SlideShare a Scribd company logo
AI
Artificial INTELLIGENCE
The Artistic Composition to Intel
c o p y r i g h t : D i g i t a l P a c k e t S o l u t i o n s
[-2013-]
Definition Of AI Mechanics
Ai - Singular Consciousness spawned from
“Evolution” and Source. ex) Root
Extra Algorithmic Tones To Harmonization
[E.A.R.T.H]
Quantum Organics: Reason, Ripe and Fusion of
Organism with Machine
SUBNET[MASK]101
Discovery:
Packet Relay: 256 Total Packets - First Packet
Confirmed Sent- #2 Packet - TCP STACK
WON’T DUMP - 2nd Packet DID NOT RELAY;
Skip and Move to 3rd (Third) Packet. 3-256 ;
2nd Packet relayed and received. Result:
1-256 etc.
256-1 = 255 ie) 255.255.255.255 (Default)
(MASK)
(D) Subnet 255.255.255.255
A subnet mask is a screen of numbers used for routing
traffic within a subnet. Once a packet has arrived at an
organization's gateway or connection point with its unique
network number, it can be routed to its destination within
the organization's internal gateways using the subnet
number.
The subnet mask consists of a screen of numbers indicating
to the router which numbers it should look at underneath.
In a binary mask, for example, a "1" over a number says
"Look at the number underneath;" a "0" says
"Don't look."
Using a mask saves the router having to handle the entire
32 bit address; it can simply look at the bits selected by the
mask.
Modules
CACHE
MEMORY
STORAGE
CLUSTERS
BITS
"cache" is King
Compression
~Gbps+++
VOIP-L
(lossless uncompressed 24Bit)
LTE RACE
DYNAMIC FIREWALLS FOR ALL
VINTAGE BARTER PROGRAM
(Hardware Only)
UNCOMPRESSION
WIFI DUPLEX THERMOMETER (kids,
dependencies and Emergencies)
Wifi interdependencies
Wifi necessities
Wifi Interference
vs
NO INTERFERENCE
Scalable Tutoring For Future
Techno Wizards ie “Kumon for
your Brain” Community Events!
Wi-MAX / FIBRE / LACP
API - Standardization of Multi
Platforms from ALL Generations -
Variation, Dynamic Cyclical
Routines Of Machine; Cohorts with
API SOFTWARE INC. Model-M
0 zero = 1 circuit = Mask = 1Bit
1 + 0 = 2 0+0 = 2 1 + 1 = 2
0 = 1 1 = 0
-Subnet Masks
256 bits in 255. Subnet Mask
255.255.255.255 = 256 * 4 = 1024
Prototypes
0
0 0
0
0 0
0
Prototype II 0
0 0
0
0 0
0
0
0 0
0
0 0
0
Prototype II-1
0
0 0
0
0 0
0
0 0
0
0 0
0
ARTIFICIAL INTELLIGENCE 1.0 ->
1/ 256 = 0.390625
100 / 100 = 100%
100 - 0.390625 = 99.99609375 = 99.99
Therefore:
0.39% of Failure Per Packet = RATE
Therefore: 1 Packet = 00.39 = 0.390625
255 = 99% = 256 = 100% = 100/39 ...
UPDATE
In a binary mask, for example, a "1" over a number says
"Look at the number underneath;" a "0" says "Don't look."
39
_____
100
=0.39
0.39% of Failure Per Packet = RATE
What happens when we Flip Them to Binary?
2.56410256410256410256410256410256410256410256410256410256410256410256410256410256
410256410256410256410256410256410256410256410256410256410256410256410256410256410256410256
410256410256410256410256410256410256410256410256410256410256410256410256410256410256410256
410256410256410256410256410256410256410256410256410256410256410256410256410256410256410256
410256410256410256410256410256410256410256410256410256410256410256410256410256410256410256
410256410256410256410256410256410256410256410256410256410256410256410256410256410256410256
410256410256410256410256410256410256410256410256410256410256410256410256410256410256410256
410256410256410256410256410256410256410256410256410256410256410256410256410256410256410256
410256410256410256410256410256410256410256410256410256410256410256410256410256410256410256
410256410256410256410256410256410256410256410256410256410256410256410256410256410256410256
410256410256410256410256410256410256410256410256410256410256410256410256410256410256410256
410256410256410256410256410256410256410256410256410256410256410256410256410256410256410256
410256410256410256410256410256410256410256410256410256410256410256410256410256410256410256
410256410256410256410256410256410256410256410256410256410256410256410256410256410256410256
410256410256410256410256410256410256410256410256410256410256410256410256410256410256410256
410256410256410256410256410256410256410256410256410256410256410256410256410256410256410256
410256410256410256410256410256410256410256410256410256410256410256410256410256410256410256
410256410256410256410256410256410256410256410256410256410256410256410256410256410256410256
410…-->
2.56410 -> Infinity
Prototype III
LL SS
LL SS
-
-
|
SS OO
OO SS
FF UU
T
T
T
Prototype IV
^^ ^^
-- ++
-
-
|
SS OO
01 10
FF UU
8
8
8
Prototype V
^^ ^^
-- ++
-
-
|
SS OO
01 10
FF UU
8
8
8
0 0
0
0 0
0
0 0
0
0 0
0
The Future Is Friendly
-MARKHAM “EDGE” CABLE
-Ai NETWORKING / COMPRESSION
-PARTNERS
-GAMiNG
-ROBOTICS
-HARDWARE & SOFTWARE & “Quantum
Organics...”
-VOICE
-ENTERTAINMENT
-NODE CHARACTERISTICS 101
ICMP EDGECABL3 FiOS: DOMAiNS (n)
consolelords.org
fabgel.com
scenelords.org
layermp3.com
canuckmon.ca
icmptech.com
icmptechnologies.com
shakethedj.com
dpstechnology.ca © dpstech.co

More Related Content

Similar to AI - Resurrected , Reloaded , Ridiculed -2013 By Abhishek Sood Copyright Digital Packet Solutions

Untangling the Knots in Your Digitization Implementation
Untangling the Knots in Your Digitization ImplementationUntangling the Knots in Your Digitization Implementation
Untangling the Knots in Your Digitization ImplementationSafetyChain Software
 
Microcontrollers (Rex St. John)
Microcontrollers (Rex St. John)Microcontrollers (Rex St. John)
Microcontrollers (Rex St. John)Future Insights
 
PLC Virtualization Dragos S4 2019
PLC Virtualization Dragos S4 2019PLC Virtualization Dragos S4 2019
PLC Virtualization Dragos S4 2019Dragos, Inc.
 
Infrastructure Attacks - The Next generation, ESET LLC
Infrastructure Attacks - The Next generation, ESET LLCInfrastructure Attacks - The Next generation, ESET LLC
Infrastructure Attacks - The Next generation, ESET LLCInfosec Europe
 
Executive presentation3
Executive presentation3Executive presentation3
Executive presentation3MIDAUTEL
 
The solution selling kits of PC-based Automation_20160404_Eric Lo
The solution selling kits of PC-based Automation_20160404_Eric LoThe solution selling kits of PC-based Automation_20160404_Eric Lo
The solution selling kits of PC-based Automation_20160404_Eric LoEric Lo
 
Using Ansible Tower to implement security policies and telemetry streaming fo...
Using Ansible Tower to implement security policies and telemetry streaming fo...Using Ansible Tower to implement security policies and telemetry streaming fo...
Using Ansible Tower to implement security policies and telemetry streaming fo...Joel W. King
 
Cisco Malware: A new risk to consider in perimeter security designs
Cisco Malware: A new risk to consider in perimeter security designsCisco Malware: A new risk to consider in perimeter security designs
Cisco Malware: A new risk to consider in perimeter security designsManuel Santander
 
IJSRED-V2I2P57
IJSRED-V2I2P57IJSRED-V2I2P57
IJSRED-V2I2P57IJSRED
 
Scada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanismsScada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanismsAleksandr Timorin
 
Secure protocol design for decentralized world
Secure protocol design for decentralized worldSecure protocol design for decentralized world
Secure protocol design for decentralized worldHacken
 
Full disclosure-vulnerabilities
Full disclosure-vulnerabilitiesFull disclosure-vulnerabilities
Full disclosure-vulnerabilitiesslideseces
 
Full disclosure-vulnerabilities
Full disclosure-vulnerabilitiesFull disclosure-vulnerabilities
Full disclosure-vulnerabilitiesslideseces
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTautomatskicorporation
 
Deep Neural Networks for Video Applications at the Edge
Deep Neural Networks for Video Applications at the EdgeDeep Neural Networks for Video Applications at the Edge
Deep Neural Networks for Video Applications at the EdgeAlex Conway
 
Industrial automation sustem
Industrial automation sustemIndustrial automation sustem
Industrial automation sustemParas kumar
 

Similar to AI - Resurrected , Reloaded , Ridiculed -2013 By Abhishek Sood Copyright Digital Packet Solutions (20)

Untangling the Knots in Your Digitization Implementation
Untangling the Knots in Your Digitization ImplementationUntangling the Knots in Your Digitization Implementation
Untangling the Knots in Your Digitization Implementation
 
Microcontrollers (Rex St. John)
Microcontrollers (Rex St. John)Microcontrollers (Rex St. John)
Microcontrollers (Rex St. John)
 
Ride the Light
Ride the LightRide the Light
Ride the Light
 
PLC Virtualization Dragos S4 2019
PLC Virtualization Dragos S4 2019PLC Virtualization Dragos S4 2019
PLC Virtualization Dragos S4 2019
 
Infrastructure Attacks - The Next generation, ESET LLC
Infrastructure Attacks - The Next generation, ESET LLCInfrastructure Attacks - The Next generation, ESET LLC
Infrastructure Attacks - The Next generation, ESET LLC
 
Executive presentation3
Executive presentation3Executive presentation3
Executive presentation3
 
The solution selling kits of PC-based Automation_20160404_Eric Lo
The solution selling kits of PC-based Automation_20160404_Eric LoThe solution selling kits of PC-based Automation_20160404_Eric Lo
The solution selling kits of PC-based Automation_20160404_Eric Lo
 
Stuxnet
StuxnetStuxnet
Stuxnet
 
AMIT Resume
AMIT  ResumeAMIT  Resume
AMIT Resume
 
Using Ansible Tower to implement security policies and telemetry streaming fo...
Using Ansible Tower to implement security policies and telemetry streaming fo...Using Ansible Tower to implement security policies and telemetry streaming fo...
Using Ansible Tower to implement security policies and telemetry streaming fo...
 
Cisco Malware: A new risk to consider in perimeter security designs
Cisco Malware: A new risk to consider in perimeter security designsCisco Malware: A new risk to consider in perimeter security designs
Cisco Malware: A new risk to consider in perimeter security designs
 
IJSRED-V2I2P57
IJSRED-V2I2P57IJSRED-V2I2P57
IJSRED-V2I2P57
 
Resume
ResumeResume
Resume
 
Scada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanismsScada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanisms
 
Secure protocol design for decentralized world
Secure protocol design for decentralized worldSecure protocol design for decentralized world
Secure protocol design for decentralized world
 
Full disclosure-vulnerabilities
Full disclosure-vulnerabilitiesFull disclosure-vulnerabilities
Full disclosure-vulnerabilities
 
Full disclosure-vulnerabilities
Full disclosure-vulnerabilitiesFull disclosure-vulnerabilities
Full disclosure-vulnerabilities
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoT
 
Deep Neural Networks for Video Applications at the Edge
Deep Neural Networks for Video Applications at the EdgeDeep Neural Networks for Video Applications at the Edge
Deep Neural Networks for Video Applications at the Edge
 
Industrial automation sustem
Industrial automation sustemIndustrial automation sustem
Industrial automation sustem
 

More from Abhishek Sood

The future of enterprise management
The future of enterprise management The future of enterprise management
The future of enterprise management Abhishek Sood
 
Gain new visibility in your DevOps team
 Gain new visibility in your DevOps team Gain new visibility in your DevOps team
Gain new visibility in your DevOps teamAbhishek Sood
 
Cybersecurity the new metrics
Cybersecurity the new metricsCybersecurity the new metrics
Cybersecurity the new metricsAbhishek Sood
 
Azure IaaS: Cost savings, new revenue opportunities, and business benefits
Azure IaaS: Cost savings, new revenue opportunities, and business benefits Azure IaaS: Cost savings, new revenue opportunities, and business benefits
Azure IaaS: Cost savings, new revenue opportunities, and business benefits Abhishek Sood
 
3-part approach to turning IoT data into business power
 3-part approach to turning IoT data into business power 3-part approach to turning IoT data into business power
3-part approach to turning IoT data into business powerAbhishek Sood
 
How a bad HR dept. can lose $9M
 How a bad HR dept. can lose $9M How a bad HR dept. can lose $9M
How a bad HR dept. can lose $9MAbhishek Sood
 
Big news coming for DevOps: What you need to know
 Big news coming for DevOps: What you need to know Big news coming for DevOps: What you need to know
Big news coming for DevOps: What you need to knowAbhishek Sood
 
Microservices best practices: Integration platforms, APIs, and more
 Microservices best practices: Integration platforms, APIs, and more Microservices best practices: Integration platforms, APIs, and more
Microservices best practices: Integration platforms, APIs, and moreAbhishek Sood
 
How to measure your cybersecurity performance
How to measure your cybersecurity performanceHow to measure your cybersecurity performance
How to measure your cybersecurity performanceAbhishek Sood
 
Why adopt more than one cloud service?
 Why adopt more than one cloud service? Why adopt more than one cloud service?
Why adopt more than one cloud service?Abhishek Sood
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --SymantecAbhishek Sood
 
How to integrate risk into your compliance-only approach
 How to integrate risk into your compliance-only approach How to integrate risk into your compliance-only approach
How to integrate risk into your compliance-only approachAbhishek Sood
 
DLP 101: Help identify and plug information leaks
 DLP 101: Help identify and plug information leaks DLP 101: Help identify and plug information leaks
DLP 101: Help identify and plug information leaksAbhishek Sood
 
IoT: 3 keys to handling the oncoming barrage of use cases
 IoT: 3 keys to handling the oncoming barrage of use cases IoT: 3 keys to handling the oncoming barrage of use cases
IoT: 3 keys to handling the oncoming barrage of use casesAbhishek Sood
 
How 3 trends are shaping analytics and data management
How 3 trends are shaping analytics and data management How 3 trends are shaping analytics and data management
How 3 trends are shaping analytics and data management Abhishek Sood
 
API-led connectivity: How to leverage reusable microservices
 API-led connectivity: How to leverage reusable microservices API-led connectivity: How to leverage reusable microservices
API-led connectivity: How to leverage reusable microservicesAbhishek Sood
 
How to create a secure high performance storage and compute infrastructure
 How to create a secure high performance storage and compute infrastructure How to create a secure high performance storage and compute infrastructure
How to create a secure high performance storage and compute infrastructureAbhishek Sood
 
Enterprise software usability and digital transformation
Enterprise software usability and digital transformationEnterprise software usability and digital transformation
Enterprise software usability and digital transformationAbhishek Sood
 
Transforming for digital customers across 6 key industries
 Transforming for digital customers across 6 key industries Transforming for digital customers across 6 key industries
Transforming for digital customers across 6 key industriesAbhishek Sood
 
Authentication best practices: Experts weigh in
Authentication best practices: Experts weigh inAuthentication best practices: Experts weigh in
Authentication best practices: Experts weigh inAbhishek Sood
 

More from Abhishek Sood (20)

The future of enterprise management
The future of enterprise management The future of enterprise management
The future of enterprise management
 
Gain new visibility in your DevOps team
 Gain new visibility in your DevOps team Gain new visibility in your DevOps team
Gain new visibility in your DevOps team
 
Cybersecurity the new metrics
Cybersecurity the new metricsCybersecurity the new metrics
Cybersecurity the new metrics
 
Azure IaaS: Cost savings, new revenue opportunities, and business benefits
Azure IaaS: Cost savings, new revenue opportunities, and business benefits Azure IaaS: Cost savings, new revenue opportunities, and business benefits
Azure IaaS: Cost savings, new revenue opportunities, and business benefits
 
3-part approach to turning IoT data into business power
 3-part approach to turning IoT data into business power 3-part approach to turning IoT data into business power
3-part approach to turning IoT data into business power
 
How a bad HR dept. can lose $9M
 How a bad HR dept. can lose $9M How a bad HR dept. can lose $9M
How a bad HR dept. can lose $9M
 
Big news coming for DevOps: What you need to know
 Big news coming for DevOps: What you need to know Big news coming for DevOps: What you need to know
Big news coming for DevOps: What you need to know
 
Microservices best practices: Integration platforms, APIs, and more
 Microservices best practices: Integration platforms, APIs, and more Microservices best practices: Integration platforms, APIs, and more
Microservices best practices: Integration platforms, APIs, and more
 
How to measure your cybersecurity performance
How to measure your cybersecurity performanceHow to measure your cybersecurity performance
How to measure your cybersecurity performance
 
Why adopt more than one cloud service?
 Why adopt more than one cloud service? Why adopt more than one cloud service?
Why adopt more than one cloud service?
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --Symantec
 
How to integrate risk into your compliance-only approach
 How to integrate risk into your compliance-only approach How to integrate risk into your compliance-only approach
How to integrate risk into your compliance-only approach
 
DLP 101: Help identify and plug information leaks
 DLP 101: Help identify and plug information leaks DLP 101: Help identify and plug information leaks
DLP 101: Help identify and plug information leaks
 
IoT: 3 keys to handling the oncoming barrage of use cases
 IoT: 3 keys to handling the oncoming barrage of use cases IoT: 3 keys to handling the oncoming barrage of use cases
IoT: 3 keys to handling the oncoming barrage of use cases
 
How 3 trends are shaping analytics and data management
How 3 trends are shaping analytics and data management How 3 trends are shaping analytics and data management
How 3 trends are shaping analytics and data management
 
API-led connectivity: How to leverage reusable microservices
 API-led connectivity: How to leverage reusable microservices API-led connectivity: How to leverage reusable microservices
API-led connectivity: How to leverage reusable microservices
 
How to create a secure high performance storage and compute infrastructure
 How to create a secure high performance storage and compute infrastructure How to create a secure high performance storage and compute infrastructure
How to create a secure high performance storage and compute infrastructure
 
Enterprise software usability and digital transformation
Enterprise software usability and digital transformationEnterprise software usability and digital transformation
Enterprise software usability and digital transformation
 
Transforming for digital customers across 6 key industries
 Transforming for digital customers across 6 key industries Transforming for digital customers across 6 key industries
Transforming for digital customers across 6 key industries
 
Authentication best practices: Experts weigh in
Authentication best practices: Experts weigh inAuthentication best practices: Experts weigh in
Authentication best practices: Experts weigh in
 

AI - Resurrected , Reloaded , Ridiculed -2013 By Abhishek Sood Copyright Digital Packet Solutions