BLACK BOX RECORDERS
PLEASE USE OUR A TO Z INDEX TO NAVIGATE THIS SITE OR CALL HOME
ANTICS - ARDUINO - ARMOUR - ARTWORK - BLACK BOX - CHAT GPT - ELECTRONICS - ENERGY - FRAME HEAD - INVISIBILITY - JAWS - KITS - LEGS - MECHANICS - MOTORS - RASPBERRY Pi - R/C DRONE - SENTRY - SOFTWARE SIM CARDS - SMARTPOHNES - SOUND PROOFING - SPACE ROVERS - SPEED - SUSPENSION - TAIL - WEAPONS - WARGAMING
|
|
PROTECTION & TRUTH - At the moment nobody can tap into your thoughts other than monitoring your behaviour patterns on the internet, during phone calls, texts and emails. Physical torture is one way that brutal regimes extract information from prisoners, but torture is illegal in international law, though most countries practice it or condone it, including the USA and UK. Whereas the National Security Agency (NSA) and equivalent covert agencies in other administrations routinely monitor communications, so abusing their positions of trust. Even Google and other search engines and services are reading your minds with their naughty behavioral monitoring software. This of course breaches privacy laws and your Article 8 right to privacy - but they are all at it and nobody is prosecuting anyone because a valid defense might be discovery of how the target was revealed. Obviously, using illegal methods.
CHRISTMAS GIANT ROBOT ANT PROJECT - DATA SECURITY
It will be fun to incorporate a data logger in a black box. Black boxes are not necessarily black in colour, but are generally fireproof, shock proof, and waterproof containers. They are usually bright orange when used in aircraft.
The black box might include other protection for computer parts and programs, but especially for recorded video that might be useful when it is necessary to identify an assailant or record an engagement, such as in paintball gaming. This feature will help you develop strategy. To prevent opposing teams gaining access to your solid state hard drive, a level of encryption may be an advantage. As we say, this is a bit of fun for your team to explore. There will be a black box of sorts for paintball activities in particular.
Security measures are primarily devoted to making the data on a compromised drive inaccessible to unauthorized users and unauthorized processes, such as may be executed by malware. One common security approach is to encrypt the data for storage, and routinely scan drives for malware with an antivirus program, although other methods are possible.
SOFTWARE ENCRYPTION
FLIGHT RECORDER - These units have to be tough to survive airplane crashes
HARDWARE ENCRYPTION
REMOTE MANAGEMENT
In commercial environments, where most secure
solid state drives are used, a central/remote management system may provide organizations with an additional level of IT asset control, significantly reducing the risks of a harmful data breach. This can include initial user deployment and ongoing management, password recovery, data backup, remote tracking of sensitive data, and termination of any issued secure
solid state drives. Such management systems are available as software as a service (SaaS), where Internet connectivity is allowed, or as behind-the-firewall solutions.
PLASTIC BOXES - The ABS project box on the left is an inexpensive waterproof enclosure that would suffice for our purposes if the tail bodywork is reinforced and perhaps lockable. The computer would also have to be low power, or cooling might become a problem. The case on the left is a good example of portable protection for all kinds of delicate electronic equipment weighing up to 340lbs. It is though an expensive item and is not suitable for our robot due to the sheer size. We love the look though.
WHAT IS A BLACK BOX ?
In science, computing, and engineering, a black box is a device, system or object which can be viewed in terms of its inputs and outputs (or transfer characteristics), without any knowledge of its internal workings. Its implementation is "opaque" (black). Almost anything might be referred to as a black box: a transistor, algorithm, or the human brain.
In our case, the black box is a combination of hard and software with data logging. The first stage of protection might be the box containing the hardware and programs as machine instructions (algorithms) in memory.
WHAT IS AN ALGORITHM ?
In mathematics and computer science, an algorithm is a self-contained step-by-step set of operations to be performed. Algorithms exist that perform calculation, data processing, and automated reasoning.
STEEL BOXES - Two examples of the popular NEMA industrial grade 316 stainless steel boxes available online from China that claim to be waterproof. What a shame they are not black.
VEHICLE DIAGNOSTICS
Event recorders are integrated with many car-borne systems and as such they are an attractive target for enhanced diagnostic and control functions. Some event recorders feature outputs controlling emergency brake (train) systems, and speedometers.
ANTICS - ARDUINO - ARMOUR - ARTWORK - BLACK BOX - ELECTRONICS - ENERGY - FRAME - GIMBALS HEAD - INVISIBILITY - JAWS - KITS - LEGS - MECHANICS - MOTORS - RASPBERRY Pi - R/C DRONE - SENTRY - SOFTWARE SIM CARDS - SMARTPHONES - SOUND PROOFING - SPACE ROVERS - SPEED - SUSPENSION - TAIL - WEAPONS - WARGAMING
|
|
This website is Copyright © 2024 Planet Earth Trust.. The design of Rough Terrain Robots featured on this website are subject to design copyright © with all rights reserved - unless stated otherwise.
|