Brett L. Scott
480.463.4628
blscott@scottnet.com
Home Software Development Strategic Consulting Security Analysis Neural Grid Computing Current Projects Speaking Engagements Resumes and Interview

Neural Grid Computing


Background

This system was originally designed to be a search engine that qualified and verified results. While automating an ISP's systems, I was asked if there was anything an ISP could do to differentiate itself from other ISPs. I proposed that a search engine that actually gave you relevant results would be such a differentiation. I developed a small prototype in a few hours and demonstrated it to the ISP. They did not take to the idea. However, it captured me completely and I have been working on it ever since.

As someone who has continuously operated a distributed neural computing grid since 1995 (19 years), I have extensive experience and well established best practices. My system designs are not simple proofs of concept or artifacts of organically grown research, they are battle hardened and used for business 24/7.

My systems are capable of working independently or as part of dynamic grid collaboration groups. The design is fault tolerant and uses a security model that allows it to operate on both public and private networks. In some cases both simultaneously. The system communicates securely and uses secure transmission techniques to ensure the best possible communication security.

The system is self load-balancing, fault tolerant, and does not lose information even in catastrophic situations. The system can be placed into software, hardware, and firmware. It is operationally efficient and not bandwidth intensive.

The Neural Computing Grid is comprised of software clients called Neuralizers and report themselves as such in the user-agent parameter. All of the clients work together seamlessly even though they are separated geographically. In addition to being separated, the NCG clients also can be "multi-homed" such that a single NCG client (Neuralizer) can serivice workload from multiple locations or sources. There is no limitation on the number of source locations. Additionally, a client can be "temporarily" re-homed to another server. The current version is 2.0.xxx and the referrer is listed as ScottNet(tm). Therefore if you were wondering who that was, it was some part of my grid.
What is Distributed Neural Computing / Grid Computing?
Neural computing also known as "grid computing" is software that aggregates processing power from many computers into a single computing system that is very powerful. Essentially, neural computing takes unused processor "cycles" and aggregates them into a virtual supercomputer. The "distributed" part of this system is that it operates from machines that are located all over the world. Most grid computing projects today are geo-centric and operate in a single lab, building, etc. By distributing the grid, the participants gain new capabilities, greater fault tolerance, and an easier implementation.

Why is this relevant to me?
Neural computing grids are definitely the most powerful emerging information technology. The sheer power, agility to avoid DDos attacks, and overall ability to automate across heterogonous and asymmetrical information systems cannot be ignored. As someone who utilizes a distributed neural computing grid, and have done so since 1995, I can tell you this is the most useful tool in my "bag of tricks".


What does your NCG do for you?
This NCG has been in existence since 1995 and has been under continuous development. As of March 1, 2006 it does the following;

e-Commerce
Processes transactions for the following payment platforms - Authorize.Net, WorldPay, Echo, Transfirst, Cybersource, CyberCash, EPX, YourPay, PayPal, and a few others. This includes credit card processing, ACH / e-Checks, credits.

Shipping
Processes transactions for fulfillment via FedEx, UPS, and the United States Postal Service USPS. This includes shipping requests, tracking number assignments, and automated shipping label creation, tracking inquiries, automated tracking number cancellation for unused tracking numbers, shipment cancellations, and address validations. It handles BOTH domestic and international shipments.

Email
Interfacing with ExactTarget. This includes list creation, management, deletions, subscriber creation, management, deletions, email broadcasts, email tracking and reporting. Email address validation. This system quietly and stealthily validates email addresses as part of a contact management suite I built to maintain my contacts.

RSS and NNTP
It queries news and RSS feeds and examines them for "relevant" news. Upon discovery it will deliver the content to the appropriate "receivers" (human, machine, or both).

Research
It currently processes over 120 million information targets a day. They are comprised of web sites, news, ftp sites, gopher sites. Users may target information using a sophisticated but simple to configure searching method. Information is analyzed based on "relevance" comprised of both keywords and other "relevance" algorithms. The searching is symbology independent and therefore can search in any language. It also searches data patterns for things like ciphers, steganographic images, facial patterns, etc. Information is delivered via email, secured web login, and other delivery methods.

Networking and Security
  • It will automatically "triangulate" IP addresses to detect and track "spoofed IP addresses".
  • It offers specific clients the ability to "respond" to cyber attacks.
  • It automatically queries ARIN, APNIC, RIPE, AfriNic to determine the owners of IP addresses or address blocks.
  • It will perform web site, web service, or port monitoring.
  • It communicates via HTTP, SSL, and proprietary mechanisms.
  • Traffic is multi-layer encrypted for security and absolute privacy.
  • The system can operate "stealthily" to preclude detection of the original point of origin for any request.
  • The system cannot be blocked by any form of network denial strategy.
  • Can be used to detect network asymmetry to identify "man in the middle" attacks.
  • other special tricks and functions.
Google APIs
The NCG now will make geocoding calls to Google's API. This system will take a postal address, contact Google who will partially clean the address, then my system will return the data and update a database.

Other functions
It will emulate any web browser / user activity.
It is capable of communicating via instant messaging services.
Other stuff that is not for release to anyone yet.
Those who participate on my NCG agree to participate in parts or all of the system's capabilities. Most want that to happen anyway. Network traffic is completely controlled and routed. Therefore, workload can be isolated to specific clients, workgroups, or systems. Peering agreements are also easily handled. The system can operate over private networks and public networks simultaneously. The workload assignments can be coordinated from my systems, private systems, or both. Individual workload assignments are also completely routable. Assignment and destination for workload assignments can be different. There is simply too much about this systems functionality to describe in a paragraph or two.

The system is also completely fault tolerant to software problems, hardware failures, network failures, etc.



The trademarks and service marks belong to their respective owners and are used for purposes of explanation only.

 


Copyright 1987 to 2014 - Brett L. Scott - All rights reserved worldwide.
Powered by ScottNet