general enterprise accountingThe General‘™general enterprise accounting

A Standard Enterprise Application Backend

Licences Offered Now!

The General,
is an application that runs as an open and adaptable system. It’s Accounting with Payroll/full HR and Inventory Management (plus Purchase & Sales order Tracking).
Included is a Generalised Asset Maintenance Scheduling, Inspection and Response System. Factory production scheduling and quality assurance are also covered. We can, depending on the risk involved with the system proposed, help you achieve a high level of embedded data security & trust with stable automatic control (programmed and connected using a node.js package called Node-Red-Industrial) in the environment of
“the Internet of Things”

We are currently incorporating a different style of “Trust Layer” based on the IOTA “Tangle” (not a Blockchain, strictly, with zero fees and no mining involved), but with a more varied range of edge-clients and programming languages available. The lack of Mining and therefore fees is enabled by an arrangement where each transaction also validates 2 other transactions. The IOTA system is designed to the German-originated Industrie 4.0 standard, and is completely open-source.

IoT

The IOTA system is at version 2.0, is fully functional, and is also a possibility (plans have been announced) as a provider of Smart-Contract technology (possibly free of fees also). The Elastos Hyperconnect system is inadequate to provide the necessary data processing and reporting capacity needed by an Enterprise IoT System, even ignoring the question of safety of Python as a language. As such, we have been forced to conform to the more traditional centralised structure with edge server/clients near sensors and actuators feeding IoT data to a single central database server in the Cloud, yet performing on-site control locally. This centralised IoT system is separate at the source and in the cloud from the remainder decentralised blockchain-driven system, however we merge notifiable events, validated against the IOTA Tangle, onto the blockchain (from the cloud) after receipt.

The General utilises Permissioned Blockchains to enable advanced, auditable Trading in Services, Commodities and Items (Goods) including the production, quality control, sale and distribution, or leasing of (possibly complex) items from Farm, Mine, Quarry, Mill, Well, Nursery, Market, Construction Industry & Factory-Networks, through Wholesale-Networks, to Retail-Networks and Consumers. Items can contain unlimited-lists of assemblages of (to start with) up to six layers of complexity each, in a scope which may easily be increased to suit your needs.
The General also provides opportunities in Facilities, Fleet and Other Asset Management, for Automated Operational Building/Asset Sensing Actuation and Recording.

We realise that Governance of a Network is of utmost importance, in many ways, and needs to be embedded in the development process as much as in production.

 
    • Our Cloud Installations are well suited to Industrie 4.0 Solutions, using 

      this Artificial Intelligence/Automation Provider,
      that AI/Automation Provider,
      or the other AI/Automation Provider

       (examples only: Any AI/Automation provider or group of providers is viable, including ITOTCCA ourselves)
       
    • As host of your network, we can provide Project Management, coding and other support, for an Industrie 4.0 Solution, at negotiable rates
    • ITOTCCA uses Kubernetes as the Cloud-based Container Management System. Kubernetes includes Kubeflow, an add-on targeted at running Machine Learning models at full scale on TensorFlow (or other M/L platforms), on a Kubeflow node. We are currently testing open source datasets on TensorFlow on a Kubeflow node
    • A Kubernetes system can be built on top of an OpenStack on-premises Cloud base. We recommend the Canonical builds here, for their convenience, economy, flexibility and lack of vendor lock-in. You can employ OpenStack in a hybrid setup combining public Cloud installations where you would benefit from easier, secure global access for sections of business actvity or periods of temporarily increased IT demand.
    The leverage companies can obtain from the planning, operational insights and automation gained using these Machine Learning techniques, spans a very wide range. There is usually a Return on Investment that makes such a system worthwhile, although this needs to be investigated before committing.

    IT <–> OT

  • generalisations
    A noteworthy system is provided by Rexroth (a Bosch company), and is called ctrlX. CtrlX is built on a Rexroth movement automation platform, incorporating an Ubuntu Linux layer, and a design enabling open connections to Industry Standard equipment and systems, with a safe and secure communications/monitoring and design-implementation ability, for flexible factories and installations of the future. The base incorporates a 6-axis Euclidean (orthogonal) co-ordinate system (3 translational, 3 rotational), which, when coupled with timers, can generate any tool-path/rate required by any/all machines under ctrlX. The main idea is to safely and securely remove the traditional “firewall” (“We must never have a ‘Blue Screen’ on the shop floor”) separating the shop floor/field (Operational Technology or OT) from the planning, purchasing, sales and CAD/CAM design systems of company IT domains.

    OT <–> IT

In a factory setting such as the latter, Machine Learning can be employed in a variety of ways to predict breakdowns of machinery or to learn how to cope with various emergency situations and exceptions in production, which may involve rerouting and rescheduling jobs, and much more, in response to production exigencies, such that losses are minimised
It is quite possible for a supply and/or trading network to be established based entirely on Ethereum Smart Contracts and IoT devices, and incorporating Elastos Front End dApps (thus providing the security benefits of ‘Carrier’), but without any Enterprise Accounting Application required to be leased from ITOTCCA. Prices for such a network (or for those members who choose not to have the Accounting) are negotiable. We can interface to existing accounts systems. However, if a customer chooses not to allow us to cross-load their legacy data onto our Postgres system and to use our proprietary ‘Block ‘n’ Tackle’ accounting system, they forego the benefits of Ultimate Database Security in
ChubbyChecker ChubbyChecker“.

 

Alternativelly, in cases where inter-business trading is desirable (eg Supply Chain applications), but the quantities of data to be stored make Blockchains impractical, we offer a system of networked databases as a Back-End, including all companies in the network with their own ‘Member Class’ servers. In our system, currently under development, entitled ‘The Bucordo Project’, the database servers are linked in networks that mimic real Blockchains, with identical immutability and security, but with huge data capacities involving no ‘mining’.
Your Trades Service People and other Service Providers can utilise the system as if it were a simple device-based, mobile-enabled & networked system
  • Bolting-on capacities in cooperation with ITOTCCA is entirely possible, at negotiable rates

     

    The advantages of Blockchains include

    • a fundamental immutability of transactions, even for documents referenced on a Block but stored elsewhere (eg InterPlanetary File System (IPFS) storage).
    • Also, many parties can be involved in automatically validating (or otherwise) each contract or transaction (“Smart Contracts”)
    • With an inter-business networked system employing Smart Contracts, productivity is increased and lost time minimised, because each transaction’s details (due to smart contract action, reliability and visibility) are indisputable and will not need to be checked by other parties to the transaction, removing conflict between trading partners
    • All parties to each transaction possess all appropriate details (and only appropriate details) for each party
    •  

      ITOTCCA can provide Blockchain-networked Secure Database Access systems on the Elastos Smart Web and Hedera Networks which largely automate intra-network trading and leave Banking, Email and and other traditional webservices to the traditional applications. However, at negotiable rates, we can advise on and implement government- and/or vendor-agreement-backed interfaces or workaround methods to save data in files, from Emails, Bank Statements and other traditional Web Services for validated reading into our ultra-secure systems, all initiated by you. As mentioned elsewhere, all but the minimum necessary data to provide our security services remains secret from us and others. You value your Information. We respect that – and we provide our services with Privacy and Security as our highest priorities.

       

       

      The Metadata you “channel” to us, via your devices automatically using our Public Key for encryption, and sent to our Metadata Stores, thence Anchored as a Trace of Traces to Elastos, amounts to a list of 20 data fields as follows:

       

      1. Enterprise Number (entnum – Unique 64-bit Integer)
      2. MemberClass Id (memberClassId – 16-bit Integer for the network’s member classes)
      3. Key (recordId – Unique 128 Hex Character String)
      4. TransactionId (txId – UUID String)
      5. BusinessNetwork (network – Big Integer)
      6. InstallationOrVM (installation – Big Integer)
      7. Database (database – String)
      8. Schema (schema – String)
      9. Table (table – String)
      10. Hash (hash – Byte Array)
      11. ClientId (clientId – Unique 128 Hex Character String)
      12. TxSignStr (txSignStr – String)
      13. BlockId (blockId – UUID String)
      14. SlabId (slabId – Big Integer)
      15. BlockHeight (blockHeight Big Integer)
      16. Amounts (int64Amounts – List of Big Integers [JSONB])
      17. Exponents (int32Exponents – List of Integers [JSONB])
      18. OpCodeExec (opCodeExec – Boolean)
      19. OpCodeCommit (opCodeCommit – Boolean)
      20. MerkleRootHex (merkleRootHex – HexadecimalString)

      Each Enterprise Transaction produces these 20 fields of Transaction Trace Metadata, multiplied by 1024 transactions per block per network then by 24 blocks per slab per network. In addition to these fields, any client data which is indicated by any of the following conditions will likewise be encoded with ITOTCCA’s Public Key, processed then encrypted with the Customer’s Public Key before storage.

      Data Types Requiring Decryption

      • Spatial Data: Geometries and geospatial properties.
      • Metadata: Transactional and spatial metadata.
      • Non-Spatial Data: Attributes linked to spatial entities.
      • Logs and Results: Audit logs, processed query results.
      Operations Requiring Decryption
      • Spatial queries and transformations (e.g., ST_Within, ST_Buffer).
      • Joins, aggregations, and proximity calculations.
      • Validation, filtering, and indexing operations.
      • Processing and formatting results for client delivery.

       

      ALL DATA IS ENCRYPTED BOTH IN TRANSIT AND AT REST

      GENERALLY USING YOUR OWN PRIVATE KEYS, BUT USING OUR PUBLIC KEY,

      OR PARTNERS’ PUBLIC KEYS, TO SEND US CHANNELED, PRIVATE COMMUNICATIONS

      Your set of cryptographic keys remains yours to manage with utter secrecy for different roles and users. We are not privy to customer crypto keys, with the exception of the common, business sub-network-wide, shared list of member public keys, intended to enable channeled secure and private communication.

       

       

      Payments are completed within the few minutes it takes for transactions to be mined, upon acceptance (but only if accepted) at delivery and other check points. QR code technology is applied, so labels are simply “flashed” by a reader upon acceptance. Rejection is handled by a separate operator controlled “soft-button”, on an Android or iOS mobile Tablet device, with selected/entered reasons for rejection, and scope for photographic, audio or video references to be attached and uploaded to the Elastos “Hive” IPFS system (to outline just one Use Case).
    • Digital currency (Elastos “ELA”) can be integrated with our blockchains to greatly facilitate cross-border financial transactions
    • Real Machines, Devices and Objects can become part of the Internet Of Things, enabling Automatic Quality/Location/Dimensions/Safety/Other Control Smart Contracts
    • These contracts can be integrated into a production/distribution or maintenance system
    Other advantages include the offer of Distributed (Shared) yet Private Ledgers, with our use of “Channels”. Elastos’ systems guarantee authenticity and security of transactions
    ElastosElastosRongChen

    We pay in ELA, for trusted Authentication,
    Blockchain and Transport security services

    Very Admiral!

    mobile friendly enterprise applications cloud based applications the general
    The General Package
    If T = the maximum Total number of all member-classes on all commercial networks at any particular month, the General (excluding Automation/Artificial Intelligence) licenses for $AUD150,000 x (1 + 1/T) per month per member class. Entire Network licensing cost is shared between the members in each class, where the classes share the total cost equally in the first instance.
    If you require Industrie 4.0 Standard (IoT/OT/AI) we can still act as the core enterprise accounting application provider, with you developing your Industrie 4.0 Project via your chosen AI/Tooling provider(s) on our specific Blockchain-networked Database Security System, so that your deployed M/L models are totally integrated with the Enterprise DApp, and connected to your Kubeflow/TensorFlow (AI) node, and indirectly connected to your trading partners (other members) for operational matters. Our use of Node-Red-Industrial, together with integrated IOTA connectivity, allows simple connection and programming of IoT controls at cloud-server/fog-client/edge-client/device levels, while obtaining trustworthy validation of IoT actions and events.

    A Blockchain (Sidechain) network consists of Members (separate companies, divisions within an organisation, etc). Each Member organises their own array of devices (including Desktops, Laptops, Tablets, Phones and IoT devices) onto which are copied the Elastos SideChain and MainChain records and connections needed at Device Initialisation. There will be varied Cloud-based Database Server Url arrangements for members of a network, due to the different possible configurations of an installation, connected via the ultra-secure Elastos Carrier network.

    Members split the Basic Monthly Licence Fees according to numbers of Members in Classes.
    • General and Mobile services such as Secure User Logins and Role Authorisations
    • Role-based data access
    • Individualised Push Notifications (our on-phone Contact’s details reminders)
    • System scaling on demand & runtime security services
    • Access to Bank, Tax & Other web services
    • With The General, many Backend Development Costs are on us.
    • A “Member-Class” is a grouping of Members of a Business Network (individual businesses) that indicates nearly identical software requirements within the group.
    • To take the example of the Petrochemical Industry, the Primary producer(s)/driller(s) occupy one member class, Pipeline and Oil-tanker operators the next, refineries another, refined products distribution a fourth, and finally oil products retailers and other petrochemicals processors a fifth member class. Reference to the table below will reveal a development cost of $1.1m per member class, including a 100% development contingency allowance (fully refundable), and with the costs split evenly amongst individual members in a class.
    • We provide one “Class-Site” per Member-Class, fully interconnected with the other sites in your Business Network.
    • ITOTCCA’s charges will be equally split between the Member-Classes in the first instance, to arrive at a charge for each individual Member-Class (as shown in below table), M-C_Chg(i), where i is a variable identifying the individual business network Member-Class. Although i is a variable, M-C_Chg(i) is a constant (ie “the charge per member-class”) across all Member-Classes for any month in a network. If there are j members in Member-Class(i) then the individual charges for each member in that class will be M-C_Chg(i)/j. Thus individual member charges vary between Member-Classes, depending on the numbers in the various member classes.
    • Our pricing system means businesses on smaller margins, and “further from” economic power centres, are not disadvantaged in network pricing. See below:
    •  
    •  
    •  
    •  

       The prices shown include top-level Control/Mechatronics Design and Detail Specification, however the purchase, fitting-out and detailed tuning of hardware/software and overall processes will be your responsibility, an ITOTCCA will fully support integration processes and projects of yours to the extent our software and designs are involved. The actual owner of any factory/plant involved in Control/Mechatronic Engineering activities is responsible to pay (on their own At-Cost basis) for such detailed design, fitting and tuning work as necessary, and accepts responsibility for the payment of bills for low-level design, purchase, fitting and tuning work performed for/at that factory or plant.

    Prices do, however, also include the central Enterprise Accounting and Administration core, with peripheral capacities (such as inter-networking – for easy and efficient Smart Contract operations) which provide a sort of information socket to your network, with database tables designed for your own industry, and readiness for an (on-premises or cloud-based) Kubeflow node, (if you require Machine Learning models to be built, trained, tested and deployed), without any Engineering beyond that needed to accomplish the commercial Enterprise Accounting and Administration core plus high-level Control/Mechatronic Design. Our system does incorporate full IoT support for both connection and programming at the edge, fog and cloud levels, as well as IOTA Tangle connectivity for IoT event and action validation. The core includes provision for Ethereum smart contract coding and operation (Hedera or IOTA smart contracts may also be chosen). Also included is provision for networked database Back End smart contracts, if data quantities are large, precluding Blockchains (Bucordo Project).

    Programming of TensorFlow, PyTorch, Jupyter Notebook etc models occurs with a fee. You can also arrange for your own Machine Learning Models to be built trained tested and deployed by your own employees/contractors, on ITOTCCA’s provided and supported Kubeflow nodes.

    There will usually be a need to allow intercommunication between the (on-prem or public-cloud-based) AI system and the (private/hybrid/public Cloud-based) Enterprise Accounting System. ITOTCCA undertakes to cooperate in the secure engineering of this connection (in Java/gRPC with Protocol Buffer technology and enclosed by Elastos Carrier) for a reasonable fee.

    We include access to Elastic’s ELK Stack, with continuous AI-led Anomaly Monitoring, protecting your organisation against “Inside Jobs”, such as exfiltration of information, and suspicious user activity. By combining this with Carrier, and our adaptation of BFT-SMaRt, including our proprietary “ChubbyChecker” transaction cross-checking system, the net result is easier sleep at night, free from worry about hacking, infiltration, Man In The Middle, Denial Of Service, and all other forms of online attacks. We avoid use of DNS (Domain Name System) wherever possible.
    ChubbyChecker BFT-SMaRt + ChubbyChecker + ELK + Elastos Carrier.

    node-red iota

    If an IoT-operational system were designed, it would similarly need to communicate to the Database in the Cloud (or to your On-Prem cloud servers). This would involve Node-Red-Industrial instructions, wrapped, to be delivered within the Elastos Carrier system to and from the Node-Red webservers, and to and from the Blockchains, Database and IoT Administrators. Electronic control is orchestrated onsite locally using “Industrial Pi” computers, PLC’s etc, located at the “Edge” relative to the Central cloudserver.

    Per “Member-Class”
    All prices($AUD), except as designated (USD), Per “Member-Class”
     
    Initial Application Development
    $AUD Per Member-Class.
    One Member = One Business Channel
    with unique identity
    and ownership of data.

    1 Year-Unit

    = “Project Resources and Superstructure”,
    (Human Resources provided by ITOTCCA following Garage Method),
    incl. 1-2 Build-Squad(s) per Site, for 1 Year

    [Prices herein assume 1 site per Member-Class, but are adjustable.]

     
    Customer Support + Security: per Member-Class
    post Launch includes 9am-8pm (Sydney/London) Monthly (Mon-Sat) access to ongoing live/ticketed support
    Premium 24/7 Support available.

    Amount is split equally among members in the class

    We pay a fee incurred by our
    ChubbyCheckerChubbyChecker

    for security policing employing the Elastos Blockchain,

    which we pass directly to our customers.

    The Daily Total Fee amounts to {$US 0.0504 x ultimate checks per day [eg 144 for a 4-member-class network] x 26 days per month}. Therefore at a pivot value of 4 member-classes and 144 Ultimate Checks (ie writing 144 Merkle Root records per day), an estimate could be $USD 190/M per month per member-class, for a 4-member-class network.
    The total fee is divided equally among the member-classes then each member class divides its own cost-share equally between its own members.
    Usually, “installation” = “network”, but not always.

    AUD Per Month.
    $5,000 – Security Licence
    $20k Support, Consulting, Tickets & Engineering
    Blockchain Fees at cost in USD estimated between $USD190 per member class per month and $USD1900 per class per month, depending on numbers of members and member classes in different networks.
     
    Monthly Network Lease Pymnt

    As a startup in Medical, NGO, Commercial & Industrial Supply Networks
    we offer the incentive of Monthly Lease Payments on a Discounting rate.
    Our formula is determined by the total number of networked member
    classes on all our commercial networks. If this Total = Tm-c, then
    the Price per commercial Member Class,

    Pm-c = $2.5k *
    (1 + 1/Tm-c).


    M-C_Chg(i)

    Ea. Member-Class

    post Launch
    ($AUD) Per Month.
    2 MEMBER-Class-Network being developed-for in current year
     
    $465,000 * (5 + 3/M) = $ 2,635,000 per Year-Unit
    of Initial Devel/Member-Class
     
    $25,000 + Blockchain Fees (eg. 0.5 x USD 190.00/M)

    Support/Security per Consumer Class Member or Member-Class

     
    3,750

    per Total Consumer Class Members
    or Member-Classes

    across all networks

    3 MEMBER-Class-Network being developed-for in current year
     
    $465,000 * (5 + 3/M) = $ 2,790,000 per Year-Unit
    of Initial Devel/Member-Class
     
    $25,000 + Blockchain Fees (eg. 0.75 x USD 190.00/M)

    Support/Security per Consumer Class Member or Member-Class

     
    $3,300

    per Total Consumer Class Members
    or Member-Classes

    across all networks

    4 MEMBER-Class-Network being developed-for in current year
     
    $465,000 * (5 + 3/M) = $ 2,673,750 per Year-Unit
    of Initial Devel/Member-Class
     
    $25,000 + Blockchain Fees (eg. USD 190.00/M)

    Support/Security per Consumer Class Member or Member-Class

     
    $3,125

    per Total Consumer Class Members
    or Member-Classes

    across all networks

    5 MEMBER-Class-Network being developed-for in current year
     
    $465,000 * (5 + 3/M) = $ 2,604,000 per Year-Unit
    of Initial Devel/Member-Class
     
    $25,000 + Blockchain Fees (eg. 1.25 x USD 190.00/M)

    Support/Security per Consumer Class Member or Member-Class

     
    $3,000

    per Total Consumer Class Members
    or Member-Classes

    across all networks

    6 MEMBER-Class-Network being developed-for in current year
     
    $465,000 * (5 + 3/M) = $ 2,557,500 per Year-Unit
    of Initial Devel/Member-Class
     
    $25,000 + Blockchain Fees (eg. 1.5 x USD 190.00/M)

    Support/Security per Consumer Class Member or Member-Class

     
    $2,900

    per Total Consumer Class Members
    or Member-Classes

    across all networks

    7 MEMBER-Class-Network being developed-for in current year
     
    $465,000 * (5 + 3/M) = $ 2,525,000 per Year-Unit
    of Initial Devel/Member-Class
     
    $25,000 + Blockchain Fees (eg. 1.75 x USD 190.00/M)

    Support/Security per Consumer Class Member or Member-Class

     
    $2,850

    per Total Consumer Class Members
    or Member-Classes

    across all networks

    8 MEMBER-Class-Network being developed-for in current year
     
    $465,000 * (5 + 3/M) = $ 2,500,000 per Year-Unit
    of Initial Devel/Member-Class
     
    $25,000 + Blockchain Fees (eg. 2 x USD 190.00/M)

    Support/Security per Consumer Class Member or Member-Class

     
    $2,800

    per Total Consumer Class Members
    or Member-Classes

    across all networks

    9 MEMBER-Class-Network being developed-for in current year
     
    $465,000 * (5 + 3/M) = $ 2,480,000 per Year-Unit
    of Initial Devel/Member-Class
     
    $25,000 + Blockchain Fees (eg. 2.25 x USD 190.00/M)

    Support/Security per Consumer Class Member or Member-Class

     
    $2,770

    per Total Consumer Class Members
    or Member-Classes

    across all networks

    10 Member-Classes – PER MEMBER CLASS in Network being developed-for in current year
     
    $465,000 * (5 + 3/Mem-Classes)= $ 2,464,500.00
    per Year-Unit
    of Initial Devel
     
    $25,000 + Blockchain Fees (eg. 2.5 x USD 190.00/M)

    Support/Security per Consumer Class Member or Member-Class

     
    $2,750

    per Total Consumer Class Members
    or Member-Classes

    across all networks

    20 Member-Classes – PER MEMBER CLASS in Network being developed-for in current year
     
    $465,000 * (5 + 3/Mem-Classes)= $ 2,394,750.00
    per Year-Unit
    of Initial Devel
     
    $25,000 + Blockchain Fees (eg. 5 x USD 190.00/M)

    Support/Security per Consumer Class Member or Member-Class

     
    $2,600

    per Total Consumer Class Members
    or Member-Classes

    across all networks

    30 Member-Classes – PER MEMBER CLASS in Network being developed-for in current year
     
    $465,000 * (5 + 3/Mem-Classes)= $ 2,371,500
    per Year-Unit
    of Initial Devel
     
    $25,000 + Blockchain Fees (eg. 7.5 x USD 190.00/M)

    Support/Security per Consumer Class Member or Member-Class

     
    $2,580

    per Total Consumer Class Members
    or Member-Classes

    across all networks

    40 Member-Classes – PER MEMBER CLASS in Network being developed-for in current year
     
    $465,000 * (5 + 3/Mem-Classes)= $ 2,360,000.00
    per Year-Unit
    of Initial Devel
     
    $25,000 + Blockchain Fees (eg. 10 x USD 190.00/M)

    Support/Security per Consumer Class Member or Member-Class

     
    $2,550

    per Total Consumer Class Members
    or Member-Classes

    across all networks

     

    ATTENTION!
    “The above prices are reliant on a scenario of various types of factories and traders producing, supplying and consuming in a network. Other applications may be less demanding and consequently cost less in initial development and ongoing maintenance. For example if all members in a network essentially have an identical “mission”, a single site for development of all members’ database needs at once is all that is required, and the same to be maintained, and same for the need for a single client “Front End” DApp as well, so each member will share the benefits of scale without needing resources. This would be an example of a simple Industry Wide Solution with a single “Member-Class”, as with the Real Estate Industry.
RealEstateIndustry

However this would not be a trading network. It would require at least 2 or 3 member classes to constitute a real economic supply chain network of any description. There are many possible ways in which the The General might be economised by the nature of the network, depending on the discernible ‘Classes’ of Members whose Class-Interests were nearly identical. One could say that the ‘IT-Mission’ of every Member in a Member-Class should be the same, even if some individual members’ ‘IT-Mission Statements’ (from ITOTCCA’s point of view) need to be slightly broadened to encompass as many Members within the same Member-Class as practically responsible.

Agriculture Fisheries
An example here might be to broaden each individual primary industry DApp and Schema in a Supermarket supply-chain application, to include all other primary industries, and integrate into one application (primary-level-DApp), employing roles within the DApp to differentiate between primary industry types.

 

Petrochemicals_1

This idea might be seen to be almost ‘inverted’ in the case of the Petrochemical industry, where the concentration of economic power is at the Primary Production end of things. In this environment there may be concerns relating to finding more flexible and accurate ways of responding optimally to, say, short, medium and long term demand expectations. If an AI system were ‘hooked up’ to The General, changes (current and predicted) in world conditions, could influence the optimum production locations and rates to be fed directly, via Node-Red organisation and networking and ctrl-X (and other) systems, into mechatronic production hardware control implementations – reaching the field almost instantaneously. In addition, the Industrie 4.0 approach to predicting machinery problems and failures, can extend the optimality of production and minimise losses, by organising maintenance, and reorganising production and distribution as diagnosed by the AI system, in response to in-field conditions, involving data collected and communicated continuously from the sites’ hardware and machinery, and control data being communicated back to machinery in the field after AI analysis.

Petrochemicals_2

 

Also, in the manufacturing industries, some dynamic and fruitful results are to be found, as the abilities of our systems to provide secure and private inter-business networking, supply-chain provisioning, and trading, come to the fore. Business automation becomes possible, not merely in the technical arenas, but in the accounting/payments/auditing, ordering & supply-control spheres that operate between companies. It is possible to control the fluxes of products and inputs for manufacturing endeavours, according to exigencies such as machinery malfunction prediction and adaptation, and demand variation, with the goals relating to minimising losses and improving responses to events, being “understood” by Machine Learning and AI, and applied to analyses of historical and current data. The degree-of-understanding achievable in these ways, is far greater than any levels attainable by human analysis and adaptation alone.
CarFactory

 

ConstructionProject_1

The construction industry provides another example of the potential of ITOTCCA systems. There is a range of suppliers for any construction project, all of whom need to be coordinated and guided to enable timely supply of materials, equipment and services. The benefits to be obtained by employing a system such as we offer, where even complex goods can be produced, tracked and, finally, installed and paid for – on schedule – are hard to ignore. There is no need for arguments about order types and quantities, or other details, nor about agreed timing (allowing for weather of course) since the system utilises a network of database servers that mimics a blockchain, thus bringing with it benefits such as immutability of records and mutually visible details, as appropriate (yet keeping private details private). Payments can be controlled by smart contract action, where multiple parties may participate in single transactions, in the same fashion as Blockchain smart contracts (such as Ethereum) but with unlimited data storage capacity (unlike Blockchains). When you add to these factors the unbeatable security of our cyber systems, backed by the use of 2 blockchain “brands” for separate security functions (Elastos for Authentication and network transport security, and Elastos for Financial/Critical Transaction cross checking and validation), we hope you will agree that ITOTCCA presents a very compelling option.

ConstructionProject_2
To anyone involved in the Health Sector, it comes as no surprise that there is a broad network of Supply-Lines involved in the delivery of safe clinical care. From parts for air conditining equipment cleaning and maintenance to supplies for operating theatres, and far beyond, the requirements for the continuous and reliable supply of high quality inputs are always demanding. Automated and secure Supply Chain networking is desirable. We can make it as affordable as it is secure.
Health-Sector

 

A sample of suggested types of (simplified) use cases for The General, is shown in the following 3 screenshots, where the Head company initiates some Jobs, and we show a range of possible control and communication flows within Supplier companies in the second and third shots. Job 1 is a product test, while Job 5 entails the manufacture of 3 sub-assemblies, by 2 different supplier companies. Job 2 comprises a somewhat more complex set of Electro-Mechanical Unit Tests.
SupplyChainII
SupplyChainIII
SupplyChainI

“The Aerospace Industry provides many examples of Inter-company supply and trading networks. The wide variety of products and parts that are needed to complete the successful production of finished Air and Space craft can only be achieved by the cooperation of many companies worldwide.

AerospaceI

Our cyber systems can provide the security, product-quality assurance, convenience, strategic enablement and usability demanded by the Accounting, Technical and Non-Technical Executives and Administration staff of member companies. Our server networks will be located in data centres around the world, all running by the principles outlined in an IBM article entitled Blockchain Meets Database: Design and Implementation of a Blockchain Relational Database. We have a private code repository where we are developing with a foundational Control-Forte/Control-Finte/Health/Housing system as a 4-cluster network-of-networks, using k3d (Kubernetes on Docker) software, with BFT-SMaRt transaction ordering and replication, and employing Terraform (Infrastructure as Code).

Using databases as de facto blockchains has many benefits, as detailed herein. By adding an Ultimate transactional cross-checking system (ChubbyChecker), and by combining all segments within Distributed Hashtable (DHT) Kademlia server networks, we have attained an unbeatable level of security that avoids the high-risk Domain Name System (DNS) for all but Banking transactions, email and any necessary traditional web services.”

RollsRoyceII
AerospaceII

This is responsive AI-led production, backed by a secure set of immutable audit trails, and based on Trust paid for by our investment in BitCoin Mining (as we pay our transaction fees) providing a built-in insurance guarantee against a global fiat currency collapse by using this Elastos/BitCoin system. When you add to that the revolutionary ultra communications security enabled by Rong Chen and his Elastos Carrier system (the Kademlia DHT networks mentioned above), the argument becomes more compelling.

The hole in the would-be iron-clad system, is the factor of trust demanded by the providers and administrators of the Centralised or on-prem Cloud Database system, in a setup we call Hybrid Web2/3, which computational and network efficiencies simply do mandate. That is to say, current capacities of networks, Client devices, and Blockchains are not sufficient to enable storage of Enterprise quantities of Data, On-Chain. We continue to require databases.

AirbusLogo
AirbusInterior
AirbusCockpit-1 AirbusPower cSpaceX

~ ~ ~ ~

Our solution to this question of trust, is to follow the IBM India lead, and develop a mutually assured Zero Trust system involving all database servers in blockchain-style Transaction-replication business-networks, which are designed to keep all players honest programmatically.

In an overall sense, the procedure is guaranteed by our practice of forming and recording Merkle Trees from Blocks of Transaction traces, followed by calculating the Merkle Roots of the Trees and recording them, one Merkle Root per ‘Slab’ of 24 Blocks of 1024 Transaction Traces, onto the Elastos Blockchain. This is part of the operation of the ChubbyChecker package.

The process anchors the data in a way that is immutable and re-checkable, so we can check for the presence of corruption. If inconsistency is found upon checking (which occurs on every occasion of recording a new Root, since the previous Root’s value can be extracted from the current Root value), alarms are automatically multicast to affected members. A Root Cause Analytic Procedure follows, led by our company, pending an “all-clear” and restart of interrupted production.

~ ~ ~ ~

RongChenElastosCoinElastos

with Carrier2 network transport security

Elastos 代币侧链 China Tibet

PostGIS


Berkeley

PostGIS

Elastos

Elastos Blockchain

Replicação da máquina de estado bizantina para as massas
Byzantine State Machine Replication for the Masses
BFT-SMaRt
Java    Java

ULisboa: BFT-SMaRt Portugal

+ IBM India Research
Indiaभारतीय अनुसंधान

IT/OT Chain & Cloud
Australia

Milo

Peace on Earth. Compassion.
Sustainability. Deterritorialisation.

IBM

authors of

node-red

written in

node.js

Mauringo: author of
Node-Red-Industrial

gRPC Elastos Carrier2: Client-to-BFT-SMaRt/Database

ChubbyPreRegister JavaChubbyPostRegister Go
ChubbyChecker: GoElastos Blockchain vs Database: 

Bucordo

Bucordo Security (BFT-SMaRt)
merged with Carrier, and:

ChubbyCheckerChubbyChecker

Elastos Carrier2 Transport, End-to-End Encryption,
7-Stage x 29-Factor Cross-Checking,
No Operator Read Access, No Operator Write Access

“BFT/DHT BUCORDE”:

Twin-Networked

Striving for the Gold Standard

  • Zero Trust,
  • Zero Tolerated Faults,
  • Utter Data Privacy
  • Total Absence of DNS (ADNS)
  • Sensors Actuators
    Devices Machinery

    iota

    Rexroth

    ctrlX

    “to Fail Safely”

    Google

    Google

    authors of

    Go

    gRPC

    node.js

    .. but sitting in the
    Clouds, appropriating
    our data .. and
    selling
    their inferences ..

    For development

    openSUSE KVM
    k3d PostGIS

    For production

    edb

    juju   JuJu Charms

    Canonical

    Choose the right desktops for your environments,
    and include your developers’ environments amongst the choices.

    CanonicalOpenStack

    Private On-Prem
    & Hybrid Clouds:

    Improve ROI;
    Increase Security

    OpenStack

    Docker + Kubernetes

    Why do people with Accountancy &
    MBA degrees get to make technical
    decisions that impinge upon the
    value, quality, safety, sustainability
    usefulness & security of products
    and services? They, too, are sheep
    feeding on fermented grass.
    Quality flawed by Design.
    Design flawed by Accountants

    Docker + Kubernetes

    Code GUI’s ..
    with Ionic

    ..

    Ionic

    ..

    Save resources ..

    .. containerise with

    Alpine

    war1?

    Honor           Ut Filiae
    Australia?Non  IEAust  ACS Lucis  RIPHAHIntlUniv
    Honores.           Ambulate.

    war2?

    UnitedNations

    ‘Treaty Yeah’

    Australia?

    ‘Honour Not Reward’

    ‘Walk As Daughters
    Of The Light’

    Pakistan

    ایمان، اتحاد، نظم
    ChubbyChecker records Transaction Traces for ongoing comparison with database status reports. In addition we involve the owners/executives of all companies in participation in the multiple daily Database Consistency Checks, with automatically broadcast Trust Alarms in the case of any discrepancies or suspected attempts at theft or fraud, if/when detected by reference to transaction traces on the Blockchain record (in comparison to reported states of the database), as well as those inconsistencies indicated by the database system itself. These reports are based on the Hedera Blockchain as ultimate & immutable source of Truth, with the Hedera system itself ultimately guaranteed by a combination of Byzantine Fault Tolerance, backed by a Governance system overseeing the Proof of Stake controls that effectively prevents collusion of the “33%”-style-of-corruption, amongst Stakeholders. ITOTCCA directors are bound to follow-up database breaches immediately, and when it is possible to determine the company or companies affected initially, a further notification is sent to the relevant CEO(s), CFO(s) and nominated officers. If further investigation is required, and no details of client companies, who appear to be involved as victims, can be determined initially, the automatic notification will have been sent to all client companies, followed by progress updates.
    We perform a Root Cause Analysis and publish the results to all client companies affected, as quickly as possible. As all operators of our databases are fully aware that any attempts at Fraud perpetration will be detected automatically (100%),it is highly unlikely that there will be any such attempts. We remain vigilant, nevertheless.
    It must be noted, however, that this does not constitute the conferring upon client companies an immunity to internal Fraud or Embezzlement, which ITOTCCA simply cannot guarantee against. Our guarantee amounts to an assurance of External Consistency, beyond the walls of your company, and extending as far as the prevention of undetected Database Operator or other External Fraud (Hackers) in relation to Member Class database networks. Your own internal & external auditing, vigilance and a sound company culture, are the only weapons against such internal losses, via the myriad of possible criminal schemes. At least we can confidently say that Network and Cyber Security can be ensured by employing the Elastos Smartweb System (for authentication and net transport security), and Hedera for cross checking database transactions, and that all Transactions will then be (in the words of IBM) “Non-Repudiable”, and verifiable, as each one is accompanied by the digital-crypto signature of the client/user, and all financial/critical transactions (as defined by customer companies) are registered initially at submission time, then upon execution, next at committal/roll-back, and finally cross-checked against the Hedera Blockchain to determine if any inconsistencies exist.
    You may have noticed the reference to “No Operator Read Access” and “No Operator Write Access”. This means no company’s data can be accesed for READ or WRITE purposes by an operator. We were working to employ “Homomorphic” “Client Side Encryption” for all customers. However, apparently, even simple 1-second plain text operations can take more than one week to complete if homomorphic encryption methods are used. So we are returning to a regime where WRITE access by non-users (eg Operators), to user tables, is totally disabled, and there will be no need to notify Company Officers upon the logging of any READ access to a customer’s table(s), since all private data will be encrypted (non-homomorphically) with keys possessed by customer companies alone.
    Our systems do require access, however, to some unencrypted datafields in order for database security checking to function properly, but with non-homomorphic client-side encryption for any important confidential fields (as defined by the customer), that do not enter into data security computations. Fortunately, the data access required by our security functions excludes most of your data, as a very tiny subset only is required by our security systems, and none of that seems confidential in any way (at least to us, at this point), being more in the realm of system-technical data. Remember that our GOOD agreement gives your data pride of place (unlike with Microsoft and Google, for example, who are scrambling currently, to be able to analyse your data for their purposes (driven by greed and the amorality of Accountancy) without decrypting it somehow – in fact anyhow if it can be done legally. This explains the intense research being done into methods allowing a practical equivalent of homomorphic encryption).
    Note that the companies in any particular member class (whether sharing the same server or not), in an internetworked application (ie an inter-business trading or supply chain application) will look up and use an intended communication partner’s Public Key in order to send a communication only decipherable by the partner. Directors, Operators and Employees of ITOTCCA will still not have access to any Private Keys.

    What companies stand to actually gain from our processes, comes down to the way the Virtual Machines on the database nodes are designed to automatically keep each other honest, with the backup of ensuring Utter Honesty via our proprietary Ultimate Checking System. To explain, our System also operates automatically on those same virtual nodes, policing, at 100%, any “escapes” from the main Trust-Enforcing System (designed originally by IBM, but only as effective as any Byzantine Fault Tolerant system can be). With criminal collusion of operators &/or hackers, it would be possible to “override” the IBM security design. However, by performing our own checks against trace records, of all original financial and otherwise critical transactions (as defined by you), made on the Hedera Blockchain, we prevent any such “escapes” from being perpetrated without knowledge of the crime(s) amongst the stakeholders. Such crimes will be automatically notified by alarms broadcast on the secure Elastos Carrier System, to all those affected, within minutes of being committed. Thus, as long as all Payment Gateways to finance facilities in Suspicious or Rogue States remain blacklisted by default at the Cloud Site, the system is secure, since database operators will not have access to alter black or whitelists – an activity in the domain of the customer company only. We add to this, the impenetrable network transport security provided by Carrier2, which bypasses the traditional Domain Name System (DNS), to emerge with a guarantee of “Total External Security” of all your database and data transport networks, outside your company walls.

    As explained on the Agreements page, and above, we cannot do more than this as far as providing guarantees, since it always remains possible to defraud a company from within.

    If your situation demands more than 12 Member Classes on your Business Sub-Network, please refer to the Bucordo Project page for an outline of the methods we employ to handle this.

    To take the example of Disease-based Support & Sponsorship Associations, it may be possible to create a “super” association for IT purposes, let’s call it a group, such that each individual member association has its own singular-company member class server, but where these associations take advantage of the similarities in their “IT Missions” to make savings on the basic application costs, and enter into a networking of their own On-Premises Cloud Servers. In this fashion, the costs of purchasing Initial Development, Trust and Security services can be shared, whilst each Association retains its own server and its own crypto key. In this case, although each member class has exactly one member company, being more expensive than multiple-company member classes, the overall number of member classes involved is still able to create savings (please refer to the price table, above, on this page).
    In such a scenario, the development prices, per member class, quoted in the above table would be reduced, since the different classes would actually have nearly identical Applications to be developed, with only a relatively minor degree of variation between Associations. This would mean a development cost, per member class (per Association), of only somewhat more than the price per member class, as quoted in the table (which is dependent upon the overall number of participating member classes in the group), divided by the number of participating Associations in the group. This represents a considerable saving on the Table-quoted development costs. The ongoing network supply and licensing prices would be the same, per member class (Association), as quoted in the table.
    You should realise that our central replication and transaction ordering application, BFT-SMaRt, will tolerate global-scale server separation and still function correctly. This means it is possible for global-sized server networks, connected under Elastos Carrier 2, to be interconnected in nets of common interest groups, such as the Disease Support and Sponsorship Associations just mentioned, and for those geographically diverse members to run their own Member-Class Servers on their own premises, joined to each other for replication and database security assurance, albeit separated geographically to varying extents. The fact that the intercommunications are shielded by Elastos Carrier 2, makes the networks ultimately secure, not even presenting normal Http connections or websockets to hackers, and using Carrier’s own global network encrypted node-numbering system for “addressing” purposes, bypassing the usual DNS (Domain Name System). Clearly, in a non-trading example such as this, there is no need to share crypto keys.

    RollsRoyceIII

    Productivity for Lease

    with Generalised Functions that can be Adapted

    productivity

    For those running Ubuntu Linux, an introductory dApp (Front End) is available for inspection and trial at “The General”.  On Ubuntu, with git, node.js, java, ionic and cordova, the repo can be cloned and run from root directory (see README.md on the site). Note there are many shortcomings compared to a fully functional dApp as we are still developing The General as a foundational template. As part of the environment for our Proof of Concept, we have 3 Other Branches on our Bitbucket repository. These are: 1. “Roland Royal Dynamics”, a branch representing a fictional Head Company involved in the design, manufacture & marketing of Jet Engines, and 2 branches (from a range of 12 other Member Classes in the model) representing 2. “Jet Engine Nacelle and Acoustic (Noise Attenuation)” design & production, and 3. “Electical/Electronic/Avionic” design & manufacture.

    Here is a screenshot of one of the Member Class dApps so far:

    elegance

    The following image is a representation of the recent state of our Backend development platform. The linked “bucordo” repository reflects this layout in code. “Bucordo” also includes the Ordering and Replication Service (shown in the next image), which guarantees Mutual Trust despite basically existing in a Distrusting environment. It is fully IoT ready. ITOTCCA has overlaid our own proprietary “Ultimate Check” across a traditional Byzantine Fault Tolerant system to achieve an effective Zero-Tolerance of Database faults, whether due to Technical or Malicious reasons.

    kubeeverything

    The next image details the Bucordo and Node-Red_Industrial systems backing The General. Bucordo is about Replication and Transaction Ordering by programmatic consensus among mutually distrusting nodes (server-installations) with each server installation existing at the Member-Class level.

    Elastos

    Opportunities

    • Do you have an idea for a commercial Business Network for which you could envisage a Front End App .. if only someone had the “Backend” Accounting Database expertise you need .. ?
    • Guess What??
    • “We’re here!”
    • We are offering Licenses for our System, ‘The General’, an adaptable Enterprise Accounting Application Backend.
    • We develop on the back of a Postgres database (which we collaborate on), and generate a front end client DApp from our definitions and “chaincode”.
    • The Front End (that we adapt to your needs) accesses the Blockchain Ledgers via Backend gRPC, and connects to File and Relational Database storage via Elastos P2P Carrier Network.
    • The Middleware – residing on a router in front of the database server – is developed by us (in Java) to match the Front End app, acting as a sort of secure & fast ‘bridge’ between front and back ends.
    • Your Front End, which we develop in collaboration with you, accesses this backend gRPC system to create, read, update & delete records (and query or search them) while controlled by the database’s transaction/contract functional logic.
    • ITOTCCA provides full support as per the Response-Time Priority Agreement, to ensure the success of our Project.
    • If you have the vision of a Commercial System or Network that is independent, sustainable & marketable, we will support its development according to agreements between you, the other founding Members, and us.
    • You will need sound commercial ideas and a viable Business Plan.
    ~ As a startup in Medical, Commercial & Industrial Supply Networks, we offer the incentive of Monthly Lease Payments on a Discounting rate. Our formula is determined by the total number of networked member classes across all our commercial networks during any month. If this Total = Tm-c, then the Price per commercial Member Class,
    Pm-c = $2.5k *(1 + 1/Tm-c).

    Licence Fee. ~

    Initial development at Cost.
    ~ “Your Network Idea. Members benefit. Customers benefit” … ~
    personal tech help catch-it2 chubba

            Block ‘n’ Tackle incl Football logo: TM Registered

    The General Package:

     

    • Adaptable, comprehensive Accounting, with Budgeting, Forecasting, Inventory, Payroll & much more.
    • Integrated Tasks, Reminders & Calendar.
    • Full Customer Relations Management System. Instant ‘Push Notifications’ so you can “place” infrequent contacts, as they phone you, from details recorded on database.
    • Uses a Role system to cater for different departments and levels of authorisation.
    • Your Tech Help and Support Desk will be available
      9am – 8pm Mon – Sat Sydney Time,
      offering help with your application, including report design and building
    • The General will be operating 24/7 all year long barring Technical Issues

     

    • Email: john@itotchaincloud.com.au
    • IT/OT Chain & Cloud Australia
    • “Software as a Service”. ITOTCCA, ELASTOS & HEDERA provide a fully functional Backend, including ELASTOS & HEDERA Blockchains & Elastos.Essentials front end with ITOTCCA Ledger Code, and with Python gRPC employing Protocol Buffers, ready to connect to the backend Postgres postgres secure database database.
    • Being Mobile-First developers means your application will work properly for 100% of Use Cases on iOS and Android mobile tablet devices, and on desktop and laptop computers, and integrates communications, contacts, messages, emails, tasks, calendar, etc on your mobile phones.
    • Our sage use of Java, GO and JavaScript and their non-blocking input/output means your app is very quick
    • Customer Relations Management, Sales & Orders, Purchases & Orders, Automated Banking and BPay with Barcode-scanning.
    • Easy Connection to ATO for STS; stay compliant with SuperStream.
    • We employ the services of qualified, experienced and practising Accountants, Engineers and Sales People as our consultant “Beta-Testers”, in a continuous feedback process. We are constantly tuning the application and database.
    • You may assess the services we provide, using the full extent of the functionality attached to the (free, non-obligation) “Initial Sandbox Trial Period” (1 month) in order to become fully aware of what we are offering, that is, after The General is launched.
    • Inexpensive, Reliable: OPEN SOURCE– & CLOUD– BASED
    • The modern ability to scale-up on the Elastos Smart Web upon demand means the application is always responsive, preventing slow and blocked systems
    • Please refer to “Productivity Gains and Better Targeted Marketing” for details of The General’s Services
    • See also Mobile First Development for further details..
    • With over 100 individual Use Cases
    • The General’s here to stay too.