Chatbot using llama2 LLM and Django in ten stepsThis article describes a simple and fast way of creating a chatbot using llama2 LLM and Django. We will download an opensource llama2 model…Jun 282Jun 282
Generate CA-Signed SSL Certificate with Own CAThis exercise is performed on Ubuntu Linux 22.04 We want to generate a private key and certifcate for use in https application written in…Mar 8Mar 8
Machine Learning, Deep Learning, Transformer Architecture and Implications to BlockchainMachine learning is a domain within the realm of Artificial Intelligence (AI) that uses algorithms and models capable of learning and…Jan 2Jan 2
Polygon zkEVM at a glancePolygon zkEVM is a Layer 2 (L2) scaling solutions for Layer 1 (L1) Ethereum.Dec 24, 20231Dec 24, 20231
Using ethersjsv6 to send signed raw transactionsSome use cases ask for sending a signed transaction. In this article, the code is developed using ethersjs v6 release 6.7.1Oct 7, 2023Oct 7, 2023
Decentralized ID and Polygon IDDefinition In simple terms, decentralized identifier (DID) means that you prove your identities, such as who you are; without relying on…Sep 16, 2023Sep 16, 2023
Crypto Custody DemystifiedIntroduction Crypto Custody is a solution where cryptos are stored securely, and users are able to access the cryptos as and when is…Aug 23, 2023Aug 23, 2023
Zero Knowledge Blockchain BridgeA blockchain bridge is a cross chain application sitting between blockchain C1 and C2, proving to applications on C2 that certain events…May 23, 2023May 23, 2023
Zero knowledge rollup using circom for beginnerIntroduction Circom is a language for arithmetic circuits that are used to generate zero knowledge proof. Circom compiler is a circom…May 15, 20231May 15, 20231
HTLC smart contract with penaltyImagine Alice and Bob want to exchange their tokens on different chains / same chain. Alice and Bob enter into HTLC (Hashed time lock…May 8, 2023May 8, 2023