We are now in the design of a Proof of Concept (PoC) demonstrator. The president of a major Canadian bank has offered to fund our commercial product development for a small equity stake, contingent upon demonstrating what I said could actually be done. ─────────────────────────── The on-site introduction of a Malware, via a USB, CD or Wi-Fi, is a major concern for Cyber Security experts. We protect against the purposeful injection of a Malware by a malicious employee, the inadvertent introduction of a Malware by a good employee or the pre-meditated attack by an on-site hacker. This extra level of protection is also accomplished without the need or use of detection software, encryption AI or analytics. I have a 30+ year background in electronic component technical sales, sales management, and project management, including the supply of electronic components used in three satellites circulating the globe today. My highest profile satellite project, was the supply of the CCD imaging sensor used in the imaging portion of the European Space Agency VIKING satellite, which produced the first images from outer space of the Aurora Borealis looking like a crown hovering above Earths North Pole. Due to my exposure to a breadth of electronic technologies, I made this major Malware security discovery. ─────────────────────────── One of the main reason I am able to provide this level of Malware Security is because of my discovery and development of a New Class of Computer Components (NCoCC), which has enabled me to do a major redesign of the architecture of the input section of our computers. It is via the input stage where most Malware obtain entry into your computer. When a clean or malware infected user data file (such as Word, PDF and SQL or Oracle data base tables files) are presented to the input of the NCoCC, the output is always no-longer-infected. The other major market for our NCoCC is for the Malware protection of certain types of data communications lines, such as those used in IOT, IIOT, SCADA, Critical Infrastructure and Process Control. Again, without the need or use of detection software, encryption, AI or analytics. ─────────────────────────── We have self-funded this project in to date. Despite our best efforts, we just cannot take this project any further without obtain the financial support needed to hire specialized technical help to build a simple PoC demonstrator, for the bank president mentioned above. Our phone is answered from 8:00 am - 9:00 pm EST, 7dpw. I sincerely invite you the reader to be in contact. For a detailed explanation of my discovery go to www.roati.com
Safe Computing, I cannot see the future, only the now. I can only hope that what I do today will prepare me for tomorrows now.
ROATI Technologies Inc.
1216 - 64 Bramalea Road Brampton, Ontario, L6T 2W8 Canada (905) 846-1233 ( -5 GMT, -5 UTC ) (800) 458-3089 ( USA & Canada ) www.roati.com ralph@roati.com Protecting Electronic Information Phones answered : 7 days per week 8:00 am - 9:00 pm, EST, 5:00 am - 6:00 pm, Pacific Time ≥ 1 hour all World Wide time zones
|