Posts

Rethinking Digital Trust in the Age of Quantum Computing

Image
What Happens to AI Security When Computing Itself Changes What happens to enterprise security when the underlying compute paradigm shifts from classical to quantum? Most current security architectures assume the limits of classical computing. Quantum computing challenges that assumption. When encryption assumptions change, security does not degrade gradually, it breaks structurally. This has implications far beyond cryptography, it affects the entire digital stack that AI systems rely on. Most AI conversations today focus on models, data, and adoption. A quieter but more fundamental constraint is emerging, the stability of the cryptographic foundations those systems depend on. One way to understand this is through what I think of as the Compute–Security Dependency Model. First, compute defines feasibility. What can or cannot be broken depends on computational limits. Second, cryptography assumes those limits. Today’s encryption standards are built on what classical systems cannot ...

COCOMO Web Application

COCOMO Model Calculator COCOMO Model Calculator Estimate software development effort and duration Project Parameters Project Size (KLOC) KLOC = Thousands of Lines of Code Estimate the total executable source code lines (excluding comments and blank lines) Project Type Organic - Small, experienced teams Semi-detached - Medium complexity Embedded - Complex, real-time systems Live Estimation Results Formulas: Effort (E) = aₚ × (KLOC)^bₚ ...

Access Control Vulnerabilities in Decentralized Finance

Image
  Access Control Vulnerabilities in Decentralized Finance: An Analysis of Security Failures and Economic Impact in 2025 Abstract According to Hacken's 2025 report, the crypto industry has lost over $3.1 billion in the first half of 2025 alone, with access-control exploits driving 59% of total losses. This analysis examines why basic security oversights continue to plague an industry built on cryptographic precision, combining real-world data with behavioral insights to understand persistent vulnerability patterns. Despite utilizing mathematically robust consensus mechanisms, access-control exploits drove the majority of financial losses, representing what researchers term "digital door handle syndrome"—sophisticated systems undermined by elementary security oversights. Our findings reveal three primary vulnerability classes and examine the behavioral factors contributing to these recurring failures. 1. Introduction: The $3.1 Billion Door Handle Problem Picture this: ...

AI, Cloud Engineering and Data Analytics for Global Collaboration

Image
A place where sages and coders collaborate under the same digital sky. The streets hum with the rhythm of algorithms, and libraries house both scrolls and quantum computers. Let's unlock the insights later. In recent years, artificial intelligence (AI) has ben a driving force behind transformative changes in the tech industry. One of its most promising applications lies in enabling software developers from non-English speaking countries to actively contribute to global projects. It’s an interesting journey to explore how AI can democratize collaboration and foster inclusivity in software development, especially in regions where native languages differ from English. The Language Barrier in Software Development Software development has long been dominated by English as the lingua franca. Code comments, documentation, and communication within development teams predominantly occur in English. While this has facilitated global collaboration, it has also unintentionally excluded talented...

Harmonizing Expertise and Disagreement: The '90s Wisdom of Steve Jobs

Image
Ah, the '90s—a time of dial-up internet, Tamagotchis, and mixtapes. It’s like opening an old shoebox filled with Polaroids and finding a snapshot of Steve Jobs himself, standing amidst the pixelated pixels and neon glow of that era. Jobs, the visionary co-founder of Apple, was a man of strong opinions and unwavering determination. His words often carried weight, and one particular statement resonates even today: “We hire people to do what they are trained to do.” Let’s unpack this vintage gem, shall we? The Expertise Equation When Jobs emphasized hiring people for their specialized skills, he was acknowledging the importance of expertise. Imagine assembling a team of musicians: you’d want a virtuoso pianist, a maestro on the violin, and a drummer who can keep the beat flawlessly. Each member brings their unique proficiency to the ensemble, creating harmonious melodies. Similarly, in the workplace, having experts—whether it’s a seasoned programmer, a marketing guru, or a financial w...

AI in Practice: Managing Bias, Drift, and Training Data Constraints

Image
A thorough understanding of concepts in responsible AI—such as bias, drift, and data constraints—can help us use AI more ethically and with greater accountability. This article explores how we can use AI tools responsibly and understand the implications of unfair or inaccurate outputs. Recognizing Harms and Biases Engaging with AI responsibly requires knowledge of its inherent biases. Data biases occur when systemic errors or prejudices lead to unfair or inaccurate information, resulting in biased outputs. These biases can cause various types of harm to people and society, including: Allocative Harm This occurs when an AI system’s use or behavior withholds opportunities, resources, or information in domains that affect a person’s well-being. Example: If a job recruitment AI tool screens out candidates from certain zip codes due to historical crime data, qualified applicants from those areas might be unfairly denied job opportunities. Quality-of-Service Harm This happens when AI tool...

Vikas Sharma

Senior AI & Digital Transformation Advisor  |  AI Governance  |  Enterprise Architecture

🏠 Home LinkedIn Medium DigitalWalk X YouTube Email

sharma1vikas ©2026  |  Content for educational purposes only. Not professional advice. Information from public sources — verify independently. Views are author's own.