🚀
10 Days Realtime LLM Bootcamp
  • Introduction
    • Getting Started
    • Course Syllabus
    • Course Structure
    • Prerequisites
    • Greetings from your Instructors
    • First Exercise (Ungraded)
  • Basics of LLM
    • What is Generative AI?
    • What is a Large Language Model?
    • Advantages and Applications of Large Language Models
    • Bonus Resource: Multimodal LLMs
  • Word Vectors Simplified
    • What is a Word Vector
    • Word Vector Relationships
    • Role of Context in LLMs
    • Transforming Vectors into LLM Responses
      • Neural Networks and Transformers (Bonus Module)
      • Attention and Transformers (Bonus Module)
      • Multi-Head Attention and Further Reads (Bonus Module)
    • Let's Track Our Progress
  • Prompt Engineering
    • What is Prompt Engineering
    • Prompt Engineering and In-context Learning
    • Best Practices to Follow in Prompt Engineering
    • Token Limits in Prompts
    • Prompt Engineering Excercise
      • Story for the Excercise: The eSports Enigma
      • Tasks in the Excercise
  • Retrieval Augmented Generation and LLM Architecture
    • What is Retrieval Augmented Generation (RAG)?
    • Primer to RAG Functioning and LLM Architecture: Pre-trained and Fine-tuned LLMs
    • In-Context Learning
    • High level LLM Architecture Components for In-context Learning
    • Diving Deeper: LLM Architecture Components
    • LLM Architecture Diagram and Various Steps
    • RAG versus Fine-Tuning and Prompt Engineering
    • Versatility and Efficiency in Retrieval-Augmented Generation (RAG)
    • Key Benefits of RAG for Enterprise-Grade LLM Applications
    • Similarity Search in Vectors (Bonus Module)
    • Using kNN and LSH to Enhance Similarity Search in Vector Embeddings (Bonus Module)
    • Track your Progress
  • Hands-on Development
    • Prerequisites
    • Dropbox Retrieval App in 15 Minutes
      • Building the app without Dockerization
      • Understanding Docker
      • Using Docker to Build the App
    • Amazon Discounts App
      • How the Project Works
      • Step-by-Step Process
    • How to Run the Examples
  • Live Interactions with Jan Chorowski and Adrian Kosowski | Bonus Resource
  • Final Project + Giveaways
    • Prizes and Giveaways
    • Tracks for Submission
    • Final Submission
Powered by GitBook
On this page
  1. Prompt Engineering
  2. Prompt Engineering Excercise

Story for the Excercise: The eSports Enigma

PreviousPrompt Engineering ExcerciseNextTasks in the Excercise

Last updated 1 year ago

In Lyon's bustling technology district, Valérie Leroux was a sorceress of software, a conjurer of code. She had created an analytics program that could break down and analyze real-time strategy for the hyper-competitive game "WarScape Online." Yet, a dark cloud hovered over her digital utopia; someone had infiltrated the sacred realms of her software, sowing discord in its algorithms and threatening to upheave the imminent World Championship.

Valérie knew she needed specialized help. That's where Detective Sophie Martin came into the picture—a school friend turned cybersecurity sleuth, who could trace digital footprints like a bloodhound. Sophie's interest piqued immediately; this was no ordinary hack. The integrity of eSports, a burgeoning industry with more at stake than just pixels and points, hung in the balance.

Sophie arrived at Valérie's whimsical office, where tech gadgets met old-world elegance. "If I understand correctly," Sophie said, half-amused, "your software is essentially the Professor McGonagall of eSports—stern but invaluable?"

"Very much so," Valérie responded. "Except someone has confounded McGonagall into giving rather questionable advice."

---

The World Championship transformed the local stadium into a cathedral of digital warfare. Fans donned vibrant costumes, clutching merchandise like talismans. Valérie and Sophie occupied a discreet corner, scrutinizing the spectators, players, and support staff. One person caught their attention—Jean-Pierre, a competitor in the analytics sector. He was glued to his phone, a sentinel of secrets, scheming in silence.

As the matches unfolded, Valérie's software hiccuped, whispering faulty strategies into the ears of players. Sophie and Valérie exchanged worried glances; their nemesis had struck again.

---

In a secluded chamber, Sophie leaned in, "We're hunting a phantom, someone who knows how to erase their traces. What can we find that they've left behind?"

Armed with her laptop, Valérie navigated the labyrinthine logs of her software. The hacker had disguised their moves meticulously, but a sliver of evidence gleamed—a distinctive encryption pattern that Jean-Pierre had championed in professional talks. It was circumstantial but pointed.

Sophie contacted her sources. Jean-Pierre had a solid alibi—he'd been hosting a webinar during the time of the original hack. However, upon deeper probing, Sophie uncovered something fascinating. Jean-Pierre had recently acquired software capable of initiating a delayed, remote hack. He could set up the intrusion ahead of time and have an alibi for when it occurred.

Confronted with this evidence, Jean-Pierre's resistance shattered. Financial desperation had led him into the murky waters of sabotage. Though he tried to justify his actions, the weight of ethical betrayal was inescapable.

---

As they parted ways after the case, Sophie reflected, "Every technology is a Pandora's Box, isn't it? Filled with wonders and horrors alike."

Valérie agreed, solemnly. "Yes, but the key is recognizing which is which and acting accordingly."

Sophie drove back to her precinct, and Valérie to her fortress of dreams, both forever bound by the curious adventure that had led them through the veils separating right and wrong, reality and virtuality.