Categories | |
Tags | |
Verification | |
Events | |
Views | 172 |
Roshan Ragupathy is a software engineer and one of the co-founders of the Marlin Protocol, a verifiable computing protocol. [1]
Raghupathy graduated from the Indian Institute of Technology, Bombay, with a Bachelor of Technology in Computer Science and Engineering. [1]
In 2014, Raghupathy started his tech career at Boost, a provider of peer-reviewed C++ source libraries, as part of the Google Summer of Code program. He worked on various C++ STL algorithms and general-purpose computing in GPUs. [1]
He joined Microsoft as a software engineer in 2015, working on an agile team and developing a universal app supported by Azure. He helped design the app's architecture and implement its backend. In 2016, he became the lead backend engineer at Cityflo, a daily commute company, where he implemented backends and APIs for various mobile apps and algorithms for vehicle routing. [1]
In 2018, he co-founded Marlin alongside Siddhartha Dutta and Prateesh Goyal. [1]
At Ingonyama’s ZK Accelerate event in December 2023, Raghupathy discussed Kalypso, a circuit-agnostic confidential proof market designed to facilitate ZK proof computation outsourcing for improved efficiency. ZK proofs offer promise in blockchain by proving computations and reducing verifiers' workload. The Kalypso marketplace outsources proof generation for faster, cheaper, and more efficient computation. It prioritizes privacy through secure enclaves, operates independently across ZK circuits, and aims to streamline developer tooling. [2]
During the Infracon x GrowthCon event, co-hosted by Biconomy, Polyhedra, Transak, and Particle Network, Raghupathy discussed the potential of trustless coprocessors for enabling limitless compute capabilities. He highlighted examples illustrating the limitations faced in the current system and emphasized the need for improved performance and simplicity, particularly for smartphone users. The discussion delved into the advantages of utilizing smart contracts and explored different approaches to leveraging coprocessors, offering insights into their security implications and compatibility with various programming languages and applications. [3]
Edited By
Edited On
April 19, 2024
Categories | |
Tags | |
Verification | |
Events | |
Views | 172 |
Edited By
Edited On
April 19, 2024