Trade Secret: |
1. Application programming has been eliminated and replaced with an artficial intelligent assistant that is driven by knowledge expressed as Business Rules. |
2. Business rules are stored as data that is easilly maintained using lists and forms. |
3. The elimination of programming means: |
(1). The cost of continual evolutionary improvements are dramatically less than any competitor. |
(2). The time to make an improvement may be just a few moments and the improvement is operational for all approved people instantly. |
(3). The quality of an improvement is self-checked and verified or ignored to ensure that the application cannot fail. |
(4). The risk of a programming defect has been eliminated, however business rules may be contradictory or incomplete. |
(5). The risk from a program hacker has been eliminated - programs are not permitted to execute on any server. |
(6). Downtime has been eliminated - Eliza never stops and cannot be stopped. |
(7). Software distribution has been eliminated - no software needs to be downloaded and everybody is always working with the very latest edition. |
(8). Program patching has been eliminated - no updates are to be downloaded on a regular basis. |
(9). The application may be used with any kind of computing device with any version of any operating system - switch on, open a browser, enter the URL address and sign-in. |
(10). The application was purposefully designed for ease of maintenance with built in continual evolutionary improvements without limit. |
(11). To eliminate the threat of a data breach, all business data has many layers of encryption and is replicated to a large number of secure data centres. |
(12). A first class sign-in authentication service has been provided and continually monitored 24*7 to keep criminals out and to help approved people. |
(13). Knowledge cannot be stolen and cannot be hacked by a criminal - Eliza eliminates most of the threats that are caused by programming. |
(14). A competitor cannot take any program code and reverse engineer it to create their own version of our applications, but we can reverse engineer competitors programs and see the internal encryption keys and server interfaces. |
4. It is probable that very few other application service providers can provide such a service that is based on 40 years of continual evolutionary development of knowledge based applications. |
5. Every downloaded program can be reverse engineered to uncover its encryption keys (if any) and server interface that can be used by hackers. |
6. Even Microsoft cannot write a program like Office without it needing software patches to overcome vulnerabilities - month after month after month. Even Microsoft had to abandon Internet Explorer because it had such bad programming logic that it could not be made secure - Edge was a total rewrite to try to build a better program, but it still needs regular patching because of program errors. Even Adobe had to abandon Adobe Reader because it had such bad programming logic that it could not be made secure - an independent team of people are rewriting it to see if they can do better - they will fail because programming is an art with vulnerabilities. |
|