🌿
Spring of Realtime LLMs
  • Get started with the Bootcamp!
    • Course Structure
    • Course Syllabus and Timelines
    • Know your Educators
    • Action Items and Prerequisites
    • Bootcamp Introductory Session | National Science Day
  • Basics of LLMs
    • What is Generative AI?
    • What is a Large Language Model?
    • Advantages and Applications of LLMs
    • Bonus Resource: Multimodal LLMs and Google Gemini
  • Word Vectors, Simplified
    • What is a Word Vector
    • Word Vector Relationships
    • Role of Context in LLMs
    • Transforming Vectors into LLM Responses
    • Bonus Section: Overview of the Transformers Architecture
      • Attention Mechanism
      • Multi-Head Attention and Transformers Architecture
      • Vision Transformers
    • Graded Quiz 1
  • Prompt Engineering and Token Limits (Early Access)
    • What is Prompt Engineering
    • Prompt Engineering and In-context Learning
    • Best Practices to Follow
    • Token Limits and Hallucinations
    • Prompt Engineering Excercise (Ungraded)
      • Story for the Excercise: The eSports Enigma
      • Your Task for the Module
  • RAG and LLM Architecture
    • What is Retrieval Augmented Generation (RAG)?
    • Primer to RAG: Pre-trained and Fine-Tuned LLMs
    • In-Context Learning
    • High-level LLM Architecture Components for In-Context Learning
    • Diving Deeper: LLM Architecture Components
    • Basic RAG Architecture with the Key Components
    • RAG versus Fine-Tuning and Prompt Engineering
    • Versatility and Efficiency in RAG
    • Key Benefits of using RAG in an Enterprise/Production Setup
    • Hands-on Demo: Performing Similarity Search in Vectors (Bonus Module)
    • Using kNN and LSH to Enhance Similarity Search (Bonus Module)
    • Graded Quiz 2
  • Hands-on Development
    • Prerequisites
    • 1 – Dropbox Retrieval App
      • Understanding Docker
      • Build the Dockerized App
      • Retrofitting our Dropbox app
    • 2 – Amazon Discounts App
      • How the Project Works
      • Building the App
    • 3 – RAG with Open Source and Running "Examples"
    • 4 (Bonus Section) – Realtime RAG with LlamaIndex and Pathway
      • Understanding the Basics
      • Implementation
      • Sample Business Use-case
  • Bonus Resource: Recorded Interactions from the Archives
  • Final Project + Giveaways
    • Prizes and Giveaways
    • Suggested Tracks for Ideation
    • Form for Submission
Powered by GitBook
On this page

Was this helpful?

  1. Prompt Engineering and Token Limits (Early Access)
  2. Prompt Engineering Excercise (Ungraded)

Story for the Excercise: The eSports Enigma

PreviousPrompt Engineering Excercise (Ungraded)NextYour Task for the Module

Last updated 1 year ago

Was this helpful?

In Lyon's bustling technology district, Valérie Leroux was a sorceress of software, a conjurer of code. She had created an analytics program that could break down and analyze real-time strategy for the hyper-competitive game "WarScape Online." Yet, a dark cloud hovered over her digital utopia; someone had infiltrated the sacred realms of her software, sowing discord in its algorithms and threatening to upheave the imminent World Championship.

Valérie knew she needed specialized help. That's where Detective Sophie Martin came into the picture— a school friend turned cybersecurity sleuth, who could trace digital footprints like a bloodhound. Sophie's interest piqued immediately; this was no ordinary hack. The integrity of eSports, a burgeoning industry with more at stake than just pixels and points, hung in the balance.

Sophie arrived at Valérie's whimsical office, where tech gadgets met old-world elegance. "If I understand correctly," Sophie said, half-amused, "your software is essentially the Professor McGonagall of eSports—stern but invaluable?"

"Very much so," Valérie responded. "Except someone has confounded McGonagall into giving rather questionable advice."


The World Championship transformed the local stadium into a cathedral of digital warfare. Fans donned vibrant costumes, clutching merchandise like talismans. Valérie and Sophie occupied a discreet corner, scrutinizing the spectators, players, and support staff. One person caught their attention—Jean-Pierre, a competitor in the analytics sector. He was glued to his phone, a sentinel of secrets, scheming in silence.

As the matches unfolded, Valérie's software hiccuped, whispering faulty strategies into the ears of players. Sophie and Valérie exchanged worried glances; their nemesis had struck again.


In a secluded chamber, Sophie leaned in, "We're hunting a phantom, someone who knows how to erase their traces. What can we find that they've left behind?"

Armed with her laptop, Valérie navigated the labyrinthine logs of her software. The hacker had disguised their moves meticulously, but a sliver of evidence gleamed—a distinctive encryption pattern that Jean-Pierre had championed in professional talks. It was circumstantial but pointed.

Sophie contacted her sources. Jean-Pierre had a solid alibi—he'd been hosting a webinar during the time of the original hack. However, upon deeper probing, Sophie uncovered something fascinating. Jean-Pierre had recently acquired software capable of initiating a delayed, remote hack. He could set up the intrusion ahead of time and have an alibi for when it occurred.

Confronted with this evidence, Jean-Pierre's resistance shattered. Financial desperation had led him into the murky waters of sabotage. Though he tried to justify his actions, the weight of ethical betrayal was inescapable.


As they parted ways after the case, Sophie reflected, "Every technology is a Pandora's Box, isn't it? Filled with wonders and horrors alike."

Valérie agreed, solemnly. "Yes, but the key is recognizing which is which and acting accordingly."

Sophie drove back to her precinct, and Valérie to her fortress of dreams, both forever bound by the curious adventure that had led them through the veils separating right and wrong, reality and virtuality.