API Driven Cloud Native Solutions
Lesson 8 Study Notes
Topic List
- Understanding AI, ML, Deep Learning, and Generative AI
- 2. AI Use Cases
- 3. The Three Generations of Machine Learning
- 4. Pre-trained Models
- 5. Fine-tuned Models
- 6. Transfer Learning
- 7. Pre-trained vs Fine-tuned Models
- 8. Where These Models Live and How They Are Used
- 9. Interpretability in Fine-tuned Models
- 10. Cognitive Services
- 11. Azure Cognitive Services
- 12. Amazon AI Services
- 13. Google Cloud Vertex AI (Gemini Models)
- 14. Categories of Cognitive Services
- 15. Benefits of Using Cognitive Services
- 16. Cognitive Services in the Broader AI Workflow
- 17. Hugging Face
- 18. Tasks in Hugging Face
- 19. Models in Hugging Face
- 20. Datasets in Hugging Face
- 21. How Tasks, Models, and Datasets Interact
- 22. Example Workflow
- 23. Model Cards
- 24. Basics of Natural Language Processing (NLP)
- 25. Understanding Language
- 26. Syntactic Processing
- 27. Semantic Processing
- 28. Natural Language Understanding (NLU)
- 29. Natural Language Generation (NLG)
- 30. Example NLP Pipeline
- 31. Tools for NLP and NLU
- 32. NLP Components and Pipelines
- 33. Transformer Applications in NLP
- 34. Applications of Transformers (NLP)
- 35. Computer Vision APIs
- 36. Key Computer Vision Tasks
- 37. Example Computer Vision API
Lesson 9 Study Notes
Topic List
- Language model fundamentals
- Large vs small models
- Model parameters and training
- Common Crawl
- Tokenisation
- Popular LLMs and SLMs
- LLMOps and the development-to-production workflow
Lesson 10 & 11
- OpenAI APIs Overview
- Access Requirements for Using APIs
- Base Code Setup for OpenAI API
- Chat or Completion API
- Embedding API
- DALL-E API
- Whisper API
- Fine-tuning API
- Rivet
- Retrieval Augmented Generation (RAG)
- LangChain and RAG Implementation Workflow
- RAG Demo and Gradio Interface
Lesson 12
- Docker
- Container
- Kubernetes
Lesson 13
Data Analytics
Lesson 14
Introduction to IoT
Distributed Computing
Lesson 7: Distributed Mutual Exclusion
Topic List
- Introduction to Distributed Mutual Exclusion
- Mutual Exclusion: Fundamental Idea
- Critical Section (CS)
- Preliminaries for Distributed Mutual Exclusion
- System Model
- States of a Site
- Additional State in Token-Based Algorithms
- Requirements of Mutual Exclusion Algorithms
- Performance Metrics
- Approaches to Distributed Mutual Exclusion
- Lamport’s Algorithm
- Ricart–Agrawala Algorithm
- Maekawa’s Algorithm
Deadlock Detection (Distributed Computing)
Lesson 8
Topic List
- Suzuki-Kasami Broadcast Algorithm
- Raymond’s Tree-Based Algorithm
- Deadlock Detection in Distributed Systems
- Wait-For Graph (WFG)
- Models of Deadlocks
- Single-Resource Model
- AND Model
- OR Model
- Unrestricted Model
- Chandy–Misra–Haas Algorithm for AND Model
- Chandy–Misra–Haas Algorithm for OR Model
Lesson 9
Topic List
- Need for agreement
- Byzantine behaviour
- Agreement in failure-free systems
- Crash-failure consensus algorithm
- Lower bound on rounds
- Upper bound on Byzantine failures
- Byzantine Agreement Tree Algorithm
- Explanation of example
- Applying Byzantine Agreement to an 8-node system
- Consensus and Agreement Algorithms
- Byzantine Behaviour and Agreement Problem
- Impossibility of Consensus (FLP Result)
- Terminating Reliable Broadcast
- Distributed Transaction Commit (2PC and 3PC)
- k-Set Consensus
Lesson 10
- Characteristics of P2P Networks
- P2P vs Client–Server Networks
- Churn in P2P Systems
- DNS Limitations and P2P Advantages
- Examples of Popular P2P Networks
- Self-Organisation and Scalability
- Advantages of P2P Overlays
- Characteristics and Performance Features of P2P Systems
- Napster Architecture
- Central Server Metadata in Napster
- Napster Search and Download Process
- Anonymity and Directory-Based Lookup
- Data Indexing in P2P (Centralised, Local, Distributed)
- Structured Overlays
- Unstructured Overlays
- Advantages and Disadvantages of Unstructured Overlays
- Iterative Prisoner’s Dilemma in P2P Design
- Tit-for-Tat Strategy and BitTorrent
- Trust / Reputation Management in P2P
- Challenges in Trust Management Protocol Design
Lesson 14
- CAP Theorem

Leave a Reply