Machine Learning' and Earining
Bye, bye, API
Gone fishing in a data lake
You shall not pass
100

This particular type of AI model mimics the structure of nerve cells being connected to each other in the brain, with an input layer, one or more “hidden” layers of cells, and an output layer.

Neural Network

100

These APIs typically are designed to access specific named resources (think a user account, a photo, a comment on a file) through URLs.

REST (Representational State Transfer) APIs:

100

This is a type of database used specifically to support analysis for the purpose of making better business decisions (rather than to implement a product for customers)

Data warehouse

100

Loosing this type of authentication method might make you lose your identity 

Password

200

This model training technique involves given a set of inputs, a set of labeled outputs, and the goal is to learn how to take inputs and choose the right label

Supervised Learning

200

These APIs use many different endpoints to access specific resources and use a single endpoint that accepts queries written in the same language as this API, to fetch data

GraphQL API

200

A centralized repository storing both structured and unstructured data in its native formats, alongside metadata tags and unique identifiers.

Data Lake

200
This authentication method uses fingerprints or facial recognition
Biometric / Biometric data
300

This problem can occur commonly when training models where the model isn't big enough, the training algorithm is too simple, or if you don't have enough training data 

Underfitting

300

This is an older format for making APIs, and it is distinguished by the use of XML as the message format for requests and responses, which are typically sent over HTTPS

SOAP (Simple Object Access Protocol) APIs

300

Software that is meant to address data lake challenges – complexity, sluggish time to value, and overall messiness.

Data Lake Platform
300

Any one of these four mechanisms can be used to implement authorization - who can access what resource and perform which actions. Name at least one.

Access control lists or permissions or roles or policies

400

This is a generic version of a large language model designed to work across many uses cases and intended to be accessed by an API

Foundation models

400

Unlike HTTP-based APIs, these APIs provide a persistent connection between the client and server, enabling real-time data transfer without having to re-establish a connection each time.

WebSocket

400

Data lakes can be tremendously cheaper than databases when working with high scales which leads to this advantage of a data lake approach

Resource optimization

400

Without proper authentication and authorization your company may be exposed to this type of risk

Security

500

The unit of measurement of context widows, a cap on the amount of text models can process

Tokens

500

This is mechanism for an API provider to provide updates or notifications without having to maintain a persistent connection

Webhooks

500

The solution to the challenges of data lakes and it allows traditional analytics, data science and machine learning to coexist in the same system, all in an open format. 

Lakehouse

500

Name a third-party vendor used for authentication

Auth0

M
e
n
u