Digital Transformation Strategies

Quantum Light Ltd is our cybersecurity subsidiary and dedicated to structuring and delivery of bespoke cognitive computing, smart infrastructure, digital transformation and blockchain innovation system’s architecture. Our Mission is to create powerful solutions for you by working together with your team and IBM resources.

We are in the midst of a Digital Transformation, where the digital and physical worlds are converging and many different problems require more advanced solutions, delivered after careful diagnosis and supported with technical expertise. Together we can deliver cognitive computing, blockchain and “end-to-end” Internet-of-things solutions. We can access together an immense wealth of knowledge, technical expertise, resources and powerful products offered by IBM. We can get you started on your own free trials.

We are committed to deliver to you world-class quality services based on our experience as system analysts and Inventors. At heart, we are system’s architects, supported by a Global Partner platform that is capable of professionally introducing you to many highly trained, expert IBMers from all over the world, whom are capable of working closely with you and your team, enabling us to help you configure, select and acquire bespoke solutions to solve your most critical network security problems.

We can perform for you cost/benefit and systems’ analysis, deliver workshops with CDIO coaches, complete an in-depth TCO analysis; work on DevOps and introduce you to the Secure IBM Cloud. We can work with IT on conversion projects, introduce you to a very broad and deep range of hardware, software, Cognitive/Artificial Intelligence solutions for integration to your business.

Pitch@Palace 9.0

Failure is not an option.”   –  attributed to Gene Kranz, Flight Controller, NASA. – Jerry C. Bostick, Flight Dynamics Officer (FDO) Apollo 13 – Wikipedia.

I have in mind an Entrepreneurial axiom for critical situations, especially being one who loves Artificial Intelligence… I imagine this idea is working for me like a human machine learning algorithm! I’m sure we’re all processing such a powerful shared experience at Pitch@Palace 9.0

Personally, HRH’s inspiring Keynote lecture,  as well as the important words said by Ciaran Martin, CEO NCSC have made me consider carefully BitBond.UK’s commitment to making the UK a safe and secure Country to live and work on-line.  We are grateful to HRH Duke of York for the opportunity to propose building  a new secure SBC digital A.I. radio network for the United Kingdom.

Quantum Light Ltd proposes adding value with bespoke hardware platform secure SBC solutions for vehicular networks. There is scientific evidence to support believing that all great “World Changing Ideas” have followed an evolutionary process involving a sequence of incrementally more perfect versions. Our technology is the product of many prior years of research and development and the insights and eurekas we’ve captured in our new engineering. Rarely do great ideas get implemented at the first try. Rather, all of our great technologies are the result of an incremental, more perfect embodiements of better and better versions of the same original “World Changing Idea.

NASA’s Great Pitch:  Apollo 13 Movie

The legendary Mission Flight Controller Gene Kranz ordered everyone in Mission Control into a packed auditorium and delivered one of the best pitches ever scripted about the Apollo 13 mission.

After a few critical moments, when Apollo 13 transmitted the cryptic words “Houston, we have a problem” Gene Kranz (or “Flight” his Mission Control call sign) drew on a blackboard a circle representing the Earth and smaller one higher up to the right representing the Moon, loudly drawing an “x” and a “y” on the board. One in the midpoint between the Earth and the Moon and the other he drew by pushing hard on the white chalk, extending a screeching line all the way around the Moon and back to the Earth, breaking the chalk with one final “crunching punch” by striking the bigger circle and announcing at the top of his voice: “Gentlemen, this is where we are according to FIDO, in Translunar Injection Trajectory. This is the free trajectory around the Moon and back safely to Earth. This is home, where we are going to bring back this crew. Failure is not an Option!

“The Spirit of Apollo” by Dr. Sidney Newton Bremer, Ph.D. (out-of-print, but you can order one on-line from different sources) is a book that has always inspired me. It was written by one of the leaders of the Apollo Program, who worked behind the scenes to select the people and the astronauts that would eventually design, invent and build one of the most amazing works of engineering and innovation that the world has ever witnessed.

According to Dr Bremer, it was the principle of personal faith in Self, of a deeply rooted sense of destiny and the power to never give up because of their love for their Mission, which drove the men and woman of the Apollo Missions to achieve great success and overcome complexities which are difficult to imagine, even to this day.

Security Framework for IoT

Based on our research, there seems to be ample evidence to prove that our global Internet network infrastructure has been pushed beyond its security capabilities and that it has reached the limit of its original architectural design.Our Internet TCP/IP and (IMS) Multimedia Sub-Systems are fundamentally vulnerable to hacking attacks. The situation is like a carpenter trying to repair a leaking old ship in the middle of a storm… as one leak is plugged the next one squirts open and yet, more “patches” and plugs are fruitlessly issued, while the existential viability of the ship is under stress.

The vulnerabilities with x86 chipsets are just being exposed, while there’s probably an entire portfolio of zero-day exploits that are yet to be let loose in the wild. Creators of cyber-weapons may have lost tight control over some toolkits and these are now in the hands of malicious actors around the world. Therefore, we have to face the fact that an International effort is required to navigate our leaking ship to a safe harbour and there, make some fundamental repairs to the hull, so as to enable our journey in cyber-space to continue safely.

Most of the cyber security presentations that I have recently heard from all kinds of experts, they all seem to accept the fact that most companies and organizations will be hacked. Well, I am surprised that many are willing to accept that, especially in the UK where GDPR laws are coming online this year and getting hacked if not reported in time could get you into deep trouble.

We believe our global hacking epidemic has been caused by faulty and outdated internet system archictecture. The leaking ship is the result of having for years been adding network devices with multiple stack overlays and many times obsolete hardware. Our global IoT network has too many layers, too many obscure DNS routing paths through dark areas of the Internet, which still conduct traffic and are prone to attack. Legacy code and obsolete hardware are found in many countries and many different critical hardware components of the Internet are vulnerable. We must raise to the task and secure the information superhighway for future generations of free people around the world. We are facing literally an information existential threat that we have failed so far to fully conquer, but we must.

The internet of Things and the security of the web itself are still at significant risk of being hacked. Hacking has now become a state-actor sponsored activity and immense capital and technological resources are being poured into outsmarting all of our global Internet computer network security protections and protocols. These malicious actors are using Artificial Intelligence and advanced coding strategies to break into every kind of system, private and governmental. We have to stop this now.

We have to outsmart the hackers… we have to out-innovate the state-actors and leap ahead of all of these threats by conceptualizing, designing and building the Internet infrastructure of the future. We need to move away from obsolete hardware equipment that is rigid and implicitly weak and replace it with an IoT virtual digital network infrastructure, which is capable of reconfiguring itself according to the threat environment. We need to virtualize all of our switching and routing equipment in order to reach an entirely secure Internet of things. A new IoT Security Framework, protected and secured with advanced virtual network switching systems and new all-digital architecture.

We can reach our goal by integrating mobile networks with digital AI cognitive radio hardware. The future IoT infrastructure is being delivered in a new 5G “network of networks” where we shall be able to “ring-fence, protect and isolate” the public network from private, government and especially “Mission Critical Infrastructure” networks.

We believe the revolution brought about by adoption of Blockchain technology will be made manifest in the implementation of new “Secure Blockchain Connect” (UK Pat Pend TM) physical hardware,” together with incredibly advanced new technologies ready for delivery by several corporate giants, as well as other amazing start-ups.

In our case, starting with vehicular networks with our Secure Blockchain Connect products for all types of cars. Our Mission is to build networks of meta-nodes and of highly capable network clients at the edge… each one able to store and process information and together deliver a delay tolerant and highly secure network. We have a duty to the UK and to Europe to prevent system-wide IoT hacks and secure the future for an expanding, massively encompassing Internet.

In the United Kingdom we have all of the hardware and software technologies, the talent and world-class engineering and communications’ skills required to build it, if we work together with Europe and our Partners in the United States.

So, let’s build it together.

IBM Blockchain Revolution Christmas Talk

Canterbury Christ Church University on 8th December 2017

We want to thank the Senior staff at the University for the wonderful invitation to deliver this years Christmas’ lecture. It was a pleasure having an engaged and fun audience and we are grateful for a warm reception. We look forward to our continued Mainframe work with IBM Blockchain and Z Systems groups.

We welcome new inquiries for our 2018 Internship programme.

We want you to think about Bitcoin as a computer application and Blockchain as an operating system on which it runs. Our open world wide web and then entire system of cash payments and assets transfers is about to be launched into one of the most important transformations of our time.

We call this the Blockchain Revolution.