Upload
others
View
0
Download
0
Embed Size (px)
Citation preview
mil.API.fit • Unrealized patent portfolio of up to $100M
• Near production ready for both ultra-secure authentica-
tion services, anonymous browsing on a stick and dis-
tributing “firing solution” supporting command and
control functions
• Investment will move Authentication and Proxy compo-
nents to Azure, upgrade hardware and software to cut-
ting edge and go to production with fully demo-able
hardware and services in addition for staff and consult-
$800k
9%
$1M
2.5%
• Mature, profitable company that develops a
payment processer for Dynamics365. Currently
doing a deployment across all of Lowes Cana-
da
• Investment conditional on use of CSH’s token
across clients at the customer retail endpoint
and possibly launching their own inhouse bank
• Interested in connecting to CxC.exchange
TOUCHPEAK SOFTWARE
$1.5M
40%
• Commodity-to-Commodity n-way barter ex-
change platform
• Has been described by the former Head of
Historical Market Data at Citadel as a possible
avenue to increasing global GDP by an order
of magnitude
$500k
80%
Hospitality.run • Enterprise Hospitality Management System de-
signed to integrate all aspects of even the most
diverse venues, both in house and on the web.
11 high end concepts have asked for this
• Includes optional federated customer profiling
component
• Will leverage StratML.services, touchpeak,
NexDevices and Cyber Saftey Harbor
• Bid proposal for SBIR Topic: A18-030 “Data
tools for the Army Basic Training Environ-
ment”. $500k Phase I funding
• Essentially the Army is looking for wearable
devices, services and modeling tools to un-
derstand performance of individuals in basic
training and adjust their training according-
ly. They have already stated that a complete
rethink of training methodology is on the
table as a result of my first question. What
we suggested was to vary the composition of
crews over training to see how different sets
of individual perform in concert, and they
agreed even with in training there was signfi-
cant value to that.
• We also suggested that, as part of this pro-
ject, we do what Transformation.run coined
“warfighting organizational integration” and
use this data to understand where SETS of
soldiers are best matched to a unit so effec-
tively units receive n-man “ready teams” that
will theoretically train faster to unit stand-
ards since not only were they in the same
training unit but performed well as a team.
They are very interested but unsure of imme-
diate feasibility, follow up question waiting
to be answered.
$2M
30%
• FIPS Certified Layer 2 Software Transport Encryp-
tion solution in production in the DoD and DOE,
including at a Nuclear Power Plant.
• Investment will enable INP to take this solution to
the next level with Artificial Intelligence in prepara-
tion for the unforeseeable attacks coming with
Quantum Computing
• In addition to an equity stake, NexDevices, Cyber
Safety Harbor and Leidos will receive preputial li-
censing
• Founded in January 2011, NexDevices has a worked out
strategy for building consumer and enterprise custom
hardware+software solutions to provide unique and dif-
ferentiating experiences not currently on the market.
• NexDevices will place INP’s solution on silicon and use
it within their own products as well as sell it to third-
parties. Possibly an opportunity for NexNIC.
• NexRouter will be a first party device for CSH: it will be
designed to route Intranet applications to a deployed
CSH Proxy component in Azure established through a
Site-to-Site VPN into their tenants VNET.
• NexPOS will be a first party device for Hospitality.run,
optimized for the touchpeak implemention of CSH.
• NexCenter will be a hardware device to replace an Enter-
tainment’s Center receiver and support a unique inter-
active experience.
• NexCraft is prototyping project for a liquid-rocket-
propelled fixed-engine vector-thrust air&spacecraft.
$2.5M
60%
HUMANS.exchange
CxC.exchange
$300k
80%
CYBER SAFETY HARBOR
• Strategy Markup Language is an ISO and
ANSI standard for semantic, machine-
r e a da b l e , s t r a t eg y d oc u me n t s .
StatML.services is leading the effort on the
Standards Committee to produce a next
generation dialect intended for modeling
purposes as well.
• FOSS, under COIL, project that the DoD has
expressed interest in matching funding to
create a platform that they will use while
StratML.services retains the ability to have a
commercial instance and consult around it.
$250k
60%
• The product is rooted in nearly a decade of Jason
Lind’s theoretical research and design aiming for
the manifestation of an Artificially Intelligent Mar-
ketplace powered by people themselves. See “A
System for Goal Oriented Governance” (2009) and
“Ideal Organization Theory” (2010).
• Premise is that by building organizations that have
well defined “Charter’s” with goals, rights and re-
sponsibilities that are truly mutually agreed upon
by all members that they are no longer subjects
and will thus evangelize the organization itself and
create, formal and informal, federations between
their organization and others.
• LinkedIn is the ideal platform to build ontop of, or
ideally even from within, as the individuals interest-
ed in this kind of entrepreneurship are already on
the platform and LinkedIn’s data is structured to
make this achievable.
• Eventually enable ICO’s, for both individuals
and organizations that trade on CxC.Exchange.
Charter’s will be defined and syndicated on
StratML.services
TRANSFORMATIONLABORATORY@
USAF.leidos
$2.5M
30%
• A joint venture between
Transformation.run and
Leidos to create additional
bandwidth to provide
strategic planning and transformation for Lei-
dos’s Air Force customers with an emphasis on
“out-of-the-box” thinking, driving, and behav-
ior.
• Deliver advanced services platforms for the
Air Force, Prototype technology against ad-
vanced threats, Proof advanced cyberspace
operational concepts
• Developer community collaboration envi-
ronments with operational data to deliver
capabilities like Multi-Mission Domain C2
and Secure cyberspace domain operations
• [email protected] has a broad mandate
where Leidos defines goals for which TL
defines objectives and then executes them
with limited oversight and red tape.
*STAR*QUEST • Mixed reality
GAME promoting
officer mentality
in the general
population as both a recruiting
tool for NATO forces and an
advanced threat generation and defense
simulator.
• The “game” that is really a GAME to CRE-
ATE the Future. Start on the ground, con-
quer Earth’s problems, research the tech-
nology to warp and found the Federation
$2M
75%
$2M
60%
Iugis Torrens
• Wealth Management consulting
company for permuto.xyz
• Is responsible for allocating div-
idend payments to existing or new
entities in the deal
• Activist investing in underlyings
250k
100%
In a world where there is movement
without Kings, Knights and Pawns are
more powerful than a Queen. In a
MAD position her only option is to
Transform, join and singularize all.
permuto!
Synergetic Equitized Transformation Package (SETP) A SETP is very similar to the inverse of a CDO where individual high risk/extremely high reward companies are coupled with lower risk/
high reward opportunities to create a package that is extremely unlikely to outright fail. Beyond that the companies are aligned in a stra-
tegic synergy such that the potential reward is amplified far beyond the individual parts.
How does it work?• Customer gets hardware. Customer Plugs in hardware. Customer contacts contracted vendor and
provides CSH key information, allowing vendor to provision to device.• Vendor can either set up from scratch or deploy modified templates from an existing cloud-based pool of
resources they've previously defined. • Configuration is applied to device and locked into an independent cloud instance for that company.• Modifications to the provisioned resources are limited by the access controls defined by the company.• After revocation of key to support vendor, cloud-based information can only be accessed by that device.
Key-pairing can be granted and revoked from the device interface, allowing vendors to access the device for support and subsets of files without allowing permanent access to all company information.
• The standardized hardware/software platform allows for simple provisioning and migration to another support vendor.
NexRouter:Provides secured connection to CSH,
optionally with a local cache that
persists on disconnection of cloud
access. Provisioning can be done
remotely via privileges granted via
INP.
Provides LAN services such as DNS, DHCP, AD,
RADIUS, WiFi, Femtocell, File and
Printer sharing, authentication and
access control, integration with
security systems and CCTV
Depending on configuration, access to
LAN/Storage/Cloud services is
deprovisioned on loss of network access,
removal of key, or permissions change on
authentication server
CSH authentication can be provided on a per-device or per-office
level using INP tokens
NexPOS Utilizing the increased
security provided by CSH, transactions can be
directly linked to a bank account, avoiding the
necessity of a payment processor.
CSH Authentication Server
AZURE
NexRouter/NexPOS
Ceton InfiniTV4-6 channel
CableCard Tuner
HD/SD Capture
FTA Satellite Tuner
FTA Satellite
Analog/DigitalAudio
PC
Pluggable Module
Interface
Allows integration of upgradeable
ADC/DACs, Analog Interfaces for
Vinyl, High-impedance XLR, etc
Analog Audio
Video Output
Optional 2-8 channel Class-D
amplifiersSpeaker Connectors
NexCenter• A fully-integrated home entertainment solution; the receiver of the future.• A combination of IR transceivers, integrated Class-D amplifiers, high-quality DAC/
ADCs, and optional modules provide a platform to unify and simplify the home entertainment experience.
• Integration of INP hardware tokens allow advanced DRM for internet-delivered content from providers such as NetFlix, Hulu and Amazon.
• Content can be locally cached on the device and licensed on a micro-level.• Access to media portfolios can be granted and revoked using INP
Cyber Safety Harbor Intelligent Net Protection- 3FA hardware token to provide secure access to cloud-based
services- Access to cloud resources requires the hardware key, proxy server and authentication server. Without any one of these three, it is impossible to access the resources.- The proxy server is unreachable without the other 2 factors- Upon removal of the hardware token, no data persists on the host
- FIPS-certified Layer 2 Software Transport Encryption- Layer-2 solution supports any 802 protocols- Layer-2 solution prevents traffic analysis even on LAN- Already deployed in production in military for ~10 years