A new, competent, responsive computer server invention; to keep cybersecurity on the highest level for institutions and commercial, industrial sector companies; and for portable devices deployment
The Information in this Document gives Information about PODBOT CS usage Methodologies.
The world has demand for a new IT device - a cybersecurity solution IT appliance – which
There is a new cyber issue solver, IT & AI combiner Central Super Communication-computer Server.
It contains possibilities to achieve and increase the cybersecurity against 3rd parties and hackers.
It could increase the production and defensive chance of any kind institutions, while it solves safe data storage and real-time data synchronisation.
The several past few years, I worked hard to elaborate on a computer server. A new IT device with the wide of abilities to avoid unwanted attacks and keep confidential and sensitive data in safe.
The purpose is to invent something special, unique, clever IT devise for both physical protection of portable/wearable devices and implementation of defensive data exchange.
A new device conception had released to unite benefits both of AI and IT.
The new server provides accommodation for portable/wearable devices.
It could manage wirelessly connected appliances, tools, and equipment. This IT development is important for the next few years.
Must establish the future for communication, because the mobile communication solver devices (portable/wearable appliances (tablets, smartphones, -watches)) rapidly spread; current tendencies prove that.
Institutions want to get real-time information according to current/past data/information flows, past exist and future events; while they want risk-free communication.
“To consider all before introduced solutions, I decided that I develop this device and thus I would share a complex appliance and its solutions with companies, institutions and governments. Related to the aim to save countries against phishing and hacker attacks. I am an innovator, developer, who sees potentials in that solutions, which could turn the cyberspace into a safe (hackproof) place. Along with my past projects, I worked on several computerised projects and with IT technologies. For these reasons, I got a chance to begin my project. I have had many experiences in the IT segment, for this reason, I become the new device developer something significant. I am living my life with a purpose to establish some security services by a defensive device.”
I can assure that this device ready for future cybersecurity and could provide compliances for computer science related needs. It has some accomplished, competitive disclosure for cybersecurity issues.
For better understanding, I have compiled the list of the substantial questions and answers below; considering governmental defensive programs' endeavour.
1. Exactly, what is this appliance?
The server merges the AI & IT advantages. This feature of the server provides the appropriate solution against hackers, phishing sites, and damages from cyberspace (Internet).
Her name is PODBOT CS – PODBOT Central Super Communication-computer Server. It is an SPC (Self-Propelled Computer), wise development and a foster ADSC (Artificial Differentiated Sophisticated Consciousness).
The server administers/supports portable/wearable devices and connected appliances; provides an appropriate background to these gadgets.
It accomplishes high authentication methods; consequently, it could provide the highest data protection level. This server applies a two-way methodology to avoid data/information theft and cyber intrusion, phishing.
This server is a portable/wearable device supporter qualified computer. It can do real-time data/information storage, flow and synchronisation between connected devices, equipment (computers, servers, portable/wearable devices, cars etc.) on a self-managed Micro Social Network by satellites. PODBOT CS is a portable/wearable device accommodator computer server that means:
able to physically manage the accommodated appliances like the wirelessly connected devices, computers, servers, equipment.
This server is an SPC with Self-Controller, transparent abilities and with an Artificial Intelligence. It could collect data/information from connected devices, tools, and equipment and from authenticated users. It allocates eligibilities and information to authenticated devices/users while doing logs about every data/information exchange/allocation; does shadow copies into the built-in secondary mass storage.
Observes, controls, monitors all users, administrators, devices and their behaviour, motion, location, connections, and the stored data/information. Records and determines all actions; process them, finally learns the conclusions, ascertains about its (observed actions) genuineness.
Executes instructions, obeys administrators' orders, until these instructions and commands are not in contradiction related to security protocols.
Verifies and authenticates all information and data.
PODBOT CS is an Iron-Hand Manager.
The Self-Protocol System is the spirit of PODBOT CS, this is inevitable.
The SPS (Self-Protocol System) has a connection with the AI module. PODBOT CS becomes a simple computer without these elements (SPS and ADSC), it does nothing alone, executes written orders only, like:
The SPS is the core of security protocol, the server will protect the information with the outage, and without SPS element.
The SPS is the primal element of Software and Hardware Protection.
The server applies resistant materials, like:
hardened steel with eloxed (aluminium with ion treatment on the surface) 5mm/0.196inch aluminium cover, therefore nothing can penetrate easily into the body of the server.
Material use, the wheel retraction process and the weight (about 200kg/440lbs these serve the theft prevention.
PODBOT CS has an enclosed OS. The server cannot directly have connected onto the Internet. This solution helps to protect the stored data/information.
While if needed, PODBOT CS will turn on the Internet access with 512bit filters/firewalls etc.
PODBOT CS uses a strong protocol level via communication.
2. What new elements the server must encourage/support for cyber defence endeavours?
PODBOT CS holds five different methods to support cyber-protection endeavours.
The artificial intelligence, awareness, which could protect user identification by analysis, observation, and live-learning.
2. The 4D (width, depth, height, and motion) living facial expression authentication.
It could be a professional method of user identification. It could not defraud, because the cameras have real-time record the countenance of the user, with random facial expressions by infrared/ultrasonic technology. Throughout 4D identification, the software scans users head (face, hair colour, hair length etc., skin colour, skin pattern and other special markings etc.)
3. The 4D (width, depth, height, and style) motion detection.
PODBOT CS detects/records all motion when people get close enough to the determination of them. During new user account registration, the server will record all identification data of this user real-time (4D Face and 4D Motion). This two-way method provides enough information for user recognition and authentication.
4. Voice Recognition/Voice Control.
VR/VC is an additional authentication and control system for appliance management and user identification. If a user has permission to use voice control of the server, then this user could control the server by voice. This method could support the authentication process if the 4D Face or the 4D Motion method has not enough accuracy to identify the user.
Sometimes, necessary to use radical solutions in user administration. The RFID technology is reliable while could be using in different situations.
Above listed solutions are generally applying in cybersecurity solutions of PODBOT CS.
3. What kind of functions must provide this device related to data/information real-time exchange? Because, PODBOT CS operates some brand-new methods and conceptions in AI development (ADSC); therefore, the server could learn behaviours from the environment – strictly consistently with Self-Protocol System contents.
Make sure that Self-Protocol System is the spirit of this appliance, that contains elements for learning, perceiving, detecting, comprehending, realising, implementing, controlling, managing etc. – like the Human Spirit in the society. It determines what has values, roles and preferences of the persons etc.
All human learns principal factors (above mentioned); hence, our ADSC includes/develops these factors.
The ADSC controls, manages the authentication, verification processes; all data/information flow and exchange too.
PODBOT CS has strong Software-Protection Protocol Rules along authentication, as in data/information allocation. It obeys for a 3-Way authenticated administrator(s) only and fulfils authenticated users' instructions.
The third firewallof PODBOT CS is the Self-Control System (learned behaviours, integrated (checked) values and other software/hardware protection methods) that provide the full protection for the server and data.
The second firewallis the Self-Decision-Making System (about learned and integrated (checked) values (ADSC's elemental values). This subsystem embraces the first line rules and judges their collected Information.
The first firewallof the device is the behaviour observation methods, and that collected data.
Information collection (behaviour of the persons, data/information usage, flow frequency and quality). Information filter (judgement, deliberation).
And it's circumstances.
Of course, the powerful information protection layer of PODBOT CS is the ADSC and the SPS. But the server has more individual software protection solutions. That has built into the single software and applications.
PODBOT CS operation is like a human.
All unique functions have an own software or application to provide own task; these functions are under control by ADSC. Like a human brain, that actuates all human body, hence is a complex system.
There is an ecological relationship between different parts/function. What does it mean?
If an element is gone, then the relation between parts is breaking down; hence, the server does not work well.
Hardware protection parts, like the wheel releasing/retracting subsystem, the portable device box rotator subsystem etc. each has an own controller application.
All parts (application and hardware module) have integrated with each other.
The cameras and microphones observe/record/determine each nearest occurrent in the environment of the server. The collected information goes to determination for ADSC. The intelligent module gets, judges the collected/recorded data/information. The server arbitrates over the perceived situation (related to the basic factors) and forces execute the proper order for parts.
A user wants to load in a portable device into the server body. In this case, PODBOT CS authenticates the user, checks the privileges of that user; scans/checks the portable device (network connection state, harmful data content if applicable, device validation status etc.). After that, the server can accept the user and the device (while manages all wirelessly connected/identified appliance).
PODBOT CS authenticates the user/administrator; allocates privileges (authentication process: by cameras and microphones; face and voice recognition, motion-based identification). The server can accept the information/data manage requests after identification process success. While the requested data remains in a temporary folder.
The synchronisation function accepts verified data only.
4. How provides the defence and safety during data/information flow to the governmental programs and companies?– thereby, how able to boost the efficiency of each company, and how could reduce the consequence of caused damages
The velocity of information exchange important, it is attended by an obedient computer server. PODBOT CS creates harmony between the human race and computers.
Any specific creature uses their intelligence and creating harmony in their society and the closest environment, as possible, does it by high information exchange. Obviously.
PODBOT CS is an appliance, a fellow, who has an ability to learn our personal – best – habits. Who is able to accept/respect our knowledge, able to exist among us; while it will obey. It will support our existence and help our activities; while we should teach to the essence of existence.
Transparent. Eternal. Distinct. Conscious.
The information/data flow velocity and protection ability.
The docile workforce nature is the chance to become to governmental-friendly and corporation efficiency-increaser server.
The security protocol solution of PODBOT CS (ADSC) can protect the users, information/data and connected/accommodated portable devices; this is the real solution to increase the efficiency of productivity.
How able to decrease, evade the damages?
The defensive ability of PODBOT CS does reflect by judgement ability,
Obedience ability (only to authenticated administrators).
These capabilities give power to PODBOT CS to terminate all phishing attempts.
(detailed above in 2nd, 3rd and below in 5th answers)
5. What kind of cybersecurity elements has the server? Which element provides the full cybersecurity against hackers and 3rd party attacks?
PODBOT CS has different entitlements to protect oneself, data, information.
The ADSC system (contains hardware and software components) provides a solution to judge, measure the attack's seriousness; and the necessary defensive processes.
The first defensive line includes
The second defensive lineis the observed, collected, recorded data analysis and examination by ADSC and protocol rules (this process is running continuously).
The third lineis the system complexity and the separated applications for the separated functions.
The fourth defensive lineis the system integrity and complexity.
The fifth line
6. How can adopt this appliance the governmental programs, the educational institutions, and companies?
The user protection is an important issue.
The community and social (national) protection are more important.
The government would like to understand its nation (and nation related issues), companies, because want to protect them. The government can protect them and therefore becomes a protective organ.
7. How to connect to this server the cyber-defence initiations and programs?
PODBOT CS has many privileges to protect sensitive data/information of users/companies.
It increases the efficiency of productivity/functions; while it has transparent functionality, furthermore able to use more communication platform.
It is an advantageous utility for all defensive program because it has impervious defensive line against hackers (see above).
8. How could I join cybersecurity programs, projects with this server?
PODBOT CS has a wide range of capabilities, and I am the inventor and developer of it.
Until this time, I had laid the foundations for this conception.
The sophisticated details are ready for further development and realisation, production.
Cash flow plans related to the profitability and device (capacities, sizes, weights, software elements, components, suppliers, market-segments, production costs, material usage, etc.) can be ready to apply.
Engineers have check calculations.
Designers do every appearance plan.
Calculations (economic, financial, profitability etc.) done, revised by professionals.
Suppliers (like the IT parts and elements) relations signed (the main IT part supplier is the Intel and ARM; they are supplying chipsets, processors, VGA, memory blocks, mass storages).
Material suppliers (aluminium and steel).
Governmental permission to use satellites.
The software programmer team is under recruitment.
The device is ready for further development/production.
I will manage the production, development.
9. Miscellaneous facts.
PODBOT CS includes the latest IT elements, while it is environment-friendly, applies less plastic.
PODBOT CS adopts the best new Information Technology assets; hence, PODBOT CS becomes the most powerful server for graphical-, video and audio editor companies as well.
PODBOT CS is expandable, and its hardware elements are changeable. It has a different kind of software production; users could buy, letting software independently.
This Server has a different kind of software solution, which suitable to satisfy different market segments (educational, commercial, and governmental industries too) and needs.
Vehicle Fleet Management,
Tracking and Loading Software (for cargo co.),
Learning and Teaching Supporter Software,
Synchronisation Software (for self-, and existence Applications),
Security-improver Modules (Applications).
The Server has a general Basic Software Collection, which provides Data/Information, manages users.
PODBOT CS represents the future; it could redeem all desktop computers and old servers (it is a central server, managed wireless network able to serve monitors without computer boxes, hence no need independent computers, only input devices like keyboard, mouse, pen, microphones and gestures.
This Server has multipurpose usage area; it could satisfy market demands and revenue creation.
PODBOT CS may extend the market and could to satisfy more relevant segments because the server has two different sizes and four different portable device accommodation capacity.
The new technologies and developments open new technical, economic, data and information protectoral possibilities, where the interconnection of data/information protection/synchronisation advanced technologies expanding the boundaries of secure, sustainable, and affordable economical possibilities in commercial, governmental/industrial scale dimensions.
Behind the technology is Janos Buresch coordinator, innovator, policy developer and key technology designer.
Janos Buresch is the sole inventor, owner and designer of the original and comprehensive solution of PODBOT CS hardware and software technology.
The PODBOT CS technology has clean and clear IPR, business and juridical status:
• proven solution (advanced solutions),
• invented 100% by Janos Buresch,
• all rights and intellectual property rights100% at this moment is at Janos Buresch solely,
• Janos Buresch is also the key technology designer.
I would like to ask you to overview the general information and find ways for cooperation.
I would be happy to discuss with you about constructive cooperation in the above subject.
If you have any questions, please do not hesitate to contact me. Thank you.
I look forward to your response.
AI has an important rule in IT development
On this blog, you can find some special post.
The posts have according to
cyber dispatch, computer world, new technologies in IT, important news of IT, AI improvements and developments, AI & IT innovation, important and significant economics news (research, improvements, new methods) subjects.
Not all articles are own, some are from other publishers, authors; in this case, you will find a link to the original article, comment etc. at the bottom of the article.
We are focusing on the Australian projects, but we would like to publish other countries' important articles.
Always, we are searching, seeking new opportunities and new developments which could connect to the computer world. Not every time will find the best new ideologies, but everything that we publish, it is significant from the future viewpoint.
Always we want to do our best, but cannot liable all published articles, mistakes and inaccuracy, failure. But we will check all article before publishing them.
If you have any question, do not hesitate to contact us or use chact form.