suriyagunasekar commited on
Commit
4cb33c4
1 Parent(s): 3cf35a2

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +1 -1
README.md CHANGED
@@ -54,7 +54,7 @@ When leveraging the phi-1 model, it's paramount to be vigilant. The model, thoug
54
  Given these potential pitfalls, and others not explicitly mentioned, it's essential to thoroughly review, test, and verify the generated code before deploying it in any application, especially those that are security-sensitive. Always consult with security experts or perform rigorous penetration testing when in doubt.
55
 
56
  ## Training
57
- ### Model (phi-1)
58
  * Architecture: a Transformer-based model with next-word prediction objective
59
  * Training tokens: 54B tokens (7B unique tokens)
60
  * Precision: fp16
 
54
  Given these potential pitfalls, and others not explicitly mentioned, it's essential to thoroughly review, test, and verify the generated code before deploying it in any application, especially those that are security-sensitive. Always consult with security experts or perform rigorous penetration testing when in doubt.
55
 
56
  ## Training
57
+ ### Model
58
  * Architecture: a Transformer-based model with next-word prediction objective
59
  * Training tokens: 54B tokens (7B unique tokens)
60
  * Precision: fp16