Design and development of computer software for protecting networks from unauthorized penetration by hackers utilizing secure authentication and dynamically rotating encryption algorithms and technologies for the Internet of Things (IoT) economy; Design and development of computer software for secure crypto currency transmissions and secure crypto wallets; Design and development of computer software for a secured network for voting, playing internet games without denial of service, and conducting secured video conferencing; Design and development of computer software for enabling our users to set up secure networks to control and monitor IoT devices protecting national infrastructure, healthcare, public utilities, energy companies, water companies, news broadcasting and entertainment companies from hacking; Development of software for secure network operations; Providing a secured-access website that gives registered Internet networked institutions the ability to upload, view, copy, print, download and share documents and images for the purposes of conducting consumer-driven transactions
Computer and Scientific