To align everyone, we present a basic glossary of what we will take into consideration when explaining during the guide:
Large Language Model (LLM): A Large Language Model (LLM) is an advanced AI tool that streamlines your text-based tasks. Leveraging machine learning algorithms, it's adept at understanding and generating text that's remarkably human-like. It is a formidable asset for your business, from answering queries to writing comprehensive reports, translating languages, or even generating creative content.
Consider the LLM as your high-performing textual processor. It takes in information, processes it, and delivers meaningful and relevant output. What's more, these models are flexible to your needs. For tasks that do not demand high-level privacy, such as drafting a blog post, a public model like GPT-4 excels with its speed and power. However, a privately hosted LLM ensures optimal data privacy and security when handling sensitive information—such as summarizing a patient's medical history.
Company knowledge: We call “company knowledge” all the accumulated data from every corner of the organization. The data can include documents, emails, databases, and other unstructured and structured information types. The GPT aims to learn from this data and generate useful, accurate responses or insights.
Servers: This refers to the physical or virtual infrastructure hosted by the private GPT model. Choosing between on-premises and cloud servers can have significant implications for cost, performance, and data privacy.
Privacy: Refers to the practices and technologies used to ensure that sensitive data is not exposed or accessed without authorization. In the context of a private GPT, privacy considerations include how the model is trained and how queries to the model are handled.
Security: This involves protecting the private GPT and its underlying systems from threats, including unauthorized access, data breaches, and other forms of cyberattacks. Security considerations for a private GPT include data encryption, user authentication, access control, and regular security audits.