Musings
Asymmetric Public-Key Cryptography
If you are unfamiliar with the general process followed for SSL sessions you may look here. Asymmetric encryption is used to transmit the secret key that will be used to encrypt the future data of the HTTP session. That is where there have been challenges in the past and potentially the future. Providing a means to make data secret for only the intended party without having any information regarding the recipient party beyond their public certificate.
I am not a cryptographer, but I do know that asymmetric cryography has inherit limiations.
Data Transfer - Global Communications
I long for the time when the notion of travel and communication will be able to overcome many of the physical obsticles that currently limit us. Telecommunications today and the generic term of the Internet has a great deal of limitions that exist well before the limitations of the speed of light come into account.
Data Locallity
Can you process data at it’s source? What is human perception capable of comprehending?
Identifense: Identity Monitoring & Verification Service
Defend yourself with more than words. Capture the activity of your life that you generate on a daily basis and use it for yourself. In a similar manner in which companies like Facebook and Google serve ads tailored for you can be used to authenticate yourself and protect yourself at the same time!
Verification as well as monitoring. This service aims to allow a user to directly provide different data sources like their email, location history, chats, purchases, music and entertainment activity. This is all for the purpose of verifying themselves by asking questions against past activity. Secondly, suspicious or out of scope for the user may trigger alerts.
WorkflowDB: A workflow platform that is also a database
The workflow is a clever way to contain the steps and logic of a business process. What if it could be more? What if it could also store the pertinent data of the workflow? This database is a fully functional workflow that is also a database.
Instead of having to use a database as well to store your results and queries. Your workflows are long-lived and represent the lifecycle of the objects. In the persistence layer with the workflows. Enabling querying based on workflow or entity state. Ability to autowire entities into certain workflow states. It’s a very streamlined approach to application development. You are only dealing with workflows/entities and their state and properties.
There is also a pub/sub aspect where an entity can subscribe to another entity or class of entity that matches the given that will invoke a given state for the subscribed entity. That is extremely powerful.
This is mainly targeted at organizations which have complex workflows with many entity classes. Being able to seamlessly integrate the database and workflow layers to be as one would simplify application development and performance greatly.
BabbageDB: Data Store with Intelligent Architecture
Automated EA governs data and optimizes data based on usage. Data structures become optimized based on the kind of data inputted as well as the nature of the queries. The database becomes the broker for events with triggers and sync and async functions.
NetworkWindow: A tool to add transparency between your network infrastructure, actual traffic, and your application
Security service that looks at your cloud infrastructure and tells you all of the possible paths you can traverse in network. Comparing against network flow logs. Comparing against architectural data flow map. Yields a tool more powerful than an IDS, or IDP.
CloudLines: A scalable cloud workflow and rules engine for the enterprise without the techie
Cloud workflow engine based on lambda style components that can be designed with overlay abstractions (BPMN, etc.) similar to step functions are a state machine. Conditions may be expressed via DSL, or function eval. For big data processing this also needs to handle data locality.
Real Intelligence: A framework for combining human intelligence and experience with machine learning
The anti-AI. This is a high-end rules engine mixed with machine learning capabilities. It is mocking AI because it demystifies the semi-conscious nature that some give to AI. This becomes a framework for building large scale systems that utilize both provided metadata, business rules, as well as statistical data analysis that works together toward an intelligent solution.