Commit
·
4cb33c4
1
Parent(s):
3cf35a2
Update README.md
Browse files
README.md
CHANGED
@@ -54,7 +54,7 @@ When leveraging the phi-1 model, it's paramount to be vigilant. The model, thoug
|
|
54 |
Given these potential pitfalls, and others not explicitly mentioned, it's essential to thoroughly review, test, and verify the generated code before deploying it in any application, especially those that are security-sensitive. Always consult with security experts or perform rigorous penetration testing when in doubt.
|
55 |
|
56 |
## Training
|
57 |
-
### Model
|
58 |
* Architecture: a Transformer-based model with next-word prediction objective
|
59 |
* Training tokens: 54B tokens (7B unique tokens)
|
60 |
* Precision: fp16
|
|
|
54 |
Given these potential pitfalls, and others not explicitly mentioned, it's essential to thoroughly review, test, and verify the generated code before deploying it in any application, especially those that are security-sensitive. Always consult with security experts or perform rigorous penetration testing when in doubt.
|
55 |
|
56 |
## Training
|
57 |
+
### Model
|
58 |
* Architecture: a Transformer-based model with next-word prediction objective
|
59 |
* Training tokens: 54B tokens (7B unique tokens)
|
60 |
* Precision: fp16
|