and Valérie to her fortress of dreams, both forever bound by the curious adventure that had led them through the veils separating right and wrong, reality and virtuality.