đź’»
RAG and LLM Bootcamp
  • Welcome to the Bootcamp
    • Course Structure
    • Course Syllabus and Timelines
    • Know your Educators
    • Action Items and Prerequisites
    • Kick-Off Session for the Bootcamp
  • Basics of LLMs
    • What is Generative AI?
    • What is a Large Language Model?
    • Advantages and Applications of LLMs
    • Bonus Resource: Multimodal LLMs and Google Gemini
  • Word Vectors, Simplified
    • What is a Word Vector?
    • Word Vector Relationships
    • Role of Context in LLMs
    • Transforming Vectors into LLM Responses
    • Bonus: Overview of the Transformer Architecture
      • Attention Mechanism
      • Multi-Head Attention and Transformer Architecture
      • Vision Transformers (ViTs)
    • Bonus: Future of LLMs? | By Transformer Co-inventor
    • Graded Quiz 1
  • Prompt Engineering and Token Limits
    • What is Prompt Engineering
    • Prompt Engineering and In-context Learning
    • For Starters: Best Practices
    • Navigating Token Limits
    • Hallucinations in LLMs
    • Prompt Engineering Excercise (Ungraded)
      • Story for the Excercise: The eSports Enigma
      • Your Task fror the Module
  • RAG and LLM Architecture
    • What is Retrieval Augmented Generation (RAG)?
    • Primer to RAG: Pre-trained and Fine-Tuned LLMs
    • In-context Learning
    • High-level LLM Architecture Components for In-context Learning
    • Diving Deeper: LLM Architecture Components
    • Basic RAG Architecture with Key Components
    • RAG versus Fine-Tuning and Prompt Engineering
    • Versatility and Efficiency in RAG
    • Key Benefits of using RAG in an Enterprise/Production Setup
    • Hands-on Demo: Performing Similarity Search in Vectors (Bonus Module)
    • Using kNN and LSH to Enhance Similarity Search (Bonus Module)
    • Bonus Video: Implementing End-to-End RAG | 1-Hour Session
    • Graded Quiz 2
  • Hands-on Development
    • Prerequisites (Must)
    • Docker Basics
    • Your Hands-on RAG Journey
    • 1 – First RAG Pipeline
      • Building with Open AI
      • How it Works
      • Using Open AI Alternatives
      • RAG with Open Source and Running "Examples"
    • 2 – Amazon Discounts App
      • How the Project Works
      • Building the App
    • 3 – Private RAG with Mistral, Ollama and Pathway
      • Building a Private RAG project
      • (Bonus) Adaptive RAG Overview
    • 4 – Realtime RAG with LlamaIndex/Langchain and Pathway
      • Understand the Basics
      • Implementation with LlamaIndex and Langchain
  • Final Project + Giveaways
    • Prizes and Giveaways
    • Suggested Tracks for Ideation
    • Sample Projects and Additional Resources
    • Submit Project for Review
Powered by GitBook
On this page
  1. Prompt Engineering and Token Limits
  2. Prompt Engineering Excercise (Ungraded)

Story for the Excercise: The eSports Enigma

PreviousPrompt Engineering Excercise (Ungraded)NextYour Task fror the Module

Last updated 11 months ago

In Lyon's bustling technology district, Valérie Leroux was a sorceress of software, a conjurer of code. She had created an analytics program that could break down and analyze real-time strategy for the hyper-competitive game "WarScape Online." Yet, a dark cloud hovered over her digital utopia; someone had infiltrated the sacred realms of her software, sowing discord in its algorithms and threatening to upheave the imminent World Championship.

Valérie knew she needed specialized help. That's where Detective Sophie Martin came into the picture— a school friend turned cybersecurity sleuth, who could trace digital footprints like a bloodhound. Sophie's interest piqued immediately; this was no ordinary hack. The integrity of eSports, a burgeoning industry with more at stake than just pixels and points, hung in the balance.

Sophie arrived at Valérie's whimsical office, where tech gadgets met old-world elegance. "If I understand correctly," Sophie said, half-amused, "your software is essentially the Professor McGonagall of eSports—stern but invaluable?"

"Very much so," Valérie responded. "Except someone has confounded McGonagall into giving rather questionable advice."


The World Championship transformed the local stadium into a cathedral of digital warfare. Fans donned vibrant costumes, clutching merchandise like talismans. Valérie and Sophie occupied a discreet corner, scrutinizing the spectators, players, and support staff. One person caught their attention—Jean-Pierre, a competitor in the analytics sector. He was glued to his phone, a sentinel of secrets, scheming in silence.

As the matches unfolded, Valérie's software hiccuped, whispering faulty strategies into the ears of players. Sophie and Valérie exchanged worried glances; their nemesis had struck again.


In a secluded chamber, Sophie leaned in, "We're hunting a phantom, someone who knows how to erase their traces. What can we find that they've left behind?"

Armed with her laptop, Valérie navigated the labyrinthine logs of her software. The hacker had disguised their moves meticulously, but a sliver of evidence gleamed—a distinctive encryption pattern that Jean-Pierre had championed in professional talks. It was circumstantial but pointed.

Sophie contacted her sources. Jean-Pierre had a solid alibi—he'd been hosting a webinar during the time of the original hack. However, upon deeper probing, Sophie uncovered something fascinating. Jean-Pierre had recently acquired software capable of initiating a delayed, remote hack. He could set up the intrusion ahead of time and have an alibi for when it occurred.

Confronted with this evidence, Jean-Pierre's resistance shattered. Financial desperation had led him into the murky waters of sabotage. Though he tried to justify his actions, the weight of ethical betrayal was inescapable.


As they parted ways after the case, Sophie reflected, "Every technology is a Pandora's Box, isn't it? Filled with wonders and horrors alike."

Valérie agreed, solemnly. "Yes, but the key is recognizing which is which and acting accordingly."

Sophie drove back to her precinct, and Valérie to her fortress of dreams, both forever bound by the curious adventure that had led them through the veils separating right and wrong, reality and virtuality.