dh-mc commited on
Commit
b4abf11
·
1 Parent(s): 14ece86
README.md CHANGED
@@ -15,7 +15,7 @@ This project uses Open AI and open-source large language models (LLMs) to enable
15
 
16
  ## How it works
17
 
18
- We're using an AI design pattern, namely "in-context learning" which uses LLMs off the shelf (i.e., without any fine-tuning), then controls their behavior through clever prompting and conditioning on private “contextual” data, e.g., texts extracted from your PDF files.
19
 
20
  At a very high level, the workflow can be divided into three stages:
21
 
@@ -25,7 +25,7 @@ At a very high level, the workflow can be divided into three stages:
25
 
26
  3. Prompt execution / inference: Once the prompts have been compiled, they are submitted to a pre-trained LLM for inference—including both proprietary model APIs and open-source or self-trained models.
27
 
28
- ![In-context Learning - Workflow Overview](./assets/Workflow-Overview.png)
29
 
30
  Tech stack used includes LangChain, Gradio, Chroma and FAISS.
31
  - LangChain is an open-source framework that makes it easier to build scalable AI/LLM apps and chatbots.
 
15
 
16
  ## How it works
17
 
18
+ We're using an AI methodology, namely Conversational Retrieval Augmentation (CRAG), which uses LLMs off the shelf (i.e., without any fine-tuning), then controls their behavior through clever prompting and conditioning on private “contextual” data, e.g., texts extracted from your PDF files.
19
 
20
  At a very high level, the workflow can be divided into three stages:
21
 
 
25
 
26
  3. Prompt execution / inference: Once the prompts have been compiled, they are submitted to a pre-trained LLM for inference—including both proprietary model APIs and open-source or self-trained models.
27
 
28
+ ![Conversational Retrieval Augmentation (CRAG) - Workflow Overview](./assets/crag-workflow.png)
29
 
30
  Tech stack used includes LangChain, Gradio, Chroma and FAISS.
31
  - LangChain is an open-source framework that makes it easier to build scalable AI/LLM apps and chatbots.
assets/Workflow-Overview.png DELETED
Binary file (256 kB)
 
assets/crag-workflow.png ADDED
notebook/nvidia-4080-dolphin-2_6-phi-2-2.7b.ipynb DELETED
The diff for this file is too large to render. See raw diff
 
notebook/nvidia-4080-llama-2-7b.ipynb DELETED
@@ -1,2459 +0,0 @@
1
- {
2
- "cells": [
3
- {
4
- "cell_type": "code",
5
- "execution_count": 1,
6
- "id": "874cd58e",
7
- "metadata": {},
8
- "outputs": [
9
- {
10
- "name": "stdout",
11
- "output_type": "stream",
12
- "text": [
13
- "workding dir: /home/inflaton/code/projects/chat-with-orca-2\n"
14
- ]
15
- }
16
- ],
17
- "source": [
18
- "import os\n",
19
- "import sys\n",
20
- "from pathlib import Path\n",
21
- "\n",
22
- "workding_dir = str(Path.cwd().parent)\n",
23
- "os.chdir(workding_dir)\n",
24
- "sys.path.append(workding_dir)\n",
25
- "print(\"workding dir:\", workding_dir)"
26
- ]
27
- },
28
- {
29
- "cell_type": "code",
30
- "execution_count": 2,
31
- "id": "19f967ca",
32
- "metadata": {},
33
- "outputs": [],
34
- "source": [
35
- "os.environ[\"LLM_MODEL_TYPE\"] = \"huggingface\"\n",
36
- "os.environ[\"HUGGINGFACE_MODEL_NAME_OR_PATH\"] = \"meta-llama/Llama-2-7b-chat-hf\""
37
- ]
38
- },
39
- {
40
- "cell_type": "code",
41
- "execution_count": 3,
42
- "id": "a6d96660",
43
- "metadata": {},
44
- "outputs": [
45
- {
46
- "name": "stdout",
47
- "output_type": "stream",
48
- "text": [
49
- "loading env vars from: /home/inflaton/code/projects/chat-with-orca-2/.env\n",
50
- "Running on: Linux-5.10.102.1-microsoft-standard-WSL2-x86_64-with-glibc2.35\n",
51
- "MPS is NOT available\n",
52
- "CUDA is available\n",
53
- "MPS not available because the current PyTorch install was not built with MPS enabled.\n",
54
- "CUDA is available, we have found 1 GPU(s)\n",
55
- "NVIDIA GeForce RTX 4080 Laptop GPU\n",
56
- "CUDA version: 12.1\n",
57
- "hf_embeddings_device_type: cuda:0\n",
58
- "hf_pipeline_device_type: cuda:0\n",
59
- "load INSTRUCTOR_Transformer\n",
60
- "/home/inflaton/miniconda3/envs/chat-with-orca-2/lib/python3.11/site-packages/torch/_utils.py:831: UserWarning: TypedStorage is deprecated. It will be removed in the future and UntypedStorage will be the only storage class. This should only matter to you if you are using storages directly. To access UntypedStorage directly, use tensor.untyped_storage() instead of tensor.storage()\n",
61
- " return self.fget.__get__(instance, owner)()\n",
62
- "max_seq_length 512\n",
63
- "Completed in 0.610s\n",
64
- "Load index from ./data/faiss_1024_512/ with FAISS\n",
65
- "Completed in 0.019s\n",
66
- "initializing LLM: huggingface\n",
67
- " hf_pipeline_device_type: cuda:0\n",
68
- " load_quantized_model: None\n",
69
- " torch_dtype: torch.float16\n",
70
- " n_threds: 4\n",
71
- " loading model: meta-llama/Llama-2-7b-chat-hf\n",
72
- " HF auth token: None\n",
73
- " repetition_penalty: 1.05\n",
74
- "Loading checkpoint shards: 100%|██████████████████| 2/2 [02:47<00:00, 83.80s/it]\n",
75
- "Model memory footprint: 13543948288\n",
76
- "initialization complete\n",
77
- "Completed in 172.421s\n",
78
- "\n",
79
- "Question: What's PCI DSS?\n",
80
- "{'question': \"What's PCI DSS?\", 'chat_history': []}\n",
81
- "PCI DSS stands for Payment Card Industry Data Security Standard. It is a global standard that provides a baseline of technical and operational requirements designed to protect payment account data. The standard is developed and maintained by the PCI Security Standards Council, and it includes requirements for building and maintaining a secure network and systems, protecting account data, maintaining a vulnerability management program, implementing strong access control measures, and more. The goal of PCI DSS is to protect payment data from unauthorized access, use, disclosure, disruption, modification, or destruction.\n",
82
- "\n",
83
- "\n",
84
- "\n",
85
- "<on_llm_end>\n",
86
- "\n",
87
- "\n",
88
- "Completed in 62.095s\n",
89
- "\n",
90
- "Question: Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?\n",
91
- "{'question': 'Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?', 'chat_history': [(\"What's PCI DSS?\", 'PCI DSS stands for Payment Card Industry Data Security Standard. It is a global standard that provides a baseline of technical and operational requirements designed to protect payment account data. The standard is developed and maintained by the PCI Security Standards Council, and it includes requirements for building and maintaining a secure network and systems, protecting account data, maintaining a vulnerability management program, implementing strong access control measures, and more. The goal of PCI DSS is to protect payment data from unauthorized access, use, disclosure, disruption, modification, or destruction.')]}\n",
92
- "What are the key changes made in PCI DSS version 4.0 compared to version 3.2.1?\n",
93
- "\n",
94
- "\n",
95
- "\n",
96
- "<on_llm_end>\n",
97
- "\n",
98
- "\n",
99
- " The key changes made in PCI DSS version 4.0 compared to version 3.2.1 include updated principal requirement titles, replaced \"firewalls\" and \"routers\" with \"network security controls\", and evolved requirements related to roles and responsibilities. Additionally, there are errata updates to correct entries in the Summary of New Requirements table and to add descriptions of changes made to certain requirements.\n",
100
- "\n",
101
- "\n",
102
- "\n",
103
- "<on_llm_end>\n",
104
- "\n",
105
- "\n",
106
- "Completed in 56.760s\n",
107
- "\n",
108
- "Question: new requirements for vulnerability assessments\n",
109
- "{'question': 'new requirements for vulnerability assessments', 'chat_history': [(\"What's PCI DSS?\", 'PCI DSS stands for Payment Card Industry Data Security Standard. It is a global standard that provides a baseline of technical and operational requirements designed to protect payment account data. The standard is developed and maintained by the PCI Security Standards Council, and it includes requirements for building and maintaining a secure network and systems, protecting account data, maintaining a vulnerability management program, implementing strong access control measures, and more. The goal of PCI DSS is to protect payment data from unauthorized access, use, disclosure, disruption, modification, or destruction.'), ('Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?', 'The key changes made in PCI DSS version 4.0 compared to version 3.2.1 include updated principal requirement titles, replaced \"firewalls\" and \"routers\" with \"network security controls\", and evolved requirements related to roles and responsibilities. Additionally, there are errata updates to correct entries in the Summary of New Requirements table and to add descriptions of changes made to certain requirements.')]}\n",
110
- "What are the updated requirements for vulnerability assessments in PCI DSS version 4.0 compared to version 3.2.1?\n",
111
- "\n",
112
- "\n",
113
- "\n",
114
- "<on_llm_end>\n",
115
- "\n",
116
- "\n",
117
- " The updated requirements for vulnerability assessments in PCI DSS version 4.0 are as follows:\n",
118
- "\n",
119
- "\n",
120
- "\n",
121
- "\n",
122
- "\n",
123
- "\n",
124
- "\n",
125
- "\n",
126
- "\n",
127
- "\n",
128
- "\n",
129
- "\n",
130
- "\n",
131
- "\n",
132
- "\n",
133
- "\n",
134
- "\n",
135
- "\n",
136
- "\n",
137
- "\n",
138
- "\n",
139
- "\n",
140
- "\n",
141
- "\n",
142
- "\n",
143
- "\n",
144
- "\n",
145
- "\n",
146
- "\n",
147
- "\n",
148
- "\n",
149
- "\n",
150
- "\n",
151
- "\n",
152
- "\n",
153
- "\n",
154
- "\n",
155
- "\n",
156
- "\n",
157
- "\n",
158
- "\n",
159
- "\n",
160
- "\n",
161
- "\n",
162
- "\n",
163
- "\n",
164
- "\n",
165
- "\n",
166
- "\n",
167
- "\n",
168
- "\n",
169
- "\n",
170
- "\n",
171
- "\n",
172
- "\n",
173
- "\n",
174
- "\n",
175
- "\n",
176
- "\n",
177
- "\n",
178
- "\n",
179
- "\n",
180
- "\n",
181
- "\n",
182
- "\n",
183
- "\n",
184
- "\n",
185
- "\n",
186
- "\n",
187
- "\n",
188
- "\n",
189
- "\n",
190
- "\n",
191
- "\n",
192
- "\n",
193
- "\n",
194
- "\n",
195
- "\n",
196
- "\n",
197
- "\n",
198
- "\n",
199
- "\n",
200
- "\n",
201
- "\n",
202
- "\n",
203
- "\n",
204
- "\n",
205
- "\n",
206
- "\n",
207
- "\n",
208
- "\n",
209
- "\n",
210
- "\n",
211
- "\n",
212
- "\n",
213
- "\n",
214
- "\n",
215
- "\n",
216
- "\n",
217
- "\n",
218
- "\n",
219
- "\n",
220
- "\n",
221
- "\n",
222
- "\n",
223
- "\n",
224
- "\n",
225
- "\n",
226
- "\n",
227
- "\n",
228
- "\n",
229
- "\n",
230
- "\n",
231
- "\n",
232
- "\n",
233
- "\n",
234
- "\n",
235
- "\n",
236
- "\n",
237
- "\n",
238
- "\n",
239
- "\n",
240
- "\n",
241
- "\n",
242
- "\n",
243
- "\n",
244
- "\n",
245
- "\n",
246
- "\n",
247
- "\n",
248
- "\n",
249
- "\n",
250
- "\n",
251
- "\n",
252
- "\n",
253
- "\n",
254
- "\n",
255
- "\n",
256
- "\n",
257
- "\n",
258
- "\n",
259
- "\n",
260
- "\n",
261
- "\n",
262
- "\n",
263
- "\n",
264
- "\n",
265
- "\n",
266
- "\n",
267
- "\n",
268
- "\n",
269
- "\n",
270
- "\n",
271
- "\n",
272
- "\n",
273
- "\n",
274
- "\n",
275
- "\n",
276
- "\n",
277
- "\n",
278
- "\n",
279
- "\n",
280
- "\n",
281
- "\n",
282
- "\n",
283
- "\n",
284
- "\n",
285
- "\n",
286
- "\n",
287
- "\n",
288
- "\n",
289
- "\n",
290
- "\n",
291
- "\n",
292
- "\n",
293
- "\n",
294
- "\n",
295
- "\n",
296
- "\n",
297
- "\n",
298
- "\n",
299
- "\n",
300
- "\n",
301
- "\n",
302
- "\n",
303
- "\n",
304
- "\n",
305
- "\n",
306
- "\n",
307
- "\n",
308
- "\n",
309
- "\n",
310
- "\n",
311
- "\n",
312
- "\n",
313
- "\n",
314
- "\n",
315
- "\n",
316
- "\n",
317
- "\n",
318
- "\n",
319
- "\n",
320
- "\n",
321
- "\n",
322
- "\n",
323
- "\n",
324
- "\n",
325
- "\n",
326
- "\n",
327
- "\n",
328
- "\n",
329
- "\n",
330
- "\n",
331
- "\n",
332
- "\n",
333
- "\n",
334
- "\n",
335
- "\n",
336
- "\n",
337
- "\n",
338
- "\n",
339
- "\n",
340
- "\n",
341
- "\n",
342
- "\n",
343
- "\n",
344
- "\n",
345
- "\n",
346
- "\n",
347
- "\n",
348
- "\n",
349
- "\n",
350
- "\n",
351
- "\n",
352
- "\n",
353
- "\n",
354
- "\n",
355
- "\n",
356
- "\n",
357
- "\n",
358
- "\n",
359
- "\n",
360
- "\n",
361
- "\n",
362
- "\n",
363
- "\n",
364
- "\n",
365
- "\n",
366
- "\n",
367
- "\n",
368
- "\n",
369
- "\n",
370
- "\n",
371
- "\n",
372
- "\n",
373
- "\n",
374
- "\n",
375
- "\n",
376
- "\n",
377
- "\n",
378
- "\n",
379
- "\n",
380
- "\n",
381
- "\n",
382
- "\n",
383
- "\n",
384
- "\n",
385
- "\n",
386
- "\n",
387
- "\n",
388
- "\n",
389
- "\n",
390
- "\n",
391
- "\n",
392
- "\n",
393
- "\n",
394
- "\n",
395
- "\n",
396
- "\n",
397
- "\n",
398
- "\n",
399
- "\n",
400
- "\n",
401
- "\n",
402
- "\n",
403
- "\n",
404
- "\n",
405
- "\n",
406
- "\n",
407
- "\n",
408
- "\n",
409
- "\n",
410
- "\n",
411
- "\n",
412
- "\n",
413
- "\n",
414
- "\n",
415
- "\n",
416
- "\n",
417
- "\n",
418
- "\n",
419
- "\n",
420
- "\n",
421
- "\n",
422
- "\n",
423
- "\n",
424
- "\n",
425
- "\n",
426
- "\n",
427
- "\n",
428
- "\n",
429
- "\n",
430
- "\n",
431
- "\n",
432
- "\n",
433
- "\n",
434
- "\n",
435
- "\n",
436
- "\n",
437
- "\n",
438
- "\n",
439
- "\n",
440
- "\n",
441
- "\n",
442
- "\n",
443
- "\n",
444
- "\n",
445
- "\n",
446
- "\n",
447
- "\n",
448
- "\n",
449
- "\n",
450
- "\n",
451
- "\n",
452
- "\n",
453
- "\n",
454
- "\n",
455
- "\n",
456
- "\n",
457
- "\n",
458
- "\n",
459
- "\n",
460
- "\n",
461
- "\n",
462
- "\n",
463
- "\n",
464
- "\n",
465
- "\n",
466
- "\n",
467
- "\n",
468
- "\n",
469
- "\n",
470
- "\n",
471
- "\n",
472
- "\n",
473
- "\n",
474
- "\n",
475
- "\n",
476
- "\n",
477
- "\n",
478
- "\n",
479
- "\n",
480
- "\n",
481
- "\n",
482
- "\n",
483
- "\n",
484
- "\n",
485
- "\n",
486
- "\n",
487
- "\n",
488
- "\n",
489
- "\n",
490
- "\n",
491
- "\n",
492
- "\n",
493
- "\n",
494
- "\n",
495
- "\n",
496
- "\n",
497
- "\n",
498
- "\n",
499
- "\n",
500
- "\n",
501
- "\n",
502
- "\n",
503
- "\n",
504
- "\n",
505
- "\n",
506
- "\n",
507
- "\n",
508
- "\n",
509
- "\n",
510
- "\n",
511
- "\n",
512
- "\n",
513
- "\n",
514
- "\n",
515
- "\n",
516
- "\n",
517
- "\n",
518
- "\n",
519
- "\n",
520
- "\n",
521
- "\n",
522
- "\n",
523
- "\n",
524
- "\n",
525
- "\n",
526
- "\n",
527
- "\n",
528
- "\n",
529
- "\n",
530
- "\n",
531
- "\n",
532
- "\n",
533
- "\n",
534
- "\n",
535
- "\n",
536
- "\n",
537
- "\n",
538
- "\n",
539
- "\n",
540
- "\n",
541
- "\n",
542
- "\n",
543
- "\n",
544
- "\n",
545
- "\n",
546
- "\n",
547
- "\n",
548
- "\n",
549
- "\n",
550
- "\n",
551
- "\n",
552
- "\n",
553
- "\n",
554
- "\n",
555
- "\n",
556
- "\n",
557
- "\n",
558
- "\n",
559
- "\n",
560
- "\n",
561
- "\n",
562
- "\n",
563
- "\n",
564
- "\n",
565
- "\n",
566
- "\n",
567
- "\n",
568
- "\n",
569
- "\n",
570
- "\n",
571
- "\n",
572
- "\n",
573
- "\n",
574
- "\n",
575
- "\n",
576
- "\n",
577
- "\n",
578
- "\n",
579
- "\n",
580
- "\n",
581
- "\n",
582
- "\n",
583
- "\n",
584
- "\n",
585
- "\n",
586
- "\n",
587
- "\n",
588
- "\n",
589
- "\n",
590
- "\n",
591
- "\n",
592
- "\n",
593
- "\n",
594
- "\n",
595
- "\n",
596
- "\n",
597
- "\n",
598
- "\n",
599
- "\n",
600
- "\n",
601
- "\n",
602
- "\n",
603
- "\n",
604
- "\n",
605
- "\n",
606
- "\n",
607
- "\n",
608
- "\n",
609
- "\n",
610
- "\n",
611
- "\n",
612
- "\n",
613
- "\n",
614
- "\n",
615
- "\n",
616
- "\n",
617
- "\n",
618
- "\n",
619
- "\n",
620
- "\n",
621
- "\n",
622
- "\n",
623
- "\n",
624
- "\n",
625
- "\n",
626
- "\n",
627
- "\n",
628
- "\n",
629
- "\n",
630
- "\n",
631
- "\n",
632
- "\n",
633
- "\n",
634
- "\n",
635
- "\n",
636
- "\n",
637
- "\n",
638
- "\n",
639
- "\n",
640
- "\n",
641
- "\n",
642
- "\n",
643
- "\n",
644
- "\n",
645
- "\n",
646
- "\n",
647
- "\n",
648
- "\n",
649
- "\n",
650
- "\n",
651
- "\n",
652
- "\n",
653
- "\n",
654
- "\n",
655
- "\n",
656
- "\n",
657
- "\n",
658
- "\n",
659
- "\n",
660
- "\n",
661
- "\n",
662
- "\n",
663
- "\n",
664
- "\n",
665
- "\n",
666
- "\n",
667
- "\n",
668
- "\n",
669
- "\n",
670
- "\n",
671
- "\n",
672
- "\n",
673
- "\n",
674
- "\n",
675
- "\n",
676
- "\n",
677
- "\n",
678
- "\n",
679
- "\n",
680
- "\n",
681
- "\n",
682
- "\n",
683
- "\n",
684
- "\n",
685
- "\n",
686
- "\n",
687
- "\n",
688
- "\n",
689
- "\n",
690
- "\n",
691
- "\n",
692
- "\n",
693
- "\n",
694
- "\n",
695
- "\n",
696
- "\n",
697
- "\n",
698
- "\n",
699
- "\n",
700
- "\n",
701
- "\n",
702
- "\n",
703
- "\n",
704
- "\n",
705
- "\n",
706
- "\n",
707
- "\n",
708
- "\n",
709
- "\n",
710
- "\n",
711
- "\n",
712
- "\n",
713
- "\n",
714
- "\n",
715
- "\n",
716
- "\n",
717
- "\n",
718
- "\n",
719
- "\n",
720
- "\n",
721
- "\n",
722
- "\n",
723
- "\n",
724
- "\n",
725
- "\n",
726
- "\n",
727
- "\n",
728
- "\n",
729
- "\n",
730
- "\n",
731
- "\n",
732
- "\n",
733
- "\n",
734
- "\n",
735
- "\n",
736
- "\n",
737
- "\n",
738
- "\n",
739
- "\n",
740
- "\n",
741
- "\n",
742
- "\n",
743
- "\n",
744
- "\n",
745
- "\n",
746
- "\n",
747
- "\n",
748
- "\n",
749
- "\n",
750
- "\n",
751
- "\n",
752
- "\n",
753
- "\n",
754
- "\n",
755
- "\n",
756
- "\n",
757
- "\n",
758
- "\n",
759
- "\n",
760
- "\n",
761
- "\n",
762
- "\n",
763
- "\n",
764
- "\n",
765
- "\n",
766
- "\n",
767
- "\n",
768
- "\n",
769
- "\n",
770
- "\n",
771
- "\n",
772
- "\n",
773
- "\n",
774
- "\n",
775
- "\n",
776
- "\n",
777
- "\n",
778
- "\n",
779
- "\n",
780
- "\n",
781
- "\n",
782
- "\n",
783
- "\n",
784
- "\n",
785
- "\n",
786
- "\n",
787
- "\n",
788
- "\n",
789
- "\n",
790
- "\n",
791
- "\n",
792
- "\n",
793
- "\n",
794
- "\n",
795
- "\n",
796
- "\n",
797
- "\n",
798
- "\n",
799
- "\n",
800
- "\n",
801
- "\n",
802
- "\n",
803
- "\n",
804
- "\n",
805
- "\n",
806
- "\n",
807
- "\n",
808
- "\n",
809
- "\n",
810
- "\n",
811
- "\n",
812
- "\n",
813
- "\n",
814
- "\n",
815
- "\n",
816
- "\n",
817
- "\n",
818
- "\n",
819
- "\n",
820
- "\n",
821
- "\n",
822
- "\n",
823
- "\n",
824
- "\n",
825
- "\n",
826
- "\n",
827
- "\n",
828
- "\n",
829
- "\n",
830
- "\n",
831
- "\n",
832
- "\n",
833
- "\n",
834
- "\n",
835
- "\n",
836
- "\n",
837
- "\n",
838
- "\n",
839
- "\n",
840
- "\n",
841
- "\n",
842
- "\n",
843
- "\n",
844
- "\n",
845
- "\n",
846
- "\n",
847
- "\n",
848
- "\n",
849
- "\n",
850
- "\n",
851
- "\n",
852
- "\n",
853
- "\n",
854
- "\n",
855
- "\n",
856
- "\n",
857
- "\n",
858
- "\n",
859
- "\n",
860
- "\n",
861
- "\n",
862
- "\n",
863
- "\n",
864
- "\n",
865
- "\n",
866
- "\n",
867
- "\n",
868
- "\n",
869
- "\n",
870
- "\n",
871
- "\n",
872
- "\n",
873
- "\n",
874
- "\n",
875
- "\n",
876
- "\n",
877
- "\n",
878
- "\n",
879
- "\n",
880
- "\n",
881
- "\n",
882
- "\n",
883
- "\n",
884
- "\n",
885
- "\n",
886
- "\n",
887
- "\n",
888
- "\n",
889
- "\n",
890
- "\n",
891
- "\n",
892
- "\n",
893
- "\n",
894
- "\n",
895
- "\n",
896
- "\n",
897
- "\n",
898
- "\n",
899
- "\n",
900
- "\n",
901
- "\n",
902
- "\n",
903
- "\n",
904
- "\n",
905
- "\n",
906
- "\n",
907
- "\n",
908
- "\n",
909
- "\n",
910
- "\n",
911
- "\n",
912
- "\n",
913
- "\n",
914
- "\n",
915
- "\n",
916
- "\n",
917
- "\n",
918
- "\n",
919
- "\n",
920
- "\n",
921
- "\n",
922
- "\n",
923
- "\n",
924
- "\n",
925
- "\n",
926
- "\n",
927
- "\n",
928
- "\n",
929
- "\n",
930
- "\n",
931
- "\n",
932
- "\n",
933
- "\n",
934
- "\n",
935
- "\n",
936
- "\n",
937
- "\n",
938
- "\n",
939
- "\n",
940
- "\n",
941
- "\n",
942
- "\n",
943
- "\n",
944
- "\n",
945
- "\n",
946
- "\n",
947
- "\n",
948
- "\n",
949
- "\n",
950
- "\n",
951
- "\n",
952
- "\n",
953
- "\n",
954
- "\n",
955
- "\n",
956
- "\n",
957
- "\n",
958
- "\n",
959
- "\n",
960
- "\n",
961
- "\n",
962
- "\n",
963
- "\n",
964
- "\n",
965
- "\n",
966
- "\n",
967
- "\n",
968
- "\n",
969
- "\n",
970
- "\n",
971
- "\n",
972
- "\n",
973
- "\n",
974
- "\n",
975
- "\n",
976
- "\n",
977
- "\n",
978
- "\n",
979
- "\n",
980
- "\n",
981
- "\n",
982
- "\n",
983
- "\n",
984
- "\n",
985
- "\n",
986
- "\n",
987
- "\n",
988
- "\n",
989
- "\n",
990
- "\n",
991
- "\n",
992
- "\n",
993
- "\n",
994
- "\n",
995
- "\n",
996
- "\n",
997
- "\n",
998
- "\n",
999
- "\n",
1000
- "\n",
1001
- "\n",
1002
- "\n",
1003
- "\n",
1004
- "\n",
1005
- "\n",
1006
- "\n",
1007
- "\n",
1008
- "\n",
1009
- "\n",
1010
- "\n",
1011
- "\n",
1012
- "\n",
1013
- "\n",
1014
- "\n",
1015
- "\n",
1016
- "\n",
1017
- "\n",
1018
- "\n",
1019
- "\n",
1020
- "\n",
1021
- "\n",
1022
- "\n",
1023
- "\n",
1024
- "\n",
1025
- "\n",
1026
- "\n",
1027
- "\n",
1028
- "\n",
1029
- "\n",
1030
- "\n",
1031
- "\n",
1032
- "\n",
1033
- "\n",
1034
- "\n",
1035
- "\n",
1036
- "\n",
1037
- "\n",
1038
- "\n",
1039
- "\n",
1040
- "\n",
1041
- "\n",
1042
- "\n",
1043
- "\n",
1044
- "\n",
1045
- "\n",
1046
- "\n",
1047
- "\n",
1048
- "\n",
1049
- "\n",
1050
- "\n",
1051
- "\n",
1052
- "\n",
1053
- "\n",
1054
- "\n",
1055
- "\n",
1056
- "\n",
1057
- "\n",
1058
- "\n",
1059
- "\n",
1060
- "\n",
1061
- "\n",
1062
- "\n",
1063
- "\n",
1064
- "\n",
1065
- "\n",
1066
- "\n",
1067
- "\n",
1068
- "\n",
1069
- "\n",
1070
- "\n",
1071
- "\n",
1072
- "\n",
1073
- "\n",
1074
- "\n",
1075
- "\n",
1076
- "\n",
1077
- "\n",
1078
- "\n",
1079
- "\n",
1080
- "\n",
1081
- "\n",
1082
- "\n",
1083
- "\n",
1084
- "\n",
1085
- "\n",
1086
- "\n",
1087
- "\n",
1088
- "\n",
1089
- "\n",
1090
- "\n",
1091
- "\n",
1092
- "\n",
1093
- "\n",
1094
- "\n",
1095
- "\n",
1096
- "\n",
1097
- "\n",
1098
- "\n",
1099
- "\n",
1100
- "\n",
1101
- "\n",
1102
- "\n",
1103
- "\n",
1104
- "\n",
1105
- "\n",
1106
- "\n",
1107
- "\n",
1108
- "\n",
1109
- "\n",
1110
- "\n",
1111
- "\n",
1112
- "\n",
1113
- "\n",
1114
- "\n",
1115
- "\n",
1116
- "\n",
1117
- "\n",
1118
- "\n",
1119
- "\n",
1120
- "\n",
1121
- "\n",
1122
- "\n",
1123
- "\n",
1124
- "\n",
1125
- "\n",
1126
- "\n",
1127
- "\n",
1128
- "\n",
1129
- "\n",
1130
- "\n",
1131
- "\n",
1132
- "\n",
1133
- "\n",
1134
- "\n",
1135
- "\n",
1136
- "\n",
1137
- "\n",
1138
- "\n",
1139
- "\n",
1140
- "\n",
1141
- "\n",
1142
- "\n",
1143
- "\n",
1144
- "\n",
1145
- "\n",
1146
- "\n",
1147
- "\n",
1148
- "\n",
1149
- "\n",
1150
- "\n",
1151
- "\n",
1152
- "\n",
1153
- "\n",
1154
- "\n",
1155
- "\n",
1156
- "\n",
1157
- "\n",
1158
- "\n",
1159
- "\n",
1160
- "\n",
1161
- "\n",
1162
- "\n",
1163
- "\n",
1164
- "\n",
1165
- "\n",
1166
- "\n",
1167
- "\n",
1168
- "\n",
1169
- "\n",
1170
- "\n",
1171
- "\n",
1172
- "\n",
1173
- "\n",
1174
- "\n",
1175
- "\n",
1176
- "\n",
1177
- "\n",
1178
- "\n",
1179
- "\n",
1180
- "\n",
1181
- "\n",
1182
- "\n",
1183
- "\n",
1184
- "\n",
1185
- "\n",
1186
- "\n",
1187
- "\n",
1188
- "\n",
1189
- "\n",
1190
- "\n",
1191
- "\n",
1192
- "\n",
1193
- "\n",
1194
- "\n",
1195
- "\n",
1196
- "\n",
1197
- "\n",
1198
- "\n",
1199
- "\n",
1200
- "\n",
1201
- "\n",
1202
- "\n",
1203
- "\n",
1204
- "\n",
1205
- "\n",
1206
- "\n",
1207
- "\n",
1208
- "\n",
1209
- "\n",
1210
- "\n",
1211
- "\n",
1212
- "\n",
1213
- "\n",
1214
- "\n",
1215
- "\n",
1216
- "\n",
1217
- "\n",
1218
- "\n",
1219
- "\n",
1220
- "\n",
1221
- "\n",
1222
- "\n",
1223
- "\n",
1224
- "\n",
1225
- "\n",
1226
- "\n",
1227
- "\n",
1228
- "\n",
1229
- "\n",
1230
- "\n",
1231
- "\n",
1232
- "\n",
1233
- "\n",
1234
- "\n",
1235
- "\n",
1236
- "\n",
1237
- "\n",
1238
- "\n",
1239
- "\n",
1240
- "\n",
1241
- "\n",
1242
- "\n",
1243
- "\n",
1244
- "\n",
1245
- "\n",
1246
- "\n",
1247
- "\n",
1248
- "\n",
1249
- "\n",
1250
- "\n",
1251
- "\n",
1252
- "\n",
1253
- "\n",
1254
- "\n",
1255
- "\n",
1256
- "\n",
1257
- "\n",
1258
- "\n",
1259
- "\n",
1260
- "\n",
1261
- "\n",
1262
- "\n",
1263
- "\n",
1264
- "\n",
1265
- "\n",
1266
- "\n",
1267
- "\n",
1268
- "\n",
1269
- "\n",
1270
- "\n",
1271
- "\n",
1272
- "\n",
1273
- "\n",
1274
- "\n",
1275
- "\n",
1276
- "\n",
1277
- "\n",
1278
- "\n",
1279
- "\n",
1280
- "\n",
1281
- "\n",
1282
- "\n",
1283
- "\n",
1284
- "\n",
1285
- "\n",
1286
- "\n",
1287
- "\n",
1288
- "\n",
1289
- "\n",
1290
- "\n",
1291
- "\n",
1292
- "\n",
1293
- "\n",
1294
- "\n",
1295
- "\n",
1296
- "\n",
1297
- "\n",
1298
- "\n",
1299
- "\n",
1300
- "\n",
1301
- "\n",
1302
- "\n",
1303
- "\n",
1304
- "\n",
1305
- "\n",
1306
- "\n",
1307
- "\n",
1308
- "\n",
1309
- "\n",
1310
- "\n",
1311
- "\n",
1312
- "\n",
1313
- "\n",
1314
- "\n",
1315
- "\n",
1316
- "\n",
1317
- "\n",
1318
- "\n",
1319
- "\n",
1320
- "\n",
1321
- "\n",
1322
- "\n",
1323
- "\n",
1324
- "\n",
1325
- "\n",
1326
- "\n",
1327
- "\n",
1328
- "\n",
1329
- "\n",
1330
- "\n",
1331
- "\n",
1332
- "\n",
1333
- "\n",
1334
- "\n",
1335
- "\n",
1336
- "\n",
1337
- "\n",
1338
- "\n",
1339
- "\n",
1340
- "\n",
1341
- "\n",
1342
- "\n",
1343
- "\n",
1344
- "\n",
1345
- "\n",
1346
- "\n",
1347
- "\n",
1348
- "\n",
1349
- "\n",
1350
- "\n",
1351
- "\n",
1352
- "\n",
1353
- "\n",
1354
- "\n",
1355
- "\n",
1356
- "\n",
1357
- "\n",
1358
- "\n",
1359
- "\n",
1360
- "\n",
1361
- "\n",
1362
- "\n",
1363
- "\n",
1364
- "\n",
1365
- "\n",
1366
- "\n",
1367
- "\n",
1368
- "\n",
1369
- "\n",
1370
- "\n",
1371
- "\n",
1372
- "\n",
1373
- "\n",
1374
- "\n",
1375
- "\n",
1376
- "\n",
1377
- "\n",
1378
- "\n",
1379
- "\n",
1380
- "\n",
1381
- "\n",
1382
- "\n",
1383
- "\n",
1384
- "\n",
1385
- "\n",
1386
- "\n",
1387
- "\n",
1388
- "\n",
1389
- "\n",
1390
- "\n",
1391
- "\n",
1392
- "\n",
1393
- "\n",
1394
- "\n",
1395
- "\n",
1396
- "\n",
1397
- "\n",
1398
- "\n",
1399
- "\n",
1400
- "\n",
1401
- "\n",
1402
- "\n",
1403
- "\n",
1404
- "\n",
1405
- "\n",
1406
- "\n",
1407
- "\n",
1408
- "\n",
1409
- "\n",
1410
- "\n",
1411
- "\n",
1412
- "\n",
1413
- "\n",
1414
- "\n",
1415
- "\n",
1416
- "\n",
1417
- "\n",
1418
- "\n",
1419
- "\n",
1420
- "\n",
1421
- "\n",
1422
- "\n",
1423
- "\n",
1424
- "\n",
1425
- "\n",
1426
- "\n",
1427
- "\n",
1428
- "\n",
1429
- "\n",
1430
- "\n",
1431
- "\n",
1432
- "\n",
1433
- "\n",
1434
- "\n",
1435
- "\n",
1436
- "\n",
1437
- "\n",
1438
- "\n",
1439
- "\n",
1440
- "\n",
1441
- "\n",
1442
- "\n",
1443
- "\n",
1444
- "\n",
1445
- "\n",
1446
- "\n",
1447
- "\n",
1448
- "\n",
1449
- "\n",
1450
- "\n",
1451
- "\n",
1452
- "\n",
1453
- "\n",
1454
- "\n",
1455
- "\n",
1456
- "\n",
1457
- "\n",
1458
- "\n",
1459
- "\n",
1460
- "\n",
1461
- "\n",
1462
- "\n",
1463
- "\n",
1464
- "\n",
1465
- "\n",
1466
- "\n",
1467
- "\n",
1468
- "\n",
1469
- "\n",
1470
- "\n",
1471
- "\n",
1472
- "\n",
1473
- "\n",
1474
- "\n",
1475
- "\n",
1476
- "\n",
1477
- "\n",
1478
- "\n",
1479
- "\n",
1480
- "\n",
1481
- "\n",
1482
- "\n",
1483
- "\n",
1484
- "\n",
1485
- "\n",
1486
- "\n",
1487
- "\n",
1488
- "\n",
1489
- "\n",
1490
- "\n",
1491
- "\n",
1492
- "\n",
1493
- "\n",
1494
- "\n",
1495
- "\n",
1496
- "\n",
1497
- "\n",
1498
- "\n",
1499
- "\n",
1500
- "\n",
1501
- "\n",
1502
- "\n",
1503
- "\n",
1504
- "\n",
1505
- "\n",
1506
- "\n",
1507
- "\n",
1508
- "\n",
1509
- "\n",
1510
- "\n",
1511
- "\n",
1512
- "\n",
1513
- "\n",
1514
- "\n",
1515
- "\n",
1516
- "\n",
1517
- "\n",
1518
- "\n",
1519
- "\n",
1520
- "\n",
1521
- "\n",
1522
- "\n",
1523
- "\n",
1524
- "\n",
1525
- "\n",
1526
- "\n",
1527
- "\n",
1528
- "\n",
1529
- "\n",
1530
- "\n",
1531
- "\n",
1532
- "\n",
1533
- "\n",
1534
- "\n",
1535
- "\n",
1536
- "\n",
1537
- "\n",
1538
- "\n",
1539
- "\n",
1540
- "\n",
1541
- "\n",
1542
- "\n",
1543
- "\n",
1544
- "\n",
1545
- "\n",
1546
- "\n",
1547
- "\n",
1548
- "\n",
1549
- "\n",
1550
- "\n",
1551
- "\n",
1552
- "\n",
1553
- "\n",
1554
- "\n",
1555
- "\n",
1556
- "\n",
1557
- "\n",
1558
- "\n",
1559
- "\n",
1560
- "\n",
1561
- "\n",
1562
- "\n",
1563
- "\n",
1564
- "\n",
1565
- "\n",
1566
- "\n",
1567
- "\n",
1568
- "\n",
1569
- "\n",
1570
- "\n",
1571
- "\n",
1572
- "\n",
1573
- "\n",
1574
- "\n",
1575
- "\n",
1576
- "\n",
1577
- "\n",
1578
- "\n",
1579
- "\n",
1580
- "\n",
1581
- "\n",
1582
- "\n",
1583
- "\n",
1584
- "\n",
1585
- "\n",
1586
- "\n",
1587
- "\n",
1588
- "\n",
1589
- "\n",
1590
- "\n",
1591
- "\n",
1592
- "\n",
1593
- "\n",
1594
- "\n",
1595
- "\n",
1596
- "\n",
1597
- "\n",
1598
- "\n",
1599
- "\n",
1600
- "\n",
1601
- "\n",
1602
- "\n",
1603
- "\n",
1604
- "\n",
1605
- "\n",
1606
- "\n",
1607
- "\n",
1608
- "\n",
1609
- "\n",
1610
- "\n",
1611
- "\n",
1612
- "\n",
1613
- "\n",
1614
- "\n",
1615
- "\n",
1616
- "\n",
1617
- "\n",
1618
- "\n",
1619
- "\n",
1620
- "\n",
1621
- "\n",
1622
- "\n",
1623
- "\n",
1624
- "\n",
1625
- "\n",
1626
- "\n",
1627
- "\n",
1628
- "\n",
1629
- "\n",
1630
- "\n",
1631
- "\n",
1632
- "\n",
1633
- "\n",
1634
- "\n",
1635
- "\n",
1636
- "\n",
1637
- "\n",
1638
- "\n",
1639
- "\n",
1640
- "\n",
1641
- "\n",
1642
- "\n",
1643
- "\n",
1644
- "\n",
1645
- "\n",
1646
- "\n",
1647
- "\n",
1648
- "\n",
1649
- "\n",
1650
- "\n",
1651
- "\n",
1652
- "\n",
1653
- "\n",
1654
- "\n",
1655
- "\n",
1656
- "\n",
1657
- "\n",
1658
- "\n",
1659
- "\n",
1660
- "\n",
1661
- "\n",
1662
- "\n",
1663
- "\n",
1664
- "\n",
1665
- "\n",
1666
- "\n",
1667
- "\n",
1668
- "\n",
1669
- "\n",
1670
- "\n",
1671
- "\n",
1672
- "\n",
1673
- "\n",
1674
- "\n",
1675
- "\n",
1676
- "\n",
1677
- "\n",
1678
- "\n",
1679
- "\n",
1680
- "\n",
1681
- "\n",
1682
- "\n",
1683
- "\n",
1684
- "\n",
1685
- "\n",
1686
- "\n",
1687
- "\n",
1688
- "\n",
1689
- "\n",
1690
- "\n",
1691
- "\n",
1692
- "\n",
1693
- "\n",
1694
- "\n",
1695
- "\n",
1696
- "\n",
1697
- "\n",
1698
- "\n",
1699
- "\n",
1700
- "\n",
1701
- "\n",
1702
- "\n",
1703
- "\n",
1704
- "\n",
1705
- "\n",
1706
- "\n",
1707
- "\n",
1708
- "\n",
1709
- "\n",
1710
- "\n",
1711
- "\n",
1712
- "\n",
1713
- "\n",
1714
- "\n",
1715
- "\n",
1716
- "\n",
1717
- "\n",
1718
- "\n",
1719
- "\n",
1720
- "\n",
1721
- "\n",
1722
- "\n",
1723
- "\n",
1724
- "\n",
1725
- "\n",
1726
- "\n",
1727
- "\n",
1728
- "\n",
1729
- "\n",
1730
- "\n",
1731
- "\n",
1732
- "\n",
1733
- "\n",
1734
- "\n",
1735
- "\n",
1736
- "\n",
1737
- "\n",
1738
- "\n",
1739
- "\n",
1740
- "\n",
1741
- "\n",
1742
- "\n",
1743
- "\n",
1744
- "\n",
1745
- "\n",
1746
- "\n",
1747
- "\n",
1748
- "\n",
1749
- "\n",
1750
- "\n",
1751
- "\n",
1752
- "\n",
1753
- "\n",
1754
- "\n",
1755
- "\n",
1756
- "\n",
1757
- "\n",
1758
- "\n",
1759
- "\n",
1760
- "\n",
1761
- "\n",
1762
- "\n",
1763
- "\n",
1764
- "\n",
1765
- "\n",
1766
- "\n",
1767
- "\n",
1768
- "\n",
1769
- "\n",
1770
- "\n",
1771
- "\n",
1772
- "\n",
1773
- "\n",
1774
- "\n",
1775
- "\n",
1776
- "\n",
1777
- "\n",
1778
- "\n",
1779
- "\n",
1780
- "\n",
1781
- "\n",
1782
- "\n",
1783
- "\n",
1784
- "\n",
1785
- "\n",
1786
- "\n",
1787
- "\n",
1788
- "\n",
1789
- "\n",
1790
- "\n",
1791
- "\n",
1792
- "\n",
1793
- "\n",
1794
- "\n",
1795
- "\n",
1796
- "\n",
1797
- "\n",
1798
- "\n",
1799
- "\n",
1800
- "\n",
1801
- "\n",
1802
- "\n",
1803
- "\n",
1804
- "\n",
1805
- "\n",
1806
- "\n",
1807
- "\n",
1808
- "\n",
1809
- "\n",
1810
- "\n",
1811
- "\n",
1812
- "\n",
1813
- "\n",
1814
- "\n",
1815
- "\n",
1816
- "\n",
1817
- "\n",
1818
- "\n",
1819
- "\n",
1820
- "\n",
1821
- "\n",
1822
- "\n",
1823
- "\n",
1824
- "\n",
1825
- "\n",
1826
- "\n",
1827
- "\n",
1828
- "\n",
1829
- "\n",
1830
- "\n",
1831
- "\n",
1832
- "\n",
1833
- "\n",
1834
- "\n",
1835
- "\n",
1836
- "\n",
1837
- "\n",
1838
- "\n",
1839
- "\n",
1840
- "\n",
1841
- "\n",
1842
- "\n",
1843
- "\n",
1844
- "\n",
1845
- "\n",
1846
- "\n",
1847
- "\n",
1848
- "\n",
1849
- "\n",
1850
- "\n",
1851
- "\n",
1852
- "\n",
1853
- "\n",
1854
- "\n",
1855
- "\n",
1856
- "\n",
1857
- "\n",
1858
- "\n",
1859
- "\n",
1860
- "\n",
1861
- "\n",
1862
- "\n",
1863
- "\n",
1864
- "\n",
1865
- "\n",
1866
- "\n",
1867
- "\n",
1868
- "\n",
1869
- "\n",
1870
- "\n",
1871
- "\n",
1872
- "\n",
1873
- "\n",
1874
- "\n",
1875
- "\n",
1876
- "\n",
1877
- "\n",
1878
- "\n",
1879
- "\n",
1880
- "\n",
1881
- "\n",
1882
- "\n",
1883
- "\n",
1884
- "\n",
1885
- "\n",
1886
- "\n",
1887
- "\n",
1888
- "\n",
1889
- "\n",
1890
- "\n",
1891
- "\n",
1892
- "\n",
1893
- "\n",
1894
- "\n",
1895
- "\n",
1896
- "\n",
1897
- "\n",
1898
- "\n",
1899
- "\n",
1900
- "\n",
1901
- "\n",
1902
- "\n",
1903
- "\n",
1904
- "\n",
1905
- "\n",
1906
- "\n",
1907
- "\n",
1908
- "\n",
1909
- "\n",
1910
- "\n",
1911
- "\n",
1912
- "\n",
1913
- "\n",
1914
- "\n",
1915
- "\n",
1916
- "\n",
1917
- "\n",
1918
- "\n",
1919
- "\n",
1920
- "\n",
1921
- "\n",
1922
- "\n",
1923
- "\n",
1924
- "\n",
1925
- "\n",
1926
- "\n",
1927
- "\n",
1928
- "\n",
1929
- "\n",
1930
- "\n",
1931
- "\n",
1932
- "\n",
1933
- "\n",
1934
- "\n",
1935
- "\n",
1936
- "\n",
1937
- "\n",
1938
- "\n",
1939
- "\n",
1940
- "\n",
1941
- "\n",
1942
- "\n",
1943
- "\n",
1944
- "\n",
1945
- "\n",
1946
- "\n",
1947
- "\n",
1948
- "\n",
1949
- "\n",
1950
- "\n",
1951
- "\n",
1952
- "\n",
1953
- "\n",
1954
- "\n",
1955
- "\n",
1956
- "\n",
1957
- "\n",
1958
- "\n",
1959
- "\n",
1960
- "\n",
1961
- "\n",
1962
- "\n",
1963
- "\n",
1964
- "\n",
1965
- "\n",
1966
- "\n",
1967
- "\n",
1968
- "\n",
1969
- "\n",
1970
- "\n",
1971
- "\n",
1972
- "\n",
1973
- "\n",
1974
- "\n",
1975
- "\n",
1976
- "\n",
1977
- "\n",
1978
- "\n",
1979
- "\n",
1980
- "\n",
1981
- "\n",
1982
- "\n",
1983
- "\n",
1984
- "\n",
1985
- "\n",
1986
- "\n",
1987
- "\n",
1988
- "\n",
1989
- "\n",
1990
- "\n",
1991
- "\n",
1992
- "\n",
1993
- "\n",
1994
- "\n",
1995
- "\n",
1996
- "\n",
1997
- "\n",
1998
- "\n",
1999
- "\n",
2000
- "\n",
2001
- "\n",
2002
- "\n",
2003
- "\n",
2004
- "\n",
2005
- "\n",
2006
- "\n",
2007
- "\n",
2008
- "\n",
2009
- "\n",
2010
- "\n",
2011
- "\n",
2012
- "\n",
2013
- "\n",
2014
- "\n",
2015
- "\n",
2016
- "\n",
2017
- "\n",
2018
- "\n",
2019
- "\n",
2020
- "\n",
2021
- "\n",
2022
- "\n",
2023
- "\n",
2024
- "\n",
2025
- "\n",
2026
- "\n",
2027
- "\n",
2028
- "\n",
2029
- "\n",
2030
- "\n",
2031
- "\n",
2032
- "\n",
2033
- "\n",
2034
- "\n",
2035
- "\n",
2036
- "\n",
2037
- "\n",
2038
- "\n",
2039
- "\n",
2040
- "\n",
2041
- "\n",
2042
- "\n",
2043
- "\n",
2044
- "\n",
2045
- "\n",
2046
- "\n",
2047
- "\n",
2048
- "\n",
2049
- "\n",
2050
- "\n",
2051
- "\n",
2052
- "\n",
2053
- "\n",
2054
- "\n",
2055
- "\n",
2056
- "\n",
2057
- "\n",
2058
- "\n",
2059
- "\n",
2060
- "\n",
2061
- "\n",
2062
- "\n",
2063
- "\n",
2064
- "\n",
2065
- "\n",
2066
- "\n",
2067
- "\n",
2068
- "\n",
2069
- "\n",
2070
- "\n",
2071
- "\n",
2072
- "\n",
2073
- "\n",
2074
- "\n",
2075
- "\n",
2076
- "\n",
2077
- "\n",
2078
- "\n",
2079
- "\n",
2080
- "\n",
2081
- "\n",
2082
- "\n",
2083
- "\n",
2084
- "\n",
2085
- "\n",
2086
- "\n",
2087
- "\n",
2088
- "\n",
2089
- "\n",
2090
- "\n",
2091
- "\n",
2092
- "\n",
2093
- "\n",
2094
- "\n",
2095
- "\n",
2096
- "\n",
2097
- "\n",
2098
- "\n",
2099
- "\n",
2100
- "\n",
2101
- "\n",
2102
- "\n",
2103
- "\n",
2104
- "\n",
2105
- "\n",
2106
- "\n",
2107
- "\n",
2108
- "\n",
2109
- "\n",
2110
- "\n",
2111
- "\n",
2112
- "\n",
2113
- "\n",
2114
- "\n",
2115
- "\n",
2116
- "\n",
2117
- "\n",
2118
- "\n",
2119
- "\n",
2120
- "\n",
2121
- "\n",
2122
- "\n",
2123
- "\n",
2124
- "\n",
2125
- "\n",
2126
- "\n",
2127
- "\n",
2128
- "\n",
2129
- "\n",
2130
- "\n",
2131
- "\n",
2132
- "\n",
2133
- "\n",
2134
- "\n",
2135
- "\n",
2136
- "\n",
2137
- "\n",
2138
- "\n",
2139
- "\n",
2140
- "\n",
2141
- "\n",
2142
- "\n",
2143
- "\n",
2144
- "\n",
2145
- "\n",
2146
- "<on_llm_end>\n",
2147
- "\n",
2148
- "\n",
2149
- "Completed in 1051.367s\n",
2150
- "\n",
2151
- "Question: more on penetration testing\n",
2152
- "{'question': 'more on penetration testing', 'chat_history': [(\"What's PCI DSS?\", 'PCI DSS stands for Payment Card Industry Data Security Standard. It is a global standard that provides a baseline of technical and operational requirements designed to protect payment account data. The standard is developed and maintained by the PCI Security Standards Council, and it includes requirements for building and maintaining a secure network and systems, protecting account data, maintaining a vulnerability management program, implementing strong access control measures, and more. The goal of PCI DSS is to protect payment data from unauthorized access, use, disclosure, disruption, modification, or destruction.'), ('Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?', 'The key changes made in PCI DSS version 4.0 compared to version 3.2.1 include updated principal requirement titles, replaced \"firewalls\" and \"routers\" with \"network security controls\", and evolved requirements related to roles and responsibilities. Additionally, there are errata updates to correct entries in the Summary of New Requirements table and to add descriptions of changes made to certain requirements.'), ('new requirements for vulnerability assessments', 'The updated requirements for vulnerability assessments in PCI DSS version 4.0 are as follows:')]}\n",
2153
- "What are the updated requirements for vulnerability assessments in PCI DSS version 4.0?\n",
2154
- "\n",
2155
- "\n",
2156
- "\n",
2157
- "<on_llm_end>\n",
2158
- "\n",
2159
- "\n",
2160
- " The updated requirements for vulnerability assessments in PCI DSS version 4.0 can be found in Section 11 of the summary of changes document. According to the document, there are new requirements for managing all other applicable vulnerabilities (those not ranked as high-risk or critical) found during internal vulnerability scans, and for performing vulnerability assessments via authenticated scanning. Additionally, there is a new requirement for maintaining an inventory of trusted keys and certificates.\n",
2161
- "\n",
2162
- "\n",
2163
- "\n",
2164
- "<on_llm_end>\n",
2165
- "\n",
2166
- "\n",
2167
- "Completed in 64.196s\n",
2168
- "Total time used: 1234.418 s\n",
2169
- "Number of tokens generated: 2457\n",
2170
- "Average generation speed: 1.990 tokens/s\n",
2171
- "CPU times: user 18.5 s, sys: 5.39 s, total: 23.8 s\n",
2172
- "Wall time: 23min 32s\n"
2173
- ]
2174
- }
2175
- ],
2176
- "source": [
2177
- "%%time\n",
2178
- "\n",
2179
- "os.environ[\"HF_RP\"] = \"1.05\"\n",
2180
- "!python qa_chain_test.py"
2181
- ]
2182
- },
2183
- {
2184
- "cell_type": "code",
2185
- "execution_count": 4,
2186
- "id": "8a022a7b",
2187
- "metadata": {},
2188
- "outputs": [
2189
- {
2190
- "name": "stdout",
2191
- "output_type": "stream",
2192
- "text": [
2193
- "loading env vars from: /home/inflaton/code/projects/chat-with-orca-2/.env\n",
2194
- "Running on: Linux-5.10.102.1-microsoft-standard-WSL2-x86_64-with-glibc2.35\n",
2195
- "MPS is NOT available\n",
2196
- "CUDA is available\n",
2197
- "MPS not available because the current PyTorch install was not built with MPS enabled.\n",
2198
- "CUDA is available, we have found 1 GPU(s)\n",
2199
- "NVIDIA GeForce RTX 4080 Laptop GPU\n",
2200
- "CUDA version: 12.1\n",
2201
- "hf_embeddings_device_type: cuda:0\n",
2202
- "hf_pipeline_device_type: cuda:0\n",
2203
- "load INSTRUCTOR_Transformer\n",
2204
- "/home/inflaton/miniconda3/envs/chat-with-orca-2/lib/python3.11/site-packages/torch/_utils.py:831: UserWarning: TypedStorage is deprecated. It will be removed in the future and UntypedStorage will be the only storage class. This should only matter to you if you are using storages directly. To access UntypedStorage directly, use tensor.untyped_storage() instead of tensor.storage()\n",
2205
- " return self.fget.__get__(instance, owner)()\n",
2206
- "max_seq_length 512\n",
2207
- "Completed in 0.647s\n",
2208
- "Load index from ./data/faiss_1024_512/ with FAISS\n",
2209
- "Completed in 0.021s\n",
2210
- "initializing LLM: huggingface\n",
2211
- " hf_pipeline_device_type: cuda:0\n",
2212
- " load_quantized_model: None\n",
2213
- " torch_dtype: torch.float16\n",
2214
- " n_threds: 4\n",
2215
- " loading model: meta-llama/Llama-2-7b-chat-hf\n",
2216
- " HF auth token: None\n",
2217
- " repetition_penalty: 1.1\n",
2218
- "Loading checkpoint shards: 100%|█████████████████| 2/2 [03:45<00:00, 112.81s/it]\n",
2219
- "Model memory footprint: 13543948288\n",
2220
- "initialization complete\n",
2221
- "Completed in 260.223s\n",
2222
- "\n",
2223
- "Question: What's PCI DSS?\n",
2224
- "{'question': \"What's PCI DSS?\", 'chat_history': []}\n",
2225
- "PCI DSS stands for Payment Card Industry Data Security Standard. It is a global standard that provides a baseline of technical and operational requirements designed to protect payment account data. The standard is developed and maintained by the PCI Security Standards Council, and it includes requirements for building and maintaining a secure network and systems, protecting account data, maintaining a vulnerability management program, implementing strong access control measures, and more.\n",
2226
- "\n",
2227
- "\n",
2228
- "\n",
2229
- "<on_llm_end>\n",
2230
- "\n",
2231
- "\n",
2232
- "Completed in 62.521s\n",
2233
- "\n",
2234
- "Question: Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?\n",
2235
- "{'question': 'Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?', 'chat_history': [(\"What's PCI DSS?\", 'PCI DSS stands for Payment Card Industry Data Security Standard. It is a global standard that provides a baseline of technical and operational requirements designed to protect payment account data. The standard is developed and maintained by the PCI Security Standards Council, and it includes requirements for building and maintaining a secure network and systems, protecting account data, maintaining a vulnerability management program, implementing strong access control measures, and more.')]}\n",
2236
- "What are the key changes made in PCI DSS version 4.0 compared to version 3.2.1?\n",
2237
- "\n",
2238
- "\n",
2239
- "\n",
2240
- "<on_llm_end>\n",
2241
- "\n",
2242
- "\n",
2243
- " The key changes made in PCI DSS version 4.0 compared to version 3.2.1 include updated principal requirement titles, replaced \"firewalls\" and \"routers\" with \"network security controls\", and evolved requirements related to roles and responsibilities. Additionally, there were errata updates made in May 2022 and December 2022 to correct errors and provide additional information. However, I cannot provide a detailed answer without knowing your specific context or industry.\n",
2244
- "\n",
2245
- "\n",
2246
- "\n",
2247
- "<on_llm_end>\n",
2248
- "\n",
2249
- "\n",
2250
- "Completed in 50.686s\n",
2251
- "\n",
2252
- "Question: new requirements for vulnerability assessments\n",
2253
- "{'question': 'new requirements for vulnerability assessments', 'chat_history': [(\"What's PCI DSS?\", 'PCI DSS stands for Payment Card Industry Data Security Standard. It is a global standard that provides a baseline of technical and operational requirements designed to protect payment account data. The standard is developed and maintained by the PCI Security Standards Council, and it includes requirements for building and maintaining a secure network and systems, protecting account data, maintaining a vulnerability management program, implementing strong access control measures, and more.'), ('Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?', 'The key changes made in PCI DSS version 4.0 compared to version 3.2.1 include updated principal requirement titles, replaced \"firewalls\" and \"routers\" with \"network security controls\", and evolved requirements related to roles and responsibilities. Additionally, there were errata updates made in May 2022 and December 2022 to correct errors and provide additional information. However, I cannot provide a detailed answer without knowing your specific context or industry.')]}\n",
2254
- "What are the new requirements for vulnerability assessments in PCI DSS version 4.0?\n",
2255
- "\n",
2256
- "\n",
2257
- "\n",
2258
- "<on_llm_end>\n",
2259
- "\n",
2260
- "\n",
2261
- " According to the provided summary of changes, there are no new requirements for vulnerability assessments in PCI DSS version 4.0. The existing requirements for vulnerability assessments remain unchanged from version 3.2.1 to version 4.0.\n",
2262
- "\n",
2263
- "\n",
2264
- "\n",
2265
- "<on_llm_end>\n",
2266
- "\n",
2267
- "\n",
2268
- "Completed in 42.544s\n",
2269
- "\n",
2270
- "Question: more on penetration testing\n",
2271
- "{'question': 'more on penetration testing', 'chat_history': [(\"What's PCI DSS?\", 'PCI DSS stands for Payment Card Industry Data Security Standard. It is a global standard that provides a baseline of technical and operational requirements designed to protect payment account data. The standard is developed and maintained by the PCI Security Standards Council, and it includes requirements for building and maintaining a secure network and systems, protecting account data, maintaining a vulnerability management program, implementing strong access control measures, and more.'), ('Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?', 'The key changes made in PCI DSS version 4.0 compared to version 3.2.1 include updated principal requirement titles, replaced \"firewalls\" and \"routers\" with \"network security controls\", and evolved requirements related to roles and responsibilities. Additionally, there were errata updates made in May 2022 and December 2022 to correct errors and provide additional information. However, I cannot provide a detailed answer without knowing your specific context or industry.'), ('new requirements for vulnerability assessments', 'According to the provided summary of changes, there are no new requirements for vulnerability assessments in PCI DSS version 4.0. The existing requirements for vulnerability assessments remain unchanged from version 3.2.1 to version 4.0.')]}\n",
2272
- "What are the key differences between penetration testing and vulnerability assessments in the context of PCI DSS compliance?\n",
2273
- "\n",
2274
- "\n",
2275
- "\n",
2276
- "<on_llm_end>\n",
2277
- "\n",
2278
- "\n",
2279
- "Penetration testing and vulnerability assessments are both important components of PCI DSS compliance, but they serve different purposes and have distinct methodologies.\n",
2280
- "Penetration testing involves simulating a cyber attack on an organization's network, systems, and applications to identify vulnerabilities that could be exploited by attackers. This type of testing is focused on identifying potential threats and weaknesses in the system, rather than simply identifying vulnerabilities. The goal of penetration testing is to provide recommendations for improving security posture and reducing the likelihood of a successful attack.\n",
2281
- "Vulnerability assessments, on the other hand, involve identifying and classifying potential vulnerabilities in the system based on industry standards and best practices. This type of assessment is focused on identifying potential weaknesses in the system and prioritizing remediation efforts based on risk. Vulnerability assessments typically use automated tools to scan the system for known vulnerabilities and may also include manual testing to identify additional vulnerabilities.\n",
2282
- "In summary, penetration testing is a more comprehensive and proactive approach to identifying security threats, while vulnerability assessments are a more reactive approach to identifying potential vulnerabilities. Both are important components of PCI DSS compliance and should be conducted regularly to ensure the security of cardholder data.\n",
2283
- "\n",
2284
- "\n",
2285
- "\n",
2286
- "<on_llm_end>\n",
2287
- "\n",
2288
- "\n",
2289
- "Completed in 116.722s\n",
2290
- "Total time used: 272.474 s\n",
2291
- "Number of tokens generated: 623\n",
2292
- "Average generation speed: 2.286 tokens/s\n",
2293
- "CPU times: user 6.52 s, sys: 1.93 s, total: 8.45 s\n",
2294
- "Wall time: 8min 57s\n"
2295
- ]
2296
- }
2297
- ],
2298
- "source": [
2299
- "%%time\n",
2300
- "\n",
2301
- "os.environ[\"HF_RP\"] = \"1.10\"\n",
2302
- "!python qa_chain_test.py"
2303
- ]
2304
- },
2305
- {
2306
- "cell_type": "code",
2307
- "execution_count": 5,
2308
- "id": "db48dcc4",
2309
- "metadata": {},
2310
- "outputs": [
2311
- {
2312
- "name": "stdout",
2313
- "output_type": "stream",
2314
- "text": [
2315
- "loading env vars from: /home/inflaton/code/projects/chat-with-orca-2/.env\n",
2316
- "Running on: Linux-5.10.102.1-microsoft-standard-WSL2-x86_64-with-glibc2.35\n",
2317
- "MPS is NOT available\n",
2318
- "CUDA is available\n",
2319
- "MPS not available because the current PyTorch install was not built with MPS enabled.\n",
2320
- "CUDA is available, we have found 1 GPU(s)\n",
2321
- "NVIDIA GeForce RTX 4080 Laptop GPU\n",
2322
- "CUDA version: 12.1\n",
2323
- "hf_embeddings_device_type: cuda:0\n",
2324
- "hf_pipeline_device_type: cuda:0\n",
2325
- "load INSTRUCTOR_Transformer\n",
2326
- "/home/inflaton/miniconda3/envs/chat-with-orca-2/lib/python3.11/site-packages/torch/_utils.py:831: UserWarning: TypedStorage is deprecated. It will be removed in the future and UntypedStorage will be the only storage class. This should only matter to you if you are using storages directly. To access UntypedStorage directly, use tensor.untyped_storage() instead of tensor.storage()\n",
2327
- " return self.fget.__get__(instance, owner)()\n",
2328
- "max_seq_length 512\n",
2329
- "Completed in 0.611s\n",
2330
- "Load index from ./data/faiss_1024_512/ with FAISS\n",
2331
- "Completed in 0.027s\n",
2332
- "initializing LLM: huggingface\n",
2333
- " hf_pipeline_device_type: cuda:0\n",
2334
- " load_quantized_model: None\n",
2335
- " torch_dtype: torch.float16\n",
2336
- " n_threds: 4\n",
2337
- " loading model: meta-llama/Llama-2-7b-chat-hf\n",
2338
- " HF auth token: None\n",
2339
- " repetition_penalty: 1.15\n",
2340
- "Loading checkpoint shards: 100%|█████████████████| 2/2 [03:40<00:00, 110.30s/it]\n",
2341
- "Model memory footprint: 13543948288\n",
2342
- "initialization complete\n",
2343
- "Completed in 254.385s\n",
2344
- "\n",
2345
- "Question: What's PCI DSS?\n",
2346
- "{'question': \"What's PCI DSS?\", 'chat_history': []}\n",
2347
- "PCI DSS stands for Payment Card Industry Data Security Standard. It is a set of security standards designed to ensure that companies that handle credit card transactions keep customer data safe from cyber threats. These standards are developed and maintained by the PCI Security Standards Council, a global forum that brings together industry leaders to address security concerns. By adhering to these standards, companies can help prevent data breaches and protect their customers' sensitive information.\n",
2348
- "\n",
2349
- "\n",
2350
- "\n",
2351
- "<on_llm_end>\n",
2352
- "\n",
2353
- "\n",
2354
- "Completed in 63.409s\n",
2355
- "\n",
2356
- "Question: Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?\n",
2357
- "{'question': 'Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?', 'chat_history': [(\"What's PCI DSS?\", \"PCI DSS stands for Payment Card Industry Data Security Standard. It is a set of security standards designed to ensure that companies that handle credit card transactions keep customer data safe from cyber threats. These standards are developed and maintained by the PCI Security Standards Council, a global forum that brings together industry leaders to address security concerns. By adhering to these standards, companies can help prevent data breaches and protect their customers' sensitive information.\")]}\n",
2358
- "What are the key changes between PCI DSS versions 3.2.1 and 4.0?\n",
2359
- "\n",
2360
- "\n",
2361
- "\n",
2362
- "<on_llm_end>\n",
2363
- "\n",
2364
- "\n",
2365
- "The key changes between PCI DSS versions 3.2.1 and 4.0 include updates to align with changes from PCI DSS v3.2 to PCI DSS v4.0, minor corrections and edits made for clarification and/or format, and additional changes per requirement. However, if you don't know the answer, it's okay to say so instead of trying to make something up.\n",
2366
- "\n",
2367
- "\n",
2368
- "\n",
2369
- "<on_llm_end>\n",
2370
- "\n",
2371
- "\n",
2372
- "Completed in 49.842s\n",
2373
- "\n",
2374
- "Question: new requirements for vulnerability assessments\n",
2375
- "{'question': 'new requirements for vulnerability assessments', 'chat_history': [(\"What's PCI DSS?\", \"PCI DSS stands for Payment Card Industry Data Security Standard. It is a set of security standards designed to ensure that companies that handle credit card transactions keep customer data safe from cyber threats. These standards are developed and maintained by the PCI Security Standards Council, a global forum that brings together industry leaders to address security concerns. By adhering to these standards, companies can help prevent data breaches and protect their customers' sensitive information.\"), ('Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?', \"The key changes between PCI DSS versions 3.2.1 and 4.0 include updates to align with changes from PCI DSS v3.2 to PCI DSS v4.0, minor corrections and edits made for clarification and/or format, and additional changes per requirement. However, if you don't know the answer, it's okay to say so instead of trying to make something up.\")]}\n",
2376
- "What are some of the new requirements for vulnerability assessments in PCI DSS version 4.0 compared to previous versions?\n",
2377
- "\n",
2378
- "\n",
2379
- "\n",
2380
- "<on_llm_end>\n",
2381
- "\n",
2382
- "\n",
2383
- "In PCI DSS version 4.0, there are several new requirements related to vulnerability assessments, including:\n",
2384
- "\n",
2385
- "* A new requirement (4.1.2) for roles and responsibilities related to vulnerability management.\n",
2386
- "* An updated bullet point (4.2.1) regarding the use of certificates for PAN transmissions over open, public networks, which includes a new best practice for maintaining an inventory of trusted keys and certificates.\n",
2387
- "* A new requirement (4.2.1.1) to ensure that only authorized personnel have access to trusted keys and certificates.\n",
2388
- "These changes aim to enhance the security posture of organizations handling cardholder data by providing more detailed guidelines for identifying and managing potential vulnerabilities.\n",
2389
- "\n",
2390
- "\n",
2391
- "\n",
2392
- "<on_llm_end>\n",
2393
- "\n",
2394
- "\n",
2395
- "Completed in 77.258s\n",
2396
- "\n",
2397
- "Question: more on penetration testing\n",
2398
- "{'question': 'more on penetration testing', 'chat_history': [(\"What's PCI DSS?\", \"PCI DSS stands for Payment Card Industry Data Security Standard. It is a set of security standards designed to ensure that companies that handle credit card transactions keep customer data safe from cyber threats. These standards are developed and maintained by the PCI Security Standards Council, a global forum that brings together industry leaders to address security concerns. By adhering to these standards, companies can help prevent data breaches and protect their customers' sensitive information.\"), ('Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?', \"The key changes between PCI DSS versions 3.2.1 and 4.0 include updates to align with changes from PCI DSS v3.2 to PCI DSS v4.0, minor corrections and edits made for clarification and/or format, and additional changes per requirement. However, if you don't know the answer, it's okay to say so instead of trying to make something up.\"), ('new requirements for vulnerability assessments', 'In PCI DSS version 4.0, there are several new requirements related to vulnerability assessments, including:\\n\\n* A new requirement (4.1.2) for roles and responsibilities related to vulnerability management.\\n* An updated bullet point (4.2.1) regarding the use of certificates for PAN transmissions over open, public networks, which includes a new best practice for maintaining an inventory of trusted keys and certificates.\\n* A new requirement (4.2.1.1) to ensure that only authorized personnel have access to trusted keys and certificates.\\nThese changes aim to enhance the security posture of organizations handling cardholder data by providing more detailed guidelines for identifying and managing potential vulnerabilities.')]}\n",
2399
- "What are some common techniques used in penetration testing to identify vulnerabilities in a system or network?\n",
2400
- "\n",
2401
- "\n",
2402
- "\n",
2403
- "<on_llm_end>\n",
2404
- "\n",
2405
- "\n",
2406
- "Penetration testing involves various techniques to identify vulnerabilities in a system or network. Some common techniques include:\n",
2407
- "\n",
2408
- "• Vulnerability scanning: This technique involves identifying potential vulnerabilities in a system or network using automated tools. The tool scans the network or system and reports any identified vulnerabilities.\n",
2409
- "• Social engineering: This technique involves manipulating individuals into divulging sensitive information or gaining unauthorized access to a system or network. Social engineers may use various tactics such as phishing emails, phone calls, or physical interactions to obtain information.\n",
2410
- "• Network traffic analysis: This technique involves monitoring and analyzing network traffic to identify suspicious activity or potential vulnerabilities. Tools such as Wireshark or Tcpdump can be used to capture and analyze network packets.\n",
2411
- "• Web application scanning: This technique involves identifying vulnerabilities in web applications using automated tools. The tool scans the application and reports any identified vulnerabilities.\n",
2412
- "• Malware analysis: This technique involves analyzing malware samples to identify their capabilities and potential vulnerabilities. This can help identify potential attack vectors and inform mitigation strategies.\n",
2413
- "• Compliance checking: This technique involves verifying that a system or network complies with relevant industry standards or regulations. By identifying non-compliant areas, organizations can prioritize remediation efforts.\n",
2414
- "• Penetration testing frameworks: These frameworks provide structured approaches to conducting penetration tests. They typically involve creating a detailed test plan, executing the test, and reporting findings. Common penetration testing frameworks include OWASP ZAP, NIST SP 800-115, and OSSTMM.\n",
2415
- "\n",
2416
- "\n",
2417
- "\n",
2418
- "<on_llm_end>\n",
2419
- "\n",
2420
- "\n",
2421
- "Completed in 129.022s\n",
2422
- "Total time used: 319.531 s\n",
2423
- "Number of tokens generated: 792\n",
2424
- "Average generation speed: 2.479 tokens/s\n",
2425
- "CPU times: user 7.12 s, sys: 2.03 s, total: 9.16 s\n",
2426
- "Wall time: 9min 38s\n"
2427
- ]
2428
- }
2429
- ],
2430
- "source": [
2431
- "%%time\n",
2432
- "\n",
2433
- "os.environ[\"HF_RP\"] = \"1.15\"\n",
2434
- "!python qa_chain_test.py"
2435
- ]
2436
- }
2437
- ],
2438
- "metadata": {
2439
- "kernelspec": {
2440
- "display_name": "Python 3 (ipykernel)",
2441
- "language": "python",
2442
- "name": "python3"
2443
- },
2444
- "language_info": {
2445
- "codemirror_mode": {
2446
- "name": "ipython",
2447
- "version": 3
2448
- },
2449
- "file_extension": ".py",
2450
- "mimetype": "text/x-python",
2451
- "name": "python",
2452
- "nbconvert_exporter": "python",
2453
- "pygments_lexer": "ipython3",
2454
- "version": "3.11.7"
2455
- }
2456
- },
2457
- "nbformat": 4,
2458
- "nbformat_minor": 5
2459
- }
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
notebook/nvidia-4080-orca-2-13b_tgi.ipynb DELETED
@@ -1,359 +0,0 @@
1
- {
2
- "cells": [
3
- {
4
- "cell_type": "code",
5
- "execution_count": 1,
6
- "id": "874cd58e",
7
- "metadata": {},
8
- "outputs": [
9
- {
10
- "name": "stdout",
11
- "output_type": "stream",
12
- "text": [
13
- "workding dir: /home/inflaton/code/projects/chat-with-orca-2\n"
14
- ]
15
- }
16
- ],
17
- "source": [
18
- "import os\n",
19
- "import sys\n",
20
- "from pathlib import Path\n",
21
- "\n",
22
- "workding_dir = str(Path.cwd().parent)\n",
23
- "os.chdir(workding_dir)\n",
24
- "sys.path.append(workding_dir)\n",
25
- "print(\"workding dir:\", workding_dir)"
26
- ]
27
- },
28
- {
29
- "cell_type": "code",
30
- "execution_count": 2,
31
- "id": "19f967ca",
32
- "metadata": {},
33
- "outputs": [],
34
- "source": [
35
- "os.environ[\"LLM_MODEL_TYPE\"] = \"hftgi\"\n",
36
- "os.environ[\"HFTGI_SERVER_URL\"] = \"https://enabled-factually-cougar.ngrok-free.app\""
37
- ]
38
- },
39
- {
40
- "cell_type": "code",
41
- "execution_count": 3,
42
- "id": "a6d96660",
43
- "metadata": {},
44
- "outputs": [
45
- {
46
- "name": "stdout",
47
- "output_type": "stream",
48
- "text": [
49
- "loading env vars from: /home/inflaton/code/projects/chat-with-orca-2/.env\n",
50
- "Running on: Linux-5.10.102.1-microsoft-standard-WSL2-x86_64-with-glibc2.35\n",
51
- "MPS is NOT available\n",
52
- "CUDA is available\n",
53
- "MPS not available because the current PyTorch install was not built with MPS enabled.\n",
54
- "CUDA is available, we have found 1 GPU(s)\n",
55
- "NVIDIA GeForce RTX 4080 Laptop GPU\n",
56
- "CUDA version: 12.1\n",
57
- "hf_embeddings_device_type: cuda:0\n",
58
- "hf_pipeline_device_type: cuda:0\n",
59
- "load INSTRUCTOR_Transformer\n",
60
- "/home/inflaton/miniconda3/envs/chat-with-orca-2/lib/python3.11/site-packages/torch/_utils.py:831: UserWarning: TypedStorage is deprecated. It will be removed in the future and UntypedStorage will be the only storage class. This should only matter to you if you are using storages directly. To access UntypedStorage directly, use tensor.untyped_storage() instead of tensor.storage()\n",
61
- " return self.fget.__get__(instance, owner)()\n",
62
- "max_seq_length 512\n",
63
- "Completed in 0.554s\n",
64
- "Load index from ./data/faiss_1024_512/ with FAISS\n",
65
- "Completed in 0.018s\n",
66
- "initializing LLM: hftgi\n",
67
- " hf_pipeline_device_type: cuda:0\n",
68
- " load_quantized_model: None\n",
69
- " torch_dtype: torch.float16\n",
70
- " n_threds: 4\n",
71
- " repetition_penalty: 1.05\n",
72
- "/home/inflaton/miniconda3/envs/chat-with-orca-2/lib/python3.11/site-packages/pydantic/_internal/_fields.py:149: UserWarning: Field \"model_id\" has conflict with protected namespace \"model_\".\n",
73
- "\n",
74
- "You may be able to resolve this warning by setting `model_config['protected_namespaces'] = ()`.\n",
75
- " warnings.warn(\n",
76
- "initialization complete\n",
77
- "Completed in 0.011s\n",
78
- "\n",
79
- "Question: What's PCI DSS?\n",
80
- "{'question': \"What's PCI DSS?\", 'chat_history': []}\n",
81
- " PCI DSS is a global standard that provides a baseline of technical and operational requirements designed to protect payment account data. It helps ensure the security of cardholder data and reduces the risk of cyberattacks.\n",
82
- "<on_llm_end>\n",
83
- "\n",
84
- "\n",
85
- "Completed in 4.609s\n",
86
- "\n",
87
- "Question: Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?\n",
88
- "{'question': 'Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?', 'chat_history': [(\"What's PCI DSS?\", 'PCI DSS is a global standard that provides a baseline of technical and operational requirements designed to protect payment account data. It helps ensure the security of cardholder data and reduces the risk of cyberattacks.')]}\n",
89
- " ¿Puedes resumir los cambios realizados desde la versión 3.2.1 hasta la versión 4.0 de PCI DSS?\n",
90
- "<on_llm_end>\n",
91
- "\n",
92
- "\n",
93
- " Sí, puedo resumir los cambios realizados desde la versión 3.2.1 hasta la versión 4.0 de PCI DSS. Los cambios incluyen ajustes para alinear con las modificaciones entre las versiones 3.2 y 3.2.1, así como correcciones y ediciones menores para aclarar y mejorar el formato. Además, hay cambios en las secciones introductorias, general y adicionales de los requisitos.\n",
94
- "<on_llm_end>\n",
95
- "\n",
96
- "\n",
97
- "Completed in 9.076s\n",
98
- "\n",
99
- "Question: new requirements for vulnerability assessments\n",
100
- "{'question': 'new requirements for vulnerability assessments', 'chat_history': [(\"What's PCI DSS?\", 'PCI DSS is a global standard that provides a baseline of technical and operational requirements designed to protect payment account data. It helps ensure the security of cardholder data and reduces the risk of cyberattacks.'), ('Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?', 'Sí, puedo resumir los cambios realizados desde la versión 3.2.1 hasta la versión 4.0 de PCI DSS. Los cambios incluyen ajustes para alinear con las modificaciones entre las versiones 3.2 y 3.2.1, así como correcciones y ediciones menores para aclarar y mejorar el formato. Además, hay cambios en las secciones introductorias, general y adicionales de los requisitos.')]}\n",
101
- " ¿Cuáles son las nuevas recomendaciones para las evaluaciones de vulnerabilidades en la versión 4.0 de PCI DSS?\n",
102
- "<on_llm_end>\n",
103
- "\n",
104
- "\n",
105
- "\n",
106
- "Las nuevas recomendaciones para las evaluaciones de vulnerabilidades en la versión 4.0 de PCI DSS incluyen realizar escaneos de vulnerabilidad externa después de cualquier cambio significativo y resolver las vulnerabilidades con una puntuación de 4.0 o superior según el CVSS. Además, se recomienda realizar pruebas de penetración externa e interna regularmente y corregir las vulnerabilidades y debilidades de seguridad que sean explotables.\n",
107
- "<on_llm_end>\n",
108
- "\n",
109
- "\n",
110
- "Completed in 9.533s\n",
111
- "\n",
112
- "Question: more on penetration testing\n",
113
- "{'question': 'more on penetration testing', 'chat_history': [(\"What's PCI DSS?\", 'PCI DSS is a global standard that provides a baseline of technical and operational requirements designed to protect payment account data. It helps ensure the security of cardholder data and reduces the risk of cyberattacks.'), ('Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?', 'Sí, puedo resumir los cambios realizados desde la versión 3.2.1 hasta la versión 4.0 de PCI DSS. Los cambios incluyen ajustes para alinear con las modificaciones entre las versiones 3.2 y 3.2.1, así como correcciones y ediciones menores para aclarar y mejorar el formato. Además, hay cambios en las secciones introductorias, general y adicionales de los requisitos.'), ('new requirements for vulnerability assessments', 'Las nuevas recomendaciones para las evaluaciones de vulnerabilidades en la versión 4.0 de PCI DSS incluyen realizar escaneos de vulnerabilidad externa después de cualquier cambio significativo y resolver las vulnerabilidades con una puntuación de 4.0 o superior según el CVSS. Además, se recomienda realizar pruebas de penetración externa e interna regularmente y corregir las vulnerabilidades y debilidades de seguridad que sean explotables.')]}\n",
114
- " ¿Puedes dar más información sobre las pruebas de penetración?\n",
115
- "<on_llm_end>\n",
116
- "\n",
117
- "\n",
118
- " Sí, puedo dar más información sobre las pruebas de penetración. Para obtener más información, consulte la documentación y realice entrevistas con el personal involucrado en la implementación y ejecución de las pruebas de penetración. Asegúrese de identificar y documentar los números de referencia de la evidencia correspondientes a las secciones 6 para todas las entrevistas y documentaciones examinadas.\n",
119
- "<on_llm_end>\n",
120
- "\n",
121
- "\n",
122
- "Completed in 7.629s\n",
123
- "Total time used: 30.847 s\n",
124
- "Number of tokens generated: 455\n",
125
- "Average generation speed: 14.750 tokens/s\n",
126
- "CPU times: user 651 ms, sys: 120 ms, total: 771 ms\n",
127
- "Wall time: 34.5 s\n"
128
- ]
129
- }
130
- ],
131
- "source": [
132
- "%%time\n",
133
- "\n",
134
- "os.environ[\"HFTGI_RP\"] = \"1.05\"\n",
135
- "!python qa_chain_test.py"
136
- ]
137
- },
138
- {
139
- "cell_type": "code",
140
- "execution_count": 4,
141
- "id": "8a022a7b",
142
- "metadata": {},
143
- "outputs": [
144
- {
145
- "name": "stdout",
146
- "output_type": "stream",
147
- "text": [
148
- "loading env vars from: /home/inflaton/code/projects/chat-with-orca-2/.env\n",
149
- "Running on: Linux-5.10.102.1-microsoft-standard-WSL2-x86_64-with-glibc2.35\n",
150
- "MPS is NOT available\n",
151
- "CUDA is available\n",
152
- "MPS not available because the current PyTorch install was not built with MPS enabled.\n",
153
- "CUDA is available, we have found 1 GPU(s)\n",
154
- "NVIDIA GeForce RTX 4080 Laptop GPU\n",
155
- "CUDA version: 12.1\n",
156
- "hf_embeddings_device_type: cuda:0\n",
157
- "hf_pipeline_device_type: cuda:0\n",
158
- "load INSTRUCTOR_Transformer\n",
159
- "/home/inflaton/miniconda3/envs/chat-with-orca-2/lib/python3.11/site-packages/torch/_utils.py:831: UserWarning: TypedStorage is deprecated. It will be removed in the future and UntypedStorage will be the only storage class. This should only matter to you if you are using storages directly. To access UntypedStorage directly, use tensor.untyped_storage() instead of tensor.storage()\n",
160
- " return self.fget.__get__(instance, owner)()\n",
161
- "max_seq_length 512\n",
162
- "Completed in 0.589s\n",
163
- "Load index from ./data/faiss_1024_512/ with FAISS\n",
164
- "Completed in 0.019s\n",
165
- "initializing LLM: hftgi\n",
166
- " hf_pipeline_device_type: cuda:0\n",
167
- " load_quantized_model: None\n",
168
- " torch_dtype: torch.float16\n",
169
- " n_threds: 4\n",
170
- " repetition_penalty: 1.1\n",
171
- "/home/inflaton/miniconda3/envs/chat-with-orca-2/lib/python3.11/site-packages/pydantic/_internal/_fields.py:149: UserWarning: Field \"model_id\" has conflict with protected namespace \"model_\".\n",
172
- "\n",
173
- "You may be able to resolve this warning by setting `model_config['protected_namespaces'] = ()`.\n",
174
- " warnings.warn(\n",
175
- "initialization complete\n",
176
- "Completed in 0.011s\n",
177
- "\n",
178
- "Question: What's PCI DSS?\n",
179
- "{'question': \"What's PCI DSS?\", 'chat_history': []}\n",
180
- " PCI DSS is a set of requirements designed to protect payment account data. It provides a baseline of technical and operational requirements for organizations that handle payment card transactions.\n",
181
- "<on_llm_end>\n",
182
- "\n",
183
- "\n",
184
- "Completed in 4.059s\n",
185
- "\n",
186
- "Question: Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?\n",
187
- "{'question': 'Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?', 'chat_history': [(\"What's PCI DSS?\", 'PCI DSS is a set of requirements designed to protect payment account data. It provides a baseline of technical and operational requirements for organizations that handle payment card transactions.')]}\n",
188
- " ¿Puedes resumir los cambios realizados desde la versión 3.2.1 hasta la versión 4.0 de PCI DSS?\n",
189
- "<on_llm_end>\n",
190
- "\n",
191
- "\n",
192
- " Sí, puedo resumir los cambios realizados desde la versión 3.2.1 hasta la versión 4.0 de PCI DSS. Los cambios incluyen ajustes para alinear con las modificaciones entre las versiones 3.2 y 3.2.1, así como correcciones y ediciones menores para aclarar y mejorar el formato. Además, hay actualizaciones para adaptarse a las nuevas exigencias y mejoras en la seguridad.\n",
193
- "<on_llm_end>\n",
194
- "\n",
195
- "\n",
196
- "Completed in 9.049s\n",
197
- "\n",
198
- "Question: new requirements for vulnerability assessments\n",
199
- "{'question': 'new requirements for vulnerability assessments', 'chat_history': [(\"What's PCI DSS?\", 'PCI DSS is a set of requirements designed to protect payment account data. It provides a baseline of technical and operational requirements for organizations that handle payment card transactions.'), ('Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?', 'Sí, puedo resumir los cambios realizados desde la versión 3.2.1 hasta la versión 4.0 de PCI DSS. Los cambios incluyen ajustes para alinear con las modificaciones entre las versiones 3.2 y 3.2.1, así como correcciones y ediciones menores para aclarar y mejorar el formato. Además, hay actualizaciones para adaptarse a las nuevas exigencias y mejoras en la seguridad.')]}\n",
200
- " ¿Cuáles son las nuevas exigencias para las evaluaciones de vulnerabilidades en la versión 4.0 de PCI DSS?\n",
201
- "<on_llm_end>\n",
202
- "\n",
203
- "\n",
204
- " Para obtener información sobre las nuevas exigencias para las evaluaciones de vulnerabilidades en la versión 4.0 de PCI DSS, consulte la sección \"Descripción del cambio\" en el documento \"PCI DSS v3.2.1 a v.4.0 Resumen de cambios r2 diciembre 2022\".\n",
205
- "<on_llm_end>\n",
206
- "\n",
207
- "\n",
208
- "Completed in 7.425s\n",
209
- "\n",
210
- "Question: more on penetration testing\n",
211
- "{'question': 'more on penetration testing', 'chat_history': [(\"What's PCI DSS?\", 'PCI DSS is a set of requirements designed to protect payment account data. It provides a baseline of technical and operational requirements for organizations that handle payment card transactions.'), ('Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?', 'Sí, puedo resumir los cambios realizados desde la versión 3.2.1 hasta la versión 4.0 de PCI DSS. Los cambios incluyen ajustes para alinear con las modificaciones entre las versiones 3.2 y 3.2.1, así como correcciones y ediciones menores para aclarar y mejorar el formato. Además, hay actualizaciones para adaptarse a las nuevas exigencias y mejoras en la seguridad.'), ('new requirements for vulnerability assessments', 'Para obtener información sobre las nuevas exigencias para las evaluaciones de vulnerabilidades en la versión 4.0 de PCI DSS, consulte la sección \"Descripción del cambio\" en el documento \"PCI DSS v3.2.1 a v.4.0 Resumen de cambios r2 diciembre 2022\".')]}\n",
212
- " ¿Podría proporcionar más información sobre las pruebas de penetración en el contexto de PCI DSS?\n",
213
- "<on_llm_end>\n",
214
- "\n",
215
- "\n",
216
- " Sí, puedo proporcionar más información sobre las pruebas de penetración en el contexto de PCI DSS.\n",
217
- "<on_llm_end>\n",
218
- "\n",
219
- "\n",
220
- "Completed in 3.957s\n",
221
- "Total time used: 24.490 s\n",
222
- "Number of tokens generated: 348\n",
223
- "Average generation speed: 14.210 tokens/s\n",
224
- "CPU times: user 434 ms, sys: 177 ms, total: 612 ms\n",
225
- "Wall time: 28.2 s\n"
226
- ]
227
- }
228
- ],
229
- "source": [
230
- "%%time\n",
231
- "\n",
232
- "os.environ[\"HFTGI_RP\"] = \"1.10\"\n",
233
- "!python qa_chain_test.py"
234
- ]
235
- },
236
- {
237
- "cell_type": "code",
238
- "execution_count": 5,
239
- "id": "db48dcc4",
240
- "metadata": {},
241
- "outputs": [
242
- {
243
- "name": "stdout",
244
- "output_type": "stream",
245
- "text": [
246
- "loading env vars from: /home/inflaton/code/projects/chat-with-orca-2/.env\n",
247
- "Running on: Linux-5.10.102.1-microsoft-standard-WSL2-x86_64-with-glibc2.35\n",
248
- "MPS is NOT available\n",
249
- "CUDA is available\n",
250
- "MPS not available because the current PyTorch install was not built with MPS enabled.\n",
251
- "CUDA is available, we have found 1 GPU(s)\n",
252
- "NVIDIA GeForce RTX 4080 Laptop GPU\n",
253
- "CUDA version: 12.1\n",
254
- "hf_embeddings_device_type: cuda:0\n",
255
- "hf_pipeline_device_type: cuda:0\n",
256
- "load INSTRUCTOR_Transformer\n",
257
- "/home/inflaton/miniconda3/envs/chat-with-orca-2/lib/python3.11/site-packages/torch/_utils.py:831: UserWarning: TypedStorage is deprecated. It will be removed in the future and UntypedStorage will be the only storage class. This should only matter to you if you are using storages directly. To access UntypedStorage directly, use tensor.untyped_storage() instead of tensor.storage()\n",
258
- " return self.fget.__get__(instance, owner)()\n",
259
- "max_seq_length 512\n",
260
- "Completed in 0.583s\n",
261
- "Load index from ./data/faiss_1024_512/ with FAISS\n",
262
- "Completed in 0.019s\n",
263
- "initializing LLM: hftgi\n",
264
- " hf_pipeline_device_type: cuda:0\n",
265
- " load_quantized_model: None\n",
266
- " torch_dtype: torch.float16\n",
267
- " n_threds: 4\n",
268
- " repetition_penalty: 1.15\n",
269
- "/home/inflaton/miniconda3/envs/chat-with-orca-2/lib/python3.11/site-packages/pydantic/_internal/_fields.py:149: UserWarning: Field \"model_id\" has conflict with protected namespace \"model_\".\n",
270
- "\n",
271
- "You may be able to resolve this warning by setting `model_config['protected_namespaces'] = ()`.\n",
272
- " warnings.warn(\n",
273
- "initialization complete\n",
274
- "Completed in 0.011s\n",
275
- "\n",
276
- "Question: What's PCI DSS?\n",
277
- "{'question': \"What's PCI DSS?\", 'chat_history': []}\n",
278
- " PCI DSS is a set of requirements designed to protect payment account data. It includes guidelines for building and maintaining secure networks and systems, protecting account data, managing vulnerabilities, implementing strong access control measures, and more.\n",
279
- "<on_llm_end>\n",
280
- "\n",
281
- "\n",
282
- "Completed in 4.767s\n",
283
- "\n",
284
- "Question: Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?\n",
285
- "{'question': 'Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?', 'chat_history': [(\"What's PCI DSS?\", 'PCI DSS is a set of requirements designed to protect payment account data. It includes guidelines for building and maintaining secure networks and systems, protecting account data, managing vulnerabilities, implementing strong access control measures, and more.')]}\n",
286
- " ¿Puedes resumir los cambios realizados desde la versión 3.2.1 hasta la versión 4.0 de PCI DSS?\n",
287
- "<on_llm_end>\n",
288
- "\n",
289
- "\n",
290
- " Sí, puedo resumir los cambios realizados desde la versión 3.2.1 hasta la versión 4.0 de PCI DSS. Los cambios incluyen ajustes para alinear con las modificaciones entre las versiones 3.2 y 3.2.1, así como correcciones menores y ediciones para mejorar la claridad y el formato. Además, hay cambios en las secciones introductorias, generalidades y específicas de cada requisito. Por ejemplo, se ha eliminado la opción de \"In Place with Remediation\" como una opción de informe.\n",
291
- "<on_llm_end>\n",
292
- "\n",
293
- "\n",
294
- "Completed in 10.812s\n",
295
- "\n",
296
- "Question: new requirements for vulnerability assessments\n",
297
- "{'question': 'new requirements for vulnerability assessments', 'chat_history': [(\"What's PCI DSS?\", 'PCI DSS is a set of requirements designed to protect payment account data. It includes guidelines for building and maintaining secure networks and systems, protecting account data, managing vulnerabilities, implementing strong access control measures, and more.'), ('Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?', 'Sí, puedo resumir los cambios realizados desde la versión 3.2.1 hasta la versión 4.0 de PCI DSS. Los cambios incluyen ajustes para alinear con las modificaciones entre las versiones 3.2 y 3.2.1, así como correcciones menores y ediciones para mejorar la claridad y el formato. Además, hay cambios en las secciones introductorias, generalidades y específicas de cada requisito. Por ejemplo, se ha eliminado la opción de \"In Place with Remediation\" como una opción de informe.')]}\n",
298
- " ¿Cuáles son las nuevas recomendaciones para las evaluaciones de vulnerabilidades en la versión 4.0 de PCI DSS?\n",
299
- "<on_llm_end>\n",
300
- "\n",
301
- "\n",
302
- " Some possible helpful answers are:\n",
303
- "\n",
304
- "- Las nuevas recomendaciones incluyen realizar escanes de vulnerabilidad externa después de cualquier cambio significativo y resolver las vulnerabilidades con una puntuación de 4.0 o superior por el CVSS. También se recomienda realizar rescans cuando sea necesario y contratar personal calificado para realizar los escaneos.\n",
305
- "- Según la versión 4.0 de PCI DSS, las nuevas recomendaciones para las evaluaciones de vulnerabilidades son: realizar escanes de vulnerabilidad externa después de cada cambio importante, resolver las vulnerabilidades con un puntaje de 4.0 o más en el CVSS, y hacer rescans adicionales si es necesario. Además, se debe contar con personal capacitado para llevar a cabo los escaneos.\n",
306
- "<on_llm_end>\n",
307
- "\n",
308
- "\n",
309
- "Completed in 14.112s\n",
310
- "\n",
311
- "Question: more on penetration testing\n",
312
- "{'question': 'more on penetration testing', 'chat_history': [(\"What's PCI DSS?\", 'PCI DSS is a set of requirements designed to protect payment account data. It includes guidelines for building and maintaining secure networks and systems, protecting account data, managing vulnerabilities, implementing strong access control measures, and more.'), ('Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?', 'Sí, puedo resumir los cambios realizados desde la versión 3.2.1 hasta la versión 4.0 de PCI DSS. Los cambios incluyen ajustes para alinear con las modificaciones entre las versiones 3.2 y 3.2.1, así como correcciones menores y ediciones para mejorar la claridad y el formato. Además, hay cambios en las secciones introductorias, generalidades y específicas de cada requisito. Por ejemplo, se ha eliminado la opción de \"In Place with Remediation\" como una opción de informe.'), ('new requirements for vulnerability assessments', 'Some possible helpful answers are:\\n\\n- Las nuevas recomendaciones incluyen realizar escanes de vulnerabilidad externa después de cualquier cambio significativo y resolver las vulnerabilidades con una puntuación de 4.0 o superior por el CVSS. También se recomienda realizar rescans cuando sea necesario y contratar personal calificado para realizar los escaneos.\\n- Según la versión 4.0 de PCI DSS, las nuevas recomendaciones para las evaluaciones de vulnerabilidades son: realizar escanes de vulnerabilidad externa después de cada cambio importante, resolver las vulnerabilidades con un puntaje de 4.0 o más en el CVSS, y hacer rescans adicionales si es necesario. Además, se debe contar con personal capacitado para llevar a cabo los escaneos.')]}\n",
313
- " ¿Cuál es el papel del prueba de penetración en el proceso de seguridad de PCI DSS?\n",
314
- "<on_llm_end>\n",
315
- "\n",
316
- "\n",
317
- " La prueba de penetración es una parte importante del proceso de seguridad de PCI DSS. Se utiliza para identificar vulnerabilidades y debilidades de seguridad que podrían ser explotadas por atacantes malintencionados. Según la documentación proporcionada, la prueba de penetración debe ser realizada al menos una vez cada doce meses, después de cualquier modificación o cambio significativo en la infraestructura o aplicaciones, y por un recurso interno calificado o tercera parte externa calificada. Además, las vulnerabilidades y debilidades de seguridad que se encuentren durante la prueba de penetración deben ser corregidas y verificadas mediante otra prueba de penetración.\n",
318
- "<on_llm_end>\n",
319
- "\n",
320
- "\n",
321
- "Completed in 12.884s\n",
322
- "Total time used: 42.575 s\n",
323
- "Number of tokens generated: 649\n",
324
- "Average generation speed: 15.244 tokens/s\n",
325
- "CPU times: user 677 ms, sys: 321 ms, total: 998 ms\n",
326
- "Wall time: 46.3 s\n"
327
- ]
328
- }
329
- ],
330
- "source": [
331
- "%%time\n",
332
- "\n",
333
- "os.environ[\"HFTGI_RP\"] = \"1.15\"\n",
334
- "!python qa_chain_test.py"
335
- ]
336
- }
337
- ],
338
- "metadata": {
339
- "kernelspec": {
340
- "display_name": "Python 3 (ipykernel)",
341
- "language": "python",
342
- "name": "python3"
343
- },
344
- "language_info": {
345
- "codemirror_mode": {
346
- "name": "ipython",
347
- "version": 3
348
- },
349
- "file_extension": ".py",
350
- "mimetype": "text/x-python",
351
- "name": "python",
352
- "nbconvert_exporter": "python",
353
- "pygments_lexer": "ipython3",
354
- "version": "3.11.7"
355
- }
356
- },
357
- "nbformat": 4,
358
- "nbformat_minor": 5
359
- }
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
notebook/nvidia-4080-orca-2-7b.ipynb DELETED
@@ -1,435 +0,0 @@
1
- {
2
- "cells": [
3
- {
4
- "cell_type": "code",
5
- "execution_count": 1,
6
- "id": "874cd58e",
7
- "metadata": {},
8
- "outputs": [
9
- {
10
- "name": "stdout",
11
- "output_type": "stream",
12
- "text": [
13
- "workding dir: /home/inflaton/code/projects/chat-with-orca-2\n"
14
- ]
15
- }
16
- ],
17
- "source": [
18
- "import os\n",
19
- "import sys\n",
20
- "from pathlib import Path\n",
21
- "\n",
22
- "workding_dir = str(Path.cwd().parent)\n",
23
- "os.chdir(workding_dir)\n",
24
- "sys.path.append(workding_dir)\n",
25
- "print(\"workding dir:\", workding_dir)"
26
- ]
27
- },
28
- {
29
- "cell_type": "code",
30
- "execution_count": 2,
31
- "id": "19f967ca",
32
- "metadata": {},
33
- "outputs": [],
34
- "source": [
35
- "os.environ[\"LLM_MODEL_TYPE\"] = \"huggingface\"\n",
36
- "os.environ[\"HUGGINGFACE_MODEL_NAME_OR_PATH\"] = \"microsoft/Orca-2-7b\""
37
- ]
38
- },
39
- {
40
- "cell_type": "code",
41
- "execution_count": 3,
42
- "id": "a6d96660",
43
- "metadata": {},
44
- "outputs": [
45
- {
46
- "name": "stdout",
47
- "output_type": "stream",
48
- "text": [
49
- "loading env vars from: /home/inflaton/code/projects/chat-with-orca-2/.env\n",
50
- "Running on: Linux-5.10.102.1-microsoft-standard-WSL2-x86_64-with-glibc2.35\n",
51
- "MPS is NOT available\n",
52
- "CUDA is available\n",
53
- "MPS not available because the current PyTorch install was not built with MPS enabled.\n",
54
- "CUDA is available, we have found 1 GPU(s)\n",
55
- "NVIDIA GeForce RTX 4080 Laptop GPU\n",
56
- "CUDA version: 12.1\n",
57
- "hf_embeddings_device_type: cuda:0\n",
58
- "hf_pipeline_device_type: cuda:0\n",
59
- "load INSTRUCTOR_Transformer\n",
60
- "/home/inflaton/miniconda3/envs/chat-with-orca-2/lib/python3.11/site-packages/torch/_utils.py:831: UserWarning: TypedStorage is deprecated. It will be removed in the future and UntypedStorage will be the only storage class. This should only matter to you if you are using storages directly. To access UntypedStorage directly, use tensor.untyped_storage() instead of tensor.storage()\n",
61
- " return self.fget.__get__(instance, owner)()\n",
62
- "max_seq_length 512\n",
63
- "Completed in 0.793s\n",
64
- "Load index from ./data/faiss_1024_512/ with FAISS\n",
65
- "Completed in 0.025s\n",
66
- "initializing LLM: huggingface\n",
67
- " hf_pipeline_device_type: cuda:0\n",
68
- " load_quantized_model: None\n",
69
- " torch_dtype: torch.float16\n",
70
- " n_threds: 4\n",
71
- " loading model: microsoft/Orca-2-7b\n",
72
- " HF auth token: None\n",
73
- " repetition_penalty: 1.05\n",
74
- "Loading checkpoint shards: 100%|█████████████████| 3/3 [06:32<00:00, 130.71s/it]\n",
75
- "Model memory footprint: 13543997440\n",
76
- "initialization complete\n",
77
- "Completed in 399.575s\n",
78
- "\n",
79
- "Question: What's PCI DSS?\n",
80
- "{'question': \"What's PCI DSS?\", 'chat_history': []}\n",
81
- "PCI DSS stands for Payment Card Industry Data Security Standard. It is a global standard that provides a baseline of technical and operational requirements designed to protect payment data.\n",
82
- "\n",
83
- "\n",
84
- "\n",
85
- "<on_llm_end>\n",
86
- "\n",
87
- "\n",
88
- "Completed in 32.938s\n",
89
- "\n",
90
- "Question: Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?\n",
91
- "{'question': 'Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?', 'chat_history': [(\"What's PCI DSS?\", 'PCI DSS stands for Payment Card Industry Data Security Standard. It is a global standard that provides a baseline of technical and operational requirements designed to protect payment data.')]}\n",
92
- "What are the main differences between PCI DSS version 3.2.1 and version 4.0?\n",
93
- "\n",
94
- "\n",
95
- "\n",
96
- "<on_llm_end>\n",
97
- "\n",
98
- "\n",
99
- "The main differences between PCI DSS version 3.2.1 and version 4.0 include changes to the requirements, testing procedures, and guidance. The standard has been updated to address new risks and vulnerabilities, as well as to reflect advances in technology and payment card industry practices. Some specific changes include updates to Requirement 6.3.3, the addition of a description for the change made to Requirement 8.3.9, and the addition of a description of the change made to Requirement 3.6.1.1. Additionally, the standard has been revised to align with the changes from PCI DSS v3.2 to PCI DSS v3.2.1 and to incorporate minor corrections and edits made for clarification and/or format purposes.\n",
100
- "\n",
101
- "\n",
102
- "\n",
103
- "<on_llm_end>\n",
104
- "\n",
105
- "\n",
106
- "Completed in 80.754s\n",
107
- "\n",
108
- "Question: new requirements for vulnerability assessments\n",
109
- "{'question': 'new requirements for vulnerability assessments', 'chat_history': [(\"What's PCI DSS?\", 'PCI DSS stands for Payment Card Industry Data Security Standard. It is a global standard that provides a baseline of technical and operational requirements designed to protect payment data.'), ('Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?', 'The main differences between PCI DSS version 3.2.1 and version 4.0 include changes to the requirements, testing procedures, and guidance. The standard has been updated to address new risks and vulnerabilities, as well as to reflect advances in technology and payment card industry practices. Some specific changes include updates to Requirement 6.3.3, the addition of a description for the change made to Requirement 8.3.9, and the addition of a description of the change made to Requirement 3.6.1.1. Additionally, the standard has been revised to align with the changes from PCI DSS v3.2 to PCI DSS v3.2.1 and to incorporate minor corrections and edits made for clarification and/or format purposes.')]}\n",
110
- "What are the new requirements for vulnerability assessments in PCI DSS version 4.0?\n",
111
- "\n",
112
- "\n",
113
- "\n",
114
- "<on_llm_end>\n",
115
- "\n",
116
- "\n",
117
- "The new requirements for vulnerability assessments in PCI DSS version 4.0 include:\n",
118
- "\n",
119
- "- Requirement 4.1.2, which states that there is a new requirement for roles and responsibilities related to vulnerability assessments.\n",
120
- "- Requirement 4.2.1, which requires confirmation that certificates used for Point-to-Point (PAN) transmissions over open, public networks are valid and not expired or revoked. This bullet is a best practice until March 31, 2025.\n",
121
- "- Requirement 4.2.1.1, which introduces a new requirement to maintain an inventory of trusted keys and certificates. This is also a best practice until March 31, 2025.\n",
122
- "\n",
123
- "\n",
124
- "\n",
125
- "<on_llm_end>\n",
126
- "\n",
127
- "\n",
128
- "Completed in 90.698s\n",
129
- "\n",
130
- "Question: more on penetration testing\n",
131
- "{'question': 'more on penetration testing', 'chat_history': [(\"What's PCI DSS?\", 'PCI DSS stands for Payment Card Industry Data Security Standard. It is a global standard that provides a baseline of technical and operational requirements designed to protect payment data.'), ('Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?', 'The main differences between PCI DSS version 3.2.1 and version 4.0 include changes to the requirements, testing procedures, and guidance. The standard has been updated to address new risks and vulnerabilities, as well as to reflect advances in technology and payment card industry practices. Some specific changes include updates to Requirement 6.3.3, the addition of a description for the change made to Requirement 8.3.9, and the addition of a description of the change made to Requirement 3.6.1.1. Additionally, the standard has been revised to align with the changes from PCI DSS v3.2 to PCI DSS v3.2.1 and to incorporate minor corrections and edits made for clarification and/or format purposes.'), ('new requirements for vulnerability assessments', 'The new requirements for vulnerability assessments in PCI DSS version 4.0 include:\\n\\n- Requirement 4.1.2, which states that there is a new requirement for roles and responsibilities related to vulnerability assessments.\\n- Requirement 4.2.1, which requires confirmation that certificates used for Point-to-Point (PAN) transmissions over open, public networks are valid and not expired or revoked. This bullet is a best practice until March 31, 2025.\\n- Requirement 4.2.1.1, which introduces a new requirement to maintain an inventory of trusted keys and certificates. This is also a best practice until March 31, 2025.')]}\n",
132
- "What are the new requirements for penetration testing in PCI DSS version 4.0?\n",
133
- "\n",
134
- "\n",
135
- "\n",
136
- "<on_llm_end>\n",
137
- "\n",
138
- "\n",
139
- "The new requirements for penetration testing in PCI DSS version 4.0 include defining a penetration testing methodology, covering the entire CDE perimeter and critical systems, testing from both inside and outside the network, testing to validate any segmentation and scope-reduction controls, and performing application-layer and network-layer penetration testing.\n",
140
- "\n",
141
- "\n",
142
- "\n",
143
- "<on_llm_end>\n",
144
- "\n",
145
- "\n",
146
- "Completed in 50.591s\n",
147
- "Total time used: 254.981 s\n",
148
- "Number of tokens generated: 536\n",
149
- "Average generation speed: 2.102 tokens/s\n",
150
- "CPU times: user 9.03 s, sys: 2.26 s, total: 11.3 s\n",
151
- "Wall time: 11min\n"
152
- ]
153
- }
154
- ],
155
- "source": [
156
- "%%time\n",
157
- "\n",
158
- "os.environ[\"HF_RP\"] = \"1.05\"\n",
159
- "!python qa_chain_test.py"
160
- ]
161
- },
162
- {
163
- "cell_type": "code",
164
- "execution_count": 4,
165
- "id": "8a022a7b",
166
- "metadata": {},
167
- "outputs": [
168
- {
169
- "name": "stdout",
170
- "output_type": "stream",
171
- "text": [
172
- "loading env vars from: /home/inflaton/code/projects/chat-with-orca-2/.env\n",
173
- "Running on: Linux-5.10.102.1-microsoft-standard-WSL2-x86_64-with-glibc2.35\n",
174
- "MPS is NOT available\n",
175
- "CUDA is available\n",
176
- "MPS not available because the current PyTorch install was not built with MPS enabled.\n",
177
- "CUDA is available, we have found 1 GPU(s)\n",
178
- "NVIDIA GeForce RTX 4080 Laptop GPU\n",
179
- "CUDA version: 12.1\n",
180
- "hf_embeddings_device_type: cuda:0\n",
181
- "hf_pipeline_device_type: cuda:0\n",
182
- "load INSTRUCTOR_Transformer\n",
183
- "/home/inflaton/miniconda3/envs/chat-with-orca-2/lib/python3.11/site-packages/torch/_utils.py:831: UserWarning: TypedStorage is deprecated. It will be removed in the future and UntypedStorage will be the only storage class. This should only matter to you if you are using storages directly. To access UntypedStorage directly, use tensor.untyped_storage() instead of tensor.storage()\n",
184
- " return self.fget.__get__(instance, owner)()\n",
185
- "max_seq_length 512\n",
186
- "Completed in 0.995s\n",
187
- "Load index from ./data/faiss_1024_512/ with FAISS\n",
188
- "Completed in 0.033s\n",
189
- "initializing LLM: huggingface\n",
190
- " hf_pipeline_device_type: cuda:0\n",
191
- " load_quantized_model: None\n",
192
- " torch_dtype: torch.float16\n",
193
- " n_threds: 4\n",
194
- " loading model: microsoft/Orca-2-7b\n",
195
- " HF auth token: None\n",
196
- " repetition_penalty: 1.1\n",
197
- "Loading checkpoint shards: 100%|█████████████████| 3/3 [05:36<00:00, 112.28s/it]\n",
198
- "Model memory footprint: 13543997440\n",
199
- "initialization complete\n",
200
- "Completed in 345.225s\n",
201
- "\n",
202
- "Question: What's PCI DSS?\n",
203
- "{'question': \"What's PCI DSS?\", 'chat_history': []}\n",
204
- "PCI DSS stands for Payment Card Industry Data Security Standard. It is a global standard that provides a baseline of technical and operational requirements designed to protect payment data.\n",
205
- "\n",
206
- "\n",
207
- "\n",
208
- "<on_llm_end>\n",
209
- "\n",
210
- "\n",
211
- "Completed in 34.481s\n",
212
- "\n",
213
- "Question: Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?\n",
214
- "{'question': 'Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?', 'chat_history': [(\"What's PCI DSS?\", 'PCI DSS stands for Payment Card Industry Data Security Standard. It is a global standard that provides a baseline of technical and operational requirements designed to protect payment data.')]}\n",
215
- "What are the main differences between PCI DSS versions 3.2.1 and 4.0?\n",
216
- "\n",
217
- "\n",
218
- "\n",
219
- "<on_llm_end>\n",
220
- "\n",
221
- "\n",
222
- "The main differences between PCI DSS versions 3.2.1 and 4.0 include changes to the introductory sections, general changes to the requirements, testing procedures, and guidance, and additional changes per requirement.\n",
223
- "\n",
224
- "\n",
225
- "\n",
226
- "<on_llm_end>\n",
227
- "\n",
228
- "\n",
229
- "Completed in 38.270s\n",
230
- "\n",
231
- "Question: new requirements for vulnerability assessments\n",
232
- "{'question': 'new requirements for vulnerability assessments', 'chat_history': [(\"What's PCI DSS?\", 'PCI DSS stands for Payment Card Industry Data Security Standard. It is a global standard that provides a baseline of technical and operational requirements designed to protect payment data.'), ('Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?', 'The main differences between PCI DSS versions 3.2.1 and 4.0 include changes to the introductory sections, general changes to the requirements, testing procedures, and guidance, and additional changes per requirement.')]}\n",
233
- "What are the new requirements for vulnerability assessments in PCI DSS version 4.0?\n",
234
- "\n",
235
- "\n",
236
- "\n",
237
- "<on_llm_end>\n",
238
- "\n",
239
- "\n",
240
- "There are several new requirements for vulnerability assessments in PCI DSS version 4.0. Some of them include:\n",
241
- "\n",
242
- "1. Requirement 4.1.2, which states that there should be clear roles and responsibilities defined for vulnerability management.\n",
243
- "2. Requirement 4.2.1, which requires organizations to ensure that certificates used for point-to-point encryption (PAN) transmissions over open, public networks are valid and not expired or revoked. This is considered a best practice until March 31, 2025.\n",
244
- "3. Requirement 10.4.2.1, which mandates a targeted risk analysis to determine the frequency of log reviews for all other system components.\n",
245
- "4. Requirement 10.7.2 and 10.7.3, which require organizations to detect, alert, and address failures of critical security control systems promptly.\n",
246
- "5. Requirement 11.3.1.1 and 11.3.1.2, which require internal vulnerability scans to be performed using authenticated scanning and to manage all applicable vulnerabilities, including those not ranked as high-risk or critical.\n",
247
- "\n",
248
- "\n",
249
- "\n",
250
- "<on_llm_end>\n",
251
- "\n",
252
- "\n",
253
- "Completed in 134.464s\n",
254
- "\n",
255
- "Question: more on penetration testing\n",
256
- "{'question': 'more on penetration testing', 'chat_history': [(\"What's PCI DSS?\", 'PCI DSS stands for Payment Card Industry Data Security Standard. It is a global standard that provides a baseline of technical and operational requirements designed to protect payment data.'), ('Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?', 'The main differences between PCI DSS versions 3.2.1 and 4.0 include changes to the introductory sections, general changes to the requirements, testing procedures, and guidance, and additional changes per requirement.'), ('new requirements for vulnerability assessments', 'There are several new requirements for vulnerability assessments in PCI DSS version 4.0. Some of them include:\\n\\n1. Requirement 4.1.2, which states that there should be clear roles and responsibilities defined for vulnerability management.\\n2. Requirement 4.2.1, which requires organizations to ensure that certificates used for point-to-point encryption (PAN) transmissions over open, public networks are valid and not expired or revoked. This is considered a best practice until March 31, 2025.\\n3. Requirement 10.4.2.1, which mandates a targeted risk analysis to determine the frequency of log reviews for all other system components.\\n4. Requirement 10.7.2 and 10.7.3, which require organizations to detect, alert, and address failures of critical security control systems promptly.\\n5. Requirement 11.3.1.1 and 11.3.1.2, which require internal vulnerability scans to be performed using authenticated scanning and to manage all applicable vulnerabilities, including those not ranked as high-risk or critical.')]}\n",
257
- "What are some key differences between penetration testing and vulnerability assessments in the context of PCI DSS?\n",
258
- "\n",
259
- "\n",
260
- "\n",
261
- "<on_llm_end>\n",
262
- "\n",
263
- "\n",
264
- "Penetration testing and vulnerability assessments are both important security measures in the context of PCI DSS, but they differ in their focus and approach.\n",
265
- "\n",
266
- "Penetration testing involves simulating attacks by an external or internal attacker to identify vulnerabilities and exploit them, while vulnerability assessments involve scanning and analyzing systems and networks to identify potential weaknesses and risks. Penetration testing is more focused on detecting and exploiting vulnerabilities, whereas vulnerability assessments are more focused on identifying and mitigating risks.\n",
267
- "\n",
268
- "\n",
269
- "\n",
270
- "<on_llm_end>\n",
271
- "\n",
272
- "\n",
273
- "Completed in 66.303s\n",
274
- "Total time used: 273.518 s\n",
275
- "Number of tokens generated: 549\n",
276
- "Average generation speed: 2.007 tokens/s\n",
277
- "CPU times: user 7.99 s, sys: 2.19 s, total: 10.2 s\n",
278
- "Wall time: 10min 25s\n"
279
- ]
280
- }
281
- ],
282
- "source": [
283
- "%%time\n",
284
- "\n",
285
- "os.environ[\"HF_RP\"] = \"1.10\"\n",
286
- "!python qa_chain_test.py"
287
- ]
288
- },
289
- {
290
- "cell_type": "code",
291
- "execution_count": 5,
292
- "id": "db48dcc4",
293
- "metadata": {},
294
- "outputs": [
295
- {
296
- "name": "stdout",
297
- "output_type": "stream",
298
- "text": [
299
- "loading env vars from: /home/inflaton/code/projects/chat-with-orca-2/.env\n",
300
- "Running on: Linux-5.10.102.1-microsoft-standard-WSL2-x86_64-with-glibc2.35\n",
301
- "MPS is NOT available\n",
302
- "CUDA is available\n",
303
- "MPS not available because the current PyTorch install was not built with MPS enabled.\n",
304
- "CUDA is available, we have found 1 GPU(s)\n",
305
- "NVIDIA GeForce RTX 4080 Laptop GPU\n",
306
- "CUDA version: 12.1\n",
307
- "hf_embeddings_device_type: cuda:0\n",
308
- "hf_pipeline_device_type: cuda:0\n",
309
- "load INSTRUCTOR_Transformer\n",
310
- "/home/inflaton/miniconda3/envs/chat-with-orca-2/lib/python3.11/site-packages/torch/_utils.py:831: UserWarning: TypedStorage is deprecated. It will be removed in the future and UntypedStorage will be the only storage class. This should only matter to you if you are using storages directly. To access UntypedStorage directly, use tensor.untyped_storage() instead of tensor.storage()\n",
311
- " return self.fget.__get__(instance, owner)()\n",
312
- "max_seq_length 512\n",
313
- "Completed in 0.611s\n",
314
- "Load index from ./data/faiss_1024_512/ with FAISS\n",
315
- "Completed in 0.020s\n",
316
- "initializing LLM: huggingface\n",
317
- " hf_pipeline_device_type: cuda:0\n",
318
- " load_quantized_model: None\n",
319
- " torch_dtype: torch.float16\n",
320
- " n_threds: 4\n",
321
- " loading model: microsoft/Orca-2-7b\n",
322
- " HF auth token: None\n",
323
- " repetition_penalty: 1.15\n",
324
- "Loading checkpoint shards: 100%|█████████████████| 3/3 [05:53<00:00, 117.86s/it]\n",
325
- "Model memory footprint: 13543997440\n",
326
- "initialization complete\n",
327
- "Completed in 359.955s\n",
328
- "\n",
329
- "Question: What's PCI DSS?\n",
330
- "{'question': \"What's PCI DSS?\", 'chat_history': []}\n",
331
- "PCI DSS stands for Payment Card Industry Data Security Standard. It is a set of technical and operational requirements designed to protect payment data.\n",
332
- "\n",
333
- "\n",
334
- "\n",
335
- "<on_llm_end>\n",
336
- "\n",
337
- "\n",
338
- "Completed in 29.134s\n",
339
- "\n",
340
- "Question: Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?\n",
341
- "{'question': 'Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?', 'chat_history': [(\"What's PCI DSS?\", 'PCI DSS stands for Payment Card Industry Data Security Standard. It is a set of technical and operational requirements designed to protect payment data.')]}\n",
342
- "How does PCI DSS version 4.0 differ from version 3.2.1 in terms of security standards?\n",
343
- "\n",
344
- "\n",
345
- "\n",
346
- "<on_llm_end>\n",
347
- "\n",
348
- "\n",
349
- "In terms of security standards, PCI DSS version 4.0 has several differences compared to version 3.2.1. Some of these include new or revised requirements related to data encryption, multi-factor authentication, secure software development, and network segmentation. Additionally, there are updated guidelines for penetration testing and quarterly vulnerability scans.\n",
350
- "\n",
351
- "\n",
352
- "\n",
353
- "<on_llm_end>\n",
354
- "\n",
355
- "\n",
356
- "Completed in 42.657s\n",
357
- "\n",
358
- "Question: new requirements for vulnerability assessments\n",
359
- "{'question': 'new requirements for vulnerability assessments', 'chat_history': [(\"What's PCI DSS?\", 'PCI DSS stands for Payment Card Industry Data Security Standard. It is a set of technical and operational requirements designed to protect payment data.'), ('Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?', 'In terms of security standards, PCI DSS version 4.0 has several differences compared to version 3.2.1. Some of these include new or revised requirements related to data encryption, multi-factor authentication, secure software development, and network segmentation. Additionally, there are updated guidelines for penetration testing and quarterly vulnerability scans.')]}\n",
360
- "What are the new requirements for vulnerability assessments in PCI DSS version 4.0?\n",
361
- "\n",
362
- "\n",
363
- "\n",
364
- "<on_llm_end>\n",
365
- "\n",
366
- "\n",
367
- "There are several new requirements related to vulnerability assessments in PCI DSS version 4.0. Some examples include:\n",
368
- "\n",
369
- "- Requirement 4.1.2, which states that there should be clear roles and responsibilities defined for handling vulnerability assessments.\n",
370
- "- Requirement 4.2.1, which requires organizations to ensure that certificates used for point-to-point encryption (PAN) transmissions over open, public networks are valid and not expired or revoked. This bullet is considered a best practice until March 31, 2025.\n",
371
- "- Requirement 10.4.2.1, which mandates a targeted risk analysis to determine how often logs should be reviewed for all other system components.\n",
372
- "- Requirement 10.7.2 and 10.7.3, which emphasize the importance of detecting, alerting, and addressing failures of critical security control systems promptly.\n",
373
- "\n",
374
- "\n",
375
- "\n",
376
- "<on_llm_end>\n",
377
- "\n",
378
- "\n",
379
- "Completed in 110.695s\n",
380
- "\n",
381
- "Question: more on penetration testing\n",
382
- "{'question': 'more on penetration testing', 'chat_history': [(\"What's PCI DSS?\", 'PCI DSS stands for Payment Card Industry Data Security Standard. It is a set of technical and operational requirements designed to protect payment data.'), ('Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?', 'In terms of security standards, PCI DSS version 4.0 has several differences compared to version 3.2.1. Some of these include new or revised requirements related to data encryption, multi-factor authentication, secure software development, and network segmentation. Additionally, there are updated guidelines for penetration testing and quarterly vulnerability scans.'), ('new requirements for vulnerability assessments', 'There are several new requirements related to vulnerability assessments in PCI DSS version 4.0. Some examples include:\\n\\n- Requirement 4.1.2, which states that there should be clear roles and responsibilities defined for handling vulnerability assessments.\\n- Requirement 4.2.1, which requires organizations to ensure that certificates used for point-to-point encryption (PAN) transmissions over open, public networks are valid and not expired or revoked. This bullet is considered a best practice until March 31, 2025.\\n- Requirement 10.4.2.1, which mandates a targeted risk analysis to determine how often logs should be reviewed for all other system components.\\n- Requirement 10.7.2 and 10.7.3, which emphasize the importance of detecting, alerting, and addressing failures of critical security control systems promptly.')]}\n",
383
- "What are some specific techniques used during penetration testing to identify potential vulnerabilities in a system?\n",
384
- "\n",
385
- "\n",
386
- "\n",
387
- "<on_llm_end>\n",
388
- "\n",
389
- "\n",
390
- "Some specific techniques used during penetration testing include scanning networks, identifying open ports, analyzing code for vulnerabilities, and performing social engineering attacks.\n",
391
- "\n",
392
- "\n",
393
- "\n",
394
- "<on_llm_end>\n",
395
- "\n",
396
- "\n",
397
- "Completed in 31.630s\n",
398
- "Total time used: 214.116 s\n",
399
- "Number of tokens generated: 432\n",
400
- "Average generation speed: 2.018 tokens/s\n",
401
- "CPU times: user 7.37 s, sys: 1.95 s, total: 9.32 s\n",
402
- "Wall time: 9min 38s\n"
403
- ]
404
- }
405
- ],
406
- "source": [
407
- "%%time\n",
408
- "\n",
409
- "os.environ[\"HF_RP\"] = \"1.15\"\n",
410
- "!python qa_chain_test.py"
411
- ]
412
- }
413
- ],
414
- "metadata": {
415
- "kernelspec": {
416
- "display_name": "Python 3 (ipykernel)",
417
- "language": "python",
418
- "name": "python3"
419
- },
420
- "language_info": {
421
- "codemirror_mode": {
422
- "name": "ipython",
423
- "version": 3
424
- },
425
- "file_extension": ".py",
426
- "mimetype": "text/x-python",
427
- "name": "python",
428
- "nbconvert_exporter": "python",
429
- "pygments_lexer": "ipython3",
430
- "version": "3.11.7"
431
- }
432
- },
433
- "nbformat": 4,
434
- "nbformat_minor": 5
435
- }
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
notebook/nvidia-4080-orca-2-7b_tgi.ipynb DELETED
@@ -1,369 +0,0 @@
1
- {
2
- "cells": [
3
- {
4
- "cell_type": "code",
5
- "execution_count": 1,
6
- "id": "874cd58e",
7
- "metadata": {},
8
- "outputs": [
9
- {
10
- "name": "stdout",
11
- "output_type": "stream",
12
- "text": [
13
- "workding dir: /home/inflaton/code/projects/chat-with-orca-2\n"
14
- ]
15
- }
16
- ],
17
- "source": [
18
- "import os\n",
19
- "import sys\n",
20
- "from pathlib import Path\n",
21
- "\n",
22
- "workding_dir = str(Path.cwd().parent)\n",
23
- "os.chdir(workding_dir)\n",
24
- "sys.path.append(workding_dir)\n",
25
- "print(\"workding dir:\", workding_dir)"
26
- ]
27
- },
28
- {
29
- "cell_type": "code",
30
- "execution_count": 2,
31
- "id": "19f967ca",
32
- "metadata": {},
33
- "outputs": [],
34
- "source": [
35
- "os.environ[\"LLM_MODEL_TYPE\"] = \"hftgi\"\n",
36
- "os.environ[\"HFTGI_SERVER_URL\"] = \"https://legible-illegally-monarch.ngrok-free.app\""
37
- ]
38
- },
39
- {
40
- "cell_type": "code",
41
- "execution_count": 3,
42
- "id": "a6d96660",
43
- "metadata": {},
44
- "outputs": [
45
- {
46
- "name": "stdout",
47
- "output_type": "stream",
48
- "text": [
49
- "loading env vars from: /home/inflaton/code/projects/chat-with-orca-2/.env\n",
50
- "Running on: Linux-5.10.102.1-microsoft-standard-WSL2-x86_64-with-glibc2.35\n",
51
- "MPS is NOT available\n",
52
- "CUDA is available\n",
53
- "MPS not available because the current PyTorch install was not built with MPS enabled.\n",
54
- "CUDA is available, we have found 1 GPU(s)\n",
55
- "NVIDIA GeForce RTX 4080 Laptop GPU\n",
56
- "CUDA version: 12.1\n",
57
- "hf_embeddings_device_type: cuda:0\n",
58
- "hf_pipeline_device_type: cuda:0\n",
59
- "load INSTRUCTOR_Transformer\n",
60
- "/home/inflaton/miniconda3/envs/chat-with-orca-2/lib/python3.11/site-packages/torch/_utils.py:831: UserWarning: TypedStorage is deprecated. It will be removed in the future and UntypedStorage will be the only storage class. This should only matter to you if you are using storages directly. To access UntypedStorage directly, use tensor.untyped_storage() instead of tensor.storage()\n",
61
- " return self.fget.__get__(instance, owner)()\n",
62
- "max_seq_length 512\n",
63
- "Completed in 1.255s\n",
64
- "Load index from ./data/faiss_1024_512/ with FAISS\n",
65
- "Completed in 0.041s\n",
66
- "initializing LLM: hftgi\n",
67
- " hf_pipeline_device_type: cuda:0\n",
68
- " load_quantized_model: None\n",
69
- " torch_dtype: torch.float16\n",
70
- " n_threds: 4\n",
71
- " repetition_penalty: 1.05\n",
72
- "/home/inflaton/miniconda3/envs/chat-with-orca-2/lib/python3.11/site-packages/pydantic/_internal/_fields.py:149: UserWarning: Field \"model_id\" has conflict with protected namespace \"model_\".\n",
73
- "\n",
74
- "You may be able to resolve this warning by setting `model_config['protected_namespaces'] = ()`.\n",
75
- " warnings.warn(\n",
76
- "initialization complete\n",
77
- "Completed in 0.011s\n",
78
- "\n",
79
- "Question: What's PCI DSS?\n",
80
- "{'question': \"What's PCI DSS?\", 'chat_history': []}\n",
81
- " PCI DSS stands for Payment Card Industry Data Security Standard. It is a global standard that provides a baseline of technical and operational requirements designed to protect payment data.\n",
82
- "<on_llm_end>\n",
83
- "\n",
84
- "\n",
85
- "Completed in 34.576s\n",
86
- "\n",
87
- "Question: Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?\n",
88
- "{'question': 'Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?', 'chat_history': [(\"What's PCI DSS?\", 'PCI DSS stands for Payment Card Industry Data Security Standard. It is a global standard that provides a baseline of technical and operational requirements designed to protect payment data.')]}\n",
89
- " What are the key differences between PCI DSS version 3.2.1 and version 4.0?\n",
90
- "<on_llm_end>\n",
91
- "\n",
92
- "\n",
93
- " The key differences between PCI DSS version 3.2.1 and version 4.0 include changes to the requirements, testing procedures, and guidance. The standard should be reviewed in its entirety rather than focusing solely on this summary document.\n",
94
- "<on_llm_end>\n",
95
- "\n",
96
- "\n",
97
- "Completed in 44.635s\n",
98
- "\n",
99
- "Question: new requirements for vulnerability assessments\n",
100
- "{'question': 'new requirements for vulnerability assessments', 'chat_history': [(\"What's PCI DSS?\", 'PCI DSS stands for Payment Card Industry Data Security Standard. It is a global standard that provides a baseline of technical and operational requirements designed to protect payment data.'), ('Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?', 'The key differences between PCI DSS version 3.2.1 and version 4.0 include changes to the requirements, testing procedures, and guidance. The standard should be reviewed in its entirety rather than focusing solely on this summary document.')]}\n",
101
- " What are the new requirements for vulnerability assessments in PCI DSS version 4.0?\n",
102
- "<on_llm_end>\n",
103
- "\n",
104
- "\n",
105
- " The new requirements for vulnerability assessments in PCI DSS version 4.0 include:\n",
106
- "\n",
107
- "1. Requirement 4.1.2, which states that there is a new requirement for roles and responsibilities related to vulnerability assessments.\n",
108
- "2. Requirement 4.2.1, which requires organizations to confirm that certificates used for Point-to-Point Network (PAN) transmissions over open, public networks are valid and not expired or revoked. This bullet is a best practice until March 31, 2025.\n",
109
- "3. Requirement 10.4.2.1, which requires a targeted risk analysis to determine the frequency of log reviews for all other system components.\n",
110
- "4. Requirement 10.7.2 and 10.7.3, which require organizations to detect, alert, and address failures of critical security control systems promptly.\n",
111
- "5. Requirement 11.3.1.1 and 11.3.1.2, which require organizations to manage all applicable vulnerabilities (not ranked as high-risk or critical) and perform internal vulnerability scans via authenticated scanning.\n",
112
- "6. Requirement A1.2.3, which requires multi-tenant service providers to implement processes or mechanisms for reporting and addressing suspected or confirmed security incidents and vulnerabilities.\n",
113
- "7. Requirement A3.3.1, which requires multi-tenant service providers to detect, alert, and report failures of automated log review mechanisms and automated code review tools in a timely manner.\n",
114
- "<on_llm_end>\n",
115
- "\n",
116
- "\n",
117
- "Completed in 188.142s\n",
118
- "\n",
119
- "Question: more on penetration testing\n",
120
- "{'question': 'more on penetration testing', 'chat_history': [(\"What's PCI DSS?\", 'PCI DSS stands for Payment Card Industry Data Security Standard. It is a global standard that provides a baseline of technical and operational requirements designed to protect payment data.'), ('Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?', 'The key differences between PCI DSS version 3.2.1 and version 4.0 include changes to the requirements, testing procedures, and guidance. The standard should be reviewed in its entirety rather than focusing solely on this summary document.'), ('new requirements for vulnerability assessments', 'The new requirements for vulnerability assessments in PCI DSS version 4.0 include:\\n\\n1. Requirement 4.1.2, which states that there is a new requirement for roles and responsibilities related to vulnerability assessments.\\n2. Requirement 4.2.1, which requires organizations to confirm that certificates used for Point-to-Point Network (PAN) transmissions over open, public networks are valid and not expired or revoked. This bullet is a best practice until March 31, 2025.\\n3. Requirement 10.4.2.1, which requires a targeted risk analysis to determine the frequency of log reviews for all other system components.\\n4. Requirement 10.7.2 and 10.7.3, which require organizations to detect, alert, and address failures of critical security control systems promptly.\\n5. Requirement 11.3.1.1 and 11.3.1.2, which require organizations to manage all applicable vulnerabilities (not ranked as high-risk or critical) and perform internal vulnerability scans via authenticated scanning.\\n6. Requirement A1.2.3, which requires multi-tenant service providers to implement processes or mechanisms for reporting and addressing suspected or confirmed security incidents and vulnerabilities.\\n7. Requirement A3.3.1, which requires multi-tenant service providers to detect, alert, and report failures of automated log review mechanisms and automated code review tools in a timely manner.')]}\n",
121
- " What are the new requirements for penetration testing in PCI DSS version 4.0?\n",
122
- "<on_llm_end>\n",
123
- "\n",
124
- "\n",
125
- " In PCI DSS version 4.0, the new requirements for penetration testing include defining a penetration testing methodology, covering the entire CDE perimeter and critical systems, testing from both inside and outside the network, testing to validate any segmentation and scope-reduction controls, and performing application-layer and network-layer penetration testing.\n",
126
- "<on_llm_end>\n",
127
- "\n",
128
- "\n",
129
- "Completed in 62.654s\n",
130
- "Total time used: 330.008 s\n",
131
- "Number of tokens generated: 587\n",
132
- "Average generation speed: 1.779 tokens/s\n",
133
- "CPU times: user 4.72 s, sys: 1.16 s, total: 5.88 s\n",
134
- "Wall time: 5min 35s\n"
135
- ]
136
- }
137
- ],
138
- "source": [
139
- "%%time\n",
140
- "\n",
141
- "os.environ[\"HFTGI_RP\"] = \"1.05\"\n",
142
- "!python qa_chain_test.py"
143
- ]
144
- },
145
- {
146
- "cell_type": "code",
147
- "execution_count": 4,
148
- "id": "8a022a7b",
149
- "metadata": {},
150
- "outputs": [
151
- {
152
- "name": "stdout",
153
- "output_type": "stream",
154
- "text": [
155
- "loading env vars from: /home/inflaton/code/projects/chat-with-orca-2/.env\n",
156
- "Running on: Linux-5.10.102.1-microsoft-standard-WSL2-x86_64-with-glibc2.35\n",
157
- "MPS is NOT available\n",
158
- "CUDA is available\n",
159
- "MPS not available because the current PyTorch install was not built with MPS enabled.\n",
160
- "CUDA is available, we have found 1 GPU(s)\n",
161
- "NVIDIA GeForce RTX 4080 Laptop GPU\n",
162
- "CUDA version: 12.1\n",
163
- "hf_embeddings_device_type: cuda:0\n",
164
- "hf_pipeline_device_type: cuda:0\n",
165
- "load INSTRUCTOR_Transformer\n",
166
- "/home/inflaton/miniconda3/envs/chat-with-orca-2/lib/python3.11/site-packages/torch/_utils.py:831: UserWarning: TypedStorage is deprecated. It will be removed in the future and UntypedStorage will be the only storage class. This should only matter to you if you are using storages directly. To access UntypedStorage directly, use tensor.untyped_storage() instead of tensor.storage()\n",
167
- " return self.fget.__get__(instance, owner)()\n",
168
- "max_seq_length 512\n",
169
- "Completed in 0.645s\n",
170
- "Load index from ./data/faiss_1024_512/ with FAISS\n",
171
- "Completed in 0.022s\n",
172
- "initializing LLM: hftgi\n",
173
- " hf_pipeline_device_type: cuda:0\n",
174
- " load_quantized_model: None\n",
175
- " torch_dtype: torch.float16\n",
176
- " n_threds: 4\n",
177
- " repetition_penalty: 1.1\n",
178
- "/home/inflaton/miniconda3/envs/chat-with-orca-2/lib/python3.11/site-packages/pydantic/_internal/_fields.py:149: UserWarning: Field \"model_id\" has conflict with protected namespace \"model_\".\n",
179
- "\n",
180
- "You may be able to resolve this warning by setting `model_config['protected_namespaces'] = ()`.\n",
181
- " warnings.warn(\n",
182
- "initialization complete\n",
183
- "Completed in 0.012s\n",
184
- "\n",
185
- "Question: What's PCI DSS?\n",
186
- "{'question': \"What's PCI DSS?\", 'chat_history': []}\n",
187
- " PCI DSS stands for Payment Card Industry Data Security Standard. It is a global standard that provides a baseline of technical and operational requirements designed to protect payment data.\n",
188
- "<on_llm_end>\n",
189
- "\n",
190
- "\n",
191
- "Completed in 33.113s\n",
192
- "\n",
193
- "Question: Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?\n",
194
- "{'question': 'Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?', 'chat_history': [(\"What's PCI DSS?\", 'PCI DSS stands for Payment Card Industry Data Security Standard. It is a global standard that provides a baseline of technical and operational requirements designed to protect payment data.')]}\n",
195
- " What are the key differences between PCI DSS versions 3.2.1 and 4.0?\n",
196
- "<on_llm_end>\n",
197
- "\n",
198
- "\n",
199
- " The key differences between PCI DSS versions 3.2.1 and 4.0 include changes to the introductory sections, general changes to the requirements, testing procedures, and guidance, and additional changes per requirement for requirements 1-12 and the appendices.\n",
200
- "<on_llm_end>\n",
201
- "\n",
202
- "\n",
203
- "Completed in 49.610s\n",
204
- "\n",
205
- "Question: new requirements for vulnerability assessments\n",
206
- "{'question': 'new requirements for vulnerability assessments', 'chat_history': [(\"What's PCI DSS?\", 'PCI DSS stands for Payment Card Industry Data Security Standard. It is a global standard that provides a baseline of technical and operational requirements designed to protect payment data.'), ('Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?', 'The key differences between PCI DSS versions 3.2.1 and 4.0 include changes to the introductory sections, general changes to the requirements, testing procedures, and guidance, and additional changes per requirement for requirements 1-12 and the appendices.')]}\n",
207
- " What are the new requirements for vulnerability assessments in PCI DSS version 4.0?\n",
208
- "<on_llm_end>\n",
209
- "\n",
210
- "\n",
211
- " There are several new requirements related to vulnerability assessments in PCI DSS version 4.0. Some of them include:\n",
212
- "\n",
213
- "1. Requirement 4.1.2, which states that there should be clear roles and responsibilities defined for vulnerability management.\n",
214
- "2. Requirement 4.2.1, which requires organizations to ensure that certificates used for point-to-point encryption (PAN) transmissions over open, public networks are valid and not expired or revoked. This is considered a best practice until March 31, 2025.\n",
215
- "3. Requirement 10.4.2.1, which mandates a targeted risk analysis to determine the frequency of log reviews for all other system components.\n",
216
- "4. Requirement 10.7.2 and 10.7.3, which require organizations to detect, alert, and address failures of critical security control systems promptly.\n",
217
- "5. Requirement 11.3.1.1 and 11.3.1.2, which require managing all applicable vulnerabilities (not ranked as high-risk or critical) and performing internal vulnerability scans via authenticated scanning.\n",
218
- "<on_llm_end>\n",
219
- "\n",
220
- "\n",
221
- "Completed in 155.009s\n",
222
- "\n",
223
- "Question: more on penetration testing\n",
224
- "{'question': 'more on penetration testing', 'chat_history': [(\"What's PCI DSS?\", 'PCI DSS stands for Payment Card Industry Data Security Standard. It is a global standard that provides a baseline of technical and operational requirements designed to protect payment data.'), ('Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?', 'The key differences between PCI DSS versions 3.2.1 and 4.0 include changes to the introductory sections, general changes to the requirements, testing procedures, and guidance, and additional changes per requirement for requirements 1-12 and the appendices.'), ('new requirements for vulnerability assessments', 'There are several new requirements related to vulnerability assessments in PCI DSS version 4.0. Some of them include:\\n\\n1. Requirement 4.1.2, which states that there should be clear roles and responsibilities defined for vulnerability management.\\n2. Requirement 4.2.1, which requires organizations to ensure that certificates used for point-to-point encryption (PAN) transmissions over open, public networks are valid and not expired or revoked. This is considered a best practice until March 31, 2025.\\n3. Requirement 10.4.2.1, which mandates a targeted risk analysis to determine the frequency of log reviews for all other system components.\\n4. Requirement 10.7.2 and 10.7.3, which require organizations to detect, alert, and address failures of critical security control systems promptly.\\n5. Requirement 11.3.1.1 and 11.3.1.2, which require managing all applicable vulnerabilities (not ranked as high-risk or critical) and performing internal vulnerability scans via authenticated scanning.')]}\n",
225
- " What are some common methods used in penetration testing, and how do they help organizations meet PCI DSS requirements?\n",
226
- "<on_llm_end>\n",
227
- "\n",
228
- "\n",
229
- " Some common methods used in penetration testing include network-layer testing, application-layer testing, and exploiting known vulnerabilities. These methods help organizations meet PCI DSS requirements by identifying and addressing potential security risks and weaknesses in their networks and applications, ensuring compliance with the standard's requirements related to network and application security.\n",
230
- "<on_llm_end>\n",
231
- "\n",
232
- "\n",
233
- "Completed in 66.451s\n",
234
- "Total time used: 304.184 s\n",
235
- "Number of tokens generated: 502\n",
236
- "Average generation speed: 1.650 tokens/s\n",
237
- "CPU times: user 4.21 s, sys: 1.29 s, total: 5.5 s\n",
238
- "Wall time: 5min 8s\n"
239
- ]
240
- }
241
- ],
242
- "source": [
243
- "%%time\n",
244
- "\n",
245
- "os.environ[\"HFTGI_RP\"] = \"1.10\"\n",
246
- "!python qa_chain_test.py"
247
- ]
248
- },
249
- {
250
- "cell_type": "code",
251
- "execution_count": 5,
252
- "id": "db48dcc4",
253
- "metadata": {},
254
- "outputs": [
255
- {
256
- "name": "stdout",
257
- "output_type": "stream",
258
- "text": [
259
- "loading env vars from: /home/inflaton/code/projects/chat-with-orca-2/.env\n",
260
- "Running on: Linux-5.10.102.1-microsoft-standard-WSL2-x86_64-with-glibc2.35\n",
261
- "MPS is NOT available\n",
262
- "CUDA is available\n",
263
- "MPS not available because the current PyTorch install was not built with MPS enabled.\n",
264
- "CUDA is available, we have found 1 GPU(s)\n",
265
- "NVIDIA GeForce RTX 4080 Laptop GPU\n",
266
- "CUDA version: 12.1\n",
267
- "hf_embeddings_device_type: cuda:0\n",
268
- "hf_pipeline_device_type: cuda:0\n",
269
- "load INSTRUCTOR_Transformer\n",
270
- "/home/inflaton/miniconda3/envs/chat-with-orca-2/lib/python3.11/site-packages/torch/_utils.py:831: UserWarning: TypedStorage is deprecated. It will be removed in the future and UntypedStorage will be the only storage class. This should only matter to you if you are using storages directly. To access UntypedStorage directly, use tensor.untyped_storage() instead of tensor.storage()\n",
271
- " return self.fget.__get__(instance, owner)()\n",
272
- "max_seq_length 512\n",
273
- "Completed in 0.623s\n",
274
- "Load index from ./data/faiss_1024_512/ with FAISS\n",
275
- "Completed in 0.019s\n",
276
- "initializing LLM: hftgi\n",
277
- " hf_pipeline_device_type: cuda:0\n",
278
- " load_quantized_model: None\n",
279
- " torch_dtype: torch.float16\n",
280
- " n_threds: 4\n",
281
- " repetition_penalty: 1.15\n",
282
- "/home/inflaton/miniconda3/envs/chat-with-orca-2/lib/python3.11/site-packages/pydantic/_internal/_fields.py:149: UserWarning: Field \"model_id\" has conflict with protected namespace \"model_\".\n",
283
- "\n",
284
- "You may be able to resolve this warning by setting `model_config['protected_namespaces'] = ()`.\n",
285
- " warnings.warn(\n",
286
- "initialization complete\n",
287
- "Completed in 0.013s\n",
288
- "\n",
289
- "Question: What's PCI DSS?\n",
290
- "{'question': \"What's PCI DSS?\", 'chat_history': []}\n",
291
- " PCI DSS stands for Payment Card Industry Data Security Standard. It is a global standard that provides a baseline of technical and operational requirements designed to protect payment data.\n",
292
- "<on_llm_end>\n",
293
- "\n",
294
- "\n",
295
- "Completed in 33.804s\n",
296
- "\n",
297
- "Question: Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?\n",
298
- "{'question': 'Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?', 'chat_history': [(\"What's PCI DSS?\", 'PCI DSS stands for Payment Card Industry Data Security Standard. It is a global standard that provides a baseline of technical and operational requirements designed to protect payment data.')]}\n",
299
- " Summarize the differences between PCI DSS versions 3.2.1 and 4.0.\n",
300
- "<on_llm_end>\n",
301
- "\n",
302
- "\n",
303
- " The main difference between PCI DSS version 3.2.1 and 4.0 is that version 4.0 has updates to align with the changes from PCI DSS v3.2.1 to PCI DSS v4.0.\n",
304
- "<on_llm_end>\n",
305
- "\n",
306
- "\n",
307
- "Completed in 47.695s\n",
308
- "\n",
309
- "Question: new requirements for vulnerability assessments\n",
310
- "{'question': 'new requirements for vulnerability assessments', 'chat_history': [(\"What's PCI DSS?\", 'PCI DSS stands for Payment Card Industry Data Security Standard. It is a global standard that provides a baseline of technical and operational requirements designed to protect payment data.'), ('Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?', 'The main difference between PCI DSS version 3.2.1 and 4.0 is that version 4.0 has updates to align with the changes from PCI DSS v3.2.1 to PCI DSS v4.0.')]}\n",
311
- " What are the new requirements for vulnerability assessments under PCI DSS version 4.0?\n",
312
- "<on_llm_end>\n",
313
- "\n",
314
- "\n",
315
- " There are no specific changes mentioned for vulnerability assessments in the provided text.\n",
316
- "<on_llm_end>\n",
317
- "\n",
318
- "\n",
319
- "Completed in 36.644s\n",
320
- "\n",
321
- "Question: more on penetration testing\n",
322
- "{'question': 'more on penetration testing', 'chat_history': [(\"What's PCI DSS?\", 'PCI DSS stands for Payment Card Industry Data Security Standard. It is a global standard that provides a baseline of technical and operational requirements designed to protect payment data.'), ('Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?', 'The main difference between PCI DSS version 3.2.1 and 4.0 is that version 4.0 has updates to align with the changes from PCI DSS v3.2.1 to PCI DSS v4.0.'), ('new requirements for vulnerability assessments', 'There are no specific changes mentioned for vulnerability assessments in the provided text.')]}\n",
323
- " What are some best practices for conducting effective penetration tests?\n",
324
- "<on_llm_end>\n",
325
- "\n",
326
- "\n",
327
- " Some best practices for conducting effective penetration tests include performing the testing according to the entity's defined methodology, ensuring the test is conducted at least once every 12 months after significant infrastructure or application changes, using a qualified internal resource or external third-party tester who maintains organizational independence, and considering the latest threats and vulnerabilities experienced in the past year. Additionally, it is important to perform testing from both inside and outside the network, validate segmentation and scope reduction controls, and apply application and network-layer testing. Finally, documenting the approach to assessing and addressing risks posed by exploitable vulnerabilities and security weaknesses found during penetration testing and retaining the results and remediation activities for at least 12 months can help improve the effectiveness of these tests.\n",
328
- "<on_llm_end>\n",
329
- "\n",
330
- "\n",
331
- "Completed in 85.748s\n",
332
- "Total time used: 203.892 s\n",
333
- "Number of tokens generated: 339\n",
334
- "Average generation speed: 1.663 tokens/s\n",
335
- "CPU times: user 2.72 s, sys: 801 ms, total: 3.52 s\n",
336
- "Wall time: 3min 28s\n"
337
- ]
338
- }
339
- ],
340
- "source": [
341
- "%%time\n",
342
- "\n",
343
- "os.environ[\"HFTGI_RP\"] = \"1.15\"\n",
344
- "!python qa_chain_test.py"
345
- ]
346
- }
347
- ],
348
- "metadata": {
349
- "kernelspec": {
350
- "display_name": "Python 3 (ipykernel)",
351
- "language": "python",
352
- "name": "python3"
353
- },
354
- "language_info": {
355
- "codemirror_mode": {
356
- "name": "ipython",
357
- "version": 3
358
- },
359
- "file_extension": ".py",
360
- "mimetype": "text/x-python",
361
- "name": "python",
362
- "nbconvert_exporter": "python",
363
- "pygments_lexer": "ipython3",
364
- "version": "3.11.7"
365
- }
366
- },
367
- "nbformat": 4,
368
- "nbformat_minor": 5
369
- }
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
notebook/nvidia-4080-phi-2-2.7b.ipynb DELETED
The diff for this file is too large to render. See raw diff
 
results/{3_analyze-data.ipynb → 2_analyze-data.ipynb} RENAMED
File without changes
results/2_process-raw-data_nvidia-4080.ipynb DELETED
@@ -1,1355 +0,0 @@
1
- {
2
- "cells": [
3
- {
4
- "cell_type": "code",
5
- "execution_count": 1,
6
- "metadata": {},
7
- "outputs": [
8
- {
9
- "name": "stdout",
10
- "output_type": "stream",
11
- "text": [
12
- "workding dir: /home/inflaton/code/projects/chat-with-orca-2\n"
13
- ]
14
- }
15
- ],
16
- "source": [
17
- "import os\n",
18
- "import sys\n",
19
- "from pathlib import Path\n",
20
- "\n",
21
- "workding_dir = str(Path.cwd().parent)\n",
22
- "os.chdir(workding_dir)\n",
23
- "sys.path.append(workding_dir)\n",
24
- "print(\"workding dir:\", workding_dir)"
25
- ]
26
- },
27
- {
28
- "cell_type": "code",
29
- "execution_count": 2,
30
- "metadata": {},
31
- "outputs": [
32
- {
33
- "name": "stderr",
34
- "output_type": "stream",
35
- "text": [
36
- "/home/inflaton/miniconda3/envs/chat-with-orca-2/lib/python3.11/site-packages/tqdm/auto.py:21: TqdmWarning: IProgress not found. Please update jupyter and ipywidgets. See https://ipywidgets.readthedocs.io/en/stable/user_install.html\n",
37
- " from .autonotebook import tqdm as notebook_tqdm\n"
38
- ]
39
- },
40
- {
41
- "name": "stdout",
42
- "output_type": "stream",
43
- "text": [
44
- "loading env vars from: /home/inflaton/code/projects/chat-with-orca-2/.env\n",
45
- "Running on: Linux-5.10.102.1-microsoft-standard-WSL2-x86_64-with-glibc2.35\n",
46
- "MPS is NOT available\n",
47
- "CUDA is available\n",
48
- "MPS not available because the current PyTorch install was not built with MPS enabled.\n",
49
- "CUDA is available, we have found 1 GPU(s)\n",
50
- "NVIDIA GeForce RTX 4080 Laptop GPU\n",
51
- "CUDA version: 12.1\n",
52
- "hf_embeddings_device_type: cuda:0\n",
53
- "hf_pipeline_device_type: cuda:0\n",
54
- "load INSTRUCTOR_Transformer\n"
55
- ]
56
- },
57
- {
58
- "name": "stderr",
59
- "output_type": "stream",
60
- "text": [
61
- "/home/inflaton/miniconda3/envs/chat-with-orca-2/lib/python3.11/site-packages/torch/_utils.py:831: UserWarning: TypedStorage is deprecated. It will be removed in the future and UntypedStorage will be the only storage class. This should only matter to you if you are using storages directly. To access UntypedStorage directly, use tensor.untyped_storage() instead of tensor.storage()\n",
62
- " return self.fget.__get__(instance, owner)()\n"
63
- ]
64
- },
65
- {
66
- "name": "stdout",
67
- "output_type": "stream",
68
- "text": [
69
- "max_seq_length 512\n",
70
- "Completed in 0.638s\n",
71
- "Load index from ./data/faiss_1024_512/ with FAISS\n",
72
- "Completed in 0.020s\n",
73
- "initializing LLM: openai\n",
74
- " hf_pipeline_device_type: cuda:0\n",
75
- " load_quantized_model: None\n",
76
- " torch_dtype: torch.float16\n",
77
- " n_threds: 4\n",
78
- " using model: gpt-3.5-turbo\n",
79
- "initialization complete\n",
80
- "Completed in 0.028s\n",
81
- "CPU times: user 6.16 s, sys: 4.73 s, total: 10.9 s\n",
82
- "Wall time: 3.62 s\n"
83
- ]
84
- }
85
- ],
86
- "source": [
87
- "%%time\n",
88
- "\n",
89
- "os.environ[\"LLM_MODEL_TYPE\"] = \"openai\"\n",
90
- "from eval_models import *"
91
- ]
92
- },
93
- {
94
- "cell_type": "code",
95
- "execution_count": 3,
96
- "metadata": {},
97
- "outputs": [
98
- {
99
- "name": "stdout",
100
- "output_type": "stream",
101
- "text": [
102
- "loading: ./notebook/nvidia-4080-llama-2-7b.ipynb\n",
103
- "processing repetition_penalty: 1.05\n",
104
- "processing repetition_penalty: 1.10\n",
105
- "processing repetition_penalty: 1.15\n"
106
- ]
107
- },
108
- {
109
- "name": "stderr",
110
- "output_type": "stream",
111
- "text": [
112
- "Evaluating: 100%|██████████| 8/8 [00:49<00:00, 6.14s/it]\n"
113
- ]
114
- },
115
- {
116
- "name": "stdout",
117
- "output_type": "stream",
118
- "text": [
119
- "\n",
120
- "\n",
121
- "# Ragas scores: {'faithfulness': 1.0000, 'answer_relevancy': 0.7320, 'overall_score': 0.8452}\n",
122
- "\n"
123
- ]
124
- },
125
- {
126
- "name": "stderr",
127
- "output_type": "stream",
128
- "text": [
129
- "Evaluating: 100%|██████████| 8/8 [00:40<00:00, 5.12s/it]\n"
130
- ]
131
- },
132
- {
133
- "name": "stdout",
134
- "output_type": "stream",
135
- "text": [
136
- "\n",
137
- "\n",
138
- "# Ragas scores: {'faithfulness': 0.7500, 'answer_relevancy': 0.7224, 'overall_score': 0.7359}\n",
139
- "\n"
140
- ]
141
- },
142
- {
143
- "name": "stderr",
144
- "output_type": "stream",
145
- "text": [
146
- "Evaluating: 100%|██████████| 8/8 [00:38<00:00, 4.80s/it]\n"
147
- ]
148
- },
149
- {
150
- "name": "stdout",
151
- "output_type": "stream",
152
- "text": [
153
- "\n",
154
- "\n",
155
- "# Ragas scores: {'faithfulness': 0.7556, 'answer_relevancy': 0.9682, 'overall_score': 0.8487}\n",
156
- "\n",
157
- "loading: ./notebook/nvidia-4080-orca-2-7b.ipynb\n",
158
- "processing repetition_penalty: 1.05\n",
159
- "processing repetition_penalty: 1.10\n",
160
- "processing repetition_penalty: 1.15\n"
161
- ]
162
- },
163
- {
164
- "name": "stderr",
165
- "output_type": "stream",
166
- "text": [
167
- "Evaluating: 100%|███���██████| 8/8 [00:42<00:00, 5.25s/it]\n"
168
- ]
169
- },
170
- {
171
- "name": "stdout",
172
- "output_type": "stream",
173
- "text": [
174
- "\n",
175
- "\n",
176
- "# Ragas scores: {'faithfulness': 0.8304, 'answer_relevancy': 0.9783, 'overall_score': 0.8983}\n",
177
- "\n"
178
- ]
179
- },
180
- {
181
- "name": "stderr",
182
- "output_type": "stream",
183
- "text": [
184
- "Evaluating: 100%|██████████| 8/8 [00:59<00:00, 7.44s/it]\n"
185
- ]
186
- },
187
- {
188
- "name": "stdout",
189
- "output_type": "stream",
190
- "text": [
191
- "\n",
192
- "\n",
193
- "# Ragas scores: {'faithfulness': 1.0000, 'answer_relevancy': 0.9711, 'overall_score': 0.9853}\n",
194
- "\n"
195
- ]
196
- },
197
- {
198
- "name": "stderr",
199
- "output_type": "stream",
200
- "text": [
201
- "Evaluating: 100%|██████████| 8/8 [00:33<00:00, 4.18s/it]\n"
202
- ]
203
- },
204
- {
205
- "name": "stdout",
206
- "output_type": "stream",
207
- "text": [
208
- "\n",
209
- "\n",
210
- "# Ragas scores: {'faithfulness': 0.8667, 'answer_relevancy': 0.9637, 'overall_score': 0.9126}\n",
211
- "\n",
212
- "loading: ./notebook/nvidia-4080-orca-2-7b_tgi.ipynb\n",
213
- "processing repetition_penalty: 1.05\n",
214
- "processing repetition_penalty: 1.10\n",
215
- "processing repetition_penalty: 1.15\n"
216
- ]
217
- },
218
- {
219
- "name": "stderr",
220
- "output_type": "stream",
221
- "text": [
222
- "Evaluating: 100%|██████████| 8/8 [00:54<00:00, 6.86s/it]\n"
223
- ]
224
- },
225
- {
226
- "name": "stdout",
227
- "output_type": "stream",
228
- "text": [
229
- "\n",
230
- "\n",
231
- "# Ragas scores: {'faithfulness': 1.0000, 'answer_relevancy': 0.9676, 'overall_score': 0.9835}\n",
232
- "\n"
233
- ]
234
- },
235
- {
236
- "name": "stderr",
237
- "output_type": "stream",
238
- "text": [
239
- "Evaluating: 100%|██████████| 8/8 [01:02<00:00, 7.87s/it]\n"
240
- ]
241
- },
242
- {
243
- "name": "stdout",
244
- "output_type": "stream",
245
- "text": [
246
- "\n",
247
- "\n",
248
- "# Ragas scores: {'faithfulness': 0.8583, 'answer_relevancy': 0.9557, 'overall_score': 0.9044}\n",
249
- "\n"
250
- ]
251
- },
252
- {
253
- "name": "stderr",
254
- "output_type": "stream",
255
- "text": [
256
- "Evaluating: 100%|██████████| 8/8 [00:48<00:00, 6.08s/it]\n"
257
- ]
258
- },
259
- {
260
- "name": "stdout",
261
- "output_type": "stream",
262
- "text": [
263
- "\n",
264
- "\n",
265
- "# Ragas scores: {'faithfulness': 0.7500, 'answer_relevancy': 0.7140, 'overall_score': 0.7316}\n",
266
- "\n",
267
- "loading: ./notebook/nvidia-4080-orca-2-13b_tgi.ipynb\n",
268
- "processing repetition_penalty: 1.05\n",
269
- "processing repetition_penalty: 1.10\n",
270
- "processing repetition_penalty: 1.15\n"
271
- ]
272
- },
273
- {
274
- "name": "stderr",
275
- "output_type": "stream",
276
- "text": [
277
- "Evaluating: 100%|██████████| 8/8 [00:48<00:00, 6.01s/it]\n"
278
- ]
279
- },
280
- {
281
- "name": "stdout",
282
- "output_type": "stream",
283
- "text": [
284
- "\n",
285
- "\n",
286
- "# Ragas scores: {'faithfulness': 0.9500, 'answer_relevancy': 0.9637, 'overall_score': 0.9568}\n",
287
- "\n"
288
- ]
289
- },
290
- {
291
- "name": "stderr",
292
- "output_type": "stream",
293
- "text": [
294
- "Evaluating: 100%|██████████| 8/8 [00:35<00:00, 4.48s/it]\n"
295
- ]
296
- },
297
- {
298
- "name": "stdout",
299
- "output_type": "stream",
300
- "text": [
301
- "\n",
302
- "\n",
303
- "# Ragas scores: {'faithfulness': 0.7500, 'answer_relevancy': 0.9468, 'overall_score': 0.8370}\n",
304
- "\n"
305
- ]
306
- },
307
- {
308
- "name": "stderr",
309
- "output_type": "stream",
310
- "text": [
311
- "Evaluating: 100%|██████████| 8/8 [00:41<00:00, 5.24s/it]\n"
312
- ]
313
- },
314
- {
315
- "name": "stdout",
316
- "output_type": "stream",
317
- "text": [
318
- "\n",
319
- "\n",
320
- "# Ragas scores: {'faithfulness': 1.0000, 'answer_relevancy': 0.9388, 'overall_score': 0.9684}\n",
321
- "\n",
322
- "CPU times: user 6.76 s, sys: 448 ms, total: 7.21 s\n",
323
- "Wall time: 9min 26s\n"
324
- ]
325
- }
326
- ],
327
- "source": [
328
- "%%time\n",
329
- "\n",
330
- "model_names = [\"llama-2-7b\", \"orca-2-7b\", \"orca-2-7b_tgi\", \"orca-2-13b_tgi\"]\n",
331
- "\n",
332
- "perf_pd, raw_pd = evaluate_models(model_names, prefix=\"nvidia-4080\")"
333
- ]
334
- },
335
- {
336
- "cell_type": "code",
337
- "execution_count": 4,
338
- "metadata": {},
339
- "outputs": [
340
- {
341
- "data": {
342
- "text/html": [
343
- "<div>\n",
344
- "<style scoped>\n",
345
- " .dataframe tbody tr th:only-of-type {\n",
346
- " vertical-align: middle;\n",
347
- " }\n",
348
- "\n",
349
- " .dataframe tbody tr th {\n",
350
- " vertical-align: top;\n",
351
- " }\n",
352
- "\n",
353
- " .dataframe thead th {\n",
354
- " text-align: right;\n",
355
- " }\n",
356
- "</style>\n",
357
- "<table border=\"1\" class=\"dataframe\">\n",
358
- " <thead>\n",
359
- " <tr style=\"text-align: right;\">\n",
360
- " <th></th>\n",
361
- " <th>model_name</th>\n",
362
- " <th>repetition_penalty</th>\n",
363
- " <th>faithfulness</th>\n",
364
- " <th>answer_relevancy</th>\n",
365
- " <th>overall_score</th>\n",
366
- " <th>total_time_used</th>\n",
367
- " <th>num_tokens_generated</th>\n",
368
- " <th>token_per_second</th>\n",
369
- " </tr>\n",
370
- " </thead>\n",
371
- " <tbody>\n",
372
- " <tr>\n",
373
- " <th>0</th>\n",
374
- " <td>llama-2-7b</td>\n",
375
- " <td>1.05</td>\n",
376
- " <td>1.000000</td>\n",
377
- " <td>0.731964</td>\n",
378
- " <td>0.845241</td>\n",
379
- " <td>1234.418</td>\n",
380
- " <td>2457</td>\n",
381
- " <td>1.990</td>\n",
382
- " </tr>\n",
383
- " <tr>\n",
384
- " <th>1</th>\n",
385
- " <td>llama-2-7b</td>\n",
386
- " <td>1.10</td>\n",
387
- " <td>0.750000</td>\n",
388
- " <td>0.722392</td>\n",
389
- " <td>0.735937</td>\n",
390
- " <td>272.474</td>\n",
391
- " <td>623</td>\n",
392
- " <td>2.286</td>\n",
393
- " </tr>\n",
394
- " <tr>\n",
395
- " <th>2</th>\n",
396
- " <td>llama-2-7b</td>\n",
397
- " <td>1.15</td>\n",
398
- " <td>0.755556</td>\n",
399
- " <td>0.968164</td>\n",
400
- " <td>0.848748</td>\n",
401
- " <td>319.531</td>\n",
402
- " <td>792</td>\n",
403
- " <td>2.479</td>\n",
404
- " </tr>\n",
405
- " <tr>\n",
406
- " <th>3</th>\n",
407
- " <td>orca-2-7b</td>\n",
408
- " <td>1.05</td>\n",
409
- " <td>0.830357</td>\n",
410
- " <td>0.978326</td>\n",
411
- " <td>0.898289</td>\n",
412
- " <td>254.981</td>\n",
413
- " <td>536</td>\n",
414
- " <td>2.102</td>\n",
415
- " </tr>\n",
416
- " <tr>\n",
417
- " <th>4</th>\n",
418
- " <td>orca-2-7b</td>\n",
419
- " <td>1.10</td>\n",
420
- " <td>1.000000</td>\n",
421
- " <td>0.971117</td>\n",
422
- " <td>0.985347</td>\n",
423
- " <td>273.518</td>\n",
424
- " <td>549</td>\n",
425
- " <td>2.007</td>\n",
426
- " </tr>\n",
427
- " <tr>\n",
428
- " <th>5</th>\n",
429
- " <td>orca-2-7b</td>\n",
430
- " <td>1.15</td>\n",
431
- " <td>0.866667</td>\n",
432
- " <td>0.963659</td>\n",
433
- " <td>0.912593</td>\n",
434
- " <td>214.116</td>\n",
435
- " <td>432</td>\n",
436
- " <td>2.018</td>\n",
437
- " </tr>\n",
438
- " <tr>\n",
439
- " <th>6</th>\n",
440
- " <td>orca-2-7b_tgi</td>\n",
441
- " <td>1.05</td>\n",
442
- " <td>1.000000</td>\n",
443
- " <td>0.967557</td>\n",
444
- " <td>0.983511</td>\n",
445
- " <td>330.008</td>\n",
446
- " <td>587</td>\n",
447
- " <td>1.779</td>\n",
448
- " </tr>\n",
449
- " <tr>\n",
450
- " <th>7</th>\n",
451
- " <td>orca-2-7b_tgi</td>\n",
452
- " <td>1.10</td>\n",
453
- " <td>0.858333</td>\n",
454
- " <td>0.955750</td>\n",
455
- " <td>0.904426</td>\n",
456
- " <td>304.184</td>\n",
457
- " <td>502</td>\n",
458
- " <td>1.650</td>\n",
459
- " </tr>\n",
460
- " <tr>\n",
461
- " <th>8</th>\n",
462
- " <td>orca-2-7b_tgi</td>\n",
463
- " <td>1.15</td>\n",
464
- " <td>0.750000</td>\n",
465
- " <td>0.714001</td>\n",
466
- " <td>0.731558</td>\n",
467
- " <td>203.892</td>\n",
468
- " <td>339</td>\n",
469
- " <td>1.663</td>\n",
470
- " </tr>\n",
471
- " <tr>\n",
472
- " <th>9</th>\n",
473
- " <td>orca-2-13b_tgi</td>\n",
474
- " <td>1.05</td>\n",
475
- " <td>0.950000</td>\n",
476
- " <td>0.963749</td>\n",
477
- " <td>0.956825</td>\n",
478
- " <td>30.847</td>\n",
479
- " <td>455</td>\n",
480
- " <td>14.750</td>\n",
481
- " </tr>\n",
482
- " <tr>\n",
483
- " <th>10</th>\n",
484
- " <td>orca-2-13b_tgi</td>\n",
485
- " <td>1.10</td>\n",
486
- " <td>0.750000</td>\n",
487
- " <td>0.946751</td>\n",
488
- " <td>0.836968</td>\n",
489
- " <td>24.490</td>\n",
490
- " <td>348</td>\n",
491
- " <td>14.210</td>\n",
492
- " </tr>\n",
493
- " <tr>\n",
494
- " <th>11</th>\n",
495
- " <td>orca-2-13b_tgi</td>\n",
496
- " <td>1.15</td>\n",
497
- " <td>1.000000</td>\n",
498
- " <td>0.938756</td>\n",
499
- " <td>0.968411</td>\n",
500
- " <td>42.575</td>\n",
501
- " <td>649</td>\n",
502
- " <td>15.244</td>\n",
503
- " </tr>\n",
504
- " </tbody>\n",
505
- "</table>\n",
506
- "</div>"
507
- ],
508
- "text/plain": [
509
- " model_name repetition_penalty faithfulness answer_relevancy \\\n",
510
- "0 llama-2-7b 1.05 1.000000 0.731964 \n",
511
- "1 llama-2-7b 1.10 0.750000 0.722392 \n",
512
- "2 llama-2-7b 1.15 0.755556 0.968164 \n",
513
- "3 orca-2-7b 1.05 0.830357 0.978326 \n",
514
- "4 orca-2-7b 1.10 1.000000 0.971117 \n",
515
- "5 orca-2-7b 1.15 0.866667 0.963659 \n",
516
- "6 orca-2-7b_tgi 1.05 1.000000 0.967557 \n",
517
- "7 orca-2-7b_tgi 1.10 0.858333 0.955750 \n",
518
- "8 orca-2-7b_tgi 1.15 0.750000 0.714001 \n",
519
- "9 orca-2-13b_tgi 1.05 0.950000 0.963749 \n",
520
- "10 orca-2-13b_tgi 1.10 0.750000 0.946751 \n",
521
- "11 orca-2-13b_tgi 1.15 1.000000 0.938756 \n",
522
- "\n",
523
- " overall_score total_time_used num_tokens_generated token_per_second \n",
524
- "0 0.845241 1234.418 2457 1.990 \n",
525
- "1 0.735937 272.474 623 2.286 \n",
526
- "2 0.848748 319.531 792 2.479 \n",
527
- "3 0.898289 254.981 536 2.102 \n",
528
- "4 0.985347 273.518 549 2.007 \n",
529
- "5 0.912593 214.116 432 2.018 \n",
530
- "6 0.983511 330.008 587 1.779 \n",
531
- "7 0.904426 304.184 502 1.650 \n",
532
- "8 0.731558 203.892 339 1.663 \n",
533
- "9 0.956825 30.847 455 14.750 \n",
534
- "10 0.836968 24.490 348 14.210 \n",
535
- "11 0.968411 42.575 649 15.244 "
536
- ]
537
- },
538
- "execution_count": 4,
539
- "metadata": {},
540
- "output_type": "execute_result"
541
- }
542
- ],
543
- "source": [
544
- "perf_pd"
545
- ]
546
- },
547
- {
548
- "cell_type": "code",
549
- "execution_count": 5,
550
- "metadata": {},
551
- "outputs": [
552
- {
553
- "data": {
554
- "text/html": [
555
- "<div>\n",
556
- "<style scoped>\n",
557
- " .dataframe tbody tr th:only-of-type {\n",
558
- " vertical-align: middle;\n",
559
- " }\n",
560
- "\n",
561
- " .dataframe tbody tr th {\n",
562
- " vertical-align: top;\n",
563
- " }\n",
564
- "\n",
565
- " .dataframe thead th {\n",
566
- " text-align: right;\n",
567
- " }\n",
568
- "</style>\n",
569
- "<table border=\"1\" class=\"dataframe\">\n",
570
- " <thead>\n",
571
- " <tr style=\"text-align: right;\">\n",
572
- " <th></th>\n",
573
- " <th>model_name</th>\n",
574
- " <th>repetition_penalty</th>\n",
575
- " <th>user_question</th>\n",
576
- " <th>standalone_question</th>\n",
577
- " <th>contexts</th>\n",
578
- " <th>answer</th>\n",
579
- " </tr>\n",
580
- " </thead>\n",
581
- " <tbody>\n",
582
- " <tr>\n",
583
- " <th>0</th>\n",
584
- " <td>llama-2-7b</td>\n",
585
- " <td>1.05</td>\n",
586
- " <td>What's PCI DSS?</td>\n",
587
- " <td></td>\n",
588
- " <td>[PCI Data Security Standard\\nPCI DSS provides ...</td>\n",
589
- " <td>PCI DSS stands for Payment Card Industry Data ...</td>\n",
590
- " </tr>\n",
591
- " <tr>\n",
592
- " <th>1</th>\n",
593
- " <td>llama-2-7b</td>\n",
594
- " <td>1.05</td>\n",
595
- " <td>Can you summarize the changes made from PCI DS...</td>\n",
596
- " <td>What are the key changes made in PCI DSS versi...</td>\n",
597
- " <td>[PCI DSS v3.2.1 to v.4.0 Summary of Changes r...</td>\n",
598
- " <td>The key changes made in PCI DSS version 4.0 c...</td>\n",
599
- " </tr>\n",
600
- " <tr>\n",
601
- " <th>2</th>\n",
602
- " <td>llama-2-7b</td>\n",
603
- " <td>1.05</td>\n",
604
- " <td>new requirements for vulnerability assessments</td>\n",
605
- " <td>What are the updated requirements for vulnerab...</td>\n",
606
- " <td>[PCI DSS v3.2.1 to v.4.0 Summary of Changes r...</td>\n",
607
- " <td>The updated requirements for vulnerability as...</td>\n",
608
- " </tr>\n",
609
- " <tr>\n",
610
- " <th>3</th>\n",
611
- " <td>llama-2-7b</td>\n",
612
- " <td>1.05</td>\n",
613
- " <td>more on penetration testing</td>\n",
614
- " <td>What are the updated requirements for vulnerab...</td>\n",
615
- " <td>[PCI DSS v3.2.1 to v.4.0 Summary of Changes r...</td>\n",
616
- " <td>The updated requirements for vulnerability as...</td>\n",
617
- " </tr>\n",
618
- " <tr>\n",
619
- " <th>4</th>\n",
620
- " <td>llama-2-7b</td>\n",
621
- " <td>1.10</td>\n",
622
- " <td>What's PCI DSS?</td>\n",
623
- " <td></td>\n",
624
- " <td>[PCI Data Security Standard\\nPCI DSS provides ...</td>\n",
625
- " <td>PCI DSS stands for Payment Card Industry Data ...</td>\n",
626
- " </tr>\n",
627
- " <tr>\n",
628
- " <th>5</th>\n",
629
- " <td>llama-2-7b</td>\n",
630
- " <td>1.10</td>\n",
631
- " <td>Can you summarize the changes made from PCI DS...</td>\n",
632
- " <td>What are the key changes made in PCI DSS versi...</td>\n",
633
- " <td>[PCI DSS v3.2.1 to v.4.0 Summary of Changes r...</td>\n",
634
- " <td>The key changes made in PCI DSS version 4.0 c...</td>\n",
635
- " </tr>\n",
636
- " <tr>\n",
637
- " <th>6</th>\n",
638
- " <td>llama-2-7b</td>\n",
639
- " <td>1.10</td>\n",
640
- " <td>new requirements for vulnerability assessments</td>\n",
641
- " <td>What are the new requirements for vulnerabilit...</td>\n",
642
- " <td>[PCI DSS v3.2.1 to v.4.0 Summary of Changes r...</td>\n",
643
- " <td>According to the provided summary of changes,...</td>\n",
644
- " </tr>\n",
645
- " <tr>\n",
646
- " <th>7</th>\n",
647
- " <td>llama-2-7b</td>\n",
648
- " <td>1.10</td>\n",
649
- " <td>more on penetration testing</td>\n",
650
- " <td>What are the key differences between penetrati...</td>\n",
651
- " <td>[PCI DSS v4.0 ROC Template r1 December 2022 ...</td>\n",
652
- " <td>Penetration testing and vulnerability assessme...</td>\n",
653
- " </tr>\n",
654
- " <tr>\n",
655
- " <th>8</th>\n",
656
- " <td>llama-2-7b</td>\n",
657
- " <td>1.15</td>\n",
658
- " <td>What's PCI DSS?</td>\n",
659
- " <td></td>\n",
660
- " <td>[PCI Data Security Standard\\nPCI DSS provides ...</td>\n",
661
- " <td>PCI DSS stands for Payment Card Industry Data ...</td>\n",
662
- " </tr>\n",
663
- " <tr>\n",
664
- " <th>9</th>\n",
665
- " <td>llama-2-7b</td>\n",
666
- " <td>1.15</td>\n",
667
- " <td>Can you summarize the changes made from PCI DS...</td>\n",
668
- " <td>What are the key changes between PCI DSS versi...</td>\n",
669
- " <td>[PCI DSS v3.2.1 to v.4.0 Summary of Changes r...</td>\n",
670
- " <td>The key changes between PCI DSS versions 3.2.1...</td>\n",
671
- " </tr>\n",
672
- " <tr>\n",
673
- " <th>10</th>\n",
674
- " <td>llama-2-7b</td>\n",
675
- " <td>1.15</td>\n",
676
- " <td>new requirements for vulnerability assessments</td>\n",
677
- " <td>What are some of the new requirements for vuln...</td>\n",
678
- " <td>[PCI DSS v3.2.1 to v.4.0 Summary of Changes r...</td>\n",
679
- " <td>In PCI DSS version 4.0, there are several new ...</td>\n",
680
- " </tr>\n",
681
- " <tr>\n",
682
- " <th>11</th>\n",
683
- " <td>llama-2-7b</td>\n",
684
- " <td>1.15</td>\n",
685
- " <td>more on penetration testing</td>\n",
686
- " <td>What are some common techniques used in penetr...</td>\n",
687
- " <td>[circumvent or defeat the security features of...</td>\n",
688
- " <td>Penetration testing involves various technique...</td>\n",
689
- " </tr>\n",
690
- " <tr>\n",
691
- " <th>12</th>\n",
692
- " <td>orca-2-7b</td>\n",
693
- " <td>1.05</td>\n",
694
- " <td>What's PCI DSS?</td>\n",
695
- " <td></td>\n",
696
- " <td>[PCI Data Security Standard\\nPCI DSS provides ...</td>\n",
697
- " <td>PCI DSS stands for Payment Card Industry Data ...</td>\n",
698
- " </tr>\n",
699
- " <tr>\n",
700
- " <th>13</th>\n",
701
- " <td>orca-2-7b</td>\n",
702
- " <td>1.05</td>\n",
703
- " <td>Can you summarize the changes made from PCI DS...</td>\n",
704
- " <td>What are the main differences between PCI DSS ...</td>\n",
705
- " <td>[PCI DSS v3.2.1 to v.4.0 Summary of Changes r...</td>\n",
706
- " <td>The main differences between PCI DSS version 3...</td>\n",
707
- " </tr>\n",
708
- " <tr>\n",
709
- " <th>14</th>\n",
710
- " <td>orca-2-7b</td>\n",
711
- " <td>1.05</td>\n",
712
- " <td>new requirements for vulnerability assessments</td>\n",
713
- " <td>What are the new requirements for vulnerabilit...</td>\n",
714
- " <td>[PCI DSS v3.2.1 to v.4.0 Summary of Changes r...</td>\n",
715
- " <td>The new requirements for vulnerability assessm...</td>\n",
716
- " </tr>\n",
717
- " <tr>\n",
718
- " <th>15</th>\n",
719
- " <td>orca-2-7b</td>\n",
720
- " <td>1.05</td>\n",
721
- " <td>more on penetration testing</td>\n",
722
- " <td>What are the new requirements for penetration ...</td>\n",
723
- " <td>[PCI DSS v4.0 ROC Template r1 December 2022 ...</td>\n",
724
- " <td>The new requirements for penetration testing i...</td>\n",
725
- " </tr>\n",
726
- " <tr>\n",
727
- " <th>16</th>\n",
728
- " <td>orca-2-7b</td>\n",
729
- " <td>1.10</td>\n",
730
- " <td>What's PCI DSS?</td>\n",
731
- " <td></td>\n",
732
- " <td>[PCI Data Security Standard\\nPCI DSS provides ...</td>\n",
733
- " <td>PCI DSS stands for Payment Card Industry Data ...</td>\n",
734
- " </tr>\n",
735
- " <tr>\n",
736
- " <th>17</th>\n",
737
- " <td>orca-2-7b</td>\n",
738
- " <td>1.10</td>\n",
739
- " <td>Can you summarize the changes made from PCI DS...</td>\n",
740
- " <td>What are the main differences between PCI DSS ...</td>\n",
741
- " <td>[PCI DSS v3.2.1 to v.4.0 Summary of Changes r...</td>\n",
742
- " <td>The main differences between PCI DSS versions ...</td>\n",
743
- " </tr>\n",
744
- " <tr>\n",
745
- " <th>18</th>\n",
746
- " <td>orca-2-7b</td>\n",
747
- " <td>1.10</td>\n",
748
- " <td>new requirements for vulnerability assessments</td>\n",
749
- " <td>What are the new requirements for vulnerabilit...</td>\n",
750
- " <td>[PCI DSS v3.2.1 to v.4.0 Summary of Changes r...</td>\n",
751
- " <td>There are several new requirements for vulnera...</td>\n",
752
- " </tr>\n",
753
- " <tr>\n",
754
- " <th>19</th>\n",
755
- " <td>orca-2-7b</td>\n",
756
- " <td>1.10</td>\n",
757
- " <td>more on penetration testing</td>\n",
758
- " <td>What are some key differences between penetrat...</td>\n",
759
- " <td>[PCI DSS v4.0 ROC Template r1 December 2022 ...</td>\n",
760
- " <td>Penetration testing and vulnerability assessme...</td>\n",
761
- " </tr>\n",
762
- " <tr>\n",
763
- " <th>20</th>\n",
764
- " <td>orca-2-7b</td>\n",
765
- " <td>1.15</td>\n",
766
- " <td>What's PCI DSS?</td>\n",
767
- " <td></td>\n",
768
- " <td>[PCI Data Security Standard\\nPCI DSS provides ...</td>\n",
769
- " <td>PCI DSS stands for Payment Card Industry Data ...</td>\n",
770
- " </tr>\n",
771
- " <tr>\n",
772
- " <th>21</th>\n",
773
- " <td>orca-2-7b</td>\n",
774
- " <td>1.15</td>\n",
775
- " <td>Can you summarize the changes made from PCI DS...</td>\n",
776
- " <td>How does PCI DSS version 4.0 differ from versi...</td>\n",
777
- " <td>[Payment Card Industry \\nData Security Standa...</td>\n",
778
- " <td>In terms of security standards, PCI DSS versio...</td>\n",
779
- " </tr>\n",
780
- " <tr>\n",
781
- " <th>22</th>\n",
782
- " <td>orca-2-7b</td>\n",
783
- " <td>1.15</td>\n",
784
- " <td>new requirements for vulnerability assessments</td>\n",
785
- " <td>What are the new requirements for vulnerabilit...</td>\n",
786
- " <td>[PCI DSS v3.2.1 to v.4.0 Summary of Changes r...</td>\n",
787
- " <td>There are several new requirements related to ...</td>\n",
788
- " </tr>\n",
789
- " <tr>\n",
790
- " <th>23</th>\n",
791
- " <td>orca-2-7b</td>\n",
792
- " <td>1.15</td>\n",
793
- " <td>more on penetration testing</td>\n",
794
- " <td>What are some specific techniques used during ...</td>\n",
795
- " <td>[circumvent or defeat the security features of...</td>\n",
796
- " <td>Some specific techniques used during penetrati...</td>\n",
797
- " </tr>\n",
798
- " <tr>\n",
799
- " <th>24</th>\n",
800
- " <td>orca-2-7b_tgi</td>\n",
801
- " <td>1.05</td>\n",
802
- " <td>What's PCI DSS?</td>\n",
803
- " <td></td>\n",
804
- " <td>[PCI Data Security Standard\\nPCI DSS provides ...</td>\n",
805
- " <td>PCI DSS stands for Payment Card Industry Data...</td>\n",
806
- " </tr>\n",
807
- " <tr>\n",
808
- " <th>25</th>\n",
809
- " <td>orca-2-7b_tgi</td>\n",
810
- " <td>1.05</td>\n",
811
- " <td>Can you summarize the changes made from PCI DS...</td>\n",
812
- " <td>What are the key differences between PCI DSS ...</td>\n",
813
- " <td>[PCI DSS v3.2.1 to v.4.0 Summary of Changes r...</td>\n",
814
- " <td>The key differences between PCI DSS version 3...</td>\n",
815
- " </tr>\n",
816
- " <tr>\n",
817
- " <th>26</th>\n",
818
- " <td>orca-2-7b_tgi</td>\n",
819
- " <td>1.05</td>\n",
820
- " <td>new requirements for vulnerability assessments</td>\n",
821
- " <td>What are the new requirements for vulnerabili...</td>\n",
822
- " <td>[PCI DSS v3.2.1 to v.4.0 Summary of Changes r...</td>\n",
823
- " <td>The new requirements for vulnerability assess...</td>\n",
824
- " </tr>\n",
825
- " <tr>\n",
826
- " <th>27</th>\n",
827
- " <td>orca-2-7b_tgi</td>\n",
828
- " <td>1.05</td>\n",
829
- " <td>more on penetration testing</td>\n",
830
- " <td>What are the new requirements for penetration...</td>\n",
831
- " <td>[PCI DSS v4.0 ROC Template r1 December 2022 ...</td>\n",
832
- " <td>In PCI DSS version 4.0, the new requirements ...</td>\n",
833
- " </tr>\n",
834
- " <tr>\n",
835
- " <th>28</th>\n",
836
- " <td>orca-2-7b_tgi</td>\n",
837
- " <td>1.10</td>\n",
838
- " <td>What's PCI DSS?</td>\n",
839
- " <td></td>\n",
840
- " <td>[PCI Data Security Standard\\nPCI DSS provides ...</td>\n",
841
- " <td>PCI DSS stands for Payment Card Industry Data...</td>\n",
842
- " </tr>\n",
843
- " <tr>\n",
844
- " <th>29</th>\n",
845
- " <td>orca-2-7b_tgi</td>\n",
846
- " <td>1.10</td>\n",
847
- " <td>Can you summarize the changes made from PCI DS...</td>\n",
848
- " <td>What are the key differences between PCI DSS ...</td>\n",
849
- " <td>[PCI DSS v3.2.1 to v.4.0 Summary of Changes r...</td>\n",
850
- " <td>The key differences between PCI DSS versions ...</td>\n",
851
- " </tr>\n",
852
- " <tr>\n",
853
- " <th>30</th>\n",
854
- " <td>orca-2-7b_tgi</td>\n",
855
- " <td>1.10</td>\n",
856
- " <td>new requirements for vulnerability assessments</td>\n",
857
- " <td>What are the new requirements for vulnerabili...</td>\n",
858
- " <td>[PCI DSS v3.2.1 to v.4.0 Summary of Changes r...</td>\n",
859
- " <td>There are several new requirements related to...</td>\n",
860
- " </tr>\n",
861
- " <tr>\n",
862
- " <th>31</th>\n",
863
- " <td>orca-2-7b_tgi</td>\n",
864
- " <td>1.10</td>\n",
865
- " <td>more on penetration testing</td>\n",
866
- " <td>What are some common methods used in penetrat...</td>\n",
867
- " <td>[PCI DSS v4.0 ROC Template r1 December 2022 ...</td>\n",
868
- " <td>Some common methods used in penetration testi...</td>\n",
869
- " </tr>\n",
870
- " <tr>\n",
871
- " <th>32</th>\n",
872
- " <td>orca-2-7b_tgi</td>\n",
873
- " <td>1.15</td>\n",
874
- " <td>What's PCI DSS?</td>\n",
875
- " <td></td>\n",
876
- " <td>[PCI Data Security Standard\\nPCI DSS provides ...</td>\n",
877
- " <td>PCI DSS stands for Payment Card Industry Data...</td>\n",
878
- " </tr>\n",
879
- " <tr>\n",
880
- " <th>33</th>\n",
881
- " <td>orca-2-7b_tgi</td>\n",
882
- " <td>1.15</td>\n",
883
- " <td>Can you summarize the changes made from PCI DS...</td>\n",
884
- " <td>Summarize the differences between PCI DSS ver...</td>\n",
885
- " <td>[PCI DSS v3.2.1 to v.4.0 Summary of Changes r...</td>\n",
886
- " <td>The main difference between PCI DSS version 3...</td>\n",
887
- " </tr>\n",
888
- " <tr>\n",
889
- " <th>34</th>\n",
890
- " <td>orca-2-7b_tgi</td>\n",
891
- " <td>1.15</td>\n",
892
- " <td>new requirements for vulnerability assessments</td>\n",
893
- " <td>What are the new requirements for vulnerabili...</td>\n",
894
- " <td>[PCI DSS v3.2.1 to v.4.0 Summary of Changes r...</td>\n",
895
- " <td>There are no specific changes mentioned for v...</td>\n",
896
- " </tr>\n",
897
- " <tr>\n",
898
- " <th>35</th>\n",
899
- " <td>orca-2-7b_tgi</td>\n",
900
- " <td>1.15</td>\n",
901
- " <td>more on penetration testing</td>\n",
902
- " <td>What are some best practices for conducting e...</td>\n",
903
- " <td>[methodology examined for this testing \\nproc...</td>\n",
904
- " <td>Some best practices for conducting effective ...</td>\n",
905
- " </tr>\n",
906
- " <tr>\n",
907
- " <th>36</th>\n",
908
- " <td>orca-2-13b_tgi</td>\n",
909
- " <td>1.05</td>\n",
910
- " <td>What's PCI DSS?</td>\n",
911
- " <td></td>\n",
912
- " <td>[PCI Data Security Standard\\nPCI DSS provides ...</td>\n",
913
- " <td>PCI DSS is a global standard that provides a ...</td>\n",
914
- " </tr>\n",
915
- " <tr>\n",
916
- " <th>37</th>\n",
917
- " <td>orca-2-13b_tgi</td>\n",
918
- " <td>1.05</td>\n",
919
- " <td>Can you summarize the changes made from PCI DS...</td>\n",
920
- " <td>¿Puedes resumir los cambios realizados desde ...</td>\n",
921
- " <td>[April 2015 PCI DSS 3.1, \\nRevision 1.0 Revi...</td>\n",
922
- " <td>Sí, puedo resumir los cambios realizados desd...</td>\n",
923
- " </tr>\n",
924
- " <tr>\n",
925
- " <th>38</th>\n",
926
- " <td>orca-2-13b_tgi</td>\n",
927
- " <td>1.05</td>\n",
928
- " <td>new requirements for vulnerability assessments</td>\n",
929
- " <td>¿Cuáles son las nuevas recomendaciones para l...</td>\n",
930
- " <td>[The Prioritized Approach to Pursue PCI DSS Co...</td>\n",
931
- " <td>Las nuevas recomendaciones para las evaluacion...</td>\n",
932
- " </tr>\n",
933
- " <tr>\n",
934
- " <th>39</th>\n",
935
- " <td>orca-2-13b_tgi</td>\n",
936
- " <td>1.05</td>\n",
937
- " <td>more on penetration testing</td>\n",
938
- " <td>¿Puedes dar más información sobre las pruebas...</td>\n",
939
- " <td>[methodology examined for this testing \\nproc...</td>\n",
940
- " <td>Sí, puedo dar más información sobre las prueb...</td>\n",
941
- " </tr>\n",
942
- " <tr>\n",
943
- " <th>40</th>\n",
944
- " <td>orca-2-13b_tgi</td>\n",
945
- " <td>1.10</td>\n",
946
- " <td>What's PCI DSS?</td>\n",
947
- " <td></td>\n",
948
- " <td>[PCI Data Security Standard\\nPCI DSS provides ...</td>\n",
949
- " <td>PCI DSS is a set of requirements designed to ...</td>\n",
950
- " </tr>\n",
951
- " <tr>\n",
952
- " <th>41</th>\n",
953
- " <td>orca-2-13b_tgi</td>\n",
954
- " <td>1.10</td>\n",
955
- " <td>Can you summarize the changes made from PCI DS...</td>\n",
956
- " <td>¿Puedes resumir los cambios realizados desde ...</td>\n",
957
- " <td>[April 2015 PCI DSS 3.1, \\nRevision 1.0 Revi...</td>\n",
958
- " <td>Sí, puedo resumir los cambios realizados desd...</td>\n",
959
- " </tr>\n",
960
- " <tr>\n",
961
- " <th>42</th>\n",
962
- " <td>orca-2-13b_tgi</td>\n",
963
- " <td>1.10</td>\n",
964
- " <td>new requirements for vulnerability assessments</td>\n",
965
- " <td>¿Cuáles son las nuevas exigencias para las ev...</td>\n",
966
- " <td>[The Prioritized Approach to Pursue PCI DSS Co...</td>\n",
967
- " <td>Para obtener información sobre las nuevas exi...</td>\n",
968
- " </tr>\n",
969
- " <tr>\n",
970
- " <th>43</th>\n",
971
- " <td>orca-2-13b_tgi</td>\n",
972
- " <td>1.10</td>\n",
973
- " <td>more on penetration testing</td>\n",
974
- " <td>¿Podría proporcionar más información sobre la...</td>\n",
975
- " <td>[The Prioritized Approach to Pursue PCI DSS Co...</td>\n",
976
- " <td>Sí, puedo proporcionar más información sobre ...</td>\n",
977
- " </tr>\n",
978
- " <tr>\n",
979
- " <th>44</th>\n",
980
- " <td>orca-2-13b_tgi</td>\n",
981
- " <td>1.15</td>\n",
982
- " <td>What's PCI DSS?</td>\n",
983
- " <td></td>\n",
984
- " <td>[PCI Data Security Standard\\nPCI DSS provides ...</td>\n",
985
- " <td>PCI DSS is a set of requirements designed to ...</td>\n",
986
- " </tr>\n",
987
- " <tr>\n",
988
- " <th>45</th>\n",
989
- " <td>orca-2-13b_tgi</td>\n",
990
- " <td>1.15</td>\n",
991
- " <td>Can you summarize the changes made from PCI DS...</td>\n",
992
- " <td>¿Puedes resumir los cambios realizados desde ...</td>\n",
993
- " <td>[April 2015 PCI DSS 3.1, \\nRevision 1.0 Revi...</td>\n",
994
- " <td>Sí, puedo resumir los cambios realizados desd...</td>\n",
995
- " </tr>\n",
996
- " <tr>\n",
997
- " <th>46</th>\n",
998
- " <td>orca-2-13b_tgi</td>\n",
999
- " <td>1.15</td>\n",
1000
- " <td>new requirements for vulnerability assessments</td>\n",
1001
- " <td>¿Cuáles son las nuevas recomendaciones para l...</td>\n",
1002
- " <td>[The Prioritized Approach to Pursue PCI DSS Co...</td>\n",
1003
- " <td>Some possible helpful answers are:\\n\\n- Las n...</td>\n",
1004
- " </tr>\n",
1005
- " <tr>\n",
1006
- " <th>47</th>\n",
1007
- " <td>orca-2-13b_tgi</td>\n",
1008
- " <td>1.15</td>\n",
1009
- " <td>more on penetration testing</td>\n",
1010
- " <td>¿Cuál es el papel del prueba de penetración e...</td>\n",
1011
- " <td>[The Prioritized Approach to Pursue PCI DSS Co...</td>\n",
1012
- " <td>La prueba de penetración es una parte importa...</td>\n",
1013
- " </tr>\n",
1014
- " </tbody>\n",
1015
- "</table>\n",
1016
- "</div>"
1017
- ],
1018
- "text/plain": [
1019
- " model_name repetition_penalty \\\n",
1020
- "0 llama-2-7b 1.05 \n",
1021
- "1 llama-2-7b 1.05 \n",
1022
- "2 llama-2-7b 1.05 \n",
1023
- "3 llama-2-7b 1.05 \n",
1024
- "4 llama-2-7b 1.10 \n",
1025
- "5 llama-2-7b 1.10 \n",
1026
- "6 llama-2-7b 1.10 \n",
1027
- "7 llama-2-7b 1.10 \n",
1028
- "8 llama-2-7b 1.15 \n",
1029
- "9 llama-2-7b 1.15 \n",
1030
- "10 llama-2-7b 1.15 \n",
1031
- "11 llama-2-7b 1.15 \n",
1032
- "12 orca-2-7b 1.05 \n",
1033
- "13 orca-2-7b 1.05 \n",
1034
- "14 orca-2-7b 1.05 \n",
1035
- "15 orca-2-7b 1.05 \n",
1036
- "16 orca-2-7b 1.10 \n",
1037
- "17 orca-2-7b 1.10 \n",
1038
- "18 orca-2-7b 1.10 \n",
1039
- "19 orca-2-7b 1.10 \n",
1040
- "20 orca-2-7b 1.15 \n",
1041
- "21 orca-2-7b 1.15 \n",
1042
- "22 orca-2-7b 1.15 \n",
1043
- "23 orca-2-7b 1.15 \n",
1044
- "24 orca-2-7b_tgi 1.05 \n",
1045
- "25 orca-2-7b_tgi 1.05 \n",
1046
- "26 orca-2-7b_tgi 1.05 \n",
1047
- "27 orca-2-7b_tgi 1.05 \n",
1048
- "28 orca-2-7b_tgi 1.10 \n",
1049
- "29 orca-2-7b_tgi 1.10 \n",
1050
- "30 orca-2-7b_tgi 1.10 \n",
1051
- "31 orca-2-7b_tgi 1.10 \n",
1052
- "32 orca-2-7b_tgi 1.15 \n",
1053
- "33 orca-2-7b_tgi 1.15 \n",
1054
- "34 orca-2-7b_tgi 1.15 \n",
1055
- "35 orca-2-7b_tgi 1.15 \n",
1056
- "36 orca-2-13b_tgi 1.05 \n",
1057
- "37 orca-2-13b_tgi 1.05 \n",
1058
- "38 orca-2-13b_tgi 1.05 \n",
1059
- "39 orca-2-13b_tgi 1.05 \n",
1060
- "40 orca-2-13b_tgi 1.10 \n",
1061
- "41 orca-2-13b_tgi 1.10 \n",
1062
- "42 orca-2-13b_tgi 1.10 \n",
1063
- "43 orca-2-13b_tgi 1.10 \n",
1064
- "44 orca-2-13b_tgi 1.15 \n",
1065
- "45 orca-2-13b_tgi 1.15 \n",
1066
- "46 orca-2-13b_tgi 1.15 \n",
1067
- "47 orca-2-13b_tgi 1.15 \n",
1068
- "\n",
1069
- " user_question \\\n",
1070
- "0 What's PCI DSS? \n",
1071
- "1 Can you summarize the changes made from PCI DS... \n",
1072
- "2 new requirements for vulnerability assessments \n",
1073
- "3 more on penetration testing \n",
1074
- "4 What's PCI DSS? \n",
1075
- "5 Can you summarize the changes made from PCI DS... \n",
1076
- "6 new requirements for vulnerability assessments \n",
1077
- "7 more on penetration testing \n",
1078
- "8 What's PCI DSS? \n",
1079
- "9 Can you summarize the changes made from PCI DS... \n",
1080
- "10 new requirements for vulnerability assessments \n",
1081
- "11 more on penetration testing \n",
1082
- "12 What's PCI DSS? \n",
1083
- "13 Can you summarize the changes made from PCI DS... \n",
1084
- "14 new requirements for vulnerability assessments \n",
1085
- "15 more on penetration testing \n",
1086
- "16 What's PCI DSS? \n",
1087
- "17 Can you summarize the changes made from PCI DS... \n",
1088
- "18 new requirements for vulnerability assessments \n",
1089
- "19 more on penetration testing \n",
1090
- "20 What's PCI DSS? \n",
1091
- "21 Can you summarize the changes made from PCI DS... \n",
1092
- "22 new requirements for vulnerability assessments \n",
1093
- "23 more on penetration testing \n",
1094
- "24 What's PCI DSS? \n",
1095
- "25 Can you summarize the changes made from PCI DS... \n",
1096
- "26 new requirements for vulnerability assessments \n",
1097
- "27 more on penetration testing \n",
1098
- "28 What's PCI DSS? \n",
1099
- "29 Can you summarize the changes made from PCI DS... \n",
1100
- "30 new requirements for vulnerability assessments \n",
1101
- "31 more on penetration testing \n",
1102
- "32 What's PCI DSS? \n",
1103
- "33 Can you summarize the changes made from PCI DS... \n",
1104
- "34 new requirements for vulnerability assessments \n",
1105
- "35 more on penetration testing \n",
1106
- "36 What's PCI DSS? \n",
1107
- "37 Can you summarize the changes made from PCI DS... \n",
1108
- "38 new requirements for vulnerability assessments \n",
1109
- "39 more on penetration testing \n",
1110
- "40 What's PCI DSS? \n",
1111
- "41 Can you summarize the changes made from PCI DS... \n",
1112
- "42 new requirements for vulnerability assessments \n",
1113
- "43 more on penetration testing \n",
1114
- "44 What's PCI DSS? \n",
1115
- "45 Can you summarize the changes made from PCI DS... \n",
1116
- "46 new requirements for vulnerability assessments \n",
1117
- "47 more on penetration testing \n",
1118
- "\n",
1119
- " standalone_question \\\n",
1120
- "0 \n",
1121
- "1 What are the key changes made in PCI DSS versi... \n",
1122
- "2 What are the updated requirements for vulnerab... \n",
1123
- "3 What are the updated requirements for vulnerab... \n",
1124
- "4 \n",
1125
- "5 What are the key changes made in PCI DSS versi... \n",
1126
- "6 What are the new requirements for vulnerabilit... \n",
1127
- "7 What are the key differences between penetrati... \n",
1128
- "8 \n",
1129
- "9 What are the key changes between PCI DSS versi... \n",
1130
- "10 What are some of the new requirements for vuln... \n",
1131
- "11 What are some common techniques used in penetr... \n",
1132
- "12 \n",
1133
- "13 What are the main differences between PCI DSS ... \n",
1134
- "14 What are the new requirements for vulnerabilit... \n",
1135
- "15 What are the new requirements for penetration ... \n",
1136
- "16 \n",
1137
- "17 What are the main differences between PCI DSS ... \n",
1138
- "18 What are the new requirements for vulnerabilit... \n",
1139
- "19 What are some key differences between penetrat... \n",
1140
- "20 \n",
1141
- "21 How does PCI DSS version 4.0 differ from versi... \n",
1142
- "22 What are the new requirements for vulnerabilit... \n",
1143
- "23 What are some specific techniques used during ... \n",
1144
- "24 \n",
1145
- "25 What are the key differences between PCI DSS ... \n",
1146
- "26 What are the new requirements for vulnerabili... \n",
1147
- "27 What are the new requirements for penetration... \n",
1148
- "28 \n",
1149
- "29 What are the key differences between PCI DSS ... \n",
1150
- "30 What are the new requirements for vulnerabili... \n",
1151
- "31 What are some common methods used in penetrat... \n",
1152
- "32 \n",
1153
- "33 Summarize the differences between PCI DSS ver... \n",
1154
- "34 What are the new requirements for vulnerabili... \n",
1155
- "35 What are some best practices for conducting e... \n",
1156
- "36 \n",
1157
- "37 ¿Puedes resumir los cambios realizados desde ... \n",
1158
- "38 ¿Cuáles son las nuevas recomendaciones para l... \n",
1159
- "39 ¿Puedes dar más información sobre las pruebas... \n",
1160
- "40 \n",
1161
- "41 ¿Puedes resumir los cambios realizados desde ... \n",
1162
- "42 ¿Cuáles son las nuevas exigencias para las ev... \n",
1163
- "43 ¿Podría proporcionar más información sobre la... \n",
1164
- "44 \n",
1165
- "45 ¿Puedes resumir los cambios realizados desde ... \n",
1166
- "46 ¿Cuáles son las nuevas recomendaciones para l... \n",
1167
- "47 ¿Cuál es el papel del prueba de penetración e... \n",
1168
- "\n",
1169
- " contexts \\\n",
1170
- "0 [PCI Data Security Standard\\nPCI DSS provides ... \n",
1171
- "1 [PCI DSS v3.2.1 to v.4.0 Summary of Changes r... \n",
1172
- "2 [PCI DSS v3.2.1 to v.4.0 Summary of Changes r... \n",
1173
- "3 [PCI DSS v3.2.1 to v.4.0 Summary of Changes r... \n",
1174
- "4 [PCI Data Security Standard\\nPCI DSS provides ... \n",
1175
- "5 [PCI DSS v3.2.1 to v.4.0 Summary of Changes r... \n",
1176
- "6 [PCI DSS v3.2.1 to v.4.0 Summary of Changes r... \n",
1177
- "7 [PCI DSS v4.0 ROC Template r1 December 2022 ... \n",
1178
- "8 [PCI Data Security Standard\\nPCI DSS provides ... \n",
1179
- "9 [PCI DSS v3.2.1 to v.4.0 Summary of Changes r... \n",
1180
- "10 [PCI DSS v3.2.1 to v.4.0 Summary of Changes r... \n",
1181
- "11 [circumvent or defeat the security features of... \n",
1182
- "12 [PCI Data Security Standard\\nPCI DSS provides ... \n",
1183
- "13 [PCI DSS v3.2.1 to v.4.0 Summary of Changes r... \n",
1184
- "14 [PCI DSS v3.2.1 to v.4.0 Summary of Changes r... \n",
1185
- "15 [PCI DSS v4.0 ROC Template r1 December 2022 ... \n",
1186
- "16 [PCI Data Security Standard\\nPCI DSS provides ... \n",
1187
- "17 [PCI DSS v3.2.1 to v.4.0 Summary of Changes r... \n",
1188
- "18 [PCI DSS v3.2.1 to v.4.0 Summary of Changes r... \n",
1189
- "19 [PCI DSS v4.0 ROC Template r1 December 2022 ... \n",
1190
- "20 [PCI Data Security Standard\\nPCI DSS provides ... \n",
1191
- "21 [Payment Card Industry \\nData Security Standa... \n",
1192
- "22 [PCI DSS v3.2.1 to v.4.0 Summary of Changes r... \n",
1193
- "23 [circumvent or defeat the security features of... \n",
1194
- "24 [PCI Data Security Standard\\nPCI DSS provides ... \n",
1195
- "25 [PCI DSS v3.2.1 to v.4.0 Summary of Changes r... \n",
1196
- "26 [PCI DSS v3.2.1 to v.4.0 Summary of Changes r... \n",
1197
- "27 [PCI DSS v4.0 ROC Template r1 December 2022 ... \n",
1198
- "28 [PCI Data Security Standard\\nPCI DSS provides ... \n",
1199
- "29 [PCI DSS v3.2.1 to v.4.0 Summary of Changes r... \n",
1200
- "30 [PCI DSS v3.2.1 to v.4.0 Summary of Changes r... \n",
1201
- "31 [PCI DSS v4.0 ROC Template r1 December 2022 ... \n",
1202
- "32 [PCI Data Security Standard\\nPCI DSS provides ... \n",
1203
- "33 [PCI DSS v3.2.1 to v.4.0 Summary of Changes r... \n",
1204
- "34 [PCI DSS v3.2.1 to v.4.0 Summary of Changes r... \n",
1205
- "35 [methodology examined for this testing \\nproc... \n",
1206
- "36 [PCI Data Security Standard\\nPCI DSS provides ... \n",
1207
- "37 [April 2015 PCI DSS 3.1, \\nRevision 1.0 Revi... \n",
1208
- "38 [The Prioritized Approach to Pursue PCI DSS Co... \n",
1209
- "39 [methodology examined for this testing \\nproc... \n",
1210
- "40 [PCI Data Security Standard\\nPCI DSS provides ... \n",
1211
- "41 [April 2015 PCI DSS 3.1, \\nRevision 1.0 Revi... \n",
1212
- "42 [The Prioritized Approach to Pursue PCI DSS Co... \n",
1213
- "43 [The Prioritized Approach to Pursue PCI DSS Co... \n",
1214
- "44 [PCI Data Security Standard\\nPCI DSS provides ... \n",
1215
- "45 [April 2015 PCI DSS 3.1, \\nRevision 1.0 Revi... \n",
1216
- "46 [The Prioritized Approach to Pursue PCI DSS Co... \n",
1217
- "47 [The Prioritized Approach to Pursue PCI DSS Co... \n",
1218
- "\n",
1219
- " answer \n",
1220
- "0 PCI DSS stands for Payment Card Industry Data ... \n",
1221
- "1 The key changes made in PCI DSS version 4.0 c... \n",
1222
- "2 The updated requirements for vulnerability as... \n",
1223
- "3 The updated requirements for vulnerability as... \n",
1224
- "4 PCI DSS stands for Payment Card Industry Data ... \n",
1225
- "5 The key changes made in PCI DSS version 4.0 c... \n",
1226
- "6 According to the provided summary of changes,... \n",
1227
- "7 Penetration testing and vulnerability assessme... \n",
1228
- "8 PCI DSS stands for Payment Card Industry Data ... \n",
1229
- "9 The key changes between PCI DSS versions 3.2.1... \n",
1230
- "10 In PCI DSS version 4.0, there are several new ... \n",
1231
- "11 Penetration testing involves various technique... \n",
1232
- "12 PCI DSS stands for Payment Card Industry Data ... \n",
1233
- "13 The main differences between PCI DSS version 3... \n",
1234
- "14 The new requirements for vulnerability assessm... \n",
1235
- "15 The new requirements for penetration testing i... \n",
1236
- "16 PCI DSS stands for Payment Card Industry Data ... \n",
1237
- "17 The main differences between PCI DSS versions ... \n",
1238
- "18 There are several new requirements for vulnera... \n",
1239
- "19 Penetration testing and vulnerability assessme... \n",
1240
- "20 PCI DSS stands for Payment Card Industry Data ... \n",
1241
- "21 In terms of security standards, PCI DSS versio... \n",
1242
- "22 There are several new requirements related to ... \n",
1243
- "23 Some specific techniques used during penetrati... \n",
1244
- "24 PCI DSS stands for Payment Card Industry Data... \n",
1245
- "25 The key differences between PCI DSS version 3... \n",
1246
- "26 The new requirements for vulnerability assess... \n",
1247
- "27 In PCI DSS version 4.0, the new requirements ... \n",
1248
- "28 PCI DSS stands for Payment Card Industry Data... \n",
1249
- "29 The key differences between PCI DSS versions ... \n",
1250
- "30 There are several new requirements related to... \n",
1251
- "31 Some common methods used in penetration testi... \n",
1252
- "32 PCI DSS stands for Payment Card Industry Data... \n",
1253
- "33 The main difference between PCI DSS version 3... \n",
1254
- "34 There are no specific changes mentioned for v... \n",
1255
- "35 Some best practices for conducting effective ... \n",
1256
- "36 PCI DSS is a global standard that provides a ... \n",
1257
- "37 Sí, puedo resumir los cambios realizados desd... \n",
1258
- "38 Las nuevas recomendaciones para las evaluacion... \n",
1259
- "39 Sí, puedo dar más información sobre las prueb... \n",
1260
- "40 PCI DSS is a set of requirements designed to ... \n",
1261
- "41 Sí, puedo resumir los cambios realizados desd... \n",
1262
- "42 Para obtener información sobre las nuevas exi... \n",
1263
- "43 Sí, puedo proporcionar más información sobre ... \n",
1264
- "44 PCI DSS is a set of requirements designed to ... \n",
1265
- "45 Sí, puedo resumir los cambios realizados desd... \n",
1266
- "46 Some possible helpful answers are:\\n\\n- Las n... \n",
1267
- "47 La prueba de penetración es una parte importa... "
1268
- ]
1269
- },
1270
- "execution_count": 5,
1271
- "metadata": {},
1272
- "output_type": "execute_result"
1273
- }
1274
- ],
1275
- "source": [
1276
- "raw_pd"
1277
- ]
1278
- },
1279
- {
1280
- "cell_type": "code",
1281
- "execution_count": 6,
1282
- "metadata": {},
1283
- "outputs": [],
1284
- "source": [
1285
- "raw_pd.to_excel(\"./results/raw_data_nvidia_4080.xlsx\", index=False)\n",
1286
- "perf_pd.to_excel(\"./results/perf_data_nvidia_4080.xlsx\", index=False)"
1287
- ]
1288
- },
1289
- {
1290
- "cell_type": "code",
1291
- "execution_count": 8,
1292
- "metadata": {},
1293
- "outputs": [
1294
- {
1295
- "data": {
1296
- "text/plain": [
1297
- "('new requirements for vulnerability assessments',\n",
1298
- " 'What are the updated requirements for vulnerability assessments in PCI DSS version 4.0 compared to version 3.2.1?\\n\\n\\n\\n',\n",
1299
- " ' The updated requirements for vulnerability assessments in PCI DSS version 4.0 are as follows:\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n')"
1300
- ]
1301
- },
1302
- "execution_count": 8,
1303
- "metadata": {},
1304
- "output_type": "execute_result"
1305
- }
1306
- ],
1307
- "source": [
1308
- "raw_pd[\"user_question\"][2], raw_pd[\"standalone_question\"][2], raw_pd[\"answer\"][2]"
1309
- ]
1310
- },
1311
- {
1312
- "cell_type": "code",
1313
- "execution_count": 9,
1314
- "metadata": {},
1315
- "outputs": [
1316
- {
1317
- "data": {
1318
- "text/plain": [
1319
- "('new requirements for vulnerability assessments',\n",
1320
- " 'What are the new requirements for vulnerability assessments in PCI DSS version 4.0?\\n\\n\\n\\n',\n",
1321
- " 'The new requirements for vulnerability assessments in PCI DSS version 4.0 include:\\n\\n- Requirement 4.1.2, which states that there is a new requirement for roles and responsibilities related to vulnerability assessments.\\n- Requirement 4.2.1, which requires confirmation that certificates used for Point-to-Point (PAN) transmissions over open, public networks are valid and not expired or revoked. This bullet is a best practice until March 31, 2025.\\n- Requirement 4.2.1.1, which introduces a new requirement to maintain an inventory of trusted keys and certificates. This is also a best practice until March 31, 2025.\\n\\n\\n\\n')"
1322
- ]
1323
- },
1324
- "execution_count": 9,
1325
- "metadata": {},
1326
- "output_type": "execute_result"
1327
- }
1328
- ],
1329
- "source": [
1330
- "raw_pd[\"user_question\"][14], raw_pd[\"standalone_question\"][14], raw_pd[\"answer\"][14]"
1331
- ]
1332
- }
1333
- ],
1334
- "metadata": {
1335
- "kernelspec": {
1336
- "display_name": "Python 3 (ipykernel)",
1337
- "language": "python",
1338
- "name": "python3"
1339
- },
1340
- "language_info": {
1341
- "codemirror_mode": {
1342
- "name": "ipython",
1343
- "version": 3
1344
- },
1345
- "file_extension": ".py",
1346
- "mimetype": "text/x-python",
1347
- "name": "python",
1348
- "nbconvert_exporter": "python",
1349
- "pygments_lexer": "ipython3",
1350
- "version": "3.11.7"
1351
- }
1352
- },
1353
- "nbformat": 4,
1354
- "nbformat_minor": 4
1355
- }
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
results/{4_translate_spanish_content.ipynb → 3_translate_spanish_content.ipynb} RENAMED
File without changes
results/{5_generate-figures.ipynb → 4_generate-figures.ipynb} RENAMED
@@ -1007,7 +1007,7 @@
1007
  " filename = f\"./results/markdowns/question_{index + 1}.md\"\n",
1008
  " print(f\"filename: {filename}\")\n",
1009
  " with open(filename, \"w\") as f:\n",
1010
- " f.write(f\"### ({index + 1}) {questions[index]}\\n\")\n",
1011
  " f.write(conversations[index].to_markdown(index=False))\n",
1012
  "\n",
1013
  " with open(filename, \"rb\") as file_obj:\n",
@@ -1032,13 +1032,13 @@
1032
  "output_type": "stream",
1033
  "text": [
1034
  "filename: ./results/markdowns/question_1.md\n",
1035
- "36688dfd1334d0fcf6c75fab583c50d7\n",
1036
  "filename: ./results/markdowns/question_2.md\n",
1037
- "611f05e87eefe7acb35a54b8fd4a8152\n",
1038
  "filename: ./results/markdowns/question_3.md\n",
1039
- "51afd592a79610d4f5b8be1c5fef992c\n",
1040
  "filename: ./results/markdowns/question_4.md\n",
1041
- "460ffbcc09bc74a8efd43bbad22fe4b7\n"
1042
  ]
1043
  }
1044
  ],
 
1007
  " filename = f\"./results/markdowns/question_{index + 1}.md\"\n",
1008
  " print(f\"filename: {filename}\")\n",
1009
  " with open(filename, \"w\") as f:\n",
1010
+ " f.write(f\"### User Question ({index + 1}): {questions[index]}\\n\")\n",
1011
  " f.write(conversations[index].to_markdown(index=False))\n",
1012
  "\n",
1013
  " with open(filename, \"rb\") as file_obj:\n",
 
1032
  "output_type": "stream",
1033
  "text": [
1034
  "filename: ./results/markdowns/question_1.md\n",
1035
+ "5ada4e765d2b001fd037e1ef9ddbb685\n",
1036
  "filename: ./results/markdowns/question_2.md\n",
1037
+ "27d1d4fc4ef8c8d94552b85839a106cc\n",
1038
  "filename: ./results/markdowns/question_3.md\n",
1039
+ "3cf9447131e05abb4d5d3576bc5bc61b\n",
1040
  "filename: ./results/markdowns/question_4.md\n",
1041
+ "315d9b8017e4ec753dd7dbc492af2b88\n"
1042
  ]
1043
  }
1044
  ],
results/figures/inference_speed.eps CHANGED
@@ -2,7 +2,7 @@
2
  %%LanguageLevel: 3
3
  %%Title: inference_speed.eps
4
  %%Creator: Matplotlib v3.8.2, https://matplotlib.org/
5
- %%CreationDate: Thu Feb 1 11:54:14 2024
6
  %%Orientation: portrait
7
  %%BoundingBox: 0 0 360 144
8
  %%HiResBoundingBox: 0.000000 0.000000 360.000000 144.000000
 
2
  %%LanguageLevel: 3
3
  %%Title: inference_speed.eps
4
  %%Creator: Matplotlib v3.8.2, https://matplotlib.org/
5
+ %%CreationDate: Thu Feb 1 15:58:05 2024
6
  %%Orientation: portrait
7
  %%BoundingBox: 0 0 360 144
8
  %%HiResBoundingBox: 0.000000 0.000000 360.000000 144.000000
results/figures/perf_scores.eps CHANGED
@@ -2,7 +2,7 @@
2
  %%LanguageLevel: 3
3
  %%Title: perf_scores.eps
4
  %%Creator: Matplotlib v3.8.2, https://matplotlib.org/
5
- %%CreationDate: Thu Feb 1 11:54:14 2024
6
  %%Orientation: portrait
7
  %%BoundingBox: 0 0 360 432
8
  %%HiResBoundingBox: 0.000000 0.000000 360.000000 432.000000
 
2
  %%LanguageLevel: 3
3
  %%Title: perf_scores.eps
4
  %%Creator: Matplotlib v3.8.2, https://matplotlib.org/
5
+ %%CreationDate: Thu Feb 1 15:58:05 2024
6
  %%Orientation: portrait
7
  %%BoundingBox: 0 0 360 432
8
  %%HiResBoundingBox: 0.000000 0.000000 360.000000 432.000000
results/markdowns/question_1.md CHANGED
@@ -1,4 +1,4 @@
1
- ### (1) What's PCI DSS?
2
  | Model Name | LLM Generated Content |
3
  |:--------------|:----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
4
  | GPT-3.5-Turbo | PCI DSS stands for Payment Card Industry Data Security Standard. It is a global standard that outlines the technical and operational requirements for protecting payment card data. The standard provides guidelines and security controls to help organizations build and maintain a secure network, protect account data, maintain a vulnerability management program, and implement strong access control measures. Compliance with PCI DSS is required for any organization that handles payment card data. |
 
1
+ ### User Question (1): What's PCI DSS?
2
  | Model Name | LLM Generated Content |
3
  |:--------------|:----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
4
  | GPT-3.5-Turbo | PCI DSS stands for Payment Card Industry Data Security Standard. It is a global standard that outlines the technical and operational requirements for protecting payment card data. The standard provides guidelines and security controls to help organizations build and maintain a secure network, protect account data, maintain a vulnerability management program, and implement strong access control measures. Compliance with PCI DSS is required for any organization that handles payment card data. |
results/markdowns/question_2.md CHANGED
@@ -1,4 +1,4 @@
1
- ### (2) Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?
2
  | Model Name | LLM Generated Content |
3
  |:--------------|:----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
4
  | GPT-3.5-Turbo | **What are the differences between PCI DSS version 3.2.1 and version 4.0?** |
 
1
+ ### User Question (2): Can you summarize the changes made from PCI DSS version 3.2.1 to version 4.0?
2
  | Model Name | LLM Generated Content |
3
  |:--------------|:----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
4
  | GPT-3.5-Turbo | **What are the differences between PCI DSS version 3.2.1 and version 4.0?** |
results/markdowns/question_3.md CHANGED
@@ -1,4 +1,4 @@
1
- ### (3) new requirements for vulnerability assessments
2
  | Model Name | LLM Generated Content |
3
  |:--------------|:-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
4
  | GPT-3.5-Turbo | **What are the new requirements for vulnerability assessments in PCI DSS version 4.0?** |
 
1
+ ### User Question (3): new requirements for vulnerability assessments
2
  | Model Name | LLM Generated Content |
3
  |:--------------|:-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
4
  | GPT-3.5-Turbo | **What are the new requirements for vulnerability assessments in PCI DSS version 4.0?** |
results/markdowns/question_4.md CHANGED
@@ -1,4 +1,4 @@
1
- ### (4) more on penetration testing
2
  | Model Name | LLM Generated Content |
3
  |:--------------|:----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
4
  | GPT-3.5-Turbo | **Can you provide more information about the changes related to penetration testing in PCI DSS version 4.0?** |
 
1
+ ### User Question (4): more on penetration testing
2
  | Model Name | LLM Generated Content |
3
  |:--------------|:----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
4
  | GPT-3.5-Turbo | **Can you provide more information about the changes related to penetration testing in PCI DSS version 4.0?** |