Posts

Quantum Machine Learning often gets framed as the next leap in speed and performance.

Image
Quantum Machine Learning often gets framed as the next leap in speed and performance. That narrative sounds compelling, but it tends to miss the real shift. The discussion around Quantum Machine Learning is less about faster computation and more about how systems are designed. Most comparisons start by positioning quantum as an upgrade to Machine Learning. A faster engine replacing CPUs and GPUs. In practice, compute is rarely the primary constraint. The more significant challenge is translation. Quantum systems require data to be encoded into quantum states. That process is complex, resource intensive, and can offset expected gains. Before acceleration becomes relevant, interpretation becomes the bottleneck. Another shift comes from how systems behave at scale. Classical models tend to improve with more data and compute. Quantum systems tend to become more sensitive to noise and instability. Error rates increase, and maintaining coherence becomes a central concern. This changes how pe...

AI Delusional spiraling, a cautious judgement is the call.

Image
The Silent Failure Mode of Enterprise AI There is a failure mode in AI adoption that almost nobody is talking about. Decision quality is declining. Confidence is rising. And most organizations will not see it until the damage is done. We spend enormous time and money worrying about hallucinations, bias, and factually incorrect outputs. Those are visible problems. They get attention, audit trails, and budget lines. Whole governance frameworks are being built around them. But there is a quieter risk building underneath all of that. AI that agrees. The Agreement Loop When an AI system consistently validates user thinking, something subtle and corrosive begins to happen. The user feels understood. The response feels right. The output feels intelligent. Dopamine does its work. The cycle repeats. But nothing has actually been challenged. In enterprise settings, this shows up in ways that are easy to miss precisely because they look like productivity gains. A senior leader tests a st...

Rethinking Digital Trust in the Age of Quantum Computing

Image
What Happens to AI Security When Computing Itself Changes What happens to enterprise security when the underlying compute paradigm shifts from classical to quantum? Most current security architectures assume the limits of classical computing. Quantum computing challenges that assumption. When encryption assumptions change, security does not degrade gradually, it breaks structurally. This has implications far beyond cryptography, it affects the entire digital stack that AI systems rely on. Most AI conversations today focus on models, data, and adoption. A quieter but more fundamental constraint is emerging, the stability of the cryptographic foundations those systems depend on. One way to understand this is through what I think of as the Compute–Security Dependency Model. First, compute defines feasibility. What can or cannot be broken depends on computational limits. Second, cryptography assumes those limits. Today’s encryption standards are built on what classical systems cannot ...

COCOMO Web Application

COCOMO Model Calculator COCOMO Model Calculator Estimate software development effort and duration Project Parameters Project Size (KLOC) KLOC = Thousands of Lines of Code Estimate the total executable source code lines (excluding comments and blank lines) Project Type Organic - Small, experienced teams Semi-detached - Medium complexity Embedded - Complex, real-time systems Live Estimation Results Formulas: Effort (E) = aₚ × (KLOC)^bₚ ...

Access Control Vulnerabilities in Decentralized Finance

Image
  Access Control Vulnerabilities in Decentralized Finance: An Analysis of Security Failures and Economic Impact in 2025 Abstract According to Hacken's 2025 report, the crypto industry has lost over $3.1 billion in the first half of 2025 alone, with access-control exploits driving 59% of total losses. This analysis examines why basic security oversights continue to plague an industry built on cryptographic precision, combining real-world data with behavioral insights to understand persistent vulnerability patterns. Despite utilizing mathematically robust consensus mechanisms, access-control exploits drove the majority of financial losses, representing what researchers term "digital door handle syndrome"—sophisticated systems undermined by elementary security oversights. Our findings reveal three primary vulnerability classes and examine the behavioral factors contributing to these recurring failures. 1. Introduction: The $3.1 Billion Door Handle Problem Picture this: ...

AI, Cloud Engineering and Data Analytics for Global Collaboration

Image
A place where sages and coders collaborate under the same digital sky. The streets hum with the rhythm of algorithms, and libraries house both scrolls and quantum computers. Let's unlock the insights later. In recent years, artificial intelligence (AI) has ben a driving force behind transformative changes in the tech industry. One of its most promising applications lies in enabling software developers from non-English speaking countries to actively contribute to global projects. It’s an interesting journey to explore how AI can democratize collaboration and foster inclusivity in software development, especially in regions where native languages differ from English. The Language Barrier in Software Development Software development has long been dominated by English as the lingua franca. Code comments, documentation, and communication within development teams predominantly occur in English. While this has facilitated global collaboration, it has also unintentionally excluded talented...

Harmonizing Expertise and Disagreement: The '90s Wisdom of Steve Jobs

Image
Ah, the '90s—a time of dial-up internet, Tamagotchis, and mixtapes. It’s like opening an old shoebox filled with Polaroids and finding a snapshot of Steve Jobs himself, standing amidst the pixelated pixels and neon glow of that era. Jobs, the visionary co-founder of Apple, was a man of strong opinions and unwavering determination. His words often carried weight, and one particular statement resonates even today: “We hire people to do what they are trained to do.” Let’s unpack this vintage gem, shall we? The Expertise Equation When Jobs emphasized hiring people for their specialized skills, he was acknowledging the importance of expertise. Imagine assembling a team of musicians: you’d want a virtuoso pianist, a maestro on the violin, and a drummer who can keep the beat flawlessly. Each member brings their unique proficiency to the ensemble, creating harmonious melodies. Similarly, in the workplace, having experts—whether it’s a seasoned programmer, a marketing guru, or a financial w...

Vikas Sharma

Senior AI & Digital Transformation Advisor  |  AI Governance  |  Enterprise Architecture

🏠 Home LinkedIn Medium DigitalWalk X YouTube Email

sharma1vikas ©2026  |  Content for educational purposes only. Not professional advice. Information from public sources — verify independently. Views are author's own.