www.analyticsvidhya.com
Open in
urlscan Pro
2606:4700:20::681a:613
Public Scan
Submitted URL: https://analyticsvidhya.com/blog/2022/09/guide-to-phantom-a-web3-wallet
Effective URL: https://www.analyticsvidhya.com/blog/2022/09/guide-to-phantom-a-web3-wallet/
Submission: On December 20 via api from US — Scanned from DK
Effective URL: https://www.analyticsvidhya.com/blog/2022/09/guide-to-phantom-a-web3-wallet/
Submission: On December 20 via api from US — Scanned from DK
Form analysis
2 forms found in the DOMPOST https://www.analyticsvidhya.com/wp-comments-post.php
<form action="https://www.analyticsvidhya.com/wp-comments-post.php" method="post" id="commentform" class="comment-form" novalidate="novalidate"><textarea id="comment" name="comment" class="form-control border-0 bg-transparent mb-3"
placeholder="What are your thoughts?..."></textarea><input class="author-name" name="author" type="hidden">
<input class="author-email" name="email" type="hidden">
<p class="form-submit"><span class="btn btn-light border-0 bg-transparent me-3 text-light-primary clear-text-btn d-none">Clear</span><button type="submit" class="btn btn-light text-dark-tertiary">Submit reply</button> <input type="hidden"
name="comment_post_ID" value="97087" id="comment_post_ID">
<input type="hidden" name="comment_parent" id="comment_parent" value="0">
</p>
<p style="display: none;"><input type="hidden" id="akismet_comment_nonce" name="akismet_comment_nonce" value="923a68e42a"></p>
<p style="display: none !important;" class="akismet-fields-container" data-prefix="ak_"><label>Δ<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_1" name="ak_js"
value="1734704056518">
<script>
document.getElementById("ak_js_1").setAttribute("value", (new Date()).getTime());
</script>
</p>
</form>
<form class="w-100" role="Phone" id="new-gen-ai-form">
<div class="row align-items-baseline">
<div class="col-12 col-xl mb-3 mb-xl-0">
<input class="form-control px-4 py-2 ps-5" type="tel" placeholder="Your Phone Number" aria-label="Phone No." min="{0}" id="genaiNumber" autocomplete="off">
</div>
<div class="col-12 col-xl mb-3 mb-xl-0">
<input class="form-control px-4 py-2" type="email" placeholder="Your Email Id" id="genaiEmail" autocomplete="off">
</div>
</div>
<div class="text-start mt-3">
<div class="form-check form-check-inline mb-3">
<input class="form-check-input opacity-100" type="checkbox" id="inlineCheckbox1" value="option1" checked="" disabled="">
<label class="form-check-label text-dark-tertiary opacity-100 fs-14" htmlfor="inlineCheckbox1">I Agree to the <a href="/terms" target="_blank" class="text-dark-tertiary textdecoration-underline">Terms & Conditions</a></label>
</div>
<div class="form-check form-check-inline">
<input class="form-check-input opacity-100" type="checkbox" id="inlineCheckbox2" value="option2" checked="">
<label class="form-check-label text-dark-tertiary opacity-100 fs-14" htmlfor="inlineCheckbox2">Send WhatsApp Updates</label>
</div>
</div>
<button class="btn btn-dark btn-dark-primary w-100 mt-4 mb-2" type="submit" onclick="saveLeadForm()">Enroll Now</button>
</form>
Text Content
Master Generative AI: Your step-by-step guide to become a certified GenAI expert Download Roadmap * Free Courses * Learning Paths * GenAI Pinnacle Program * Agentic AI Pioneer Program New * * * Login * Switch Mode * Logout Interview Prep Career GenAI Prompt Engg ChatGPT LLM Langchain RAG AI Agents Machine Learning Deep Learning GenAI Tools LLMOps Python NLP SQL AIML Projects READING LIST INTRODUCTION What is Data Visualization? Data Visualization Techniques EDA using Data Visualization Data Visualization for One Dimentional and Multi Dimentional Data TOOLS Data Visualization in Tableau Data Visualization in Power BI Data Visualization in Excel Data Visualization in SAS Data Visualization in Julia Data Visualization in Python Data Visualization in R LIBRARIES Data Visualization using Matplotlib Data Visualization using Seaborn Data Visualization using Bokeh Data Visualization using Shiny App Data Visualization using Plotly Data Visualization using Folium Data Visualization using Geopandas Data Visualization using Altair PLOTS Geo-Spatial Plot Donut Plot Lollipop Charts Cyberpunk Bar plot Choosing Right Plot in Data Visualization USE CASES Dashboards 1. Home 2. Advanced 3. Guide to Phantom- A Web3 Wallet GUIDE TO PHANTOM- A WEB3 WALLET Myron Last Updated : 21 Mar, 2024 11 min read 1 INTRODUCTION Most hodlers (crypto asset holders) store their coins or tokens on a centralized exchange. Our keys are held by this exchange, so if they decide to halt or suspend withdrawals, our assets will be stuck. It’s essential to consider adding token in Phantom wallet for decentralized control. This is where decentralization comes into play, which puts power into the hands of the people. Users may store their assets on the blockchain via a Web3 wallet. By storing assets on the blockchain, our assets are safe, we can take advantage of DeFi (Decentralized Finance), and most importantly, we users have complete control over our assets, including the ability to add token in Phantom wallet. In this guide, we’ll explore how to use Phantom, a Web3 wallet for storing assets and interacting with decentralized applications on the Solana blockchain. Additionally, we’ll cover how to add a token in Phantom wallet. This article was published as a part of the Data Science Blogathon. Source: https://coinmarketcap.com/currencies/solana/ TABLE OF CONTENTS 1. What is a Web3 wallet? 2. How to Add Token in Phantom Wallet? 3. Create or Import an account 4. Public and Private Keys 5. Send or Receive Assets 6. Swap Assets 7. Transaction History 8. Import Tokens 9. Add, Rename, and Switching Accounts 10. Accessing a Decentralized Application (Dapp) 11. Settings 12. Bonus Tip! WHAT IS A WEB3 WALLET? A web3 wallet is software that allows us to store, send, receive, swap, and manage digital assets (such as coins, tokens, and NFTs) on the blockchain. Furthermore, a Web3 wallet enables us to interact with decentralized applications (dapps). By using a web3 wallet, we store our crypto assets on-chain. These assets are stored in an extremely secure and decentralized way, and we users have complete control over our assets. The Phantom Web3 wallet is accessible as both a web wallet and a mobile application for Android and iOS. This guide will teach you how to utilize the Phantom Web3 web extension wallet, including how to add token in Phantom wallet for managing your cryptocurrency assets efficiently. Source: https://play.google.com/store/apps/details?id=app.phantom&hl=en_US&gl=US HOW TO ADD TOKEN IN PHANTOM WALLET? The Phantom Web3 wallet extension can be downloaded by visiting add token to Phantom Wallet’s official site. You can do so by clicking here. To add the phantom wallet extension to your browser, follow the steps below: 1. On the Phantom website homepage, click on the Download button. 2. Select the browser on which you want to download the Phantom wallet. 3. Click on the Add to Chrome button on the chrome extensions page. 4. On the popup window, click on Add extension. Once installed, you may pin the wallet to your browser’s extension tab. The next step is to create a new account or import an existing account. CREATE OR IMPORT AN ACCOUNT Creating a new account To access a Web3 wallet, you are required to create a wallet account. You can create an account by following the steps below: 1. Click on Create a new wallet. 2. Enter and confirm a secure password for your wallet. 3. Tick the checkbox to agree to terms and conditions. 4. Click on the Continue button. 5. Hover over your Secret Recovery Phase and note this phrase (Very Important Step). Tick the box after you have saved your recovery phrase. 6. Click on the Continue button. 7. Click on the Continue button. 8. Click on the Finish button. Importing an existing account If you already have a phantom account, you may follow the steps below to import an existing account: 1. Click on I already have a wallet. 2. Enter your Secret recovery phrase. 3. Click on Import Wallet. 4. Enter and confirm a secure password for your wallet. 5. Tick the checkbox to agree to terms and conditions. 6. Click on the Continue button. 7. Select the wallets you want to import. 8. Click on Import Selected Accounts. 9. Follow steps (7) and (8) from the above process. PUBLIC AND PRIVATE KEYS Public and Private keys are the most essential concepts which allow a user to send and receive assets on the blockchain. Both the keys together, encrypted with a cryptographic algorithm, keep your crypto assets secure. Public Key A public key enables you to receive assets. A sender must know your public address for you to receive crypto assets or NFTs. You can access your public key by following the steps below: 1. Enter your password if prompted to unlock your wallet. 2. Click on the Unlock button. 3. On the wallet homepage, click on the wallet name on the top. Your public address has been copied to your clipboard, and you can now share it. Private Key: As its name suggests, a private key must be kept private, i.e., secure. These keys are used to send digital assets. NEVER DISCLOSE YOUR PRIVATE KEY TO ANYONE. Store this key (address) in a safe place at all times. Anyone who gains access to your private key has access to your assets. Hence the phrase – “Not your keys, Not your crypto.” You can access your private key by following the steps below: 1. Click on the wallet icon on the top left-hand side of the wallet homepage. 2. Click on the wallet name (Highlighted Area). 3. Click on the three dots near your account name. 4. Select Export Private Key. 5. Enter your wallet password. 6. Click on Next. Your private key is now visible. Note down this key and keep it safe at all times. SEND OR RECEIVE ASSETS A Web3 wallet’s main function is to store crypto assets in a secure and decentralized manner. Hence, crypto assets, when sent to your wallet, are stored in the wallet. You can receive and send crypto assets via your wallet by using your wallet’s public and private keys, respectively. Send Assets: To send digital assets such as cryptocurrency or NFTs, your wallet’s private key is utilized. You may follow the steps below to send crypto assets: 1. Click on the Send button on the wallet homepage. 2. Select or Search for the coin or token you want to send. 3. Enter the recipient’s wallet address (public key) and the number of coins or tokens you want to send. 4. Click on the Next button. 5. Confirm your transaction and click Send. Bonus Tip! – Always double-check the address to where you are sending your digital assets. Blockchain transactions are immutable, meaning they cannot be changed. Hence, If one letter also is incorrect in the address, you will lose your assets forever. Receive Assets: To receive digital assets such as cryptocurrency or NFTs, your wallet’s public key is utilized. You may follow the steps below to receive crypto assets: 1. Click on the Deposit button on the wallet homepage. 2. Select or search for the coin or token which you want to receive. 3. Copy the wallet address or ask the sender to scan the QR code. The tokens will be available in your wallet when the sender sends them and once the transaction is validated. SWAP ASSETS Swapping is the process of exchanging one crypto asset for another. Swapping allows users to trade their crypto assets in a decentralized manner. Initially, users could swap their assets by connecting their wallet to a Decentralized Exchange (DEX). But one of the cool features of Phantom is that you can directly swap your assets within your wallet. For example, a user may Swap their SOL coins for USDC. You may follow the steps below to swap your assets: 1. Select the Swap icon on the wallet homepage. 2. Select the coins or tokens you want to swap. 3. Enter the number of tokens or coins to be swapped. 4. Click on the Confirm button. TRANSACTION HISTORY A blockchain is a public ledger meaning all the transactions performed on a blockchain by you are recorded. You can access your past transaction history via your crypto wallet in the following manner: 1. Select the Transaction (lighting) icon on the wallet homepage. You may now view all of your past transactions. IMPORT TOKENS You will only notice the SOL coin when you set up your Phantom wallet. However, after a token is sent to your wallet, it may or may not be displayed in your wallet. As a result, we must manually add the token. You may do so by following the steps below: 1. Click on the Manage token list on the wallet homepage. 2. Click on the + icon. 3. Enter the token’s mint address, token name, and token symbol. 4. Click on Add. 5. Click on Continue. 6. You may copy the wallet address or ask the sender to scan the QR code. Once imported, you will see the respective token in your wallet. Token Details: It may be wondering, in step 3, where can we get the token’s details? with that you can search for the token on Solana’s blockchain explorer. You may visit Solana’s blockchain explorer by clicking here. You can get the details of the token by following the steps below: 1. On the explorer’s homepage, navigate to the search bar and enter the token you are searching for. 2. Select the respective token. 3. The token data will be shown on the token page. 4. Furthermore, you may get the token details by clicking on the Metadata section. 5. All the tokens details are displayed here. ADD, RENAME, AND SWITCHING ACCOUNTS A crypto wallet can have multiple accounts, each with its public and private key. You can create several accounts for different purposes, like managing your NFTs, crypto assets, or even a burner wallet. Additionally, you may want to learn how to add a token to your Phantom wallet to manage various assets efficiently. Adding Accounts: You can add multiple accounts by following the steps below: 1. Click on the wallet icon on the top left-hand side of the wallet homepage. 2. Click on the Wallet name (highlighted area). 3. Click on the Add/Connect wallet button. 4. Select Create a new Wallet. 5. A new wallet has now been created. Bonus Tip! – Remember to store your new account’s private and public keys. The private key is more important. Renaming Account: You can rename the accounts you have created by following the steps below: 1. Click on the wallet icon on the top left-hand side of the wallet homepage. 2. Click on the Wallet name (highlighted area). 3. Click on the three dots near the wallet name. 4. Click on Wallet Name. 5. Enter your new wallet name. 6. Click on Save. 7. You will notice your wallet name is now changed on your wallet homepage. Switching Accounts: You can switch between your accounts by following the steps below: 1. Click on the wallet icon on the top left-hand side of the wallet homepage. 2. Click on the Wallet name (highlighted area). 3. Select the wallet you want to switch to. 4. Your wallet homepage will notice that your wallet accounts have been switched. ACCESSING A DECENTRALIZED APPLICATION (DAPP) Decentralized applications (Dapps) are protocols or applications built on a blockchain, offering various services like exchanges, yield farming, and borrowing. These Dapps are decentralized, meaning they operate without a central authority. For example, you can add tokens to a Phantom wallet for Dapp transactions. A dapp is similar to applications on your smartphone. For example, you may download apps from the app store for IOS and the play store for android. Some applications on the app store are unavailable on the play store and vice versa. Similarly, blockchains operate on the same principle. Some dapps are not available on another blockchain. This guide will see how to connect to Raydium, the most popular decentralized application in the Solana ecosystem. Source: https://raydium.medium.com/the-raydium-protocol-9809464e0105 You may visit Raydium by clicking here. You can connect to the dapp by following the steps below: 1. Select the Connect Wallet button on the top right-hand side of the dapps homepage. 2. Select Phantom Wallet. 3. Click on Connect button on your wallet. 4. The wallet is now connected to the dapp. Your wallet is now connected to the decentralized application. With the application, you can now interact – swap, farm, stake. SETTINGS The settings section of your wallet enables you to modify and view the basic features of the wallet. Address Book In this section, you may save the addresses of the wallets you frequently send your crypto assets to. You can do so by following the steps below: 1. Click on the wallet icon on the top left-hand side of the wallet homepage. 2. Click on the Address Book. 3. Click on Add Address. 4. Enter the label and the public address. 5. Click on the Add button. You can now easily send coins and tokens to your saved addresses. Security and Privacy In this section, you may alter some of your wallet’s security and privacy features. To do so, follow the steps below: 1. Click on the wallet icon on the top left-hand side of the wallet homepage. 2. Click on Security and Privacy. 3. You may change your password or reset your secret recovery phrase. BONUS TIP! This section is very, very important. I want you’ll to go through this section twice, maybe thrice, and please follow it. So, whenever you connect your wallet to any decentralized application, sometimes we as users do not read the permissions before connecting our wallet to the dapp. Due to this, we blindly click on the connect button and connect our dapp to the site. Sometimes, by accepting permissions from unknown sites, you may have given access to the dapp to withdraw your funds. So once permission is granted, the owner of the dapp or smart contract may withdraw your funds to another account. To prevent this, we must always revoke access to sites we have connected our wallets to. You may do this by following the steps below: 1. Click on the wallet icon on the top left-hand side of the wallet homepage. 2. Click on the Trusted Apps. 3. You will find a list of all the applications you have connected your wallet to. Click on the revoke button (red). Please ensure that you follow these steps as a risk protection method. I lost over $300 (Rs 25000) because I did not revoke access to the protocol I had connected to. CONCLUSION You now understand how to access decentralized applications on the Solana ecosystem. Remember, decentralized apps carry risks like smart contract exploits and software bugs. Before connecting your wallet to any application, consider the risks of DeFi. If you want to add a token to your Phantom wallet, follow the steps for wallet safety and research thoroughly. If you have enjoyed this guide, please let me know in the comments and consider following. Thank you for your time. Key Takeaways * A Web3 wallet enables you to have full control over your crypto assets and store these assets in a secure and decentralized manner. * Phantom is the most popular crypto wallet in the Solana ecosystem. * Connect your wallet to only trusted sites. * Never disclose your private keys to anyone. * The seed phrase must be kept safe always. * Go through the Bonus Tip section thoroughly. TRUST ME. The media shown in this article is not owned by Analytics Vidhya and is used at the Author’s discretion. Myron A crypto research analyst, algorithmic trader who is passionate about cryptocurrency, finance, investing and data analytics. In this blog, I will be mainly focusing on how to use python programming language to derive meaningful insights from datasets in order educate and develop various investing strategies for assets. In addition, I will be uploading "how to" guides on various decentralized applications running on a number of blockchains and "Top 5" guides. Furthermore, research articles on blockchain projects will be a part of the content. AdvancedCloud ComputingWeb 3.0 FREE COURSES 4.7 GENERATIVE AI - A WAY OF LIFE Explore Generative AI for beginners: create text and images, use top AI tools, learn practical skills, and ethics. 4.5 GETTING STARTED WITH LARGE LANGUAGE MODELS Master Large Language Models (LLMs) with this course, offering clear guidance in NLP and model training made simple. 4.6 BUILDING LLM APPLICATIONS USING PROMPT ENGINEERING This free course guides you on building LLM apps, mastering prompt engineering, and developing chatbots with enterprise data. 4.8 IMPROVING REAL WORLD RAG SYSTEMS: KEY CHALLENGES & PRACTICAL SOLUTIONS Explore practical solutions, advanced retrieval strategies, and agentic RAG systems to improve context, relevance, and accuracy in AI-driven applications. 4.7 MICROSOFT EXCEL: FORMULAS & FUNCTIONS Master MS Excel for data analysis with key formulas, functions, and LookUp tools in this comprehensive course. RECOMMENDED ARTICLES * Build a Travel Assistant Chatbot with HuggingFa... * What is LangChain? * Guide to MetaMask Mobile Application * Learn to Use Nami Wallet * Complete Guide to a Decentralized Exchange R... * Guide to a Decentralized Application – Qu... * Everything You Need to Know about Liquid Stakin... * Dapp Deployment Using Quick Node RPC * End to End Guide to SushiSwap- A Decentralized ... * End-to-end Guide Using Trader Joe: A Decentrali... RESPONSES FROM READERS Cancel reply ClearSubmit reply Δ WRITE FOR US Write, captivate, and earn accolades and rewards for your work * Reach a Global Audience * Get Expert Feedback * Build Your Brand & Audience * Cash In on Your Knowledge * Join a Thriving Community * Level Up Your Data Science Game We use cookies essential for this site to function well. Please click to help us improve its usefulness with additional cookies. Learn about our use of cookies in our Privacy Policy & Cookies Policy. Show details Accept all cookies Use necessary cookies POWERED BY * Consent * Details * About COOKIES This site uses cookies to ensure that you get the best experience possible. To learn more about how we use cookies, please refer to our Privacy Policy & Cookies Policy. NECESSARY (2) NECESSARY COOKIES HELP MAKE A WEBSITE USABLE BY ENABLING BASIC FUNCTIONS LIKE PAGE NAVIGATION AND ACCESS TO SECURE AREAS OF THE WEBSITE. THE WEBSITE CANNOT FUNCTION PROPERLY WITHOUT THESE COOKIES. ANALYTICS VIDHYA (4) LEARN MORE ABOUT ANALYTICS VIDHYA PRIVACY BRAHMAID It is needed for personalizing the website. Expiry: Session Type: HTTP CSRFTOKEN This cookie is used to prevent Cross-site request forgery (often abbreviated as CSRF) attacks of the website Expiry: Session Type: HTTPS IDENTITYID Preserves the login/logout state of users across the whole site. Expiry: Session Type: HTTPS SESSIONID Preserves users' states across page requests. Expiry: Session Type: HTTPS GOOGLE (1) LEARN MORE ABOUT GOOGLE PRIVACY G_STATE Google One-Tap login adds this g_state cookie to set the user status on how they interact with the One-Tap modal. Expiry: 365 days Type: HTTP STATISTICS (4) STATISTIC COOKIES HELP WEBSITE OWNERS TO UNDERSTAND HOW VISITORS INTERACT WITH WEBSITES BY COLLECTING AND REPORTING INFORMATION ANONYMOUSLY. MICROSOFT (7) LEARN MORE ABOUT MICROSOFT POLICY MUID Used by Microsoft Clarity, to store and track visits across websites. Expiry: 1 Year Type: HTTP _CLCK Used by Microsoft Clarity, Persists the Clarity User ID and preferences, unique to that site, on the browser. This ensures that behavior in subsequent visits to the same site will be attributed to the same user ID. Expiry: 1 Year Type: HTTP _CLSK Used by Microsoft Clarity, Connects multiple page views by a user into a single Clarity session recording. Expiry: 1 Day Type: HTTP SRM_I Collects user data is specifically adapted to the user or device. The user can also be followed outside of the loaded website, creating a picture of the visitor's behavior. Expiry: 2 Years Type: HTTP SM Use to measure the use of the website for internal analytics Expiry: 1 Years Type: HTTP CLID The cookie is set by embedded Microsoft Clarity scripts. The purpose of this cookie is for heatmap and session recording. Expiry: 1 Year Type: HTTP SRM_B Collected user data is specifically adapted to the user or device. The user can also be followed outside of the loaded website, creating a picture of the visitor's behavior. Expiry: 2 Months Type: HTTP GOOGLE (7) LEARN MORE ABOUT GOOGLE PRIVACY _GID This cookie is installed by Google Analytics. The cookie is used to store information of how visitors use a website and helps in creating an analytics report of how the website is doing. The data collected includes the number of visitors, the source where they have come from, and the pages visited in an anonymous form. Expiry: 399 Days Type: HTTP _GA_# Used by Google Analytics, to store and count pageviews. Expiry: 399 Days Type: HTTP _GAT_# Used by Google Analytics to collect data on the number of times a user has visited the website as well as dates for the first and most recent visit. Expiry: 1 Day Type: HTTP COLLECT Used to send data to Google Analytics about the visitor's device and behavior. Tracks the visitor across devices and marketing channels. Expiry: Session Type: PIXEL AEC cookies ensure that requests within a browsing session are made by the user, and not by other sites. Expiry: 6 Months Type: HTTP G_ENABLED_IDPS use the cookie when customers want to make a referral from their gmail contacts; it helps auth the gmail account. Expiry: 2 Years Type: HTTP TEST_COOKIE This cookie is set by DoubleClick (which is owned by Google) to determine if the website visitor's browser supports cookies. Expiry: 1 Year Type: HTTP WEBENGAGE (2) LEARN MORE ABOUT WEBENGAGE PRIVACY _WE_US this is used to send push notification using webengage. Expiry: 1 Year Type: HTTP WEBKLIPPERAUTH used by webenage to track auth of webenagage. Expiry: Session Type: HTTP LINKEDIN (16) LEARN MORE ABOUT LINKEDIN PRIVACY LN_OR Linkedin sets this cookie to registers statistical data on users' behavior on the website for internal analytics. Expiry: 1 Day Type: HTTP JSESSIONID Use to maintain an anonymous user session by the server. Expiry: 1 Year Type: HTTP LI_RM Used as part of the LinkedIn Remember Me feature and is set when a user clicks Remember Me on the device to make it easier for him or her to sign in to that device. Expiry: 1 Year Type: HTTP ANALYTICSSYNCHISTORY Used to store information about the time a sync with the lms_analytics cookie took place for users in the Designated Countries. Expiry: 6 Months Type: HTTP LMS_ANALYTICS Used to store information about the time a sync with the AnalyticsSyncHistory cookie took place for users in the Designated Countries. Expiry: 6 Months Type: HTTP LIAP Cookie used for Sign-in with Linkedin and/or to allow for the Linkedin follow feature. Expiry: 6 Months Type: HTTP VISIT allow for the Linkedin follow feature. Expiry: 1 Year Type: HTTP LI_AT often used to identify you, including your name, interests, and previous activity. Expiry: 2 Months Type: HTTP S_PLT Tracks the time that the previous page took to load Expiry: Session Type: HTTP LANG Used to remember a user's language setting to ensure LinkedIn.com displays in the language selected by the user in their settings Expiry: Session Type: HTTP S_TP Tracks percent of page viewed Expiry: Session Type: HTTP AMCV_14215E3D5995C57C0A495C55%40ADOBEORG Indicates the start of a session for Adobe Experience Cloud Expiry: Session Type: HTTP S_PLTP Provides page name value (URL) for use by Adobe Analytics Expiry: Session Type: HTTP S_TSLV Used to retain and fetch time since last visit in Adobe Analytics Expiry: 6 Months Type: HTTP LI_THEME Remembers a user's display preference/theme setting Expiry: 6 Months Type: HTTP LI_THEME_SET Remembers which users have updated their display / theme preferences Expiry: 6 Months Type: HTTP PREFERENCES (0) PREFERENCE COOKIES ENABLE A WEBSITE TO REMEMBER INFORMATION THAT CHANGES THE WAY THE WEBSITE BEHAVES OR LOOKS, LIKE YOUR PREFERRED LANGUAGE OR THE REGION THAT YOU ARE IN. We do not use cookies of this type. MARKETING (4) MARKETING COOKIES ARE USED TO TRACK VISITORS ACROSS WEBSITES. THE INTENTION IS TO DISPLAY ADS THAT ARE RELEVANT AND ENGAGING FOR THE INDIVIDUAL USER AND THEREBY MORE VALUABLE FOR PUBLISHERS AND THIRD PARTY ADVERTISERS. GOOGLE (11) LEARN MORE ABOUT GOOGLE PRIVACY _GCL_AU Used by Google Adsense, to store and track conversions. Expiry: 3 Months Type: HTTP SID Save certain preferences, for example the number of search results per page or activation of the SafeSearch Filter. Adjusts the ads that appear in Google Search. Expiry: 2 Years Type: HTTP SAPISID Save certain preferences, for example the number of search results per page or activation of the SafeSearch Filter. Adjusts the ads that appear in Google Search. Expiry: 2 Years Type: HTTP __SECURE-# Save certain preferences, for example the number of search results per page or activation of the SafeSearch Filter. Adjusts the ads that appear in Google Search. Expiry: 2 Years Type: HTTP APISID Save certain preferences, for example the number of search results per page or activation of the SafeSearch Filter. Adjusts the ads that appear in Google Search. Expiry: 2 Years Type: HTTP SSID Save certain preferences, for example the number of search results per page or activation of the SafeSearch Filter. Adjusts the ads that appear in Google Search. Expiry: 2 Years Type: HTTP HSID Save certain preferences, for example the number of search results per page or activation of the SafeSearch Filter. Adjusts the ads that appear in Google Search. Expiry: 2 Years Type: HTTP DV These cookies are used for the purpose of targeted advertising. Expiry: 6 Hours Type: HTTP NID These cookies are used for the purpose of targeted advertising. Expiry: 1 Month Type: HTTP 1P_JAR These cookies are used to gather website statistics, and track conversion rates. Expiry: 1 Month Type: HTTP OTZ Aggregate analysis of website visitors Expiry: 6 Months Type: HTTP FACEBOOK (2) LEARN MORE ABOUT FACEBOOK PRIVACY _FBP This cookie is set by Facebook to deliver advertisements when they are on Facebook or a digital platform powered by Facebook advertising after visiting this website. Expiry: 4 Months Type: HTTP FR Contains a unique browser and user ID, used for targeted advertising. Expiry: 2 Months Type: HTTP LINKEDIN (6) LEARN ABOUT LINKEDIN POLICY BSCOOKIE Used by LinkedIn to track the use of embedded services. Expiry: 1 Year Type: HTTP LIDC Used by LinkedIn for tracking the use of embedded services. Expiry: 1 Day Type: HTTP BCOOKIE Used by LinkedIn to track the use of embedded services. Expiry: 6 Months Type: HTTP AAM_UUID Use these cookies to assign a unique ID when users visit a website. Expiry: 6 Months Type: HTTP USERMATCHHISTORY These cookies are set by LinkedIn for advertising purposes, including: tracking visitors so that more relevant ads can be presented, allowing users to use the 'Apply with LinkedIn' or the 'Sign-in with LinkedIn' functions, collecting information about how visitors use the site, etc. Expiry: 6 Months Type: HTTP LI_SUGR Used to make a probabilistic match of a user's identity outside the Designated Countries Expiry: 90 Days Type: HTTP MICROSOFT (2) LEARN MORE ABOUT MICROSOFT PRIVACY. MR Used to collect information for analytics purposes. Expiry: 1 year Type: HTTP ANONCHK Used to store session ID for a users session to ensure that clicks from adverts on the Bing search engine are verified for reporting purposes and for personalisation Expiry: 1 Day Type: HTTP UNCLASSNAMEIFIED (0) UNCLASSNAMEIFIED COOKIES ARE COOKIES THAT WE ARE IN THE PROCESS OF CLASSNAMEIFYING, TOGETHER WITH THE PROVIDERS OF INDIVIDUAL COOKIES. We do not use cookies of this type. Cookie declaration last updated on 24/03/2023 by Analytics Vidhya. Cookies are small text files that can be used by websites to make a user's experience more efficient. The law states that we can store cookies on your device if they are strictly necessary for the operation of this site. For all other types of cookies, we need your permission. This site uses different types of cookies. Some cookies are placed by third-party services that appear on our pages. Learn more about who we are, how you can contact us, and how we process personal data in our Privacy Policy. Accept all cookies Use necessary cookies FLAGSHIP COURSES GenAI Pinnacle Program| AI/ML BlackBelt Courses FREE COURSES Generative AI| Large Language Models| Building LLM Applications using Prompt Engineering| Building Your first RAG System using LlamaIndex| Stability.AI| MidJourney| Building Production Ready RAG systems using LlamaIndex| Building LLMs for Code| Deep Learning| Python| Microsoft Excel| Machine Learning| Decision Trees| Pandas for Data Analysis| Ensemble Learning| NLP| NLP using Deep Learning| Neural Networks| Loan Prediction Practice Problem| Time Series Forecasting| Tableau| Business Analytics POPULAR CATEGORIES Generative AI| Prompt Engineering| Generative AI Application| News| Technical Guides| AI Tools| Interview Preparation| Research Papers| Success Stories| Quiz| Use Cases| Listicles GENERATIVE AI TOOLS AND TECHNIQUES GANs| VAEs| Transformers| StyleGAN| Pix2Pix| Autoencoders| GPT| BERT| Word2Vec| LSTM| Attention Mechanisms| Diffusion Models| LLMs| SLMs| StyleGAN| Encoder Decoder Models| Prompt Engineering| LangChain| LlamaIndex| RAG| Fine-tuning| LangChain AI Agent| Multimodal Models| RNNs| DCGAN| ProGAN| Text-to-Image Models| DDPM| Document Question Answering| Imagen| T5 (Text-to-Text Transfer Transformer)| Seq2seq Models| WaveNet| Attention Is All You Need (Transformer Architecture) POPULAR GENAI MODELS Llama 3.1| Llama 3| Llama 2| GPT 4o Mini| GPT 4o| GPT 3| Claude 3 Haiku| Claude 3.5 Sonnet| Phi 3.5| Phi 3| Mistral Large 2| Mistral NeMo| Mistral-7b| Gemini 1.5 Pro| Gemini Flash 1.5| Bedrock| Vertex AI| DALL.E| Midjourney| Stable Diffusion DATA SCIENCE TOOLS AND TECHNIQUES Python| R| SQL| Jupyter Notebooks| TensorFlow| Scikit-learn| PyTorch| Tableau| Apache Spark| Matplotlib| Seaborn| Pandas| Hadoop| Docker| Git| Keras| Apache Kafka| AWS| NLP| Random Forest| Computer Vision| Data Visualization| Data Exploration| Big Data| Common Machine Learning Algorithms| Machine Learning COMPANY * About Us * Contact Us * Careers DISCOVER * Blogs * Expert session * Podcasts * Comprehensive Guides LEARN * Free courses * AI/ML BlackBelt Program * GenAI Program * Agentic AI Pioneer Program ENGAGE * Community * Hackathons * Events * AI Newsletter CONTRIBUTE * Become an Author * Become a speaker * Become a mentor * Become an instructor ENTERPRISE * Our offerings * Trainings * Data Culture Terms & conditions Refund Policy Privacy Policy Cookies Policy © Analytics Vidhya 2024.All rights reserved. GENAI PINNACLE PROGRAM REVOLUTIONIZING AI LEARNING & DEVELOPMENT * 1:1 Mentorship with Generative AI experts * Advanced Curriculum with 200+ Hours of Learning * Master 26+ GenAI Tools and Libraries ENROLL WITH US TODAY! I Agree to the Terms & Conditions Send WhatsApp Updates Enroll Now SKIP CONTINUE YOUR LEARNING FOR FREE Login with Google Login with Email Forgot your password? I accept the Terms and Conditions Receive updates on WhatsApp ENTER EMAIL ADDRESS TO CONTINUE Email address Get OTP ENTER OTP SENT TO Edit Enter the OTP Resend OTP Resend OTP in 45s Verify OTP