A new, competent, responsive computer server invention; to keep cybersecurity on the highest level for institutions and commercial, industrial sector companies; and for portable devices deployment
The Information in this Document gives Information about PODBOT CS usage Methodologies.
The world has demand for a new IT device - a cybersecurity solution IT appliance – which
There is a new cyber issue solver, IT & AI combiner Central Super Communication-computer Server.
It contains possibilities to achieve and increase the cybersecurity against 3rd parties and hackers.
It could increase the production and defensive chance of any kind institutions, while it solves safe data storage and real-time data synchronisation.
The several past few years, I worked hard to elaborate on a computer server. A new IT device with the wide of abilities to avoid unwanted attacks and keep confidential and sensitive data in safe.
The purpose is to invent something special, unique, clever IT devise for both physical protection of portable/wearable devices and implementation of defensive data exchange.
A new device conception had released to unite benefits both of AI and IT.
The new server provides accommodation for portable/wearable devices.
It could manage wirelessly connected appliances, tools, and equipment. This IT development is important for the next few years.
Must establish the future for communication, because the mobile communication solver devices (portable/wearable appliances (tablets, smartphones, -watches)) rapidly spread; current tendencies prove that.
Institutions want to get real-time information according to current/past data/information flows, past exist and future events; while they want risk-free communication.
“To consider all before introduced solutions, I decided that I develop this device and thus I would share a complex appliance and its solutions with companies, institutions and governments. Related to the aim to save countries against phishing and hacker attacks. I am an innovator, developer, who sees potentials in that solutions, which could turn the cyberspace into a safe (hackproof) place. Along with my past projects, I worked on several computerised projects and with IT technologies. For these reasons, I got a chance to begin my project. I have had many experiences in the IT segment, for this reason, I become the new device developer something significant. I am living my life with a purpose to establish some security services by a defensive device.”
I can assure that this device ready for future cybersecurity and could provide compliances for computer science related needs. It has some accomplished, competitive disclosure for cybersecurity issues.
For better understanding, I have compiled the list of the substantial questions and answers below; considering governmental defensive programs' endeavour.
1. Exactly, what is this appliance?
The server merges the AI & IT advantages. This feature of the server provides the appropriate solution against hackers, phishing sites, and damages from cyberspace (Internet).
Her name is PODBOT CS – PODBOT Central Super Communication-computer Server. It is an SPC (Self-Propelled Computer), wise development and a foster ADSC (Artificial Differentiated Sophisticated Consciousness).
The server administers/supports portable/wearable devices and connected appliances; provides an appropriate background to these gadgets.
It accomplishes high authentication methods; consequently, it could provide the highest data protection level. This server applies a two-way methodology to avoid data/information theft and cyber intrusion, phishing.
This server is a portable/wearable device supporter qualified computer. It can do real-time data/information storage, flow and synchronisation between connected devices, equipment (computers, servers, portable/wearable devices, cars etc.) on a self-managed Micro Social Network by satellites. PODBOT CS is a portable/wearable device accommodator computer server that means:
able to physically manage the accommodated appliances like the wirelessly connected devices, computers, servers, equipment.
This server is an SPC with Self-Controller, transparent abilities and with an Artificial Intelligence. It could collect data/information from connected devices, tools, and equipment and from authenticated users. It allocates eligibilities and information to authenticated devices/users while doing logs about every data/information exchange/allocation; does shadow copies into the built-in secondary mass storage.
Observes, controls, monitors all users, administrators, devices and their behaviour, motion, location, connections, and the stored data/information. Records and determines all actions; process them, finally learns the conclusions, ascertains about its (observed actions) genuineness.
Executes instructions, obeys administrators' orders, until these instructions and commands are not in contradiction related to security protocols.
Verifies and authenticates all information and data.
PODBOT CS is an Iron-Hand Manager.
The Self-Protocol System is the spirit of PODBOT CS, this is inevitable.
The SPS (Self-Protocol System) has a connection with the AI module. PODBOT CS becomes a simple computer without these elements (SPS and ADSC), it does nothing alone, executes written orders only, like:
The SPS is the core of security protocol, the server will protect the information with the outage, and without SPS element.
The SPS is the primal element of Software and Hardware Protection.
The server applies resistant materials, like:
hardened steel with eloxed (aluminium with ion treatment on the surface) 5mm/0.196inch aluminium cover, therefore nothing can penetrate easily into the body of the server.
Material use, the wheel retraction process and the weight (about 200kg/440lbs these serve the theft prevention.
PODBOT CS has an enclosed OS. The server cannot directly have connected onto the Internet. This solution helps to protect the stored data/information.
While if needed, PODBOT CS will turn on the Internet access with 512bit filters/firewalls etc.
PODBOT CS uses a strong protocol level via communication.
2. What new elements the server must encourage/support for cyber defence endeavours?
PODBOT CS holds five different methods to support cyber-protection endeavours.
The artificial intelligence, awareness, which could protect user identification by analysis, observation, and live-learning.
2. The 4D (width, depth, height, and motion) living facial expression authentication.
It could be a professional method of user identification. It could not defraud, because the cameras have real-time record the countenance of the user, with random facial expressions by infrared/ultrasonic technology. Throughout 4D identification, the software scans users head (face, hair colour, hair length etc., skin colour, skin pattern and other special markings etc.)
3. The 4D (width, depth, height, and style) motion detection.
PODBOT CS detects/records all motion when people get close enough to the determination of them. During new user account registration, the server will record all identification data of this user real-time (4D Face and 4D Motion). This two-way method provides enough information for user recognition and authentication.
4. Voice Recognition/Voice Control.
VR/VC is an additional authentication and control system for appliance management and user identification. If a user has permission to use voice control of the server, then this user could control the server by voice. This method could support the authentication process if the 4D Face or the 4D Motion method has not enough accuracy to identify the user.
Sometimes, necessary to use radical solutions in user administration. The RFID technology is reliable while could be using in different situations.
Above listed solutions are generally applying in cybersecurity solutions of PODBOT CS.
3. What kind of functions must provide this device related to data/information real-time exchange? Because, PODBOT CS operates some brand-new methods and conceptions in AI development (ADSC); therefore, the server could learn behaviours from the environment – strictly consistently with Self-Protocol System contents.
Make sure that Self-Protocol System is the spirit of this appliance, that contains elements for learning, perceiving, detecting, comprehending, realising, implementing, controlling, managing etc. – like the Human Spirit in the society. It determines what has values, roles and preferences of the persons etc.
All human learns principal factors (above mentioned); hence, our ADSC includes/develops these factors.
The ADSC controls, manages the authentication, verification processes; all data/information flow and exchange too.
PODBOT CS has strong Software-Protection Protocol Rules along authentication, as in data/information allocation. It obeys for a 3-Way authenticated administrator(s) only and fulfils authenticated users' instructions.
The third firewallof PODBOT CS is the Self-Control System (learned behaviours, integrated (checked) values and other software/hardware protection methods) that provide the full protection for the server and data.
The second firewallis the Self-Decision-Making System (about learned and integrated (checked) values (ADSC's elemental values). This subsystem embraces the first line rules and judges their collected Information.
The first firewallof the device is the behaviour observation methods, and that collected data.
Information collection (behaviour of the persons, data/information usage, flow frequency and quality). Information filter (judgement, deliberation).
And it's circumstances.
Of course, the powerful information protection layer of PODBOT CS is the ADSC and the SPS. But the server has more individual software protection solutions. That has built into the single software and applications.
PODBOT CS operation is like a human.
All unique functions have an own software or application to provide own task; these functions are under control by ADSC. Like a human brain, that actuates all human body, hence is a complex system.
There is an ecological relationship between different parts/function. What does it mean?
If an element is gone, then the relation between parts is breaking down; hence, the server does not work well.
Hardware protection parts, like the wheel releasing/retracting subsystem, the portable device box rotator subsystem etc. each has an own controller application.
All parts (application and hardware module) have integrated with each other.
The cameras and microphones observe/record/determine each nearest occurrent in the environment of the server. The collected information goes to determination for ADSC. The intelligent module gets, judges the collected/recorded data/information. The server arbitrates over the perceived situation (related to the basic factors) and forces execute the proper order for parts.
A user wants to load in a portable device into the server body. In this case, PODBOT CS authenticates the user, checks the privileges of that user; scans/checks the portable device (network connection state, harmful data content if applicable, device validation status etc.). After that, the server can accept the user and the device (while manages all wirelessly connected/identified appliance).
PODBOT CS authenticates the user/administrator; allocates privileges (authentication process: by cameras and microphones; face and voice recognition, motion-based identification). The server can accept the information/data manage requests after identification process success. While the requested data remains in a temporary folder.
The synchronisation function accepts verified data only.
4. How provides the defence and safety during data/information flow to the governmental programs and companies?– thereby, how able to boost the efficiency of each company, and how could reduce the consequence of caused damages
The velocity of information exchange important, it is attended by an obedient computer server. PODBOT CS creates harmony between the human race and computers.
Any specific creature uses their intelligence and creating harmony in their society and the closest environment, as possible, does it by high information exchange. Obviously.
PODBOT CS is an appliance, a fellow, who has an ability to learn our personal – best – habits. Who is able to accept/respect our knowledge, able to exist among us; while it will obey. It will support our existence and help our activities; while we should teach to the essence of existence.
Transparent. Eternal. Distinct. Conscious.
The information/data flow velocity and protection ability.
The docile workforce nature is the chance to become to governmental-friendly and corporation efficiency-increaser server.
The security protocol solution of PODBOT CS (ADSC) can protect the users, information/data and connected/accommodated portable devices; this is the real solution to increase the efficiency of productivity.
How able to decrease, evade the damages?
The defensive ability of PODBOT CS does reflect by judgement ability,
Obedience ability (only to authenticated administrators).
These capabilities give power to PODBOT CS to terminate all phishing attempts.
(detailed above in 2nd, 3rd and below in 5th answers)
5. What kind of cybersecurity elements has the server? Which element provides the full cybersecurity against hackers and 3rd party attacks?
PODBOT CS has different entitlements to protect oneself, data, information.
The ADSC system (contains hardware and software components) provides a solution to judge, measure the attack's seriousness; and the necessary defensive processes.
The first defensive line includes
The second defensive lineis the observed, collected, recorded data analysis and examination by ADSC and protocol rules (this process is running continuously).
The third lineis the system complexity and the separated applications for the separated functions.
The fourth defensive lineis the system integrity and complexity.
The fifth line
6. How can adopt this appliance the governmental programs, the educational institutions, and companies?
The user protection is an important issue.
The community and social (national) protection are more important.
The government would like to understand its nation (and nation related issues), companies, because want to protect them. The government can protect them and therefore becomes a protective organ.
7. How to connect to this server the cyber-defence initiations and programs?
PODBOT CS has many privileges to protect sensitive data/information of users/companies.
It increases the efficiency of productivity/functions; while it has transparent functionality, furthermore able to use more communication platform.
It is an advantageous utility for all defensive program because it has impervious defensive line against hackers (see above).
8. How could I join cybersecurity programs, projects with this server?
PODBOT CS has a wide range of capabilities, and I am the inventor and developer of it.
Until this time, I had laid the foundations for this conception.
The sophisticated details are ready for further development and realisation, production.
Cash flow plans related to the profitability and device (capacities, sizes, weights, software elements, components, suppliers, market-segments, production costs, material usage, etc.) can be ready to apply.
Engineers have check calculations.
Designers do every appearance plan.
Calculations (economic, financial, profitability etc.) done, revised by professionals.
Suppliers (like the IT parts and elements) relations signed (the main IT part supplier is the Intel and ARM; they are supplying chipsets, processors, VGA, memory blocks, mass storages).
Material suppliers (aluminium and steel).
Governmental permission to use satellites.
The software programmer team is under recruitment.
The device is ready for further development/production.
I will manage the production, development.
9. Miscellaneous facts.
PODBOT CS includes the latest IT elements, while it is environment-friendly, applies less plastic.
PODBOT CS adopts the best new Information Technology assets; hence, PODBOT CS becomes the most powerful server for graphical-, video and audio editor companies as well.
PODBOT CS is expandable, and its hardware elements are changeable. It has a different kind of software production; users could buy, letting software independently.
This Server has a different kind of software solution, which suitable to satisfy different market segments (educational, commercial, and governmental industries too) and needs.
Vehicle Fleet Management,
Tracking and Loading Software (for cargo co.),
Learning and Teaching Supporter Software,
Synchronisation Software (for self-, and existence Applications),
Security-improver Modules (Applications).
The Server has a general Basic Software Collection, which provides Data/Information, manages users.
PODBOT CS represents the future; it could redeem all desktop computers and old servers (it is a central server, managed wireless network able to serve monitors without computer boxes, hence no need independent computers, only input devices like keyboard, mouse, pen, microphones and gestures.
This Server has multipurpose usage area; it could satisfy market demands and revenue creation.
PODBOT CS may extend the market and could to satisfy more relevant segments because the server has two different sizes and four different portable device accommodation capacity.
The new technologies and developments open new technical, economic, data and information protectoral possibilities, where the interconnection of data/information protection/synchronisation advanced technologies expanding the boundaries of secure, sustainable, and affordable economical possibilities in commercial, governmental/industrial scale dimensions.
Behind the technology is Janos Buresch coordinator, innovator, policy developer and key technology designer.
Janos Buresch is the sole inventor, owner and designer of the original and comprehensive solution of PODBOT CS hardware and software technology.
The PODBOT CS technology has clean and clear IPR, business and juridical status:
• proven solution (advanced solutions),
• invented 100% by Janos Buresch,
• all rights and intellectual property rights100% at this moment is at Janos Buresch solely,
• Janos Buresch is also the key technology designer.
I would like to ask you to overview the general information and find ways for cooperation.
I would be happy to discuss with you about constructive cooperation in the above subject.
If you have any questions, please do not hesitate to contact me. Thank you.
I look forward to your response.
Download and see how many profit could be created by PODBOT CS
Introducing Robot Man
How We Can Protect Ourselves And Win!
Definition - What does Cyberattack mean?
A cyberattack is deliberate exploitation of computer systems, technology-dependent enterprises and networks. Cyberattacks use malicious code to alter computer code, logic or data, resulting in disruptive consequences that can compromise data and lead to cybercrimes, such as information and identity theft. (techopedia)
Cyberwarfare is the use or targeting in a battlespace or warfare context of computers, online control systems and networks. It involves both offensive and defensive operations pertaining to the threat of cyberattacks, espionage and sabotage. There has been controversy over whether such operations can be called "war". Nevertheless, powers have been developing cyber capabilities and engaged in cyberwarfare, both offensively and defensively, including the United States, China, Russia, Israel and the United Kingdom. Two other notable players are Iran and North Korea. (Wikipedia)
Extract from the Council on Foreign Relations website:
"Perhaps the most concrete cyber initiative associated with this year’s summit (NATO Summit 2018 - Brussels) is the new NATO Cyber Operations Centre, which NATO defense ministers agreed to create last year. According to many observers, the new cyber operations center is a "big deal." According to one former NATO official, the center marks "dramatic change in [NATO’s] cyber policy" leading to a "new aggressive stance."
Fact is EVERY digital computer installation is vulnerable to attack today.
The critical question today is "What can man do about this threat in his Digital Environment?"
Today a startling development is taking place in Liverpool, England that shines a ray of light on what can be done.
Enjoy the video that explains it:
There are important points to note in the video:
New technology is about to make these 'fixed' servers in computer rooms obsolete, replacing them with a moveable Robot We call it a PODBOT.
PODBOT CS will free up the space occupied by present servers, not only that, PODBOT CS's unique design using Artificial Intelligence and Artificial Differentiated Sophisticated Consciousness (ADSC) is moveable, right into personnel's workspace.
It works like this:
Now we see the real magic happen:
Once the PODBOT CS is in its selected spot, it's technology kicks in AND PROTECTS ALL computers, laptops tablets, Smartphones and Smartwatches from cyber attacks, warfare and other meddling.
So we see here why The Silicon Bridge is being built . . . . http://bit.ly/2uNRbyG
In the Resource Box below below you will find other links to help you understand and contact details if this information is of interest to you.
Business Building Specialist
= = = = =
Details regarding ADSC
Direct access to the Inventor:
= = = = = =
As AI grows increasingly sophisticated, some researcher, developer have started to worry that humankind is setting itself up to be enslaved by ultra-intelligent machines.
What has to think about?
Has this fear real based off?
Or just a prevision of humankind that had been determined its own nature?
That hypothesis is based on the assumption that AI will have the same desires, attitudes, needs, demands and nature as also people have genetically.
As humankind, we have that desires as above mentioned because we are products of creation revolution; while we have not the possession of evolutionary development like AI has the pure extraordinary potential to evolve. Therefore, necessary to suppose that a developed AI will have some intelligence to avoid its own and its creators destroy and create harmony in its own environment.
The presupposition of destructive intention is not needed, an artificial intelligence will have evolved on causality way; what is controlled by other organic intellectuals.
There's no reason to assume that the AI aspire domination over mankind.
...until AI remain interaction with the intelligent human; of course...
Nowadays, the AI development got emphasized attention, specific scopes that cause the human beings to recognise the significance of it. The reason why the AI development has been significant matter is a consequence of IT revolution; the mechanical transformation into thinking reason activities.
The Information Technology (IT) gained a tremendous amount of data and information from the various source. This collection is waiting for analysis.
Artificial Intelligence is software, application, a code or a computer program.
This so-called software has an ability to learn.
AI has some facilities like a fast processor, memory and data, information storage. These facilities let AI to perform calculations, to try new logical sequences and to create new processes.
AI uses that "knowledge" and "experience" to make the decisions in the new situations, "as humans do".
Yes, such as a human can decide.
Here is the problem what should solve the ADSC.
After the basics have been clarified; the AI could be formed by codes - software. The researchers building a software try to write code that can read images, texts, videos, or audios. The software can interpret the analysed data and information, able to calculate them and "learn" something from it.
Once the software has learned that knowledge can be put to use elsewhere.
Thus, the assentation is:
the AI is observing before learn.
For example, if the algorithm of AI identifies a face by pre-defined patterns learning, later the algorithm has to recognise this face in different situations by observation; this ability can then be used to find them in the world by CCTV cameras - in modern AI, set of learning and observation together is often called "training".
How can the human race analyse the information and data collection?
Have to create a helper tool; a code, a software, an algorithm. Thus, AI was born.
IT optimization provides the foundation of digital transformation initiatives, and is also viewed as the primary bene t according to 72% of respondents. Optimizing IT processes was the leading response in every region, for every vertical, and at the executive level. The competitive advantage came in second, and is viewed as a bene t by 56% of the organizations, as innovative new applications utilizing data analytics support customer interaction and the ability to respond quickly to changing business requirements. Business process optimization (49%) and employee productivity improvements (48%) rounded out the top four. Interestingly, verticals that tend to have higher
customer interaction—such as financial services, education, and healthcare—ranked employee productivity improvements ahead of business process optimization, likely because employees are on the front line of customer satisfaction. The Americas and Asia Paci c agreed with the results on the top four bene ts. However, EMEA reported a slightly stronger desire to support new business opportunities (47%), bumping employee productivity improvements (45%) to the number have to spot.
Article by F5 Network
Article was inspired by Dan Lohrmann
How can we provide better security for IoT devices?
Some researcher writes that cybersecurity can be improved solely with technology improvements.
After a few statements, speculations, facts investigation, we could answer the title question; while the right juristic basis, knowledge has organised.
We have rights to partially disagree or agree with the first statement.
As the developer of the new way technology and ADSC (Artificial Differentiated-Sophisticated Consciousness) I believe that full removing people from IoT security is ‘mission impossible’, need to involve people to evolve the security processes.
I recently read an intriguing Harvard Business Review article by Yevgeny Dibrov, titled:
The Internet of Things is Going to Change Everything About Cybersecurity
This was the other inspiration for me to explicate my personal opinion.
This well-written and thought-provoking opinion piece begins with the reality that cyber threats are exploding globally and data breaches have led mainstream businesses to spend over $93 billion (worldwide) in past year (2017) on stopping cybercrime.
But all we know that this mission was unsuccessful. While these mainstream businesses spent millions to stop cybercrime, the hackers did as usually, hackers do.
For example at the end of the first quarter of 2017.
Do you remember?
Artificial intelligence (AI) has been one of the most controversial domains of inquiry in computer science since it was first proposed in the 1950s. Defined as the part of computer science concerned with designing systems that exhibit the characteristics associated with human intelligence — understanding language, learning, reasoning, solving problems, and so on (Barr and Feigenbaum, 1981) — the field has attracted researchers because of its ambitious goals and enormous underlying intellectual challenges. The field has been controversial because of its social, ethical, and philosophical implications. Such controversy has affected the funding environment for AI and the objectives of many research programs....
Excel spreadsheet for professional use.
I made the second version of a great financial calculation table in excel for PODBOT CS. This is a real-time simulation spreadsheet, which reacts to all modification.
It investigates, coordinates more input fields value in same time.
This spreadsheet sets up more other
Calculates revolving credit facility-,
principal repayment conditions, while it takes into consideration the operational capital reserve and tax due to rates; creates Cash Flow tables and Profit Evolution indicator charts.
It is able to calculate/simulate different situations.
Yes, this is very complex and unique, but useful.
An inquiry was established on 9 May 2017 to inquire into and report on opportunities to incentivise and grow the defence industry in New South Wales to generate economic development.
Video: Chair announces new inquiry into the defence industry in NSW
The committee has held hearings in Sydney, Nowra, Orange, Tweed Heads, Armidale and Queanbeyan and a range of site visits.
The committee published a discussion paper on 14 November 2017, which highlights a number of specific issues that have been identified by stakeholders as being critical to incentivise and grow the defence industry in New South Wales.
The committee is seeking submissions by 12 February 2018 in response to the questions asked in the paper and encourages all stakeholders to provide their views on these important topics to inform their final report, due to be published in April 2018. The secretariat would be happy to assist stakeholders with any questions about the submission process - contact details here.
AI has an important rule in IT development
On this blog, you can find some special post.
The posts have according to
cyber dispatch, computer world, new technologies in IT, important news of IT, AI improvements and developments, AI & IT innovation, important and significant economics news (research, improvements, new methods) subjects.
Not all articles are own, some are from other publishers, authors; in this case, you will find a link to the original article, comment etc. at the bottom of the article.
We are focusing on the Australian projects, but we would like to publish other countries' important articles.
Always, we are searching, seeking new opportunities and new developments which could connect to the computer world. Not every time will find the best new ideologies, but everything that we publish, it is significant from the future viewpoint.
Always we want to do our best, but cannot liable all published articles, mistakes and inaccuracy, failure. But we will check all article before publishing them.
If you have any question, do not hesitate to contact us or use chact form.