Uses a Business Channel and Role system to cater for Australian Community Housing Organisations & U.K. Housing Associations at once (CHEIRRS)
Inexpensive, Reliable: OPEN SOURCE– & DEVICE– BASED
Being “Mobile-First” developers means your application will work properly for Use Cases on iOS and Android mobile devices, and on desktop and laptop computers
Our sage use of JavaScript and its non-blocking input/output means your app is very quick
Security Courtesy Of:
“ChubbyChecker“.
The modern ability to scale-up on the Elastos Smart Web upon demand means the application is always responsive, preventing slow and blocked systems
The following represents a shot of the current state of “Front End” (GUI) development:
Your Tech Help and Support Desk will be available
9am – 8pm Mon – Sat Sydney Time,
offering help with your application, including report design and building
CHEIRRS will be operating 24/7 all year long barring Technical Issues
“Software as a Service”
We employ the services of qualified, experienced and practising Social Housing Workers and Solicitors as our consultant “Beta-Testers”, in a continuous feedback process.We are constantly tuning the application and database.
Cheirrs provides a full Residents Database, and allows for Support Partners and many types of Community relationships.
We are still searching for $3.0m USD in Capital to complete development of both CHEIRRS and Chubba Morris: as such CHEIRRS is not yet available.
You may assess the services we provide, to the extent of the functionality attached to the (free, non-obligation) “CHEIRRS Sandbox” (1 month) in order to get an indication of what we are offering, that is, after CHEIRRS is launched.
Please note there are 2 possible senses of the words Order and Orderer. One is intended to refer to the ordering of Housing supplies. This is not the sense intended in the following paragraphs. The sense intended is the Ordering of Transactions – ie putting submitted transactions into an order determined by a programmed consensus process on a virtual machine, and then committing or aborting them in that order. The order will appertain to each Virtual Machine independently.
An example of a Fully Developed National Housing Database Network
The following figure shows an array of 5 Cloud Servers, encompassing 42 nodes, with between 7 and 10 nodes per virtual (cloud) server, provisioning one node for Real Estate Agencies (consisting of one database for all agencies with one schema for each company), one node for our Conveyancing dApp, and (assuming 5 signed-up Social Housing Organisations) – 5 nodes, ie one node and database per Social Housing Provider – scalable. In addition there are 35 nodes, one for each Housing Supplier-Class on the remaining 4 virtual servers, with one Database Schema devoted to each individual supplier on their Class-Database. The total number of virtual servers required to realise this network is therefore 1 for the first 5-8 Housing Organisations (co-residing with 1 node for Real Estate and 1 for Conveyancing), and 4 virtual servers to cover the 35 Supplier-Class Nodes.
In total, there are 42 x 42 database-replicas. As noted above, this allows the operation of our BFT-SMaRt/ChubbyChecker anti-hacker network, with automated multi-party inter-company trading via Smart Contracts including unlimited data volumes per transaction. This is a schematic of the sample network:
With all servers located within a single Google Datacentre, the bandwidth available is maximised, so that network communication is fast. Transaction throughput and replication is expected to be very satisfactory. Security against Hackers is guaranteed – 0n the wire (data in transit), by using Elastos Carrier 2.0, and in the database (data at rest) by using our BFT-SMaRt system with ChubbyChecker Ultimate Transaction Cross-Checking: “ChubbyChecker“.
The advantage you gain by participating passively in the above networked arrangement, is that fraud, data exfiltration, and other attacks by hackers can be detected and prevented, with companies on any affected nodes being warned, and then participating in a temporary shutdown and Root Cause Analysis. A similar process would occur if the included AI-led ELK Stack detects an Anomaly in usage pattern by a user of the system. This prevents “insider jobs” from succeeding.
Security provided by Elastos Carrier 2.0 is based on encapsulating your users’ devices and your database in a distributed network, which completely bypasses the traditional DNS (Domain Name System), source of many hacking problems. This provides security for data in transit.
Overall, with the exception of extremely rare “False Negative” results, and also not including internal Fraud or embezzlement, against which one can only employ insurance and internal auditing, we can guarantee absence of external Fraud and the effects of hacking exploits and also guarantee against “inside-user jobs” committed by employees, in relation to data exfiltration. Simultaneously we guarantee net transport security for your data-in-transit. Other threats such as Ransomware attacks will simply fail to affect you, due to client-side encryption of your data in combination with regular half-hourly data backups stored offline (to prevent online access during attacks). In the event of such an attack, you simply restore from backup and carry on, with hackers unable to read the original data they stole and re-encrypted, and with you having safe, clean copies of your data. You take exclusive possession of your company’s encryption keys. Carrier 2.0 prevents Man In The Middle and Denial Of Service attacks by not using the fault-ridden DNS system. You will, however, still need to use DNS for traditional website access and services such as email.