DINOBOT ROBOT ANT - BLACK BOX
FORMICARIUM - HEAD - JAWS - JIMMY WATSON - KITS - LEGS - MECHANICS - MOTORS - MOVIE - PHOTOGRAPHY - RASPBERRY Pi R/C DRONE - SENTRY SOFTWARE - SOUND PROOFING - SPACE ROVERS - SPEED - SUSPENSION - TAIL - WEAPONS - WARGAMING
PROTECTION & TRUTH - At the moment nobody can tap into your thoughts other than monitoring your behaviour patterns on the internet, during phone calls, texts and emails. Physical torture is one way that brutal regimes extract information from prisoners, but torture is illegal in international law, though most countries practice it or condone it, including the USA and UK. Whereas the National Security Agency (NSA) and equivalent covert agencies in other administrations routinely monitor communications, so abusing their positions of trust. Even Google and other search engines and services are reading your minds with their naughty behavioral monitoring software. This of course breaches privacy laws and your Article 8 right to privacy - but they are all at it and nobody is prosecuting anyone because a valid defense might be discovery of how the target was revealed. Obviously, using illegal methods.
CHRISTMAS GIANT ROBOT ANT PROJECT - DATA SECURITY
It will be fun to incorporate a data logger in a black box. Black boxes are not necessarily black in colour, but are generally fireproof, shock proof, and waterproof containers. They are usually bright orange when used in aircraft.
The black box might include other protection for computer parts and programs, but especially for recorded video that might be useful when it is necessary to identify an assailant or record an engagement, such as in paintball gaming. This feature will help you develop strategy. To prevent opposing teams gaining access to your solid state hard drive, a level of encryption may be an advantage. As we say, this is a bit of fun for your team to explore. There will be a black box of sorts for paintball activities in particular.
Security measures are primarily devoted to making the data on a compromised drive inaccessible to unauthorized users and unauthorized processes, such as may be executed by malware. One common security approach is to encrypt the data for storage, and routinely scan drives for malware with an antivirus program, although other methods are possible.
FLIGHT RECORDER - These units have to be tough to survive airplane crashes
In commercial environments, where most secure
solid state drives are used, a central/remote management system may provide organizations with an additional level of IT asset control, significantly reducing the risks of a harmful data breach. This can include initial user deployment and ongoing management, password recovery, data backup, remote tracking of sensitive data, and termination of any issued secure
solid state drives. Such management systems are available as software as a service (SaaS), where Internet connectivity is allowed, or as behind-the-firewall solutions.
PLASTIC BOXES - The ABS project box on the left is an inexpensive waterproof enclosure that would suffice for our purposes if the tail bodywork is reinforced and perhaps lockable. The computer would also have to be low power, or cooling might become a problem. The case on the left is a good example of portable protection for all kinds of delicate electronic equipment weighing up to 340lbs. It is though an expensive item and is not suitable for our robot due to the sheer size. We love the look though.
WHAT IS A BLACK BOX ?
In science, computing, and engineering, a black box is a device, system or object which can be viewed in terms of its inputs and outputs (or transfer characteristics), without any knowledge of its internal workings. Its implementation is "opaque" (black). Almost anything might be referred to as a black box: a transistor, algorithm, or the human brain.
In our case, the black box is a combination of hard and software with data logging. The first stage of protection might be the box containing the hardware and programs as machine instructions (algorithms) in memory.
WHAT IS AN ALGORITHM ?
In mathematics and computer science, an algorithm is a self-contained step-by-step set of operations to be performed. Algorithms exist that perform calculation, data processing, and automated reasoning.
STEEL BOXES - Two examples of the popular NEMA industrial grade 316 stainless steel boxes available online from China that claim to be waterproof. What a shame they are not black.
Event recorders are integrated with many car-borne systems and as such they are an attractive target for enhanced diagnostic and control functions. Some event recorders feature outputs controlling emergency brake (train) systems, and speedometers.
LINKS & REFERENCE
LEFT - Movie idea, lurking beneath the Antarctic ice is a discovery that scientists will die for. This story is now the subject of a low budget trailer to be produced mostly in the UK. The promoters are looking for backers. The UK will contribute 20% toward production costs. Roughly 60% of a low budget film may be pre-sold as distribution rights, leaving 20% finance to source. The deal is that investors recover 120% on their project stake within 12 months of shooting, with an income stream thereafter from networks and merchandising. Producers and directors please take note that there is a significant audience for well made movies of this genre. Look at what happened when they remade Godzilla. RIGHT - 2015 movie inspired by the Marvel graphic novels.
ANTICS - ARDUINO - ARMOUR - ARTWORK - BIOLOGY - BLACK BOX - COMPUTERS - ELECTRONICS - ENERGY - FRAME - HEAD - JAWS - JIMMY WATSON - KITS - LEGS - MECHANICS - MOTORS - MOVIE - PHOTOGRAPHY - RASPBERRY Pi - R/C DRONE - SENTRY - SOFTWARE - SOUND PROOFING - SPEED - SUSPENSION - TAIL - WEAPONS - WARGAMING
This website is Copyright © 2020 Bluebird Marine Systems Limited. The names Bluebird™, Bluefish™, Miss Ocean™, SeaNet™, SeaVax™ are trademarks. All other trademarks are hereby acknowledged. The design of the Robot Ant on this page is design copyright © December 15 2015, all rights reserved - Jameson Hunter Ltd. IMPORTANT NOTE: Under no circumstances may our products, or those of Jameson Hunter Ltd, be used by any military or law enforcement organization, for any warlike, combat, or peacekeeping crowd control purposes. Anyone purchasing one of these units will be required to sign a binding undertaking (Deed) to that effect. Any unit found to have been purchased by proxy, will be confiscated, along with civil remedy in respect of breach of contract, that all parties in the chain will be vicariously liable for - to include damages for vehicles developed from our designs without our consent - and possible fraud issue from the deception. In addition to copyright theft, the law of passing-off applies.