Priyal Walpita

Priyal Walpita

CTO & Co-Founder @ Zafer | Expert in AI/ML, Blockchain, Quantum Computing, Cybersecurity & Secure Coding | Digital Security Innovator | Mentor & Trainer in Advanced Tech

View articles by Priyal Walpita

Large Action Models(LAM): Ushering in a New Era of AI Autonomy

Large Action Models(LAM): Ushering in a New…

September 26, 2024

2 likes

Software 3.0: The Next Evolution in Software Development

Software 3.0: The Next Evolution in Software…

August 2, 2024

4 likes

Unlocking the Power of Local Large Language Models with Llamafiles — Part 01

Unlocking the Power of Local Large Language…

July 22, 2024

7 likes

The Dawn of AI Agents: Reshaping the Future

The Dawn of AI Agents: Reshaping the Future

July 10, 2024

11 likes

Harnessing the Power of Event-Driven, Evolutionary Software Architecture While Managing Complexity

Harnessing the Power of Event-Driven…

July 8, 2024

9 likes

Major Changes in Large Language Models (LLMs) You Need to Know in 2024

Major Changes in Large Language Models…

July 3, 2024

15 likes

Securing the Future of AI: A Deep Dive into OWASP’s Top 10 Security Risks for Large Language Models

Securing the Future of AI: A Deep Dive into…

July 20, 2023

6 likes

REST, GraphQL, and gRPC: Comparing and Contrasting Modern API Design Patterns

REST, GraphQL, and gRPC: Comparing and…

July 18, 2023

27 likes

Reactive Systems: Redefining Software Architectures for the 21st Century

Reactive Systems: Redefining Software…

July 13, 2023

10 likes

AI Odyssey: Sailing Through the Seven Stages of Artificial Intelligence Evolution

AI Odyssey: Sailing Through the Seven Stages…

July 7, 2023

17 likes1 comment

How to Avoid Software Entropy

How to Avoid Software Entropy

June 22, 2023

22 likes

Steering Clear of Distributed Monolith Traps in Your Journey to Effective Microservices Architecture

Steering Clear of Distributed Monolith Traps…

June 21, 2023

23 likes

Unlock Kafka’s Full Potential: An Intro to Best DevOps Practices

Unlock Kafka’s Full Potential: An Intro to…

June 20, 2023

44 likes1 comment

What is Zero Knowledge Proof? A simple explanation

What is Zero Knowledge Proof? A simple…

February 25, 2023

9 likes

A New attack vector with hyped AI : “Prompt Injection Attacks” on AI-powered Chatbots and Virtual Assistants

A New attack vector with hyped AI : “Prompt…

February 19, 2023

15 likes1 comment

Web 3.0- How developers should survive and thrive in this new Wild West

Web 3.0- How developers should survive and…

February 17, 2023

17 likes

What Is Software Engineering - Part 1

What Is Software Engineering - Part 1

February 16, 2023

11 likes

Low Code Revolution: How it's Changing the Software Development Industry and Empowering Developers and Businesses

Low Code Revolution: How it's Changing the…

January 23, 2023

8 likes

How Quantum Computing Would Affect Information Security

How Quantum Computing Would Affect…

January 19, 2023

6 likes

Impact of blockchain on digital IDs

Impact of blockchain on digital IDs

January 13, 2023

9 likes

  翻译: