Vectara

Categories

Blog - Application Development - Page 4

All posts

Security Guidance for All Authentication Methods

Security Guidance for All Authentication Methods

At Vectara, we recognize the importance of robust security in all of our authentication methods. While OAuth remains the gold standard in security with features like automated expiry and the JWT token flow, we understand it’s not always feasible for every user or scenario.

Nick Ma
Nick Ma
Introducing Vectara’s Custom Prompt Engine

Introducing Vectara’s Custom Prompt Engine

Vectara’s all-new Custom Prompt Engine allows customers to take their Retrieval Augmented Generation (RAG) system to the next level: by introducing completely custom prompts that can reference the most relevant text and metadata to solve your GenAI headaches.

Shane Connelly
Shane Connelly
Create-UI

Create-UI

Create-UI is the fastest way to generate a Vectara-powered sample codebase for a range of user interfaces

Deryk DeGuzmanCJ Cenizal
Deryk DeGuzman,CJ Cenizal
Before you go...

Connect with
our Community!