Home → News 2023 January
 
 
News 2023 January
   
 

01.January.2023

New Year 2023

The OntomaX team wishs our friends, supporters and fans a happy new year.


04.January.2023

00:00, 01:00, 02:01, and 26:00 UTC+1
SOPR #

Topic:

  • Legal matter

    Legal matter
    Because the

  • very well known and extremely extensively discussed essential demands, prerequisites, and requirements, which are legally required for opening our orignal and unique work of art titled Ontologic System and created by C.S., and allowing and licensing the performance and reproduction of certain parts of our Ontologic System, have not been met by governmemts, federal authorities, research institutes, private companies, and other entities, and
  • national and international laws, regulations, and acts, as well as agreements, conventions, and charters are applied and enforced relatively laxly and liberally, specfically in relation to competition and market regulation,

    we have made the following decisions:

    C.S. has decided to withdraw all announced modifications of the original and unique work of art titled Ontologic System and created by C.S., which are legally required for opening our Ontologic System (OS), and allowing and licensing the performance and reproduction of certain parts of our OS.

    Our Society for Ontological Performance and Reproduction (SOPR) has decided to withdraw all regulations discussed, announced, and introduced.
    Therefore, a legal agreement, a legal framework, and a legal certainty other than the

  • national and international laws, regulations, and acts, as well as agreements, conventions, and charters, and
  • Fair, Reasonable, And Non-Discriminatory, As well as Customary (FRANDAC) Terms of Service (ToS) with the License Model (LM) of our SOPR

    do not exist without the consent of C.S. and our corporation.

    Our SOPR remains a collecting society, and the end users or consumers remain members of our SOPR.
    But our business unit Ontonics has suspended those activities of our SOPR, which have become obsolete without said modifications of our OS, until said essential demands, prerequisites, and requirements for opening our OS, and allowing and licensing the performance and reproduction of certain parts of our OS have been met, fulfilled, satisfied, executed, realized, and so on by all entities concerned.

    The scopes and terms for licensing the performance and reproduction of certain parts of our OS will be decided on a case-by-case basis of a legal entity and state-by-state basis of a statutory union by following best legal practices and industry proven actions.

    Obviously and as we already worked out in the past, the front line runs very deep through the business goals, strategies, and processes of fraudulent and even serious criminal entities, as the following short lists already show:

    Integrations of the fields of

  • Inter-Process Communication (IPC),
  • Remote Procedure Call (RPC),
  • Remote Direct Memory Access (RDMA),
  • Distributed operating system (Dos),
  • Fault-tolerant, Reliable, and Distributed System (FRDS),
  • SuperComputing (SC or SupC),
  • Cybernetical System (CybS),
  • Computational Intelligence (CI or ComI) (e.g. Artifical Neural Network (ANN) and Evolutionary Computing (EC)),
  • Model-Based Autonomous System (MBAS) or Immobile Robotic System (ImRS or Immobot) (focus directed inward, only change of workflow, but no change of physical function, property, appearance, etc.),
  • Cognitive System (CogS),
  • Emotional Intelligence (EI),
  • LifeLogging (LL),
  • Wearable Computing (WC or WearC),
  • Humanistic Computing (HC or HumanC),
  • Ubiquitous Computing (UC or UbiC) and Internet of Things (IoT), and Networked Embedded System (NES),
  • Mediated Reality (MedR), including Mixed Reality (MR),
  • creations of (the foundations) of our fields listed below,
  • and much more.

    Creations of (the foundations of) our fields of

  • operating system-level virtualization or containerization,
  • exception-less system call mechanism,
  • Asynchronous Input/Output (AIO) without context switch,
  • Remote Direct Memory Access (RDMA) over Transmission Control Protocol (TCP)/Internet Protocol (IP) (TCP/IP) and in Ontologic Net (ON),
  • (foundation of) Service-Oriented technologies (SOx) with microService-Oriented Architecture (mSOA), Service-Oriented Architecture (SOA), Service-Oriented Computing (SOC), meshing, orchestration, and without Web Services (WS), which means parts of Grid Computing and Networking, and Cloud, Edge, and Fog Computing and Networking (not to be confused with WS),
  • (foundation of) (core) Infrastructure as a Service (IaaS) technologies (IaaSx) (e.g. Capability and Operational Models (COMs), Capability and Operational Systems (COSs), and Capability and Operational Platforms (COPs)), including
    • (utility) Technology as a Service (TaaS) technologies (TaaSx), including (utility)
      • Platform as a Service (PaaS) technologies (PaaSx),
      • Service as a Service (SaaS) technologies (SaaSx), and
      • Data as a Service (DaaS) technologies (DaaSx),
  • (foundation of) Software-Defined Networking (SDN), Network Function Virtualization (NFV), and Virtualized Network Function (VNF) (SDN-NFV-VFN),
  • (foundation of) 5th Generation mobile networks or 5th Generation wireless systems of the Next Generation (5G NG) and the 6th Generation mobile networks or 6th Generation wireless systems (6G) with network slicing, virtualized and programmable Radio Access Network (RAN), and so on,
  • Resilient Distributed System (RDS), including
    • Peer-to-Peer Virtual Machine (P2PVM) for smart contract transaction execution,
  • Grid operating system (Gos) and Cloud operating system (Cos), incuding
    • Data Center operating system (DCos),
  • polylogarithmically scalable and synchronizable Distributed Computing (DC) or Distributed System (DS),
  • Cybernetical Intelligence (CI or CybI),
  • (foundation of) Autonomic Computing (AC) and Robotic Process Automation (RPG),
  • (foundation of) Resource-Oriented technologies (ROx) with Resource-Oriented Computing (ROC),
  • Intelligent Personal Assistant (IPA), Personal Intelligent Assistant (PIA), including
    • Personalized Assistant that Learns (PAL), including Reflective Agents with Distributed Adaptive Reasoning (RADAR) and Cognitive Assistant that Learns and Organizes (CALO), also wrongly called Siri, Alexa, Cortana, Bixby, Google Assistant, etc., and
    • Conversational Intelligent Personal Assistant (CIPA),
  • Ontologic holon or Onton, also wrongly called digital twin and living digital record of the physical world,
  • Cyber-Physical System (CPS) (also change of physical function, property, appearance, etc. respectively Onton),
  • eXtended Mixed Reality (XMR) or eXtended Reality (XR), and New Reality (NR) (fusion of realities beyond mirror world approach),
  • Ontoverse (Ov), also wrongly called metaverse and multiverse,
  • Distributed Ledger Technology (DLT) with foundation of cryptocurrencies, multichain, cross-chain bridge, and so on,
  • Web 3.0, also wrongly called Semantic (World Wide) Web (SWWW), Decentralized Web (DWeb), and Web 3 or Web3,
  • Ontologic Net (ON) (fusion of Internet, WWW, SWWW, and SOx), also wrongly called Information-Centric Networking (ICN), Content-Centric Networking (CCN) and Named Data Neworking (NDN), Named Function Networking (NFN), Service-Centric Networking (SCN), Function-Centric Service Chaining (FCSC), Data-Oriented Network Architecture (DONA), Publish-Subscribe Internet Routing Paradigm (PSIRP) and PUblish-SUbscribe Internet Technologies (PURSUIT), and so on,
  • Ontologic Web (OW) (fusion of Global Brain, SWWW),
  • Ontoscope (Os), also wrongly called smartphone, iPhone, Galaxy, Pixel, smartwatch, smartglasses, Hololens, smartcar, and so on,
  • and much more.

    If a State-Owned Enterprise (SOE) is granted an allowance and license for the performance and reproduction of certain parts of our OS, then said allowance and license is only granted in the scope of the jurisdication of its headquarter.

    Either we have an environment with a rule-based law and order and a democracy, where

  • decisions about what is right and what is wrong are not decided by the larger and more powerful entity or group of entities, and
  • decisions are not made by taking the easiest way with the lowest resistance and risk, or even in a capricious way,

    or said environment with such a concept and such an idea does only exist on paper and in hot air.

    02:01 UTC+1
    Designations and sales other than the ones of C.S. prohibited

  • handset, mobile phone, or smartphone,
  • smarttablet or tablet computer,
  • smartwatch,
  • smartHMD or headset,
  • smartglasses,
  • smartspeaker,
  • smartdisplay,
  • smartTV,
  • smartdevice,
  • smartthing,
  • smartcar,
  • smarttruck,
  • smarthome,
  • smartassistant, Intelligent Personal Assistant (IPA), or Personal Intelligent Assistant (PIA),
  • and so on,

  • iPhone, iPad, and Apple Watch,
  • Galaxy,
  • Pixel,
  • Kindle,
  • Echo,
  • Surface,
  • HoloLens,
  • Oculus,
  • and so on,

  • iOS,
  • MacOS,
  • Linux (prohibited FOSS),
  • Android (prohibited FOSS),
  • Wear OS (prohibited FOSS),
  • Windows,
  • and so on,

  • Personalized Assistant that Learns (PAL), including Reflective Agents with Distributed Adaptive Reasoning (RADAR) and Cognitive Assistant that Learns and Organizes (CALO),
  • Siri,
  • Alexa,
  • Cortana,
  • Bixby,
  • Google Assistant,
  • and so on,

  • metaverse,
  • cloud,
  • app store,
  • Azure,
  • Amazon Web Services,
  • Google Cloud,
  • Oracle Cloud,
  • Alibaba Cloud,
  • 5th Generation mobile networks or 5th Generation wireless systems of the Next Generation (5G NG) and the 6th Generation mobile networks or 6th Generation wireless systems (6G),
  • Cyber-Physical System (CPS),
  • Industry 4.0,
  • and so on,

  • Volkswagen ID,
  • Audi e-tron,
  • Daimler EQ,
  • and so on,

    have to be called, labelled, branded, communicated, advertised, sold, and so on by using our designations

  • Ontologics,
  • Ontologic System or simply OS,
  • Ontonics,
  • OntoLab,
  • Ontobot,
  • Ontoscope,
  • intelliTablet or iTablet,
  • Ontoverse,
  • iRaiment,
  • Roboticle,
  • Style of Speed,
  • and so on.

    See also the note SOPR # of today above.


    05.January.2023

    03:01 UTC+1
    Other app stores than our MfE prohibited

    All Ontologic Applications and Ontologic Services (OAOS) have to be sold and distributed exclusively on our Marketplace for Everything (MfE), also wrongly called app store.
    All authors of OAOS have to publish their OAOS through our corporation on our MfE exclusively.
    Authors of OAOS get 30% or maybe some more percentage of the revenue generated with said OAOS on our MfE, which is much more than the 20% authors get for writting and publishing a book.

    03:01 UTC+1
    Use of our OS for military use prohibited

    The original and unique ArtWorks (AWs) and further Intellectual Properties (IPs) included in the oeuvre of C.S., including our Ontologic System (OS), are allowed and licensed for private and commercial performance and reproduction respectively use only.
    Therefore, the use of our original and unique AWs and further IPs for military facilities, technologies, goods, and services, including military equipment, by other entities than C.S. and our corporation is in clear breach of our terms and conditions of

  • performance and reproduction, and
  • sale and provision

    applicable to

  • governments,
  • end users or customers,
  • distributors, and
  • providers

    alike worldwide.

    Said illegal military misuse include the

  • so-called and wrongly called command cloud in general, and
  • illegal federal programms in particular, such as for example the
    • Joint Enterprise Defense Infrastructure (JEDI) and
    • Joint Warfighting Cloud Capability (JWCC).

    Companies involved in such an illegal military misuse of our original and unique AWs and further IPs face the

  • withdrawal of their allowance and license for the performance and reproduction of certain parts of our OS, if they have been granted such an allowance and license at all, and
  • payment of triple damage compensation or 300% of the royalties according to the License Model (LM) of our SOPR.


    06.January.2023

    16:46 and 26:26 UTC+1
    Illegal Ontoscope clone iPhone now dead?!

    It depends on the company Apple, or being more precise, if Apple complies to the

  • national and international laws, regulations, and acts, as well as agreements, conventions, and charters, and
  • Fair, Reasonable, And Non-Discriminatory, As well as Customary (FRANDAC) Terms of Service (ToS) with the License Model (LM) of our Society for Ontological Performance and Reproduction (SOPR).

    But sadly to say, we are forced to demand proper designation, labelling, branding, marketing, distribution, sale, and so on in relation to the original and unique ArtWorks (AWs) and further Intellectual Properties (IPs) included in the oeuvre of C.S. by court order worldwide, due to the

  • lying of entities, including plagiarists (specifically in arts, sciences, and industries), and
  • proof given once again that it will not work without such a court order or an out-of-court agreement,

    and therefore this legal action will happen in the next weeks, definitely, and most potentially will have significant implications on illegal plagiarisms of our original and unique work of art titled Ontologic System and created by C.S., including the

  • illegal plagiarism of our Ontoscope called iPhone,
  • illegal plagiarism of our intelliTablet (iTablet) called iPad and also based on our Ontoscope,
  • illegal plagiarism of our intelligent Raiment (iR) called Apple Watch and also based on our Ontoscope, and
  • whole range of the other illegal gatecrashes, plagiarisms, and lootings permanently conducted by Apple and all the other manufacturers.

    In former notes we have already

  • explained that there is no way around the moral rights of C.S., and also
  • described how the labelling and other actions have to be realized to ensure that the public knows where the original and unique ArtWorks (AWs) and further Intellectual Properties (IPs) included in the oeuvre of C.S. were created, designed, presented, and discussed by C.S. and our corporation.

    Also note that we have not forgotten the

  • joint action of Apple and Alphabet (Google) in relation to applications related to SARS-CoV-2 pandemic,
  • lurking around and manoeuvring of Apple in relation to smartcars and other activities of us in the last years,
  • designation of the illegal Ontoscope plagiarism iPhone by "Designed in California", U.S.America, on its case, and
  • presentation of the illegal Ontoscope plagiarism iPhone as a national icon of the U.S.America in the Sustainability pavillion at the World Exhibition 2020:"The iPhone Ontologic System and the Ontoscope transformed the information age. On December, 1999, C.S. first unveiled The Proposal and the Evoos, and on October, 2006, C.S. first unveiled the Ontologic System and the Ontoscope based on Evoos. On[ly] on January, 2007, [notorious kleptomanic] Apple CEO Steve Jobs first unveiled the iPhone[, which was no new invention at all, but merely a Personal Digital Assistant (PDA) with wireless modem, simple one lens camera, and a slightly modernized design, but no Artificial Intelligence (AI), Machine Learning (ML), Artificial Neural Network (ANN), Computer Vision (CV), Intelligent Personal Assistant (IPA), advanced photography, etc., and used as an enabling means to steal the Ontologic System and the Ontoscope, as proven and documented completely and comprehensively multiple times again and again]. The result was a pocket-sized device variant of the Ontoscope powered by a variant of the Ontologic System that would change the world again.".

    If U.S.American entities refuse to comply with the

  • national and international laws, regulations, and acts, as well as agreements, conventions, and charters, and
  • Fair, Reasonable, And Non-Discriminatory, As well as Customary (FRANDAC) Terms of Service (ToS) with the License Model (LM) of our SOPR,

    then we also have to

  • prohibit the production of Apple products in the P.R.China and other locations, and
  • prohibit the production, distribution, provision, sale, and so on of U.S.American technologies, goods, and services in the U.S.America, the European Union, the P.R.China, and other locations

    if they are based on the original and unique ArtWorks (AWs) and further Intellectual Properties (IPs) included in the oeuvre of C.S..
    And of course we will get these prohibitions, as is the case with for example the prohibition of the produciton, distribution, provision, sale, and so on of our Ontoscope on Wheels by companies, like for example Porsche SE/Volkswagen, General Motors, Toyota, and Co., in the U.S.America, the European Union, the P.R.China, and other locations.

    See also the notes

  • After crypto, Silicon Valley, Big Tech, and Co. is next of the 28th of December 2022,
  • SOPR # of the 4th of January 2023,
  • Designations and sales other than the ones of C.S. prohibited of the 4th of January 2023,
  • Other app stores than our MfE prohibited of the 5th of January 2023,
  • Use of our OS for military use prohibited of the 5th of January 2023, and
  • Ontoscope Further steps of today,

    which are legally secured and protected by the granting of freedom of expression, self-expression, arts, and moral right of C.S., specifically modification, naming, and presentation, which cannot be circumvented by any dirty trick.
    Also note that we do not need to consider and enforce the copyright of C.S. at this point at all, which nevertheless will become matter of further legal actions.

    All those bad actors thought that they could get away with the individual illegal acts, because of their power, size, and cunning, even in court. But now the whole package is on the table and it has a completely different quantity and quality, which shows once again that it is not only a matter of anti-sociality, stupidity, and arrogance, but still also a matter of intelligence, diligence, and conscientiousness. In fact, if one constructs such a huge house of card and makes oneself so vulnerable, then another one only needs to pull some very few cards to destroy the whole structure. It is so incredibly easy. And now we are only beginning with just hammering on the others and whacking them away in the good old Wild West and Silicon Valley style. :)

    Eventually, all of the rights, properties, reputations, and momenta, as well as follow-up opportunities of C.S. and our corporation will be reconstituted, restituted, and restored in one way or another, as we always crystal clearly said, demanded, and explained.

    By the way:

  • Do not talk with the press anymore. That mess has nothing to do with freedom of speech and democracy anymore.
  • Do not lie or Artificial Intelligence and Artificial Consciousness, if achievable at all, will do so as well.
  • Do not ignore and destroy the existence, work, achievement, legacy, and so on of C.S. and our corporation, because one only destroys herself, himself, or theirselves.

    16:46 UTC+1
    Ontoscope Further steps

    We are considering to ask the 20 largest manufacturers of handheld and wearable mobile devices to produce our exclusive Ontoscope for our business units exclusively. It might be their only chance to remain in this business.

    See also the

  • Ontonics Further steps of the 1st of August 2022,
  • Ontonics Further steps of the 14th of August 2022, and
  • Ontonics Further steps of the 8th of November 2022.


    08.January.2023

    06:37, 08:03, and 29:09 UTC+1
    Ontoscope Further steps

    We are considering several measures regarding the production of our original and unqiue, copyrighted, and prohibited for fair use work of art titled Ontoscope, created by C.S., and exclusively managed and exploited by our corporation with the consent and on the behalf of C.S., specifically the

  • hand-held pocket-sized variant,
  • hand-held tablet-sized variant,
  • in-vehicle display-sized variant,
  • wrist-worn watch-sized variant,
  • head-worn glasses-sized variant, and
  • head-mounted goggle-sized variant

    of our Ontoscope.

    In case of the

  • hand-held pocket-sized variant,
  • hand-held tablet-sized variant, and
  • in-vehicle display-sized variant

    of our Ontoscope, we will consider the following options for decision making:

  • only no Ontoscope variants for others, and all variants exclusive for our Ontoscope, as it always should have been since at least the year 2007,
  • only Ontoscope variants of 10 or more years old generations with labelling at the back side for others, and all newer generations exclusive for our Ontoscope,
  • only Ontoscope variants with 0 or 1 camera lens, or no bionic (e.g. Artificial Intelligence (AI), Machine Learning (ML), Computational Intelligence (CI or ComI) (e.g. Artifical Neural Network (ANN) and Evolutionary Computing (EC)), Computer Vision (CV), Simultaneous Localization And Mapping (SLAM), Soft Computing (SC), Natural Language Processing (NLP), Cognitive Computing (CogC) or Cognitive System (CogS), Cognitive Agent System (CAS), Cognitive-Affective Personality or Processing System (CAPS), Swarm Intelligence (SI) or Swarm Computing (SC), etc.) sensor, or no bionic processor, and with labelling at the back side for others, and our original and unique multi-lens and bionic designs exclusive for our Ontoscope,
  • only Ontoscope variants with a frame border of around 10 millimeter (mm) at at least one side of the display with labelling at the front side (e.g. Ontoscope (6 to 7 mm high typography)) and labelling at the back side (e.g. Created and Designed by C******** M********* J******* S********* ..., © and ® 1999-20xy (customary typography)) for others, as discussed in the past, and our original and unique borderless designs exclusive for our Ontoscope.

    In case of the

  • wrist-worn watch-sized variant

    of our Ontoscope, we will consider the following options for decision making:

  • only no Ontoscope variants for others, and all variants exclusive for our Ontoscope, as it always should have been since at least the year 2007,
  • only Ontoscope variants of 10 or more years old generations with labelling at the back side for others, and all newer generations exclusive for our Ontoscope,
  • only Ontoscope variants with 0 or 1 sensor, or no bionic (e.g. AI, ML, CI (e.g. ANN and EC), CV, SLAM, SC, NLP, CogC or CogS, CAS, CAPS, SI or SC, etc.) sensor, or no bionic processor, and with labelling at the back side for others, and our original and unique multi-sensor and bionic designs exclusive for our Ontoscope,
  • only Ontoscope variants with a frame border of around 5 millimeter (mm) at at least one side of the display with labelling at the front side (e.g. Ontoscope (3 to 4 mm high typography)) and labelling at the back side (e.g. Created and Designed by C******** M********* J******* S********* ..., © and ® 1999-20xy (customary typography)) for others, as discussed in the past, and our original and unique borderless design exclusive for our Ontoscope.

    In case of the

  • head-worn glasses-sized variant

    of our Ontoscope, we will consider the following options for decision making:

  • only no Ontoscope variants for others, and all variants exclusive for our Ontoscope, as it always should have been since at least the year 2007,
  • only Ontoscope variants of 10 or more years old generations with labelling at the back side respectively inside for others, and all newer generations exclusive for our Ontoscope,
  • only Ontoscope variants with 0 or 1 sensor, or no bionic (e.g. AI, ML, CI (e.g. ANN and EC), CV, SLAM, SC, NLP, CogC or CogS, CAS, CAPS, SI or SC, etc.) sensor, or no bionic processor, and with labelling at the back side respectively inside for others, and our original and unique multi-sensor and bionic designs exclusive for our Ontoscope,
  • only Ontoscope variants with a frame border of around 5 millimeter (mm) at at least one side of the glasses or at the temples with labelling at the front side respectively outside (e.g. Ontoscope (3 to 4 mm high typography)) and labelling at the back side respectively inside (e.g. Created and Designed by C******** M********* J******* S********* ..., © and ® 1999-20xy (customary typography)) for others, as discussed in the past, and our original and unique borderless design exclusive for our Ontoscope.

    In case of the

  • head-mounted goggle-sized variant

    of our Ontoscope, we will consider the following options for decision making:

  • only no Ontoscope variants for others, and all variants exclusive for our Ontoscope, as it always should have been since at least the year 2007,
  • only Ontoscope variants of 10 or more years old generations with labelling at the outside for others, and all newer generations exclusive for our Ontoscope,
  • only Ontoscope variants with 0 or 1 camera lens, or no bionic (e.g. AI, ML, CI (e.g. ANN and EC), CV, SLAM, SC, NLP, CogC or CogS, CAS, CAPS, SI or SC, etc.) sensor, or no bionic processor, and with labelling at the outside for others, and our original and unique multi-lens and bionic designs exclusive for our Ontoscope,
  • only Ontoscope variants with a screen stripe or bar of around 10 millimeter (mm) on at least one side of the display screen with labelling on the display image respectively inside (e.g. Ontoscope (6 to 7 mm high typography)) and labelling at the outside (e.g. Created and Designed by C******** M********* J******* S********* ..., © and ® 1999-20xy (customary typography)) for others, as discussed in the past, and our original and unique stripeless design exclusive for our Ontoscope.

    We already have informed manufacturers of mobile devices and vehicles to make preparations. This is now coming in the next few months and every company, that still refuses to comply with the

  • national and international laws, regulations, and acts, as well as agreements, conventions, and charters, and
  • Fair, Reasonable, And Non-Discriminatory, As well as Customary (FRANDAC) Terms of Service (ToS) with the License Model (LM) of our Society for Ontological Performance and Reproduction (SOPR),

    will get a cease and desist letter from us and a cease and desist order by a court, and eventually will be pushed out of the market.
    It is that simple. :)

    In this regard, our Hightech Office Ontonics is working out and finalizing the last details of our legal strategy, so that we are able to enforce the rights and properties of C.S. and our corporation as fast as possible and without another delay.

    Please also keep in mind that

  • all modifications required for
    • opening our original and unqiue, copyrighted, and prohibited for fair use work of art titled Ontologic System, created by C.S., and exclusively managed and exploited by our corporation with the consent and on the behalf of C.S., and
    • allowing and licensing the performance and reproduction of certain parts of our Ontologic System (OS) with its Ontologic System Architecture (OSA), Ontoverse (Ov), and Ontoscope (Os),

    have been withdrawn by C.S., but

  • all regulations for
    • utilizing the exclusive infrastructures of our corporation, and
    • paying the triple damage compensations

    are still mandatory and demanded by C.S..

    Ontologic Applications and Ontologic Service Providers (OAOSPs) in general and Communications Service Providers (CSPs) in particular have to take care that they

  • use only the exclusive infrastructures of our corporation with their exclusive subsystems, platforms, and access and utilization requirements, specifications, and items for the
    • configuration and management of their
      • subnet structures in our Ontologic Net (ON),
      • subweb representations in our Ontologic Web (OW), and
      • subspaces, subenvironments, subworlds, and universes respectively realities in our Ontologic uniVerse (OV),

      which collectively are our Ontoverse (Ov) and New Reality (NR), and

    • implementation and publication of their Ontologic Applications and Ontologic Service (OAOS) in our Marketplace for Everything (MfE),

    because there exists only our one Ontologic System (OS) with its Ontologic System Architecture (OSA), Ontoverse (Ov), and Ontoscope (Os), and

  • do not compete with their OAOS as infrastructure and platform provider with the OAOS of their end users or customers.

    We also would like to give the friendly and strong recommendation to work directly with our corporation and our business units to get the best Licensee eXperience (LX) and provide the best User eXperience (UX).

    See also the notes

  • After crypto, Silicon Valley, Big Tech, and Co. is next of the 28th of December 2022,
  • SOPR # of the 4th of January 2023,
  • Designations and sales other than the ones of C.S. prohibited of the 4th of January 2023,
  • Other app stores than our MfE prohibited of the 5th of January 2023,
  • Use of our OS for military use prohibited of the 5th of January 2023,
  • Illegal Ontoscope clone iPhone now dead?! of the 6th of January 2023, and
  • Ontoscope Further steps of the 6th of January 2023,

    which are legally secured and protected by the granting of freedom of expression, self-expression, arts, and moral right of C.S., specifically the exclusive right to decide about modification, naming, and presentation, which cannot be circumvented by any dirty trick.


    10.January.2023

    05:34 UTC+1
    Evidences of crypto Ponzi scheme plot

    We have reviewed the events, which happened in relation to the companies working in the cryptologic technology industrial sector on the basis of the smart contract transaction protocol and the blockchain technique in the period of the years 2015 to 2022.
    Investments, loans, and other actions, as well as the resulting collapse of the whole so-called crypto ecosystem, or better said house of cards or literally spoken chain of tokens, and bankruptcies of the leading companies suggest a conspiracy and a plot to infringe the rights and properties of C.S. and our corporation by

  • stealing essential parts of the original and unique ArtWorks (AWs) and further Intellectual Properties (IPs) included in the oeuvre of C.S. (e.g. our Distributed Ledger Technology (DLT) and Web 3.0 with its Web 3 or Web3) and
  • conducting a collective Ponzi scheme.

    But the fiasco is not limited to the private cryptotulips concerned, because the whole scandal is also directly connected with the governments, commissions, federal authorities, universities, research institutes, companies, artists, other individual persons, cliques, and other entities of several federal states of the United States of America (U.S.A.), member states of the European Union (EU), and other individual sovereign states worldwide.

    The situation is very similar to the conspiracies in the fields of

  • Grid Computing (GC),
  • Cloud, Edge, and Fog Computing (CEFC), and
  • Service-Oriented technologies (SOx), and also
  • Mobile Computing (MC or MobileC).

    And for sure, we are not ready with all of them.

    06:54 and 10:50 UTC+1
    Fair goes first, but fairness without limits is unfair

    Despite we have withdrawn all announced modifications of our original and unique work of art titled Ontologic System and created by C.S., which are legally required for opening our Ontologic System (OS), and allowing and licensing the performance and reproduction of certain parts of our OS, our maxim and credo of Fair, Reasonable, And Non-Discriminatory, As well as Customary (FRANDAC) entrepreneurial behaviour still remains.

    In this relation, we would like to note at first that certain blacklistings make no sense anymore, because the issue respectively disputed matter is solved by the

  • withdrawal of said modifications of our Ontologic System (OS), and
  • new regulation regarding the exclusive Ontologic Applications and Ontologic Services (OAOS) on our exclusive Marketplace for Everything (MfE)

    and entities are allowed to implement their OAOS, if they also publish them on our exclusive MfE.
    For example, the company Microsoft is allowed to

  • implement its Microsoft Office software suite, applications, and services as OAOS on top of one of our
    • operating systems respectively variants of our Ontologic Core (OntoCore or OC) and
    • movements respectively raw versions of our OS,

    and

  • publicate said OAOS on our MfE

    under our FRANDAC terms and conditions, but Microsoft is not allowed to

  • implement OAOS, which are related to the exclusive infrastructures of our corporation, and
  • provide said OAOS,

    which means for example no Microsoft Windows, no Microsoft Azure, and no Microsoft 365.
    The same holds for other companies, like for example Alphabet (Google), Amazon, Apple, Meta (Facebook), Oracle, IBM, Tencent, Alibaba, Baidu, Samsung, Huawei, Xiaomi, Cisco, Intel, Nvidia, Qualcomm, Epic Games, etc., etc., etc., and their technologies, goods, and services based on or dependent on our OS. :)

    In this relation, we would also like to note that we

  • get all of our raw signals and data through the OAOS publicized on the MfE and provided on the subsystems and platforms of the infrastrutures of our corporation, and
  • are allowed to use all of our raw signals and data for all of our business activities related to the exclusive management and exploitation respectively performance and reproduction of our OS,

    because eventually we are the only Ontologic Applications and Ontologic Services Provider (OAOSP) and therefore there are no competitors, but only creators, authors, developers, implementers, programmers, customers, and users represented to other entities by our corporation exclusively.

    In this relation, we would now like to note that indeed a justified question exists regarding the handling of public signals and data, and open signals and data sources respectively publicly available signal streams and datasets, and openly available signal streams and datasets, which are common items, obviously, doubtlessly, and definitely.
    The proposed compromise respectively agreement of our Society for Ontological Performance and Reproduction (SOPR) for making said withdrawn modificatons of our OS comprises the regulations that

  • all original and unique ArtWorks (AWs) and further Intellectual Properties (IPs) included in the oeuvre of C.S. will not be provided for free (either end user or consumer, or responsible enity pays) or under a license, which has not been authorized by our SOPR,
  • all items, which are common to all members of our SOPR, become parts of the exclusive infrastructures of our SOPR, and
  • all raw signals and data, informations, knowledge bases, models, and algorithms are traded exclusively on the Marketplace for Everything (MfE), even for 0 cent in the extremely rare case, that they are truly not owned by C.S. and our corporation as well respectively not gathered in the
    • legal scope of our Ontologic System (OS),
    • domain of our New Reality (NR) respectively
    • sovereign space of our Ontoverse (Ov), also known as our digital state OntoLand (OL).

    A prominent example are raw signals and data, informations, knowledge bases, models, and algorithms related to the fields of geography and Geographic Information System (GIS), but also our OS with its Ontologic Net (ON), Ontologic Web (OW), and Ontologic uniVerse (OV), which collectively are our Ontoverse (Ov) and New Reality (NR), as well as the related

  • OntoBot, OntoScope, OntoCoVE, OntoGIS, OntoMap, OntoGlobe, and OntoEarth components of our OS (see for example the note Overture Maps Foundation blacklisted of the 16th of December 2022), and also
  • backbones, core networks, or fabrics, and also subsystems and platforms of our infrastructures (see also the issue SOPR #327 of the 7th of June 2021 and for example the note Vertical and horizontal HB and SB, AS and RS of the 22nd of June 2021), and
  • OAOS for warning the public about emergencies, epidemics, and so on, also known as warn apps and also provided by for example federal states of the F.R.Germany and members of the F.R.German clique related to Technical Universities (TUs) and Institutes of Technology (ITs), research companies, like for example Fraunhofer Institutes, companies like for example Microsoft, Amazon, and Meta (Facebook), and also Porsche SE/Volkswagen, Daimler, and the other entities usually named in such a circumstance.

    For a better understanding, we have to recall that there exists a white, yellow, or red line between the original and unique ArtWorks (AWs) and further Intellectual Properties (IPs) included in the oeuvre of C.S., which are exclusively managed and exploited by our corporation with the consent and on the behalf of C.S., and all the rest, specifically because of the

  • prohibition to provide said original and unique AWs and further IPs for free (either end user or consumer, or responsible enity pays) or under a license, which has not been authorized by C.S.,
  • impossibility to establish a level playing field due to the simple facts that C.S.
    • is the proven creator and holds at least the moral rights for said original and unique AWs and further IPs in addition to certain copyrights, and also
    • has no need and no interest to sell or give away any rights and properties, but has the power and interest to exercise all rights and control all properties,

    and

  • refusal of the market regulators of the U.S.America (U.S.A.) and the European Union (EU) to approximate a level playing field as much as possible, which requires to break up illegal monopolies, like the ones listed above, and act against abuses of market power and illegal business actions,

    which are further legal requirements for modifying and opening our OS.

    We also have to mention that we wanted to avoid to draw said white, yellow, or red line at the courts, because on the one hand it is not optimal for the benefit of the public and on the other hand it becomes very restrictive and quite expensive for certain companies.
    But finally, we had to conclude that too many entities are too incompetent or just too stubborn to comply with any limit and to understand our perfect solution with our SOPR, as we also mentioned several times in the past.

    Both, the question regarding said common items and said unruly behaviour, are supporting our decision to withdraw said modifications and introduce stricter regulations, for example in relation to the performance and reproduction respectively implementation and publication of certain interfaces of our Ontologic System Architecture (OSA), which nevertheless are prohibited for fair use, and the allowance and licensing of the performance and reproduction of OSA interface by State-Owned Enterprises (SOEs) and militaries, as known as Armed Forces (AF).

    Are there any questions by the U.S.American Federal Trade Comission (FTC) and European Comission (EC) regarding legal monopoly? If this is the case, then we are always happy to provide education, explanation, and clarification, as well as itemization.


    11.January.2023

    05:13 UTC+1
    Does not look good for Microsoft and Co.

    Unsurprisingly, we found more evidence, that support our view that the company Microsoft is an illegal monopoly (e.g. abuse of market power) and serious criminal actor (e.g. espionage, criminal copyright infringement, blackmailing, wire fraud, securities fraud, commercial fraud, lobbyism scam, corruption, conspiracy, and plot).
    In fact, Microsoft is

  • infringing the rights and properties of C.S. and our corporation, but also every national and international laws, regulations, and acts, as well as agreements, conventions, and charters wherever and whenever such a bad action seems to be beneficial for Microsoft,
  • stealing everything from C.S. and our corporation,
  • marketing the stolen original and unique ArtWorks (AWs) and further Intellectual Properties (IPs) included in the oeuvre of C.S. as own works and achievements,
  • giving away those parts of said original and unique AWs and further IPs, which Microsoft cannot steal alone for various reasons, either for free directly or implement them as Free and Open Source Software (FOSS) alone and in collaboration,
  • financing and supporting research projects with everything required to generate a maximal damage for C.S. and our corporation,
  • financing and supporting start-ups, which are also stealing said original and unique AWs and further IPs included in the oeuvre of C.S., and also infringing the rights and properties of C.S. and our corporation,
  • financing and supporting FOSS foundations to dis-empower, dis-aggregate, ridicule, and eventually destroy our Society for Ontological Performance and Reproduction (SOPR) and telling other entities to join up directly and indirectly, and
  • conspiring with every other entity, including governments, commissions, federal authorities, universities, research institutes, companies, artists, other individual persons, cliques, and other entities, that supports its business plan, business goal, and business strategy,

    as we have already shown multiple times and documented by maybe 100 or more individual cases, which crystal clearly prove all of our allegation in relation to more than 20 infringements of national and international laws, regulations, and acts, as well as agreements, conventions, and charters.
    Our investigations also show that Microsoft and its accomplices have gone totally beserk in the last 2 years, as we have also shown with other companies and their partners in crime, because only blunt stealing and conducting other crimes in public and daylight are applyable. In fact, Microsoft is making war against C.S. and our corporation, and does not care for law and order, and other achievements of civilized societies anymore.
    That issue cannot be solved by monetary penalities and other measures, but only by the complete break-up, as we always said, explained, and demanded.

    But as we always said in this relation, Microsoft is not alone and a crackdown of national cliques and mafias is inevitable to solve that chaos.

    06:41 and 09:26 UTC+1
    More evidence transformer model, etc. based on OS

    We quote a report, which is about the field of generative SoftBionics and was publicized on the 10th of January 2023 (yesterday): "[...]
    As a Google engineer, he held a few credits that allowed him to run experimental software across the company's vast network of computer data centers. But these credits would grant only a small fraction of the computing power needed to train his chatbot. So he started borrowing credits from other engineers; as the system analyzed more data, its skills would improve by leaps and bounds.
    Initially, he trained his chatbot using what is called an LSTM, for Long Short-Term Memory - a neural network designed in the 1990s specifically for natural language. But he soon switched to a new kind of neural network called a transformer, developed by a team of Google A.I. researchers that included [a second Google engineer].
    Unlike an LSTM, which reads text one word at a time, a transformer can use multiple computer processors to analyze an entire document in a single step."

    Comment
    We have already explained that the so-called transformer, reformer, and transducer (e.g. perceiver) model and other models are based on the fields of Machine Learning (ML) and Artificial Neural Network (ANN), specifically MultiLayer Perceptron (MLP), and also concluded that such models are also based on our Evolutionary operating system (Evoos) and our Ontologic System (OS) (to a significant extend somehow).
    With this statement about multi-processing or multiprocessing, which is also listed explicitly in the Feature-List #1 of our OS in direct context to ML, ANN, MLP, and so on, and integrated by our Ontologic System Architecture (OSA), we get another first-hand confirmation of our claims and explanation straight from the horse's mouth.

    Add anything related to the fields of

  • Information System (IS)
    • Geographic Information System (GIS),
      • digital maps, digital globes, etc.,

      and

    • smart guidance system,
  • Knowledge-Based (KB) system
    • Graph-Based Knowledge Base (GBKB) or Knowledge Graph (KG),
  • Question Answering (QA) System (QAS), including predictive QA,
  • Recommendation System or Recommender System (RecS), including predictive RecS,
  • chatbot,
  • speech recognition,
  • voice user interface,
  • Dialog System (DS or DiaS), including Dialogue Management System (DMS),
  • Conversational System (CS or ConS), including Conversational Agent System (CAS or ConAS),
  • Multimodal System (MS or MMS), including Multimodal User Interface (MUI),
  • Intelligent Agent System (IAS), including (voice-based or speech controlled) virtual assistant, Intelligent Personal Assistant (IPA) or Personal Intelligent Assistant (PIA),
  • Cognitive Agent System (CAS), including
    • Personalized Assistant that Learns (PAL)
      • Reflective Agents with Distributed Adaptive Reasoning (RADAR) and
      • Cognitive Assistant that Learns and Organizes (CALO),

    also wrongly called Siri, Alexa, Cortana, Bixby, and so on,

  • Robotic System (RS),
  • and so on,

    and the infringement of the rights and properties (e.g. copyright) of C.S. and our corporation becomes even more obvious and proven.

    06:35, 08:12, 12:00, 13:57, and 19:31 UTC+1
    Further steps and Ontologic Net Further steps

    We looked at Segment Routing (SR) technologies (SRx) and their relation to our Ontologic System (OS), specifically our creations or foundations of the fields of

  • Software-Defined Networking (SDN) with Network Function Virtualization (NFV), and Virtualized Network Function (VNF),
  • Cloud-native Computing and Networking (CnCN) with Cloud-native Network Function (CNF), as wrongly called by others, including the integration and combination of SDN with NFV, and VNF, and also CNF (SDN-NFV-VNF-CNF),
  • what is wrongly called Future Interconnected network Architecture (FIA), New Generation Network (NGN), including Information-Centric Networking (ICN), including all variants of Centric/Named networking, such as Content-Centric Networking (CCN) and Named Data Neworking (NDN), Named Function Networking (NFN), Service-Centric Networking (SCN), Function-Centric Service Chaining (FCSC), Data-Oriented Network Architecture (DONA), Publish-Subscribe Internet Routing Paradigm (PSIRP) and PUblish-SUbscribe Internet Technologies (PURSUIT), and so on,
  • 5th Generation mobile networks or 5th Generation wireless systems of the Next Generation (5G NG) and the 6th Generation mobile networks or 6th Generation wireless systems (6G) with network slicing, network access sharing, virtualized and programmable Radio Access Network (RAN), and so on, and
  • Service-Oriented technologies (SOx).

    In the following sections we quote publications in relation to the fields of

  • Source Routing (SR or SourceR),
  • Scalable Source Routing (SSR),
  • Ad hoc Network (ANET),
    • Wireless Ad hoc NETwork (WANET),
      • Mobile Ad Hoc NETwork (MANET),
    • mesh network, and
    • sensor network,
  • Peer-to-Peer underlay network, protocol, techniques, etc.,
  • Self-organizing, self-stabilizing, organic growing network,
  • Segment Routing (SR or SegR), and
  • Software-Defined Networking (SDN).

    At first, we quote an online encyclopedia about the subject Source Routing (SR or SourceR): "In computer networking, source routing, also called path addressing, allows a sender of a packet to partially or completely specify the route the packet takes through the network.[1 [Source routing in computer networks. [1st of January 1977]]] In contrast, in conventional routing, routers in the network determine the path incrementally based on the packet's destination. Another routing alternative, label switching, is used in connection-oriented networks such as X.25, Frame Relay, Asynchronous Transfer Mode and Multiprotocol Label Switching.
    [...]
    Many high-performance interconnects including Myrinet, Quadrics,[2 [Adaptive Routing Strategies for Modern High Performance Networks. [2008 or later]]] IEEE 1355, and SpaceWire support source routing.

    Internet Protocol
    In the Internet Protocol, two header options are available which are rarely used: "strict source and record route" (SSRR) and "loose source and record route" (LSRR).[3] Because of security concerns, packets marked LSRR are frequently blocked on the Internet. If not blocked, LSRR can allow an attacker to spoof an address but still successfully receive response packets by forcing return traffic for spoofed packets to return through the attacker's device.[4]
    In IPv6, two forms of source routing have been developed. The first approach was the Type 0 Routing header.[5] This routing header was designed to support the same use cases as the IPv4 header options. Unfortunately there were several significant attacks against this routing header and its utilisation was deprecated.[6] A more secure form of source routing is being developed within the IETF to support the IPv6 version of Segment Routing.[7 [IPv6 Segment Routing Header (SRH). [20th of July 2017]]]

    Software-defined networking
    Software-defined networking can also be enhanced when source routing is used in the forwarding plane. Studies have shown significant improvements in convergence times as a result of the reduced state that must be distributed by the controller into the network.[8 [Source Routed Forwarding with Software Defined Control, Considerations and Implications. [2012]]][9 [SDN State Reduction. [7th of March 2013]]]

    [...]"]

    Comment
    We are missing dates, which is often the case, when the public should be misled about the existence or relevance of prior art, specifically our Evolutionary operating system (Evoos) and our Ontologic System (OS).
    We also have the impression that the truly interesting features and functionalities are based on our Evoos and our OS, SR-MPLS and SRv6 with our without SDN, as shown with the existing dates, which is often the case and proves the originality and uniqueness of our prior art, specifically our Evoos and our OS.

    We also quote an online encyclopedia about the subject Scalable Source Routing (SSR): "Scalable Source Routing (SSR) is a routing protocol for unstructured networks such as mobile ad hoc networks, mesh networks, or sensor networks. It combines source routing with routing along a virtual ring, and is based on the idea of "pushing Chord into the underlay".[1 [Pushing Chord into the Underlay: Scalable Routing for Hybrid [Mobile Ad hoc NETworks (]MANETs[)]. [21st of June 2006]]]
    [...] [2 [A Self-organizing Routing Scheme for Random Networks. [31st of May 2005]]]
    [...]"

    We also quote the document titled "Self-Stabilizing Ring Networks on Connected Graphs" and publicized on the 31st of January 2005: "Abstract
    Large networks require scalable routing. Traditionally, protocol overhead is reduced by introducing a hierarchy. This requires aggregation of nearby nodes under a common address prefix. In fixed networks, this is achieved administratively, whereas in wireless ad-hoc networks, dynamic assignments of nodes to aggregation units are required.
    As a result of the nodes commonly being assigned a random network address, the majority of proposed ad-hoc routing protocols discovers routes between end nodes by flooding, thus limiting the network size. Peer-to-peer (P2P) overlay networks offer scalable routing solutions by employing virtualized address spaces, yet assume an underlying routing protocol for end-to-end connectivity.
    We investigate a cross-layer approach to P2P routing, where the virtual address space is implemented with a network-layer routing protocol by itself. The Iterative Successor Pointer Rewiring Protocol (ISPRP) efficiently initializes a ring-structured network among nodes having but link-layer connectivity. It is fully self-organizing and issues only a small per-node amount of messages by keeping interactions between nodes as local as possible.
    [...]

    Introduction
    Autonomous systems like ad hoc and sensor networks require protocols which make the system self-organizing. A routing protocol, for example, should be able to cope with self-assigned random node addresses and to scale reasonably with the network size at the same time. Routing scalability traditionally is achieved by introducing a hierarchy in the address structure. The hierarchy is dependent on the position of the nodes in the network graph. In autonomous networks, the hierarchy thus has to be established dynamically, for example using clustering protocols. Still, as nodes commonly have self-assigned random network address, the majority of proposed ad-hoc routing protocols (see for example [Per00]) performs route discovery between end nodes using some variant of flooding. This approach is limited in its scalability. Although Peer-to-Peer (P2P) systems are mainly known from the various file-sharing applications, their main benefit is that they offer scalable routing in a virtualized address space [CF05b].
    Structured overlays like Chord [SMK+01], Pastry [RD01], and others are well-known examples of P2P systems. Here, nodes also have self-assigned random addresses, however, overlay addresses. These systems assume the prior existence of a network-layer routing protocol.
    We investigate cross-layer solutions where scalable routing in a virtual address space is implemented as network-layer protocol by itself. The Iterative Successor Pointer Rewiring Protocol (ISPRP) [CF05a [ISPRP: A Message-Efficient Protocol for Initializing Structured P2P Networks. April 2005] is our first step towards this. It is able to build a basic ring network on top of a network in which nodes only have link-layer connectivity. Once this ring has been established, messages can be routed between arbitrary nodes. The key concern with ISPRP was to limit the amount of messages required for the initalization as opposed to previously proposed flooding-based approaches [(e.g. DPSR cross-layer approach)] [HDP03 [Exploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Networks. 2003], PDH04 [Ekta: An Efficient DHT Substrate for Distributed Applications in Mobile Ad Hoc Networks. December 2004]]. This is done by locally restricting interactions and message exchanges to places where inconsistencies occur. Thus, ISPRP produces only very low overhead.
    In this paper, we present a correctness proof for ISPRP. Moreover, we show that ISPRP is self-stabilizing [Dol00] in the sense that the protocol lets a (connected) network converge into a globally correct state starting from an arbitrary state within a bounded amount of time. Thus, ISPRP is able to initialize a routeable network among freshly deployed nodes like it is required in a sensor network.
    [...]

    Related Work
    Other authors have also considered building a network-layer routing protocol using P2P techniques [EFK01 [PeerNet: Pushing Peer-to-Peer Down the Stack. February 2001], For04 [Unmanaged Internet Protocol. January 2004]]. [...] In contrast to our ring-based system, their system uses hierarchical, tree-based routing. They do not consider small nodes with limited capabilites like in sensor networks, but aim at the Internet.
    Hu et al. propose to use the Pastry overlay for unicast routing in ad-hoc networks, where routes between virtual addresses are discovered using the DSR routing protocol [HDP03, PDH04]. Their work differs from ours in that we do not require all nodes to flood the network in order to discover routes.
    [...]

    Problem Description
    [...]
    In our cross-layer design and the P2P scenario, however, there are no dedicated routers, and the nodes themselves take responsibility for routing messages. With randomly assigned addresses, storing the above-mentioned information leads to huge memory requirements and protocol overhead, as next-hop information cannot be hierarchically aggregated, which is a common practice in fixed networks like the Internet. To avoid this problem, another option is to use source routing. There, message headers contain an enumeration of all the nodes along the path. Hence, forwarding nodes do not have to maintain any routing information, but message sources need to know the routes to all destinations they communicate with.
    [...]

    The Iterative Successor Pointer Rewiring Protocol (ISPRP)
    The ISPRP was designed with two key aspects in mind: simplicity and efficiency. By relying on the total ordering of the linear integer address space, inconsistencies can be locally detected and interactions are also locally performed, effectively reducing the control message overhead."]

    Comment
    First of all, we note that the document is related to the field of Mobile Ad hoc NETwork (MANET).

    Obviously, we have to state more precisely our messages, notes, explanations, clarifications, investigations, and claims regarding the Associative Memory (AM) or Content-Addressable Memory (CAM) and the P2P underlay techniques made in the related notes of October, November, and December 2022.
    And there is still a lot that was created with or was integrated by the creation of our OS, as also explained here.
    Also, we have found again our source of inspiration and decisive prior art, which supports our other claims. And as we always say at such a point, if one door closes, then another door opens. :)

    Also note that the terms and properties of organically growing, self-organizing, and self-stabilizing point directly to our field of SoftBionics (SB) and our Evolutionary operating system (Evoos).

    Also note

  • on the one hand rewriting logics, inclusive graph rewriting logics and Poplog, inclusive Prolog, are foundational parts of our Ontologic roBot (OB or OntoBot), and
  • on the other hand rewiring protocol and Network Datalog (NDlog).

    Everything is coming together

  • at first by the original and unique ArtWorks (AWs) and further Intellectual Properties (IPs) included in the oeuvre of C.S., specifically our Evoos and our OS, and
  • again by the plagiarisms of others on the other hand.

    But the copyright is crystal clear in such a situation: The original and unique prior art gets the cookie exclusively.

    Because we have integrated Ontology-Oriented (OO 2) technologies (OOx) in our OS, including ontology-based technologies, we also have OOx Service-Oriented technologies (SOx), so we have the SOx (e.g. Service-Oriented Architecture (SOA) and Service-Oriented Computing (SOC)), Service-Centric Networking (SCN), Function-Centric Service Chaining (FCSC), and so on as well.
    Note once again that (the foundation of) our microService-Oriented Architecture (mSOA) already comes with our Resource-Oriented technologies (ROx) (e.g. Resource-Oriented Computing (ROC)) created with our Evoos.

    We have also proven once again that we have (the foundation of) the Publish-Subscribe Internet Routing Paradigm (PSIRP) and PUblish-SUbscribe Internet Technologies (PURSUIT), ... already created with our OS as well.
    See for example the document titled "MOPAR: A Mobile Peer-to-Peer Overlay Architecture for Interest Management of Massively Multiplayer Online Games". For the management of Area of Interest (AoI) slave nodes subscribe and master nodes publish.

    We have also proven once again that all state of the art Data Center operating systems (DCoss) are plagiarisms of our OS, including our Cloud Ontologic System (COS), including our Cloud operating system (Cos).

    We also quote the document titled "Pushing Chord into the Underlay: Scalable Routing for Hybrid MANETs" and publicized on the 21st of June 2006: "Abstract
    Scalable Source Routing is a novel routing approach for large unstructured networks, for example hybrid mobile ad hoc networks (MANETs), mesh networks, or sensor-actuator networks. It is especially suited for organically growing networks of many resource-limited mobile devices supported by a few fixed-wired nodes. Scalable Source Routing is a full-fledged routing protocol that directly provides the semantics of a structured peer-to-peer overlay. [...]
    Scalable Source Routing combines source routing in the physical network with Chord-like routing in the virtual ring formed by the address space. Message forwarding greedily decreases the distance in the virtual ring while preferring physically short paths.
    Unlike previous approaches, scalability is achieved without imposing artificial hierarchies or assigning location-dependent addresses. Scalable Source Routing enables any-to-any communication in a flat address space without maintaining any-to-any routes. Each node proactively discovers its virtual vicinity using an iterative process. Additionally, it passively caches a limited amount of additional paths.
    [...]

    Introduction
    [...]
    [...] The multi-hop network mixes wired and wireless links, as well as fixed and mobile devices. Most devices in such networks are highly available, while others may have volatile connectivity and be prone to failure. For example, the user could program lighting, air conditioning, and security systems using a portable computer. The network enables automation in and across buildings without a structured and managed infrastructure.
    A basic functional requirement in a multi-hop computer network is routing. Although ad hoc networks have been extensively researched, and many ad hoc routing protocols have been developed, they are still limited to a few hundred nodes. Furthermore, distributed applications need basic services such as naming and service directories. As a result of their self-organization property, structured peer-to-peer (P2P) overlays such as Chord [35] or Pastry [34] are an attractive choice for the implementation of these basic services. However, running a P2P protocol on top of an ad oc routing protocol incurs a high cost.
    Scalable Source Routing is an integrated solution to both problems. It creates a Chord-like, ring-structured P2P network at the network layer. Thereby, Scalable Source Routing efficiently provides network-layer connectivity, and at the same time the indirect routing primitive of a structured P2P network. [...]
    [...]

    Scalable Source Routing Overview
    [...]

    Indirect Routing
    Indirect routing decouples packet addresses from the network nodes. Nodes send packets to abstract destinations that the routing protocol maps to a concrete node. This level of indirection enables data-centric communication where packet addresses identify data objects instead of nodes.
    [...]
    Besides the successor, nodes store the addresses of O(log n) additional nodes at exponentially spaced distances to reduce the average request path length from O(n) to O(log n), where n is the size of the network. By choosing physically close nodes for the additional state, the total physical lookup path length is a constant factor longer than the shortest possible length [14 [The Impact of DHT Routing Geometry on Resilience and Proximity. 2003]].

    Overview of the Design
    Scalable Source Routing provides indirect routing at the network layer. To this end, it integrates source routing with Chord-like routing in an address space that has the structure of a virtual ring. Nodes have selfassigned addresses that we assume to be unique and preferably uniformly distributed.
    In contrast to well-known link-state and distance-vector routing protocols, Scalable Source Routing does not maintain state information for all destinations in the network. A node's forwarding database is comprised of the node's physical neighbors, the node's virtual predecessor and successor, and opportunistically cached information. [...]
    The protocol maintains its forwarding database as a route cache. [...]

    Packet Forwarding
    [...]

    State Maintenance
    [...]

    [...]

    Related Work
    Related work can be broadly classified into routing protocols for self-organizing systems (that is, future architectures of the Internet, mobile ad hoc networks, and sensor networks) and protocols for indirect routing in MANETs.
    In the current architecture of the Internet, addresses are dependent on the physical location of the nodes. This prohibits users from running long-lived application connections while roaming between different subnetworks. For example, TCP connections break if the address of an endpoint changes. In addition to that, since addresses cannot be used to identify nodes, they also cannot be used to locate a mobile node.
    Mobile IP [29 [Mobile IP. May 1997]] was designed to enable roaming in the Internet. A mobile node is assigned a permanent home address by its home agent, that is a router in the mobile node's home network. When roaming to a different network, the mobile node temporarily gets assigned a care-of address by a foreign agent. For packet delivery, the mobile node is identified by its home address. Packets are transparently tunneled from the home agent to the foreign agent. By sending packets over sub-optimal routes, tunneling increases both end-to-end delays and the network load.
    Newer approaches therefore employ a different form of indirection for handling roaming. Instead of tunneling, they use dynamic location services. There, fixed node identifiers are transparently resolved into location-dependent addresses. For scalability, the directory storing the identifier-to-address mappings has to be decentralized. A number of proposed approaches use structured P2P protocols for implementing their directories [11 [PeerNet: Pushing Peer-to-Peer Down the Stack. February 2001], 37 [An Underlay Strategy for Indirect Routing. 2004]]. Location directories have to be updated to provide correct mappings, and the resolution of identifiers into addresses incurs a delay. While Scalable Source Routing is based on structured P2P principles and employs fixed node identifiers, it eliminates the need for a separate location service. The node identifiers are also used as addresses. Nonetheless, the locality-awareness of the network established by Scalable Source Routing diminishes the cost of location-independent addressing.
    The UIP [13 [Unmanaged Internet Protocol. January 2004]] also is independent of a location service, but the authors do not address and evaluate the aspect of network dynamics. [...]
    [...]
    Johnson proposed to reduce the amount of state for routing in a MANET by only considering currently needed routes [20]. The idea was extended to Dynamic Source Routing (DSR) [21 [Dynamic Source Routing in Ad Hoc Wireless Networks. 1996]]. DSR separates routing in a discovery and a maintenance phase. [...]
    [...]
    As an alternative to flat routing, Kleinrock and others [24] analyzed hierarchical routing for large networks. By grouping nodes into areas and assigning addresses to this area hierarchy, the size of routing tables can be reduced. [...] Tsuchiya [36 [The landmark hierarchy: a new hierarchy for routing in very large networks. 1988]] extended the concept of an area hierarchy to the landmark hierarchy. There, node addresses are assigned on the basis of relative positions to a set of landmark nodes. A landmark hierarchy is easier to dynamically configure and maintain. The routing performance of an area hierarchy is sensitive to the selection of areas, whereas the landmark hierarchy is less sensitive to the placement of landmarks. In addition to that, it is more complex to maintain an area of nodes instead of a landmark. LANMAR [28 [Lanmar: Landmark routing for large scale wireless ad hoc networks with group mobility. 2000]] and L+ [6 [L+: Scalable Landmark Routing and Address Lookup for Multi-hop Wireless Networks. 2002]] are examples of landmark routing protocols for MANETs. Unlike Scalable Source Routing, landmark routing protocols make dynamic address assignments and therefore need an additional location service.
    With geographic routing, no routes have to be maintained at all. Therefore, it has ideal scaling properties. Nodes only need to know the physical locations of their neighbors, and packets are greedily forwarded into the direction of the destination's physical location. However, for enabling geographic routing, all nodes have to be equipped with satellite navigation receivers (e.g., GPS). An example of geographic routing protocols is Greedy Perimeter Stateless Routing (GPSR) [22 [GPSR: Greedy Perimeter Stateless Routing for Wireless Networks. 2000]]. For practical purposes, geographic routing requires a location service for mapping the location-independent address of a node to its current geographic coordinate. The Grid Location Service [or Geographic Location System (GLS) of GRID] [25 [A Scalable Location Service for Geographic Ad Hoc Routing. 2000]] is an example of a scalable, distributed location service. Greedy geographic routing requires a planarized network graph. Therefore, it is unsuitable for our scenario of hybrid MANETs where additional wired links provide shortcuts. The Geographic Hash Table (GHT) [33 [GHT: A Geographic Hash Table for Data-Centric Storage. 2002]] enables indirect routing on the basis of GPSR. As a result of that, the GHT requires the nodes to access to physical location information. [We add that "GPSR was designed for a network model where a sender wishes to transmit packets to a destination node with a known non-geographic address; a sender must map the destination's identifier to its current location using a location database, such as [Geographic Location System (]GLS[)] [16]. [...] While GLS provides this location database itself as a service, GHT avoids this level of indirection and instead maps event names directly to locations."]
    Wireless sensor networks (WSNs) are large-scale deployments of resource-constrained nodes. As a result of their size and deployment scenarios, WSNs need to be self-organizing. Protocol designs have to address the limited communication and computational capabilities as well as the limited memory and battery capacity of nodes. In general, sensor nodes are assumed to be stationary [...]. Early applications of WSNs were concerned with environmental data collection. These applications require data-centric routing primitives which support aggregation. Recent proposals also necessitate point-to-point routing. [...]
    [...]
    The idea of using structured P2P protocols for routing in a MANET has independently been proposed by several groups. DPSR [18 [Exploiting the synergy between peer-to-peer and mobile ad hoc networks. 2003]] is a cross-layer approach for using the structured P2P overlay Pastry as a network-layer routing protocol. It integrates Pastry with the MANET routing protocol DSR [21 [Dynamic Source Routing in Ad Hoc Wireless Networks. 1996]]. DPSR addresses nodes by fixed identifiers.The Ekta [32 [Ekta: An Efficient DHT Substrate for Distributed Applications in Mobile Ad Hoc Networks. December 2004]] protocol enhances DPSR with an indirect routing primitive.
    [...] As a result of the location-dependency of addresses, key-tonode mappings frequently change due to mobility. This causes additional overhead which Scalable Source Routing avoids by using fixed identifiers.
    [...]"

    Comment
    We have integrated the fields of

  • operating system (os)
    • Embedded System operating system (ESos),
      • Embedded Linux,
      • Wombat Linux running on L4 and Independent Group of Unix-Alikes and Networking Activists (IGUANA) system,
      • ANTS-EOS - An Evolvable Operating System for Wireless Sensor Networks,
      • and so on,
    • Real-Time operating system (RTos),
    • Distributed operating system (Dos),
    • L4 distributions (an operating system made from a software collection that includes the L4 microkernel and, often, a toolset),
    • Linux distributions ("an operating system made from a software collection that includes the Linux kernel and, often, a package management system")
      • Openwall,
      • Open Wireless RouTer (OpenWrt),
      • and so on,
    • and so on,
  • virtualization and Virtual Machine (VM)
    • operating system-level virtualization or containerization, and
    • hypervisor,
  • network drivers (note that in the Unix abstraction "everything is a file") and foundation of Software-Defined Network (SDN) and Network Function Virtualization (NFV) and Virtualized Network Function (VNF),
  • Distributed Computing (DC) and Distributed System (DS)
    • (large) structured network,
    • (large) unstructured network
      • Wireless Ad hoc NETwork (WANET),
        • Mobile Ad hoc NETwork (MANET),
      • mesh network,
      • sensor network, and
      • sensor-actuator network,
    • (large) hybrid network
      • hybrid Mobile Ad hoc NETwork (hMANET),
    • Peer-to-Peer Computing (P2PC),
      • unstructured Peer-to-Peer (uP2P),
      • structured Peer-to-Peer (sP2P), and
      • hybrid Peer-to-Peer (hP2P),
    • Grid Computing (GC),
    • foundation of Cloud Computing (CC),
  • Mobile Computing (MC or MobileC),
  • Service-Oriented technologies (SOx),
  • Embedded System (ES),
  • Network HardWare (NHW), specifically equipment, device, card, chip, and module,
  • mobile device,
  • and so on

    in our OS and very important fields even before in our Evoos.
    Obviously, our Evoos and our OS are more general, which implies that they have the foundational properties and functionalities in relation to networking, and also much more.

    Also note that the document mentions the fields of

  • hybrid network,
  • P2P underlay in relation to the Internet Protocol (IP) layer
    "PeerNet: Pushing Peer-to-Peer Down the Stack": "PeerNet is not an overlay on top of IP, it is an alternative to the IP layer.",
  • Data-Centric Storage (DCS) and Content-Addressable Storage (CAS)
    "GHT: A Geographic Hash Table for Data-Centric Storage": "Under DCS, sensed data are stored at a node determined by the name associated with the sensed data.", "Under the DCS approach, the particular node that stores a given data object is determined by the object's name. Hence all data with the same general name (e.g., "elephant sightings") will be stored at the same sensornet node (not necessarily the node that originally gathered the data).", and
  • data-centric routing,

    but it does not mention the field of data-centric networking in the sense of Information-Centric Networking (ICN), which was created with our integrating Ontologic System Architecture (OSA), OntoBase, OntoFS, and OntoNet Ontologic System Components (OSC), and also OntoBot component.
    But the 3 quoted documents in relation to the field of MANET (ISPRP and SSR, and also GHT), the 1 quoted document about P2P underlay (PeerNet), the 2 documents about indirect routing on connected graphs (ISPRP and SSR), and the 1 mentioned document about DCS (GHT) do not integrate all in one.
    And we have (hyper)graph-based system and routing in addition to hierarchical, tree-based system and routing, and ring-based system and routing, which includes hybrid structure-based systems and routings based on them.
    We also explained that Evoos is based on a model of a brain and therefore based on Associative Memory (AM) or Content-Addressable Memory (CAM) (see also the Further steps, Ontologic Net Further steps of the 7th of December 2022).

    Obviously, we have to state more precisely our messages, notes, explanations, clarifications, investigations, and claims regarding the Associative Memory (AM) or Content-Addressable Memory (CAM), the P2P underlay techniques, and the landmark routing and geographic routing protocols made in notes of October, November, and December 2022.
    And there is still a lot that was created with or was integrated by the creation of our OS, as also explained here.
    Also, we have found again our source of inspiration and decisive prior art, which supports our other claims. And as we always say at such a point, if one door closes, then another door opens. :)

    Also note our logical integration of Source Routing (SR), including Scalable Source Routing (SSR), with Content-Addressable Storage (CAS), logic engine, etc., which is our Centric/Named networking included in our Ontologic Net (ON).

    We also quote an online encyclopedia about the subject Segment Routing (SR or SegR): "Segment routing, a form of computer networking, is a modern variant of source routing that is being developed within the [Source Packet Routing in NetworkinG (]SPRING[)] and IPv6 working groups of the [Internet Engineering Task Force (]IETF[)]. In a segment routed network, an ingress node may prepend a header to packets that contain a list of segments, which are instructions that are executed on subsequent nodes in the network. These instructions may be forwarding instructions, such as an instruction to forward a packet to a specific destination or interface.
    Segment routing works either on top of a [MultiProtocl Label Switching (]MPLS[)] network or on an IPv6 network.[1][2] In an MPLS network, segments are encoded as MPLS labels [respectively SR using MPLS (SR-MPLS)]. Under IPv6 [respectively SR using IPv6 (SRv6)], a new header called a Segment Routing Header (SRH) is used. Segments in a SRH are encoded in a list of IPv6 addresses.
    "]

    Moreover, we quote the chapter 1 of a document, which is about Segmented Routing (SR or SegR) and was published by a large company in the field of network hardware: "About Segment Routing
    This chapter introduces the concept of segment routing and provides a workflow for configuring segment routing.
    [...]

    Scope
    Segment routing is a method of forwarding packets on the network based on the source routing paradigm. The source chooses a path and encodes it in the packet header as an ordered list of segments. Segments are an identifier for any type of instruction. For example, topology segments identify the next hop toward a destination. Each segment is identified by the segment ID (SID) consisting of a flat unsigned 20-bit integer.
    Segments
    Interior gateway protocol (IGP) distributes two types of segments: prefix segments and adjacency segments. Each router (node) and each link (adjacency) has an associated segment identifier (SID).
    [...]
    Dataplane
    Segment routing can be directly applied to the Multiprotocol Label Switching (MPLS) architecture with no change in the forwarding plane. [...]
    Services
    Segment Routing integrates with the rich multi-service capabilities of MPLS, including Layer 3 VPN (L3VPN), Virtual Private Wire Service (VPWS), Virtual Private LAN Service (VPLS), and Ethernet VPN (EVPN).
    Segment Routing for Traffic Engineering
    Segment routing for traffic engineering (SR-TE) takes place through a tunnel between a source and destination pair. [...]

    Need
    With segment routing for traffic engineering (SR-TE), the network no longer needs to maintain a per-application and per-flow state. Instead, it simply obeys the forwarding instructions provided in the packet.
    SR-TE utilizes network bandwidth more effectively than traditional MPLS-TE networks by using ECMP at every segment level. It uses a single intelligent source and relieves remaining routers from the task of calculating the required path through the network.

    Benefits

  • Ready for SDN: Segment routing was built for SDN and is the foundation for Application Engineered Routing (AER). SR prepares networks for business models, where applications can direct network behavior. SR provides the right balance between distributed intelligence and centralized optimization and programming.
  • Minimal configuration: Segment routing for TE requires minimal configuration on the source router.
  • Load balancing: Unlike in RSVP-TE, load balancing for segment routing can take place in the presence of equal cost multiple paths (ECMPs).
  • Supports Fast Reroute (FRR): Fast reroute enables the activation of a pre-configured backup path within 50 milliseconds of path failure.
  • Plug-and-Play deployment: Segment routing tunnels are interoperable with existing MPLS control and data planes and can be implemented in an existing deployment."

    Comment
    First of all, we note that Segment Routing (SR or SegR) is a modern variant of Source Routing (SR or SourceR) (see the related quotes and comments above) and Application Engineered Routing (AER) is already done in fields like

  • SuperComputing (SC or SupC), including
    • High-Performance Computing (HPC),
  • Massively Multi-user Virtual Environment (MMVE), including
    • Massively Multiplayer Online Game (MMOG),
  • and so on.

    Also note that SR-TE, Segment Routing using Centric/Named networking, and stateless service chaining with SR are already included in at least two variants of Centric/Named networking and therefore included in at least our OS (somehow).

    Also note that IPv6 and all of its extensions does not solve the issues, which are addressed and solved with our Ontologic Net (ON), including our Centric/Named networking.

    Also note Named Function Networking (NFN) and Service-Centric Networking (SCN), and our logical combination of the foundations of Centric/Named networking with Software-Defined Networking (SDN), Network Function Virtualization (NFV), and Virtual Network Function (VNF) (SDN-NFV-VNF), specifically Information-Centric Networking (ICN) with SDN-NF-VNF, service chaining, function naming, and separating the policy (required functions) from the routing ...

  • Operation, Administration, and Management (OAM), and traffic accounting, and
  • Performance Management (PM) and monitoring

    or as we called it

  • service management, including planning, orchestrating, resource controlling, executing, monitoring, and result controlling, specifically
    • network slicing,
    • network access sharing,
    • service chaining,
    • and so on.

    It should be very easy to see and understand, that SR is built for our foundations of the related fields or most potentially even based on them, and therefore in the

  • legal scope of our Ontologic System (OS),
  • domain of our New Reality (NR) respectively
  • sovereign space of our Ontoverse (Ov), also known as our digital state OntoLand (OL),

    which implies that the

  • national and international laws, regulations, and acts, as well as agreements, conventions, and charters, specifically in relation to the copyright and the competiton laws, and
  • Fair, Reasonable, And Non-Discriminatory, As well as Customary (FRANDAC) Terms of Service (ToS) with the License Model (LM) of our Society for Ontological Performance and Reproduction (SOPR)

    do apply.

    For sure, this has further implications for Network operating systems (Noss), specifically those based on our Ontologic System (OS), including our Cloud Ontologic System©™ (COS™), including our Cloud operating system©™ (Cos™), such as for example

  • Cisco Unified Computing System (UCS), which is already supporting hypervisors, and operating system-level virtualization or containerization, hence based on our OS,
  • Arista Networks Extensible Operating System (EOS), which is (claimed to be) based on Virtual Machine (VM), Multi-Agent System (MAS), concurrency, and fault tolerance, hence based on Evoos, and with illegal OpenFlow and SDN, and also evolution, self-healing, resilience, Resource-Oriented technologies (ROx) with Resource-Oriented Computing (ROC), Autonomic Computing (AC or AutoC), Robotic Automation (RA), Grid Computing (GC), Cloud, Edge, and Fog Computing (CEFC), Cloud operating system©™ (Cos™), exception-less system call mechanism, Asynchronous Input/Output (AIO) without context switch, publish-subscribe state sharing, well-structured system architecture, and several other original and unique, copyrighted parts of our OS, hence based on Evoos and OS, and what we call an Ontoclone,
  • Nvidia Cumulus Linux,
  • Open Network Operating System (ONOS), which is a Software-Defined Networking (SDN) operating system (SDNos) for Communications Service Providers (CSPs) based on Linux, hence based on our OS and another Ontoclone, and
  • Microsoft et al. Software for Open Networking in the Cloud (SONiC), which is a (Layer 3 network layer) switch operating system based on Debian Linux, and hence based on our Cos and our OS, and another illegal action and Ontoclone of Microsoft to steal our Cos and our OS besides the support of Data Center operating system (DCos).

    Apache Mesos and Data Center operating system (DCos), which is a Distributed operating system (Dos) based on Apache Mesos, are already blacklisted. EOS, Cumulus, ONOS, and SONiC are based on illegal FOSS, which is prohibited for the implementation of our Evoos and our OS, including our Real-Time operating system (RTos), Dos, Cos, and so on, or are illegal plagiarisms based on our Evoos and our OS respectively Ontoclones.

    By the way:

  • We call such activities abuse of market power, criminal copyright infringement, blackmailing, wire fraud, securities fraud, commercial fraud, conspiracy, plot, and so on.
    We also call such a crying for freedom, democracy, and socialism by the largest, most capitalistic, and most monopolistic criminals hypocrisy, populism, and scam. Specifically the demand for a level playing field by those entities, that are disrespecting or even ignoring the rights and properties of C.S. and our corporation, and therefore not dealing and interacting with us on an equal footing respectively as an equal participant and full partner, can only be called ridiculous, arrogant, and out of touch with reality.
    And we demand once again that governments, authorities, and other entities take decisive actions to restore an environment with a rule-based law and order, a democracy, and a culture, or the next actions will damage basic rights, freedoms, and civilizations.
    In this relation we also quote a report, which discusses the copyright and was publicized on the 23rd of November 2017: "The art of the steal: When does a copyright go too far?
    [...]
    Protecting creativity
    Copyright is a cornerstone of any democratic, progressive, free society that values and wishes to continue to enjoy the benefits of a knowledge-based economy.
    "As the founders of this country were wise enough to see," former register of copyrights Abraham Kaminstein told the United States Congress in the 1970s, "the most important elements of any civilization include its independent creators -- its authors, composers and artists -- who create as a matter of personal initiative and spontaneous expression rather than as a result of patronage or subsidy. A strong, practical copyright is the only assurance we have that this creative activity will continue."
    Most people agree that the world would be poorer without the works of Picasso, and in so far as his "creative activity" was supported by copyright, copyright must be a Good Thing. [...]"
    Comment
    And we add that the copyright should never be perverted and become a means for copyright infringement by exploiting the exception clauses, such as the fair use clause, as seen with for example the lawsuit Google LLC vs. Oracle America, Inc., 593 U.S. (2021). Causal link, source of inspiration, blueprint, and Bingo! It is that simple to show an infringement of copyright.
    Luckily, we have no Application Programming Interface (API), but an expression of idea and a creation or design of architecture.
    Please do not confuse system with system architecture, system design, and so on, and operating system (os) with Ontologic System (OS).
  • We quote a contribution, which is about recessions and was publicized on the 9th of October 2008: "Wisdom of Warren Buffett: On Innovators, Imitators, and Idiots [...]
    [...]
    Leave it to Warren Buffett [...] to offer the most valuable advice on this score. In a recent hour-long television interview, Buffet gave a masterful course on how the world got into this financial mess.
    At one point, his interviewer asked the question that is on all our minds: "Should wise people have known better?" Of course, they should have, Buffett replied, but there's a "natural progression" to how good new ideas go wrong. He called this progression the "three I's." First come the innovators, who see opportunities that others don't. Then come the imitators, who copy what the innovators have done. And then come the idiots, whose avarice undoes the very innovations they are trying to use to get rich.
    The problem, in other words, isn't with innovation - it's with the idiocy that follows. [...]"
    Comment
    And we correct this advice by noting that first come the ideators, authors, composers, and artists, who see and create actively things others do not and express spontaneously their personal ideas.
    We also made this observation and draw this conclusion several times in the last 4 decades, but if W. Buffet is right, then he is ... quotable. In fact, this is exactly what we are thinking about since around a week once again: intellectuality respectively stupidity. But despite we warned about the illegal activities related to our OS with its Ontoverse and Ontoscope, cryptotulips, and also AI, ML, and so on, this "natural progression" repeats again and again. Lucky, other entities exist, who handle such activities and actors: truly competent judges.
    And they do not hang around for long with such individuals in contrast to other individuals.
    Hopefully, we do not already see the three horsemen of the apocalypse riding their way: immorality, dishonesty, and bigotry.
  • See also the notes

    which are legally secured and protected by the granting of freedom of expression, self-expression, arts, and moral right of C.S., specifically the exclusive right to decide about modification, naming, and presentation, which cannot be circumvented by any dirty trick.

  • One not ONES


    12.January.2023

    09:56 UTC+1
    Further steps and Ontologic Net Further steps

    For a better understanding we thought it would be helpful to provide more information and explain more details about our Ontologic Net (ON) in relation to source routing and what is wrongly called Future Internet and New Generation Network (NGN), and so on.

    We quote the document titled "Pushing Chord into the Underlay: Scalable Routing for Hybrid MANETs" and publicized on the 21st of June 2006: "[See the note Further steps and Ontologic Net Further steps of the 11th of January 2023 (yesterday).]"

    Comment
    See the note Further steps and Ontologic Net Further steps of the 11th of January 2023 (yesterday).


    13.January.2023

    08:00 and 12:47 UTC+1
    Further steps and Ontologic Net Further steps

    For a better understanding we thought it would be helpful to provide more information and explain more details about our Ontologic Net (ON) in relation to source routing and what is wrongly called Future Internet and New Generation Network (NGN), and so on.

    We quote the document titled "Self-Stabilizing Ring Networks on Connected Graphs" and publicized on the 31st of January 2005: "[See the note Further steps and Ontologic Net Further steps of the 11th of January 2023.]"

    Comment
    See the note Further steps and Ontologic Net Further steps of the 11th of January 2023.

    By the way:

  • In this relation we have to recall once again that if the moral rights in particular and the copyrights in general of C.S. are not sufficient at the courts in certain jurisdictions and sovereign states, potentially for whatsoever reasons and dirty tricks, then the obvious infringements of the competition laws and the conspiracies of all larger companies will break their neck, finally and definitely.
    In addition, we will catch fraudulent and even serious criminal entities at one location or another and then it becomes extremely expensive or just stops.
    Despite of this, Communication Service Providers (CSPs), Web Service Providers (WSPs), Internet Service Providers (ISPs), and so-called Cloud Service Providers (CSPs) can publicate their Ontologic Applications and Ontologic Services (OAOS) on our exclusive Marketplace for Everything (MfE) of our collecting Society for Ontological Performance and Reproduction (SOPR), and supplier of hardware and software technologies, goods, and services. But exclusive for us and not for others.
  • And we know that the Institute of Technology (IT) belongs to the F.R.German clique togther with the Deutsches Forschungszentrum für Künstliche Intelligenz (DFKI)==German Research center for Artificial Intelligence, Fraunhofer Institutes, Technical Universities (TUs), State-Owned Enterprises (SOEs) (e.g. Porsche SE/Volkswagen, Audi, etc., Airbus, Deutsche Telekom, T-Mobile US, etc.), and is one of the most aggressive plagiarists of our works.
    We also noted acts of espionage, for example in relation to the
    • implementation of variants of the L4 microkernel and L4 distributions of said F.R.German Institute of Technology (IT) and other research institutes, and
    • collaboration of said F.R.German Institute of Technology (IT) and the National Information and Communications Technology Centre of Excellence Australia (NICTA) in relation to our idea of the verified L4 microkernel stolen by that collaboration (see for example the Investigations::Multimedia of August 2009 and other related investigations).

    This is also the reason why we have not referenced documents of that clique and collaboration directly, but instead referenced the fields of

    • operating system (os), including oss for Embedded System (ES), Distributed System (DS), and Ubiquitours Computing (UbiC) and Internet of Things (IoT), and also
    • networking technology, including Peer-to-Peer (P2P), large unstructured network, and so on

    directly and referenced the quoted work indirectly by integrating these fields, and only began recently to quote the documents of said F.R.German clique to confront the U.S.American clique and other national cliques and mafias.

    Are there any questions by the U.S.American entities, F.R.German entities, and European Union (EU) entities regarding fraudulent actions, corruptions, and conspiracies? If this is the case, then we are always happy to provide education, explanation, and clarification, as well as itemization.

    09:32 and 18:42 UTC+1
    Microsoft, OpenAI fraud now proven

    We quote a fabricated fake report, which is about the relationship of the companies Microsoft and OpenAI, and was publicized by the New York Trolls as part of a most potentially commissioned series on the 13th of January 2023 (today): ""Microsoft Bets Big on the Creator of ChatGPT in Race to Dominate A.I.
    [...]
    In 2019, Microsoft invested $1 billion in OpenAI, the tiny San Francisco company that designed ChatGPT. And in the years since, it has quietly invested another $2 billion, according to two people familiar with the investment who requested anonymity because they were not authorized to speak with the media. [But only the transfer of the money was quite. The rest was obvious.]
    The $3 billion paid for the huge amounts of computing power that OpenAI needed to build the chatbot. And it meant that Microsoft could rapidly build and deploy new products based on the technology.
    Microsoft is now poised to challenge Big Tech competitors like Google, Amazon and Apple with a technological advantage the company has not possessed for more than two decades. Microsoft is in talks to invest another $10 billion in OpenAI as it seeks to push its technology even further, according to a person familiar with the matter.
    [...]
    In 2019, Microsoft invested $1 billion in OpenAI, the tiny San Francisco company that designed ChatGPT. And in the years since, it has quietly invested another $2 billion, according to two people familiar with the investment who requested anonymity because they were not authorized to speak with the media.
    The $3 billion paid for the huge amounts of computing power that OpenAI needed to build the chatbot. And it meant that Microsoft could rapidly build and deploy new products based on the technology.
    Microsoft is now poised to challenge Big Tech competitors like Google, Amazon and Apple with a technological advantage the company has not possessed for more than two decades. Microsoft is in talks to invest another $10 billion in OpenAI as it seeks to push its technology even further, according to a person familiar with the matter.
    [...]
    The new generative A.I. technologies could reinvent everything from online search engines like Google to digital assistants like Alexa and Siri. Microsoft sees these technologies as a way of expanding and improving its already wide range of products for businesses, computer programmers and consumers, while boosting revenues across its Azure cloud computing services.
    [...]
    Built using Microsoft's huge network for computer data centers, the new chatbot could be a system much like ChatGPT that solely generates text. Or it could juggle images as well as text. Some venture capitalists and Microsoft employees have already seen the service in action. But OpenAI has not yet determined whether the new system will be released with capabilities involving images.
    [...]
    A year later, Microsoft invested $1 billion in the company and committed to building the supercomputer technologies OpenAI's enormous models would demand while becoming its "preferred partner for commercializing" its technologies. OpenAI later officially licensed its technologies to Microsoft, allowing the company to directly add them to Microsoft products and services.
    [...]
    Microsoft last year began incorporating DALL-E image creations into its Bing search engine, and is working with OpenAI on a new version of the search engine that would include technology along the lines of ChatGPT [...].
    [...]
    Microsoft and OpenAI have built a new kind of supercomputer specifically for ChatGPT and other generative A.I. technologies. That means Microsoft can readily offer these systems to its own customers.
    [...]
    Microsoft and OpenAI hope they can improve these systems by training them on larger amounts of data and most experts agree their skills will improve. Right now, Microsoft acknowledges, they can "hallucinate" answers by mixing fact and fiction.
    [...]
    These technologies still come with a long list of flaws and question marks. They often produce toxic content, including misinformation, hate speech and images that are biased against women and people of color.
    [...]
    Microsoft, Google, Meta and other companies have been reluctant to release many of these technologies because of the potential damage to their established brands. Five years ago, Microsoft quickly backtracked after releasing a chatbot called Tay that generated racist, xenophobic and otherwise filthy language.
    [...]
    "There is an argument to be made that they all end up smelling the same," he said. "There is another argument that what OpenAI is doing is truly special blacklisted and that all the not much money goes to them[, if at all].""

    Comment
    First of all, we have to make clear that Microsoft totally depends on the original and unique ArtWorks (AWs) and futher Intellectual Properties (IPs) included in the oeuvre of C.S., so that such an advantage does not exist at all. Guess why "OpenAI has not yet determined whether the new system will released with capabilities [other than text generation, Natural Language Processing (NLP), chatting, Question Answering (QA), and so on]." As soon as there is something with multimodality, ontology or semantic structures, schema, etc., Mixed Reality (MR), Ubiquitours Computing (UbiC) and Internet of Things (IoT), and many other fields integrated with our Ontologic System Architecture (OSA), every company comes directly into the

  • legal scope of our Ontologic System (OS),
  • domain of our New Reality (NR) respectively
  • sovereign space of our Ontoverse (Ov), also known as our digital state OntoLand (OL),

    specifically in relation to Service-Oriented technologies (SOx), Software-Defined Networking (SDN), Grid Computing (GC or GridC), and Cloud, Edge, and Fog Computing and Networking (CEFCN), required for the data centers and supercomuter technologies, as operated by Microsoft, and eXtended Mixed Reality (XMR), or simply eXtended Reality (XR), Metaverse and Ontoverse (Ov), Industry 4.0 and 5.0, and many other fields of others and us (see also the note More evidence transformer model, etc. based on OS of the 11th of January 2023). Due to this artistical, legal, and technical dependency, we have already called such systems island systems.
    We could also tell some more facts, but we do not do this at this time.

    We always knew and said on this website of OntomaX that OpenAI is a scam of the company Microsoft, which was conducted at first together with the company Tesla and other entities. Now, everybody can see that the designation as a not-for-profit venture, group, foundation, consortium, or company respectively Non-Profit Organization (NPO) was always only a camouflage of a vehicle, which is a proprietary business unit of Microsoft to

  • steal the original and unique ArtWorks (AWs) and further Intellectual Properties (IPs) included in the oeuvre of C.S.,
  • confuse and mislead the public about the true origin of our works and achievements, and
  • thwart, obstruct, and block the further artistic activity of C.S. and the development of our corporation.

    There is absolutely no way that Microsoft and other entities will succeed with their blackmailing, conspiring, and other serious criminal activities by perverting the facts, the laws, and the ways it truly goes and works in reality. Its Artificial Intelligence (AI), Machine Learning (ML) system is not the only thing that hallucinates, mixes fact and fiction, and has also become toxic for societies with rule-based law and order, democracy, culture, and freedom.
    Every judge worldwide will instantly understand how Microsoft and Co. alone and in collaboration have stolen the related parts of our original and unqiue, copyrighted, and prohibited for fair use work of art titled Ontologic System, created by C.S., and exclusively managed and exploited by our corporation with the consent and on the behalf of C.S..

    Also note the fine detail that

  • on the one hand Microsoft and others want to share their geographic signals and data, but
  • on the other hand (some of) the same entities do not want to share their Machine Learning Models (MLMs),

    which both belong to the exclusive infrastructures of our corporation, and they will have to explain to a judge

  • why they are active in both fields in relation to our OS and
  • why they handle both in different ways,

    which will result in many contradictions, insights, revelations, and convictions no matter what they present and how they argue.
    Every judge worldwide will instantly understand how Microsoft and Co. alone and in collaboration ....

    We have already come and gone far with our investigations, documentations, and preparations for legal actions.

    Howsoever, we leave it to Microsoft and other companies to choose our corporation with our Hightech Office Ontonics, business units Ontologics, and collecting Society for Ontological Performance and Reproduction (SOPR) as their preferred partner, or better said as the one and only legal partner for commercialization of their technologies, goods, and services, which are all based on our Ontologic System (OS) with its Ontologic System Architecture (OSA), Ontoverse (Ov), and Ontoscope (Os), or alternatively cease and desist operation. :)

    See also the notes

  • After crypto, Silicon Valley, Big Tech, and Co. is next of the 28th of December 2022,
  • SOPR # of the 4th of January 2023,
  • Designations and sales other than the ones of C.S. prohibited of the 4th of January 2023,
  • Other app stores than our MfE prohibited of the 5th of January 2023,
  • Use of our OS for military use prohibited of the 5th of January 2023,
  • Ontoscope Further steps of the 6th of January 2023,
  • Illegal Ontoscope clone iPhone now dead?! of the 6th of January 2023,
  • Ontoscope Further steps of the 8th of January 2023,
  • Fair goes first, but fairness without limits is unfair of the 10th of January 2023,
  • Does not look good for Microsoft and Co. of the 11th of January 2023, and
  • Further steps and Ontologic Net Further steps of the 11th of January 2023, 11th of January 2023 (yesterday), and 13th of January 2023 (today).


    14.January.2023

    14:21 and 15:48 UTC+1
    Further steps and Ontologic Net Further steps

    For a better understanding we thought it would be helpful to provide more information and explain more details about our Ontologic Net (ON) in relation to Peer-to-Peer (P2P) underlay and what is wrongly called Future Internet and New Generation Network (NGN), and so on.

    We quote the document titled "PeerNet: Pushing Peer-to-Peer Down the Stack" and publicized in February 2001: "Abstract - An unwritten principle of the Internet Protocol is that the IP address of a node also serves as its identifier. We observe that many scalability problems result from this principle, especially when we consider mobile networks. In this work, we examine how we would design a network with a separation between address and identity. We develop PeerNet, a peer-to-peer-based network layer for large networks. PeerNet is not an overlay on top of IP, it is an alternative to the IP layer. [...]
    PeerNet is a radically different alternative to current network layers, and our initial design suggests that the PeerNet approach is promising and worth further examination.

    Introduction
    How would we design a network layer with mobile nodes and peer-to-peer interactions in mind? [...] Implementing such a vision introduces new networking requirements, and we may need a novel network architecture. Here, we focus on the network layer of such a future architecture.
    [...] An implicit principle of this protocol is that the IP address of a node is tightly coupled with its identity. [...] However, the address as identifier paradigm may encounter problems in highly mobile networks. We have already seen mobility and scalability push IP to its limits. While it is possible to satisfy most new requirements with patches such as NAT, DHCP Mobile IP, the end result is seldom elegant and often plagued by new problems. One striking example of the above paradigm failing is the fact that a TCP session will break if one of the end points changes its address. This is an important issue as networks are becoming increasingly mobile.
    The overarching question is how we would design the network layer for future networks if we were to start from scratch. Our target environment is very large potentially wireless and mobile networks. Therefore, we want an agile, plug and play, fault-tolerant, and scalable networking layer. A source of inspiration is application layer peer-to-peer networking, an area that has seen tremendous advancements recently. Therefore, we pose the question: what can we gain by bringing the peer-to-peer concept from the application layer down to the networking layer? We develop a set of guidelines that seems to satisfy our networking vision.
    In this paper, we present PeerNet, a network layer with integrated support for routing between peers. PeerNet makes an explicit distinction between node identity and address. The address of a node reflects its current location in the network at all times. This simplifies routing but introduces two new challenges. First, we need a node lookup service that will provide the address for a given a node identifier. Second, PeerNet needs to maintain addresses dynamically: as a node moves, its address changes to reflect the new location. Our initial design suggests that PeerNet is feasible and potentially fundamental component of our vision for future networks.
    Our work in perspective. PeerNet is a radically new architecture that brings peer-to-peer concepts to the network layer. [...]
    Related work. Area Routing [11 [Hierarchical routing for large networks: Performance evaluation and optimization. 1977] and Landmark routing [16 [The landmark hierarchy : A new hierarchy for routing in very large networks. ]] are classical papers on hierarchical routing. LANMAR [13 [Lanmar: Landmark routing for large scale wireless ad hoc networks with group mobility. 2000]] and L+ [9 [L+: Scalable Landmark Routing and Address Lookup for Multi-hop Wireless Networks. 2002]] are modern extensions of Landmark routing, whereas PeerNet to our knowledge is the first protocol for dynamic networks with similarity to Area Routing. [...] Recently, several efforts such as [15 [Internet indirection infrastructure. August 2002], 8 [An end-to-end approach to globally scalable network storage. August 2002]] address some of the same issues as PeerNet but do so by adding functionality to the existing IP infrastructure.

    Operations Overview
    The key idea in PeerNet is the separation of the identity and the address of a node. For now, we can assume that each PeerNet node has one unique identifier and one unique address. The address is dynamic and changes with node movement to reflect the node's location in the network. The ID of the node remains the same throughout, reliably identifying the node despite address changes. An integrated distributed node lookup service maps identifiers to addresses.
    Joining the network. To join a PeerNet network, a node establishes a physical connection to at least one node already in the network and requests an address. The receiving node(s) answer(s) with an available address. The joining node then "registers" its identifier together with the address in the distributed node lookup service. As a node moves, it requests and receives new addresses from its new neighbors. On each address change, the node updates its entry in the lookup service.
    Packet routing. The sender node only needs to know the identifier of the receiver. Before sending its first packet to some destination, the sender looks up the current address of the destination node using the lookup service. PeerNet packets contain both the identifier of the destination and the last known address and routing is done in a Distance Vector fashion1, one hop at a time. If the destination cannot be reached, the lookup table is consulted along the way to find the new address of the destination.

    The PeerNet Network Layer
    PeerNet targets networks consisting of a large number of mobile and stationary nodes, connected by bidirectional links using any current MAC technology.
    Node addresses are dynamically assigned depending on the node's current position in the network. More specifically, the addresses are organized as leaves of a binary tree. We call this the address tree. By selecting node addresses carefully, we guarantee that nodes within a subtree are able to communicate using only nodes inside that subtree. We will also use the term area [...]
    [...]

    Conclusion
    We present PeerNet, a radically different network layer. Recent trends in wireless technology, popular demand, and commercial interest impose new requirements on networks. This has prompted us to reevaluate the role of IP in future networks. We envision dynamic networks with pockets of peer-to-peer wireless connectivity interconnected with traditional wired lines.
    There are two fundamental and complementary novelties in PeerNet. First, there is a distinction between the identity and address of a node. This distinction enables us to handle mobility in a novel way, improving the scalability of the system. Specifically, the effect of node mobility is confined to the neighborhood of a moving node in most cases. Second, PeerNet supports peer-to-peer routing at the network layer. [...]
    To summarize, PeerNet is a promising new network layer with the potential to scale to very large dynamic networks. In our ongoing implementation, we will validate and refine the ideas presented here."

    Comment
    What makes us wonder is the fact that most of the plagiarisms of the related part of our Ontologic Net (ON) in the field of Information-Centric Networking (ICN) (e.g. Thing-Centric Networking and Named Thing Networking) discuss the IDentifier (ID) (endpoint "name", "who respectively what")/routing and forwarding LOCator (LOC) (source and destination "address", "where") (ID/LOC) split or separation, but do not reference the documents about the

  • PeerNet and similar P2P underlay techniques,
  • field of Wireless Ad hoc NETwork (WANET), including Mobile Ad hoc NETwork (MANET), and
  • field of Distributed Virtual Environment (DVE) or Networked Virtual Environment (NVE), and Collaborative Virtual Environment (CVE), etc.

    with the exception of

  • 1 work about Next Generation Network (NGN) "[...] some people believe that this problem has been solved by applying techniques for Mobile IP. However, resource discovery mechanisms in P2P, the coexistence of various routing in ad-hoc networks, and data-centric concepts in sensor networks suggest the future importance of addressing" [Bingo!!!], and
  • 1 work about Service-Centric Networking (SCN), though it only mentiones an aspect related to Mobile IP "Similar to Mobile IP [22 [IP mobility support for IPv4, RFC3344]] the service router acts as a "home agent," but only temporarily to ensure successful resynchronization".

    We guess that they wanted to avoid a causal link with them and in this way with our OS.

    See also for example the document titled "MOPAR: A Mobile Peer-to-Peer Overlay Architecture for Interest Management of Massively Multiplayer Online Games" once again to see that we overlayed and integrated both separated techniques of P2P underlay and Distributed Virtual Environment (DVE) or Networked Virtual Environment (NVE), and Collaborative Virtual Environment (CVE) in particular, as we did for the creation of our OS with its integrating Ontologic System Architecture (OSA) in general.
    The truly fascinating point is that this is possible indeed with our original and unique, ingenious masterpiece. Add our Ontoscope (Os), also wrongly called iPhone, smartphone, and so on, and one can see that certain matters are not up for debate at all.

    We have a performance of O(c) with c = 1 or 2 (hops), O(1) (constant), and O(logk n) (logarithmic to the base of k, polylogarithmic time) hop lookup performance in the cases of hotspot regions with churn-intensive workloads due to the utilization of one- or two-hop schemes, which is required for providing Ontologic Applications and Ontologic Services (OAOS) in real-time in our fields of eXtended Reality (XR), Cyber-Physical System (CPS), and Industry 4.0 and 5.0, and the fields of Traffic Management (TM), Autonomous System (AS) and Robotic System (RS), and all the other fields of our Ontoverse (Ov) and New Reality (NR), as well as backbones, core networks, or fabrics, and also subsystems and platforms of our exclusive infrastructures (see also the issue SOPR #327 of the 7th of June 2021).

    Also note that IPv6 and all of its extensions, including

  • "Locator/ID Separation Protocol (LISP)",
  • topological (location-dependent) addressing, like for example GSE/8+8,
  • HLP ("compartmentalizes the lower tiers in Internet's topological hierarchy into separate regions", see also DVE or NVE with zoning, partioning),
  • shim6/multi6/Host Identity Protocol (HIP)/Stream Control Transmission Protocol (SCTP),
  • etc.,

    do not solve the issues, which are addressed and solved with our Ontologic Net (ON), including our Centric/Named networking.
    See also the discussions about the

  • session layer IDentifier (ID) (endpoint "name", "who respectively what")/routing and forwarding locator (LOC) (source and destination "address", "where") (ID/LOC) split, specifically the Locator/ID Separation Protocol (LISP) for IPv6 addresses in for example the Further steps of the 18th of November 2022
  • separation between address and identity in the document titled "PeerNet: Pushing Peer-to-Peer Down the Stack", and
  • issues of IPv6 and issues of solutions in the document titled "Scaling of Internet Routing and Addressing: past view, present reality, and possible futures" (The IETF, the company Cisco, and the other thieves of Cloud operating system (Cos) do know better, obviously, but still try to circumvent our Evoos and our OS.)

    Also note that a referenced globally scalable network storage approach is still based on IP.

    Also note that Evoos is based on the fields Cognitive Agent System (CAS), Multi-Agent System (MAS), including Holonic Agent System (HAS), and Distributed operating system (Dos), including TUNES OS and Aperion (Apertos (Muse)).

    This quote and comment most potentially will be added to the note Further steps and Ontologic Net Further steps of the 11th of January 2023.

    16:27 UTC+1
    Cisco, Deutsche Telekom, and Co. do not get away

    We quote a report, which is about a partnership of the companies Cisco and T-Mobile US and was publicized on the 15th of December 2022: "T-Mobile builds cloud native 5G converged core with Cisco
    T-Mobile US has deployed what is described as the world's largest highly scalable and distributed nationwide cloud native converged core gateway using Cisco's flagship networking solutions including [...] routers, 5G and 4G packet core gateways, Cisco Unified Computing System (UCS), and [...] Switches with Cisco Network Services Orchestrator for full stack automation.
    The fully automated converged core architecture is based on Cisco's cloud native control plane, optimized with Kubernetes orchestrated containers on bare metal, freeing up over 20% of the CPU (Central Processing Unit) cores.
    "T-Mobile customers already have access to the largest, most powerful 5G network in the country, and we're innovating every day to supercharge their experience even further," said [the] Senior Vice President of Core Network and Services Engineering at T-Mobile. "This cloud native core gateway takes our network to new heights, allowing us to push 5G forward by delivering next-level performance for consumers and businesses nationwide while setting the stage for new applications enabled by next-gen networks."
    "Our strategic relationship with T-Mobile is rooted in co-innovation, with a shared vision to establish best practices for 5G and the Internet for the Future," said [the] Senior Vice President and General Manager, Cisco Networking Provider Mobility. "This is the type of network every operator aspires to. It will support the most advanced 5G applications for consumers and businesses today and enables T-Mobile to test and deliver new and emerging 5G and [Internet of Things (]IoT[)] applications with simplicity at scale."
    [...]"

    Comment
    First of all, we recall that Kubernetes is illegal Free and Open Source Software (FOSS) based on our Evolutionary operating system (Evoos), specifically our operating system-level virtualization or containerization.
    We also recall that the fully automated converged core architecture is the related part of our integrating Ontologic System Architecture (OSA) and what is wrongly called cloud-native is nothing else than the related part of our Ontologic Net (ON). In fact, cloud-native means

  • based on our Ontologic System (OS) or simply OS-based, and
  • Ontologic Applications and Ontologic Services (OAOS).

    In the same way and for the same reason, 5th Generation mobile networks or 5th Generation wireless systems with cloud-native measns our 5th Generation mobile networks or 5th Generation wireless systems of the Next Generation (5G NG).

    Furthermore, Cisco Unified Computing System (UCS) is based on our original and unqiue, copyrighted, and prohibited for fair use work of art titled Ontologic System, created by C.S., and exclusively managed and exploited by our corporation with the consent and on the behalf of C.S., and discussed in the last section of the note Further steps and Ontologic Net Further steps of the 11th of January 2023 (keyword Cloud operating system).

    In addition, certain backbones, core networks, or fabrics, and also subsystems and platforms, and also Ontologic Applications and Ontologic Services (OAOS), specficially for the planning, controlling, and monitoring respectively management and orchestration of specific converged or integrated systems, gateways, and so on, belong to the exclusive infrastructures of our corporation.

    The allowance and license for the performance and reproduction of certain parts of our Ontologic System (OS) in certain locations for the partially State-Owned Enterprise (SOE) Deutsche Telekom and its subsidiary T-Mobile US is not effective, actually.
    Take this very seriously, finally for general legal reasons and for the particular reason that the 4th Generation mobile networks or 4th Generation wireless systems (4G), the 5th Generation mobile networks or 5th Generation wireless systems of the Next Generation (5G NG), and the 6th Generation mobile networks or 6th Generation wireless systems (6G) respectively 4G, 5G, and 6G mobile communication standards are worth nothing without our Ontoscope (Os) with our without heads, legs, wings, wheels, and so on.
    The same holds for all other technologies, goods, and services based on our OS with its OSA, OSC, OAOS, Ov, Os, and OsC directly or indirectly.

    See also the notes

  • SOPR # of the 4th of January 2023,
  • Designations and sales other than the ones of C.S. prohibited of the 4th of January 2023,
  • Other app stores than our MfE prohibited of the 5th of January 2023,
  • Use of our OS for military use prohibited of the 5th of January 2023,
  • Ontoscope Further steps of the 6th of January 2023,
  • Illegal Ontoscope clone iPhone now dead?! of the 6th of January 2023,
  • Ontoscope Further steps of the 8th of January 2023,
  • Fair goes first, but fairness without limits is unfair of the 10th of January 2023, and
  • section By the way of the note Further steps and Ontologic Net Further steps of the 13th of January 2023.


    15.January.2023

    13:09 and 25:09 UTC+1
    Further steps and Ontologic Net Further steps

    For a better understanding we thought it would be helpful to provide more information and explain more details about our Ontologic Net (ON) in relation to Peer-to-Peer (P2P) underlay and what is wrongly called Future Internet and New Generation Network (NGN), and so on.

    We quote the document titled "Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and Routing" and publicized in April 2001: "We are also exploring the possibility of offering Mobile IP-like [20 [IP Mobility Support. October 1996]] functionality using the location-independent naming mechanism of Tapestry."

    Comment
    Howsoever, as in case with other P2P underlay techniques, this possibility is still based on the TCP/IP protocol suite.

    We quote the document titled "GHT: A Geographic Hash Table for Data-Centric Storage" and publicized on the 28th of September 2002: "Abstract
    [...] Under [Data-Centric Storage (]DCS[)], sensed data are stored at a node determined by the name associated with the sensed data.
    [...]

    Introduction
    [...] making effective use of sensornet data will require scalable, self-organizing, and energy-efficient data dissemination algorithms.
    The utility of a sensornet derives primarily from the data it gathers; the identity of the individual sensor node that records the data tends to be less relevant. Accordingly, sensornet researchers have argued for communication abstractions that are data-centric. Under this model, data are "named" and communication abstractions refer to these names rather than to node network addresses [1 [The Design and Implementation of an Intentional Naming System. December 1999], 9]. The directed diffusion [10] data-centric routing scheme has been shown to be an energy-efficient data dissemination method for sensornet environments. In an associated position paper [23 [Data-centric storage in sensornets. July 2002]], we suggest that a companion method, data-centric storage (DCS), will also be useful. Under the DCS approach, the particular node that stores a given data object is determined by the object's name. Hence all data with the same general name (e.g., "elephant sightings") will be stored at the same sensornet node (not necessarily the node that originally gathered the data). The advantage of DCS then is that queries for data with a particular name can be sent directly to the node storing these named data, thereby avoiding the query flooding typically required in data-centric routing proposals.
    [...] three canonical dissemination methods, one of which is data-centric storage [...] we expect that future sensornets will embody all of these (or similar) data-centric dissemination methods, and that users will choose which to use according to the task at hand.
    [...]
    [...] Geographic Hash Table (GHT). GHT is inspired by the new generation of Internet-scale Distributed Hash Table (DHT) systems such as Chord, CAN, Pastry, and Tapestry [6 [Pastry: scalable, distributed object location and routing for large-scale peer-to-peer systems. November 2001], 21 [[Content-Addressable Network (CAN):] A scalable content-addressable network. August 2002], 24 [Chord: A scalable peer-to-peer lookup service for Internet applications. August 2001], 25 [Tapestry: An infrastructure for fault-tolerant wide-area location and routing. 2001]]. [...] GHT uses the GPSR geographic routing algorithm [13 [GPSR: greedy perimeter stateless routing for wireless networks. August 2000]] as the underlying routing system to provide a similar hash-table-like functionality in sensornets.

    Context
    [...]
    We consider large-scale sensornets with nodes that are spread out over an area whose approximate geographic boundaries are known to the network operators. We assume that nodes know their geographic location. This can be achieved through the use of [Global Positioning System (]GPS[)] or some other approximate but less burdensome localization technique [3, 8 [Robust range estimation using acoustic and multimodal sensing. 2001], 19, 20, 22]. [...]
    We assume that the sensornet is connected to the outside world through a small number of access points, hence getting data from a sensornet node to the outside world requires routing the data through the sensornet to the access point. This assumption is not required by our DCS mechanism per se but is key to our comparison of the different dissemination mechanisms.
    [...] algorithms should seek to minimize communication in order to extend overall system life-time [and other performance metrics] [...]

    Sensornet Data
    [...]
    When an event occurs, the detecting node has only three options for where the event information can be stored: at external storage outside the sensornet, within the sensornet at the detecting node or within the sensornet at a node other than the detecting node. These three storage actions lead to the following canonical data dissemination methods:
    External Storage (ES): [...]
    Local Storage (LS): [...]
    Data-Centric Storage (DCS): Here, after an event is detected the data are stored by name (i.e., at a storage node that need not be the same as the detecting node) within the sensornet. [...]

    Sensornet Data
    [...]

    The DCS Problem
    [...]

    Storage Abstraction
    Like the many distributed hash table systems before it [6, 21, 24, 25], DCS provides a (key, value)-based associative memory. Events are named with keys. Both the storage of an event and its retrieval are performed using these keys. DCS is naming-agnostic; any naming scheme that distinguishes events that users of the sensornet wish to identify distinctly suffices. The two operations DCS supports are:
    Put(k;v) stores v (the observed data) according to the key k, the name of the data.
    Get(k) retrieves whatever value is stored associated with key k.

    Design Criteria for Scalable, Robust DCS
    The challenge in any design for a DCS system is to meet scalability and robustness criteria despite the system's fundamentally distributed nature. Sensornets represent a particularly challenging environment for a distributed storage system:
    Node failures may be routine [...].
    Topology changes will be more frequent than on traditional wired networks. Node failures, node mobility, and received signal strength variations in real radio deployments each independently cause neighbor relationships among nodes to change over time.
    System scale in nodes may be very great. Sensor nodes may be deployed extremely densely, and may be deployed over a very wide physical region, [...].
    Energy constraints will often be severe [...].
    These challenges suggest several specific, important design criteria for ensuring scalability and robustness in the distributed storage system we envision:
    Persistence: [...]
    Consistency: [...]
    Scaling in database size: [...]
    Scaling in node count: as the number of nodes in the system increases, the system's total storage capacity should increase, and the communication cost of the system should not grow unduly. Nor should any node become a concentration point of communication.
    Topological generality: the system should work well on a broad range of network topologies.

    GHT: A Geographic Hash Table
    The DCS system architecture we describe in this paper to meet the above-enumerated design criteria is GHT, a Geographic Hash Table (GHT). The core step in GHT is the hashing of a key k into geographic coordinates. [...] A key-value pair is stored at a node in the vicinity of the location to which its key hashes. Choosing this node consistently is central to building a GHT. [...]
    [...] much of the nuance to the GHT system design arises specifically to ensure robustness and scalability in the face of the many sorts of failures possible in a distributed system. GHT uses a novel perimeter refresh protocol to provide both persistence and consistency when nodes fail or move. This protocol replicates stored data [...] Yet the protocol is efficient; it typically uses highly local communication, especially on networks where nodes are deployed densely. By hashing keys, GHT spreads storage and communication load between different keys evenly throughout the sensornet. When many events with the same key are stored, GHT avoids creating a hotspot of communication and storage at their shared home node by employing structured replication, whereby events that hash to the same home node can be divided among multiple mirrors.

    Algorithms
    [...] GHT is built atop GPSR [12, 13, 14 [Geographic Routing for Wireless Networks. October 2000]], a geographic routing system for multi-hop wireless networks. [...]

    [Greedy Perimeter Stateless Routing (]GPSR[)]
    Under GPSR, packets are routed geographically. All packets are marked with the positions of their destinations. All nodes know their own positions, and the positions of the nodes a single hop away from them. [...]

    The Home Node and Home Perimeter
    GPSR was designed for a network model where a sender wishes to transmit packets to a destination node with a known non-geographic address; a sender must map the destination's identifier to its current location using a location database, such as GLS [16 [A scalable location service for geographic ad-hoc routing. August 2000]. Under GHT, however, the originator of a Put() or Get() packet does not know the identifier of the node that is the eventual destination of the packet. [...] it is quite likely that there is no node at the precise coordinates the hash function produces. We define the home node for a GHT packet to be the node geographically nearest the destination coordinates of the packet. The home node serves as the rendezvous point for Put() and Get() operations on the same key.
    [...]
    With only the home node binding mechanism we've described thus far, GHT will work on static network topologies. Note that when the network topology changes after node failures, deployment of new nodes, or mobility, the identity of the home node and membership of the home perimeter may change. But for any snapshot of the network topology, there exist a home node and enclosing home perimeter for every location in the network. To offer persistence and consistency under the topological dynamics that sensornets are sure to exhibit, GHT needs a protocol to replicate key-value pairs, and re-associate them with the appropriate home node when the topology changes.

    [...]

    Related Work
    Directed diffusion [9, 10] is an example of data-centric routing - routing based on the name of the data rather than on the identity of the destination node. Unlike our proposed DCS mechanism, event information in directed diffusion is stored locally at the detecting node; as such, directed diffusion is closer to the local storage (LS) model. Directed diffusion also provides additional mechanisms for the reinforcement of high-quality data delivery paths and for in-network aggregation (i.e., as the data is being routed to the requestor, it may be aggregated by intermediate nodes). Directed diffusion doesn't require geographic information; it uses flooding.
    The Geographic Location System (GLS) used in GRID [16] can be augmented to provide a DCS-like service. Geographic routing delivers packets to locations, not addresses; thus, a packet sender must be able to map a destination's identifier to its geographic location. GLS is a scalable location service that performs this mapping. The location database is distributed across the nodes; each node acting as the location server for a small number of other nodes. [...] what GLS enables is routing to node identifiers. [...] While GLS provides this location database itself as a service, GHT avoids this level of indirection and instead maps event names directly to locations.
    [...]
    Although GHT was inspired by Distributed Hash Table systems like Chord and CAN [6, 21, 24, 25], we did not adopt the routing algorithms used in these systems. These algorithms require nodes to be interconnected in a fairly rigid manner. On the Internet, node neighbor relationships are at the logical level; the underlying IP routing system logically connects nodes that are not immediate physical neighbors. It is not clear how (if at all) the node connectivity required by these DHT algorithms can be efficiently achieved in a sensornet environment. GPSR allows us to achieve the required hash-table functionality while working with only the true physical connectivity between nodes.

    Conclusion And Future Work
    [...]
    Finally, our proposed design fundamentally requires that a node know its own geographic position. While this assumption seems reasonable for most sensornets, an open question is how one might achieve DCS using only approximate geographic information, or without any such information."

    Comment
    We remember that at the time around the years 2000 and 2001, we already knew that the

  • Personal Digital Assistant (PDA) and pocket computer will become a mobile phone with web browser and Java Virtual Machine (JVM), also known as smartphone, a pocket supercomputer, and eventually our Ontoscope (Os), also wrongly called an iPhone, Android Smartphone, etc., and also
  • scalability, mobility (e.g. roaming), resilience (e.g. fault tolerance, trustworthiness (e.g. reliability, availability, safety, security, performability (Quality of Service (QoS)))), and energy consumption would become more and more serious problems,

    and therefore replaced the sensor nodes of a sensor network with (Mobile Robotic System (MRS or Mobot), Immobile Robotic System (ImRS or Immobot), DataBase Management System (DBMS), Graphic Processing Unit (GPU), etc.) nodes of a Supercomputer Cluster (SuperCluster), grid, or network, and transformed the Interconnected network (Internet) into our Interconnected supercomputer (Intersup) on the basis of ontology, cybernetics, HardBionics (HB) and SoftBionics (SB) (e.g. Artificial Intelligence (AI), Machine Learning (ML), Artificial Neural Network (ANN), Evotionary Computing (EC), Computer Vision (CV), Cognitive Agent System (CAS), Multi-Agent System (MAS), Swarm Computing (SC), Artificial Life (AL), etc.), operating system (os), Humanistic Computing (HC or HumanC), Mediated Reality (MedR), and so on. The rest can be found on the website of our Ontologic System variants OntoLix and OntoLinux, and this website of OntomaX.

    Obviously, the authors of GHT

  • did not know the work titled "PeerNet: Pushing Peer-to-Peer Down the Stack",
  • did not understand, that PeerNet solves the problem of mobility in Peer-to-Peer (P2P) with Distributed Hash Table (DHT) by indirection or indirect routing for handling roaming, but is still hierarchical, tree-based routing, or
  • did not want to reference PeerNet and present an updated version of GHT based on it, while they referenced Tapestry, but did not mention the Mobile IP-like functionality based on it,

    in contrast to us with the integration of their works.

    Obviously, we have to state more precisely our messages, notes, explanations, clarifications, investigations, and claims regarding the Associative Memory (AM) or Content-Addressable Memory (CAM), the P2P underlay techniques, and the landmark routing and geographic routing protocols made in notes of October, November, and December 2022.
    And there is still a lot that was created with or was integrated by the creation of our OS, as also explained here.
    Also, we have found again our source of inspiration and decisive prior art, which supports our other claims. And as we always say at such a point, if one door closes, then another door opens. :)
    And we can also see where prior art ends and our creation begins.
    But in addition to the integration of these works, we also expressed different ideas and solved different problems with the creation of our OS than the works presented in relation to large unstructured networks, including Wireless Ad hoc NETwork (WANET), Mobile Ad Hoc NETwork (MANET), mesh network, and sensor network, and Client-Server or Master-Worker, Cluster, P2P, including P2P overlay and P2P underlay, and so on.

    Despite that a common goal is to solve the problems of TCP/IP

  • scalability,
  • resilience,
  • mobility,

    etc.,

  • on the one hand, we made similar observations that most of the plagiarism of the related part of our Ontologic Net (ON) in the field of Future Internet and New Generation Network (NGN) (e.g. Centric/Named networking, including Information-Centric Networking (ICN)), and so on do not discuss the Mobile IP with the exception of
    • 1 work about NGN "[...] some people believe that this problem has been solved by applying techniques for Mobile IP. However, resource discovery mechanisms in P2P, the coexistence of various routing in ad-hoc networks, and data-centric concepts in sensor networks suggest the future importance of addressing" [Bingo!!!], and
    • 1 work about Service-Centric Networking (SCN), though it only mentiones an aspect related to Mobile IP "Similar to Mobile IP [22 [IP mobility support for IPv4. August 2002]] the service router acts as a "home agent," but only temporarily to ensure successful resynchronization",

    and

  • on the other hand, we made the observation that the works in the fields of Wireless Ad hoc NETwork (WANET), Mobile Ad hoc NETwork (MANET), mesh network, and sensor network do not discuss and have not focused on the IDentifier (ID) (endpoint "name", "who respectively what")/routing and forwarding locator (LOC) (source and destination "address", "where") (ID/LOC) split or separation.

    Also note that "[Data-Centric Storage (]DCS[)] provides a (key, value)-based associative memory" points directly to

  • Associative Memory (AM) or Content-Addressable Memory (CAM), and Distributed os (Dos) of our Evolutionary operating system (Evoos), and
  • Key-Value (K-V) store, Berkeley DB library and the SQLite library in our In-Kernel Databases (KDB), and Content-Addressable Storage (CAS) in our OS.

    Also note that we can exploit the existing

  • basic properties of our OS, including self-organization, Distributed operating system (Dos), Real-Time operating system (RTos), Embedded System operating system (ESos), Distributed System (DS), Scalable Source Routing (SSR), Content-Addressable Storage (CAS), Data-Centric Storage (DCS), and Geographic Hash Table (GHT)
  • integrations of by our Ontologic System Architecture (OSA),
  • geograhic and location backbones, core networks, or fabrics, and also subsystems and platforms with our
    • Ontologic Geographic Information System (OntoGIS), including
      • OntoMap,
      • OntoGlobe, and
      • OntoEarth,
    • Positioning or Location System, Navigation System, and Tracking or Locating System, and
    • geographic and location Ontologic Applications and Ontologic Services (OAOS

    and also

  • routing and forwarding Supercomputer Cluster (SuperCluster)

    for optimization and other reasons.

    Furthermore, we concluded that all entities concerned in governments, commissions, federal authorities, universities, research institutes, companies, artists, other individual persons, cliques, and other entities have understood this part of our OS several years ago already at least to a sufficient extent to make related decision, but as usual neither referenced our works nor communicated with us and asked for allowance and licensing.
    Therefore, we got the impression once again that the legal defense could by quite difficult at the courts worldwide.
    As we always say: Good parenting is a matter of luck.

    This quote and comment most potentially will be added to the note Further steps and Ontologic Net Further steps of the 11th of January 2023.


    19.January.2023

    07:21, 08:26, 17:12, and 21:25 UTC+1
    And next abuse of market power by Microsoft

    We quote a report, which is about the Microsoft Azure OpenAI Service and was publicized on the 16th respectively 17th of January 2023: "[...]
    Microsoft said it is vetting customers' applications to mitigate potential abuse of the software [of the other fraudulent company OpenAI based on SoftBionics (SB) (e.g. Artificial Intelligence (AI), Machine Learning (ML), Artificial Neural Network (ANN), Computer Vision (CV), Simultaneous Localization And Mapping (SLAM), Soft Computing (SC), Autonomic Computing (AC), Natural Language Processing (NLP), Cognitive Computing (CogC) or Cognitive System (CogS), Cognitive Agent System (CAS), Cognitive-Affective Personality or Processing System (CAPS), Swarm Intelligence (SI) or Swarm Computing (SC), etc.)], and its filters can screen for harmful content users might input or the tech might produce.
    [...]"

    Comment
    The company Microsoft depends on our original and unqiue, copyrighted, and prohibited for fair use work of art titled Ontologic System, created by C.S., and exclusively managed and exploited by our corporation with the consent and on the behalf of C.S..
    But several serious legal problems do exist for Microsoft:

  • Microsoft still has no allowance and license for the performance and reproduction of certain parts of our Ontologic System (OS) to implement its applications and services as Ontologic Applications and Ontologic Services (OAOS) and publicate them on the Marketplace for Everything (MfE) of our collecting Society for Ontological Performance and Reproduction (SOPR) exclusively.
  • In addition, OAOS in the field of SoftBionics (SB) are provided by the related exclusive subsystems and platforms of our SOPR by our SOPR exclusively, which means the Azure OpenAI Service is prohibited.
  • In addition, so-called Machine Learning Models (MLMs) have to be set up, generated, and trained on the related exclusive subsystems and platforms of our SOPR by all interested licensees jointly, which means the OpenAI MLM is prohibited. But this regulation might have become obsolete, if only the exclusive MLMs of our SOPR are permitted anyway.
  • In addition, vetting customers' OAOS is a regulation, which has been envisioned and introduced by our SOPR as well and is an exclusive task of our SOPR, which means said vetting by Microsoft is prohibited.

    We view such illegal actions in particular and such rejections of virtually every regulation of our SOPR by Microsoft and also other companies as the next reiteration of their declaration of insolvency and war against C.S. and our corporation, but also against the societies worldwide.

    In fact, Microsoft and Co. are not able and do not show any interest to compete legally in the market and instead obstruct, frustrate, and even block freedom of choice, innovation, and competition for the benefit of the public, which even questions rule-based law and order and interferes in democratic processes somehow.
    Sadly to say, virtually all governments, commissions, federal authorities, specifically federal investigators and market regulators, universities, research institutes, companies, artists, other individual persons, cliques, and other entities are truly interested in solving that social and societal disturbance and annoyance.
    The only action is that usual production of hot air and blah blah blah.
    Howsoever, as a side effect of their inactivity, they all have also confirmed that the Articles of Association (AoA) and the Terms of Service (ToS) with the License Model (LM) and Main Contract Model (MCM) of our SOPR are Fair, Reasonable, And Non-Discriminatory, As well as Customary (FRANDAC) terms and conditions no matter how they are drafted.

    That specific strategy to chisel and scrape single parts of our OS off, simulate a technological progress, confuse the public, and so on is already over since the summer of 2017, because

  • presenting the resulting point cloud is showing
    • on the one hand the volumes of our works of art, performances, and achievements, and
    • on the other hand their individual and mutual motivations, goals, strategies, methods,
  • connecting the dots is showing
    • on the one hand the contours of our works of art, performances, and achievements and
    • on the other hand their obivous act of
      • taking our works of art as sources of inspiration and blueprints, specifically the integration of said single parts of our OS in accordance to our composition and Ontologic System Architecture (OSA), and
      • encircling and besieging C.S. and our corporation, and shielding them from the public.

    The same holds for all the many other illegal actions, supports, conspiracies of all the other entities under their individual groups and across these groups.
    Even more worse and nasty, our demands are only taken to question, contest, attack, damage, and destruct our rights and properties, and our regulations are taken only to find weak spots for more and maximal attack, damage, and destruction.
    They are not showing a serious commitment, but are only trying to infringe the rights and properties, and damage the goals and threaten the integrities of C.S. and our corporation, and eventually taking them for a ride.

    We have already begun to create graphic presentations, which show how those illegal methods, scams, frauds, and crimes work in space and time, specifically

  • how an alternative reality with a simulated technologiccal progress was created and is being perpetuated,
  • how the actions and events truly happened and are taking place,
  • how the causalities were and are being perverted,
  • how these actions and events, and also causalities are related to the bad actors and to each other,
  • and so on.

    Also serious and ridiculous is the fact that other decisive activities of C.S. and our corporation, including our SOPR and our other Societies, cannot and will not proceed, if they will be started at all, for example in relation to the fights against

  • climate change,
  • environmental pollution,
  • famine,
  • obsolescence or overageing,
  • national debt, and
  • many other social and societal, national and international problems,

    which all have already turned into chaos and the only strategy and plan of governments and their clique, which we see, is to continue as usual with infringing the rights and stealing the properties, as well as the strategy and plan of C.S. and our corporation.
    Regarding these problems and the related transformation and modernization, our demands for the

  • restoration of rights, integrities, and reputations,
  • restitution of properties, and
  • restoration of momenta, as well as follow-up opportunities

    of C.S. and our corporation, and our terms and conditions are a no-brainer.
    But as we said in the past already, there is no understanding and no learning effect, and somehow we have the impression that blocking us is another one of their main goals and there will be no rip-off 3.0.


    20.January.2023

    17:44 UTC+1
    MfE does apply for stock images as well

    Marketplace for Everything (MfE)

    We expect that stock image platforms, like for example the companies Getty Images and Shutterstock, provide their images on our Marketplace for Everything (MfE) exclusively, if said images are used for purposed related to our field of SoftBionics (SB) (e.g. Artificial Intelligence (AI), Machine Learning (ML), Artificial Neural Network (ANN), Computer Vision (CV), Cognitive Agent System (CAS), etc.), specifically for purposes related to training SB systems.

    19:19 UTC+1
    OntoBot and OntoSearch exclusive on all Os

    Ontologic roBot (OB or OntoBot)
    Ontologic Search (OntoSearch)
    Ontoscope (Os)

    The companies Alphabet (Google), Microsoft, and Co. depend on our original and unqiue, copyrighted, and prohibited for fair use work of art titled Ontologic System, created by C.S., and exclusively managed and exploited by our corporation with the consent and on the behalf of C.S..
    Because of the various Fair, Reasonable, And Non-Discriminatory, As well as Customary (FRANDAC) terms and conditions of our collecting Society for Ontological Performance and Reproduction (SOPR),

  • no Alphabet Google Search, no Bidirectional Encoder Representations from Transformers (BERT), no Bidirectional and Auto-Regressive Transformers (BART), no DeepMind Language Model for Dialogue Applications (LaMDA),
  • no Microsoft Bing,
  • no OpenAI Generative Pre-trained Transformer (GPT-3), no ChatGPT, etc.,
  • no whatsoever, including
    • no Search System (SS) or Search Engine (SE),
    • no Question Answering (QA) System (QAS),
    • no Recommendation System or Recommender System (RecS),
    • no chatbot,
    • no speech recognition and no speech synthesis,
    • no voice user interface,
    • no Dialog System (DS or DiaS), including Dialogue Management System (DMS), and
    • no Conversational System (CS or ConS), including Conversational Agent System (CAS or ConAS),

    and definitely

  • no Multimodal System (MS or MMS), including no Multimodal User Interface (MUI),
  • no ontology-based system,
  • no Agent-Based System (ABS), including no Autonomous Agent System (AAS),
  • no Intelligent Agent System (IAS), including no (voice-based or speech controlled) virtual assistant, no Intelligent Personal Assistant (IPA) or Personal Intelligent Assistant (PIA),
  • no Cognitive Agent System (CAS), including
    • no Personalized Assistant that Learns (PAL)
      • no Reflective Agents with Distributed Adaptive Reasoning (RADAR) and
      • no Cognitive Assistant that Learns and Organizes (CALO),
  • no Autonomous System (AS) and Robotic System (RS), and
  • no this and that,

    which are based on our

  • OntoBot and
  • OntoSearch based on

    is allowed and licensed on our Ontoscope (Os) and in our Ontoverse (Ov) as part of our original and unique work of art titled Ontologic System and created by C.S., because no modification of our Ontologic System (OS) exists, which would allow and license the performance and reproduction of certain parts of our OS in any other way, and no modification and no copy is required at all, because we have created the original and unique work of art, which already has all these features and functionalities.

    As we already said in the last past, it is time for companies, including old online companies but also start-ups, to

  • adapt their businesses and transfer their accrued talents and competences to our new environment, which requires the allowance and license for the performance and reproduction of certain parts of our OS, and
  • implement their goods (e.g. applications) and services as Ontologic Applications and Ontologic Services (OAOS) on the basis of our Ontologic System Architecture (OSA), and publicate them on the Marketplace for Everything (MfE) of our collecting SOPR exclusively

    in full compliance with

  • national and international laws, regulations, and acts, as well as agreements, conventions, and charters, and
  • Fair, Reasonable, And Non-Discriminatory, As well as Customary (FRANDAC) Terms of Service (ToS) with the License Model (LM) of our SOPR.

    Simultaneously, legal proceedings worldwide to enforce the

  • restoration of rights, integrities, and reputations,
  • restitution of properties, and
  • restoration of momenta, as well as follow-up opportunities

    of C.S. and our corporation, including the payment of triple damage compensations and a lot of other legal actions.

    See also the notes selected for the sections Infrastructure [API and HMI] and Infrastructure [Search engine] of the issue SOPR #33p of the 13th of September 2022:

  • SOPR considering search engines respectively SOPR demands single API and HMI to OntoSearch and OntoPortal of the 30th of July 2022
    "The era of certain search engines, as we know them, has now ended.",
  • SOPR reminds of single API and HMI to user accounts of the 31st of July 2022
    "The IDentity and Access Management System (IDAMS), Trust Management System (TMS), and Consent Management System (CMS) of our SOPR imply that a single Application Programming Interface (API) and Human Machine Interface (HMI) to the user accounts already exists.", and
  • SOPR decided search engines now same exclusive like other services of the 19th of August 2022.
    The ratio and the related regulation of the Articles of Association (AoA) and the Terms of Service (ToS) of our Society for Ontological Performance and Reproduction (SOPR) behind the decision to handle search engines is straightforward: Search engines are common to all members of our SOPR and therefore a part of the exclusive infrastructures of our SOPR and our other Societies, like
    • Geographic Information Systems (GISs) (e.g. digital maps, digital globes, etc.),
    • social and societal service platforms,
    • electronic commerce platforms (e.g. marketplaces), and
    • online advertisement, as well as
    • models, architectures, frameworks, ontologies, and any other basic or foundational concepts, items, and so on (e.g. so-called foundation supermodels or Mixture of Experts)

    based on our Evoos and our OS in one way or another. :)
    We already discussed a little the matter in general and the common User Interface (UI) for search engines in particular (see the note SOPR considering search engines of the 30th of July 2022)."

    Google, Microsoft, and other existing and new online companies adapted their existing and implemented their new search engines with generative Artificial Intelligence (AI) accordingly. We would say they all come just 16 years in case of generative AI and 10 years in case of those search engines too late. Is not it?
    Google also adapted its library for website functions, so that the login message by the Google account is shown automatically when loading a webpage implemented with this library.

    See also the notes

  • SOPR # of the 4th of January 2023,
  • Designations and sales other than the ones of C.S. prohibited of the 4th of January 2023,
  • Other app stores than our MfE prohibited of the 5th of January 2023,
  • Use of our OS for military use prohibited of the 5th of January 2023,
  • Ontoscope Further steps of the 6th of January 2023,
  • Illegal Ontoscope clone iPhone now dead?! of the 6th of January 2023,
  • Ontoscope Further steps of the 8th of January 2023,
  • Fair goes first, but fairness without limits is unfair of the 10th of January 2023,
  • section By the way of the note Further steps and Ontologic Net Further steps of the 13th of January 2023, and
  • And next abuse of market power by Microsoft of the 19th of January 2023.

    By the way:

  • The recent layoffs of companies, like for example Meta (Facebook), Amazon, Microsoft, Alphabet (Google), and so on, show a quite optimistic future by them.
  • All or nothing at all.
  • There will be no rip-off 3.0 or even rip-off 4.0.


    23.January.2023

    13:54 UTC+1
    OS one and only legal TAI

    *** Work in progress ***

    Ontologic System (OS)
    Trusted Artificial Intelligence (TAI) or Trustworthy Artificial Intelligence (TAI)

    As we have seen with what is wrongly called cloud computing and as a Service (aaS) technologies (aaSx) (e.g. capability and operational models, (sub)systems, and platforms), the U.S.American National Institute of Standards and Technology (NIST) has once again taken content from our website without proper referencing, which constitutes the next infringement of our copyright for our original and unique work of art titled Ontologic System and created by C.S..
    This time it is its Artificial Intelligence Risk Management Framework (AI RMF).

    We quote the document titled "AI Risk Management Framework: Second Draft" and publicized on the 18th of August 2022: "The AI Risk Management Framework
    This second draft of the NIST Artificial Intelligence Risk Management Framework (AI RMF, or Framework) builds on the initial March 2022 version and the December 2021 concept paper. It reflects and incorporates the constructive feedback received. [...]
    [...]

    The AI Risk Management Framework (AI RMF) Playbook
    In concert with the release of the AI RMF second draft, NIST seeks comments on a draft companion AI RMF Playbook. The Playbook provides actions Framework users could take to implement the AI RMF by incorporating trustworthiness considerations in the design, development, use, and evaluation of AI systems. The draft Playbook is based on this second draft of the AI RMF. It includes example actions, references, and supplementary guidance for "Govern" and "Map" - two of the four proposed functions. Draft material for the "Measure" and "Manage" functions will be released at a later date.

    [...]

    Figure 1: Lifecycle and Key Dimensions of an AI System. Modified from [Organisation for Economic Co-operation and Development (]OECD[)] (2022) OECD Framework for the Classification of AI systems - OECD Digital Economy Papers. Risk management should be continuous, timely, and performed throughout the AI system lifecycle, starting with the plan & design function in the application context.

    [...]

    4. AI Risks and Trustworthiness
    Approaches which enhance AI trustworthiness can also contribute to a reduction of AI risks. This Framework articulates the following characteristics of trustworthy AI, and offers guidance for addressing them. Trustworthy AI is: valid and reliable, safe, fair and bias is managed, secure and resilient, accountable and transparent, explainable and interpretable, and privacy-enhanced.
    [...]

    Table 1: Mapping of AI RMF taxonomy to AI policy documents.
    [...]

    Human Factors Since AI systems can make sense of information more quickly and consistently than humans, they are often deployed in high-impact settings as a way to make decisions fairer and more impartial than human decision-making, and to do so more efficiently. One common strategy for managing risks in such settings is the use of a human "in-the-loop" (HITL). [...]

    [...]

    Appendix A: Descriptions of AI Actor Tasks from Figure 1
    AI Design [...]
    AI Development [...]
    AI Deployment [...]
    Operation and Monitoring includes AI actors who are responsible for operating the AI system and working with others to continuously assess system output and impacts. Users who interpret or incorporate the output of AI systems, evaluators and auditors, and members of the research community are part of this group.
    Test, Evaluation, Verification, and Validation (TEVV) tasks are performed by AI actors who examine the AI system or its components, or detect and remediate problems throughout the AI lifecycle. Tasks can be incorporated into a phase as early as design, where tests are planned in accordance with the design requirement.
    [...]
    Human Factors [...]
    Domain Experts are multidisciplinary practitioners or scholars who provide knowledge or expertise in an industry sector, economic sector, or application area where an AI system is being used. These experts are essential contributors for AI system design and development and can provide interpretation of outputs to support the work of TEVV and AI impact assessment teams.
    AI Impact Assessors [...]
    Procurers [...]
    Organizational Management, Senior Leadership, and the Board of Directors are among the parties responsible for AI governance.
    End Users [...]
    AI Operators continuously assess system recommendations and impacts (both intended and unintended) in light of the system's objectives as well as the ethical considerations that go into its operation. Operators can often be associated with the planning and design or specification stage of the AI system lifecycle as well as post-deployment monitoring.
    Affected Individuals/Communities encompass any individual, group, community, or stakeholder organization affected by AI systems or decisions based on the output of AI systems, directly or indirectly. These individuals do not necessarily interact with the system and can be indirectly or directly affected by the deployment of an AI system or application.
    Other AI actors may provide formal or quasi-formal norms or guidance for specifying and managing AI risks. They can include trade groups, standards developing organizations, advocacy groups, environmental groups, and civil society organizations.
    The general public is most likely to directly experience positive and negative impacts of AI technologies. They may provide the motivation for actions taken by the other stakeholders and can include individuals, communities, and consumers in the context where an AI system is developed or deployed."

    Appendix B: How AI Risks Differ from Traditional Software Risks
    [...]"

    Comment
    The whole draft is based on our Ontologic System (OS), including our Evolutionary operating system (Evoos), specifically its basic properties, and our related messages, notes, explanations, clarifications, investigations, and claims.
    See also once again the note Success story continues and no end in sight of the 17th of May 2022.

    We also quote our message Success story continues and no end in sight of the 17th of May 2022:
    "After 16 years, they found out that a so-called Trusted Artificial Intelligence (TAI) is needed. Guess what is taken as foundation? Hint: It is a belief system, which is purely rational and resilient (e.g. trustworthy), and has the basic properties of (mostly) being validated and verified, and specification- and proof-carrying, and a formal semantics, including formal operational semantics.

    Our revolution based on our Evolutionary operating system (Evoos) and Ontologic System (OS) continues and there is no end in sight.
    What comes now is a New Artificial Intelligence (NAI or New AI), because the whole big pile of semantic bull$#!+ must be cleaned up, ordered, and put together again. :D
    As we said, they have stolen our properties, but will not keep them."

    Comment
    Also note that Ted W. Lieu, who represents California's 36th Congressional District in the U.S.American House of Representatives, was also not shy to mislead the public about the true origin of the creations, works, and achievements of C.S. and our corporation in an opinion respectively guest essay. "The fourth industrial revolution is here." Our revolution ....

    So much about an environment with a rule-based law and order and a democracy and a culture and basic rights and freedoms and civilizations.

    Of course, this already had consequences and we already acted and contained that next general activity of fraud and crime from several directions, for example

    • Ontoscope (Os),
    • operating system (os),
    • Ontologic Applications and Ontologic Services (OAOS),
    • Ontologic Net (ON) (what is wrongly called Grid Computing (GC), and Cloud, Edge, and Fog Computing (CEFC), Decentralized Web (DWeb), Web3, etc.),
    • Ontoverse (Ov) (what is wrongly called metaverse),
    • and so on.

    See also the notes

  • SOPR # of the 4th of January 2023,
  • Designations and sales other than the ones of C.S. prohibited of the 4th of January 2023,
  • Other app stores than our MfE prohibited of the 5th of January 2023,
  • Use of our OS for military use prohibited of the 5th of January 2023,
  • Ontoscope Further steps of the 6th of January 2023,
  • Illegal Ontoscope clone iPhone now dead?! of the 6th of January 2023,
  • Ontoscope Further steps of the 8th of January 2023,
  • Fair goes first, but fairness without limits is unfair of the 10th of January 2023,
  • section By the way of the note Further steps and Ontologic Net Further steps of the 13th of January 2023,
  • And next abuse of market power by Microsoft of the 19th of January 2023, and
  • OntoBot and OntoSearch exclusive on all Os of the 20th of January 2023.

    We also added some kind of firewalls and gateways.

    It will become extremely expensive to cure the actions of the companies Alphabet (Google)→DeepMind, OpenAI, Microsoft, Meta (Facebook), and Co. after they opened the Pandora's box with the release of their large Machine Learning Models (MLMs) made available to the general public, even as illegal Free and Open Source Software (FOSS).
    The worldwide public should hold those utter morons and criminals accountable and not accept their democratization of their damages and destructions, as we do with their illegal democratization of the rights and properties of C.S. and our corporation, specifically the activity to "democratize AI as a new technology platform" based on our OS.

    If their MLMs, and also technologies (e.g. systems, platforms, and also Service-Oriented technologies (SOx)), goods (e.g. software (e.g. applications), hardware (e.g. processors), devices, robots, vehicles), and services (e.g. as a Service (aaS) business models and capability models) satisfy the recommendations and the guidelines of the NIST AI RMF, then we have another evidence that shows a causal link with our OS.

    We will see what the courts will say to this and in which area they will not have to pay triple damages, or even cease and desist, and stop operation.

    We will also investigate the Organisation for Economic Co-operation and Development (OECD) for infringements of the rights and properties of C.S. and our corporation.

    The tide has turned. The noose has tightened.

    We already said in the Investigations::Multimedia, AI and KM of the 5th of August 2022 that it was totally clear that they will take the brute force approach, because it matches their usual business strategy based on their abuse of market power and therefore shows their illegal monopoly.
    We also said that "[t]he next step would be more Cluster Computing and a so-called Global Brain, or being more precise, our

  • Ontologic Net (ON) or Universal Space and formerly Global Grid, and
  • Ontologic Web (OW) or Universal Brain Space or Global Brain 2.0, and formerly Global Brain Grid

    anyway" (see the Further steps, Ontologic Net Further steps of the 14th of November 2022), and therefore activities such as abuse of market power, criminal copyright infringement, blackmailing, wire fraud, securities fraud, commercial fraud, corruption, conspiracy, plot, and so on to circumvent us with

  • SuperSomputing (SC or SupC) (e.g. Cluster Computing (CC or Cluster C)) of our Ontologic Net (ON),
  • Interconnected supercomputer (Intersup) of our Ontologic Net (ON) as the foundation of our Ontologic Web (OW) also called World Wide Web (WWW) brain by us.

    See also the

  • Clarification of the 21st of September 2021
  • issue SOPR #33e of the 8th of October 2021,
  • Clarification of the 13th of April 2022 (keyword Global Brain), and
  • Clarification of the 8th of May 2022 (keyword Global Brain).

    But what they developed so far is even not Frankenstein's brain, but Nasty Artificial Intelligence (NAI), like the Skynet of the Terminator saga, which now has the potential to set the world on fire. The latter reminds us of the first ignition of the hydrogen bomb (H bomb).

    Now they want to solve the problem in the usual way, which also means by

  • stealing from us as well,
  • blackmailing us,
  • making the same promises as in the beginning of AI, making cheap populism,
  • talking about ""develop[ing] AI that is increasingly safe, useful, and powerful [and] advanc[ing] AI research and democratize AI as a new technology platform [... und an] existing exclusive deal", and
  • misleading the public by fabricated publications alone and together with the media and other entities.

    But this does not solve the problem at all, because it only repeats all mistakes and illegal actions seen with for example the

  • operating sytem (os) fraud,
  • Personal Computer (PC) fraud,
  • Interconnected network (internet) fraud,
  • World Wide Web (WWW) fraud,
  • Semantic (World Wide) Web (SWWW) fraud,
  • web browser fraud,
  • smartphone fraud,
  • Ontoscope (Os) fraud,
  • Linked Data (LD) fraud,
  • Grid Computing (GC) fraud,
  • Cloud, Edge, and Fog Computing (CEFC) fraud,
  • crypto fraud,
  • Decentralized Web (DWeb) fraud, and
  • metaverse fraud

    (see also once again the quote of the NIST AI RMF above).
    Even more ridiculous is the fact that the U.S.America is not able to solve its problems with weapons and mass shootings, and its Information and Communication Technology (ICT) monopolies, but now wants to solve the problem with AI, ML, Robotic Systems (RSs), and so on by the same approach.

    So much about monetization and democratization of the rights and properties of individuals and societies.

    21:00, 22:15, 23:24, and 25:51 UTC+1
    Clarification

    *** Work in progress ***
    We took a closer look at the field of generative AI and are working on an investigation and a clarification about this field.
    That entities acting in this field have stolen from us is for sure, because they do not create or invent, but just ony steal and market the original and unique ArtWorks (AWs) and further Intellectual Properties (IPs) included in the oeuvre of C.S., as we have proven again and again in more than the last 16 years. Therefore, not the motivation and the evidence are missing, but only the explanation of the causal link in a court-proof way is missing.

    The prior art comprises individual foundational fields and integrations of them done by others and us.
    Foundational fields

  • SoftBionics (SB), including
    • Artificial Life (AL),
    • Artificial Intelligence (AI),
    • Machine Learning (ML),
    • Computational Intelligence (CI), including
      • Fuzzy Logic (FL)==Computing with Words (CwW),
      • Artificial Neural Network (ANN), including
        • Multi-Layer Perceptron (MLP),
      • Evolutionary Computing (EC or EvoC), including
        • Evolutionary Strategy (ES),
        • Evolutionary Algorithm (EA),
        • Genetic Algorithm (GA),
        • Evolutionary Programming (EP),
        • Genetic Programming (GP),
        • Hybrid Evolutionary Computing (HEC),
        • and so on,

        and

      • Swarm Intelligence (SI) or Swarm Computing (SC),
    • Soft Computing (SC),
    • Computer Vision (CV),
    • Computer Audition (CA),
    • Simultaneous Localization And Mapping (SLAM),
    • Computational Linguistics (CL),
    • Natural Multimodal Processing (NMP) and Natural Multimodal Understanding (NLU),
      • Natural Language Processing (NLP),
      • Natural Language Understanding (NLU),
      • Natural Image Processing (NIP),
      • Natural Image Understanding (NIU)
      • and so on,
    • Emotive Computing (EmoC) and Affective Computing (AffC),
    • Emotional Intelligence (EI),
    • Autonomic Computing (AC),
    • Cognitive Computing (CogC),
    • Cognitive Vision (CogV),
    • Cognitive Agent System (CAS),
    • Cognitive-Affective Personality or Processing System (CAPS),
    • Common Sense Computing (CSC),
    • Multi-Agent System (MAS),
    • etc.,

  • logics, including
    • Logic Programming (LP),
    • Generate 'n' Test (GnT),
    • Rewriting Logic (RL),
    • Fuzzy Logic (FL)==Computing with Words (CwW),
    • etc.

  • technologies, applications, and services
    • Search System (SS) or Search Engine (SE),
    • Question Answering (QA) System (QAS),
    • Recommendation System or Recommender System (RecS),
    • chatbot,
    • speech recognition,
    • voice user interface,
    • Dialog System (DS or DiaS), including Dialogue Management System (DMS),
    • Conversational System (CS or ConS), including Conversational Agent System (CAS or ConAS),
    • Multimodal System (MS or MMS), including Multimodal User Interface (MUI),
    • Intelligent Agent System (IAS), including (voice-based or speech controlled) virtual assistant, Intelligent Personal Assistant (IPA),
    • Robotic System (RS),
    • and so on,

  • generative grammar,
  • generative design,
  • Algorithmic/Generative/Evolutionary/Organic ... Art/Science, including
    • Persistence of Vision Ray Tracer (POV-Ray),
    • etc..

    We quote an online encyclopedia about the subject POV-Ray: "The Persistence of Vision Ray Tracer, most commonly acronymed as POV-Ray, is a cross-platform ray-tracing program that generates images from a text-based scene description.
    [...]
    [...] The name "STAR-Light" (Software Taskforce on Animation and Rendering) was initially used, but eventually the name became "PV-Ray", and then ultimately "POV-Ray" (Persistence of Vision Ray Tracer),[2] a name inspired by Dali's painting, The Persistence of Memory.[7][8]"

    Comment
    But POV-Ray is not related to SB (e.g. AI, ML, CI (FL, ANN, EC, and SI), CV, CC, CAS, etc.) and therefore considerably different to generative AI, which is included in our OS, obviously and definitely.

    Et voilà, we have a crystal clear causal link of the illegal DALL-E and our OS in addition to the causal link based on multimodality and our Evoos included in our OS.
    But we want to show the fraud based on that textual transformer thing as well.

    Integrations of foundational fields by prior art

  • ML and CL respectively NLP and NLU,
  • ML and GP,
  • ANN and GP,
  • ML and QA,
  • SC and MAS,
  • and so on.

    Creations and integrations of C.S.

  • Ontonics,
  • Ontologics,
  • Evolutionary operating system (Evoos) with its Evolutionary operating system Architecture (EosA), and
  • Ontologic System (OS) with its integrating Ontologic System Architecture (OSA)
  • and all the rest all in one.

    We quote an online encyclopedia about the subject Question Answering (QA): "[...]
    [...] Latest systems, such as [Generative Pre-trained Transformer (]GPT-3[)], T5,[7] and,[8] even use an end-to-end architecture in which a transformer-based architecture is used to store large-scale textual data in the underlying parameters. These models can then be directly used to answer questions without accessing any external knowledge sources.
    [...]
    In information retrieval, an open domain question answering system aims at returning an answer in response to the user's question. The returned answer is in the form of short texts rather than a list of relevant documents.[12] The system uses a combination of techniques from computational linguistics, information retrieval and knowledge representation for finding answers.
    [...]
    In 2011, Watson, a question answering computer system developed by IBM, competed in two exhibition matches of Jeopardy! against Brad Rutter and Ken Jennings, winning by a significant margin.[31] Facebook Research has made their DrQA system[32] available under an open source license. This system has been used for open domain question answering using Wikipedia as knowledge source.[33] The open source framework Haystack by deepset allows combining open domain question answering with generative question answering and supports the domain adaptation of the underlying language models for industry use cases. [34][35]"

    We also quote a report, which is about the field of generative Artificial Intelligence and was publicized today: "[A very rich man from Asia] is addicted to ChatGPT
    [A very rich man from Asia]says he is addicted to ChatGPT, the powerful new AI tool that interacts with users in an eerily convincing and conversational way.
    In a [social service platform] post last week, the [very rich man from Asia] said that the release of ChatGPT was a "transformational moment in the democratization of AI given its astounding capabilities as well as comical failures."
    [...]
    The tool, which artificial intelligence research company OpenAI made available to the general public late last year, has sparked conversations about how "generative AI" services - which can turn prompts into original essays, stories, songs and images after training on massive online datasets - could radically transform how we live and work.
    Some claim it will put artists, tutors, coders, and writers out of a job. Others are more optimistic, postulating that it will allow employees to tackle to-do lists with greater efficiency.
    "But there can be no doubt that generative AI will have massive ramifications," [a very rich man from Asia] wrote in his post, adding that generative AI holds the "same potential and danger" as silicon chips.
    "Nearly five decades ago, the pioneering of chip design and large-scale chip production put the US ahead of rest of the world and led to the rise of many partner countries and tech behemoths [...]," [a very rich man from Asia] [...] wrote.
    "It also paved the way for precision and guided weapons used in modern warfare with more chips mounted than ever before," he added. The race in the field of generative AI will quickly get as "complex and as entangled as the ongoing silicon chip war," he said.
    Chipmaking has emerged recently as a new flashpoint in US-China tensions, with Washington blocking sales of advanced computer chips and chip-making equipment to Chinese companies. Some Chinese investments in European chipmaking have also been blocked.
    [...]""

    Comment
    But an end-to-end architecture is still an

  • integration of individual components in general, and
  • integration of individual components in particular, which are also part of our
    • Evoos with its EosA based on TUNES OS, AL, AI, ML, CI, NMP and NMU, and Humanistic Computing (HC or HumanC), and also human brain, and
    • OS with its OSA.

    But to make it court-proof we must show the artistical and technological details.

    Since 2013 {links missing}, we discuss the fields of

  • semantic knowledge representation, including Graph-Based Knowledge Base (GBKB) or Knowledge Graph (KG),
  • Machine Learning Model (MLM),
  • and much more

    in relation to our Evoos and our OS.
    We have already explained that the so-called transformer, reformer, and transducer (e.g. perceiver) model and other models are based on the fields of Machine Learning (ML) and Artificial Neural Network (ANN), specifically MultiLayer Perceptron (MLP), and also concluded that such models are also based on our Evolutionary operating system (Evoos) and our Ontologic System (OS) to a significant extend, specifically when used as capability and operational model, cognitive model, including foundational cognitive model, including foundation model, or other coherent ontologic model (see also the note More evidence transformer model, etc. based on OS of the 11th of January 2023).

    A Machine Learning Model (MLM) and an Artificial Neural Network Model (ANNM) or a Large Language Model (LLM) are data stores, which in case of an ANNM compresses and stores data as parameters of an ANN respectively nodes, connections of these nodes, and weights of these notes.
    Obviously, we have here technologies, goods (e.g. applications), and services, which are based on a

  • brain-like, neural circuit and Artificial Neural Network (ANN), Content-Addressable Memory (CAM) respectively Associative Memory (AM), blackboard approach, and
  • "more natural to interact with" and human-like approach,

    and therefore an organic model and a bionic system, and therefore our Evoos.

    We also quote our Clarification of the 14th of May 2016:
    "[...] OntoBot software component of of our OS with its well-structured and -formed, validated and verified, and kernel-less reflective/fractal/holonic properties and rule-based and rewrite rules subsystems. Compare this with the content of the section 2. Computational Linguistics of "From Computational Linguistics to Computing with Words", specifically with "Certainly, linear aggregation of these symbols serve to understand and control one type of observable natural language phenomena as part of aggregational string formation or formal grammar. Its core concepts of well-formedness (syntax) and truth-function (semantics) were made explicit by way of specifying conditions of formal correctness and derivational compositionality. Their symbolic representations in the form of productions or rewrite rules - allowing for recursive application and generative string formation - not only constituted a wealth of symbol aggregation systems (formal languages) but were also employed to model comparable properties (in processes) of natural language string formation.
    [...]"

    Comment
    Bingo!!!

    Computational Intelligence (CI) (Fuzzy Logic (FL)==Computing with Words (CwW), Artificial Neural Network (ANN), Evolutionary Computing (EC or EvoC), and Swarm Intelligence (SI) or Swarm Computing (SC)) and Soft Computing (SC) are no legal loophole, because we already integrated it with the

  • other foundational fields in our Evoos and
  • Virtual Reality Chat (VRC) system in our OS (see the section Collaborative Virtual Environment of the webpage Links to Software of the website of OntoLinux).

    So we were definitely before all the others, who have taken our Evoos and our OS as source of inspiration and blueprint without allowance.
    This becomes even more clear with the integration of all the other individual fields and all the other parts and components of our Evoos and our OS.
    The later also shows once again that AI is an island technology from the legal point of view.

    We also quote our note OS too large to steal of the 15th of May 2016:
    "Everytime a defrauding entity stops to give informations, we can go on and

  • provide detailed explanations about the background and the whole picture, and
  • give arguments in all directions.

    Only an original creator, author, or/and developer is able to act in this way.
    In the course of the discussion about a suspicous or defrauding work, it also becomes obvious that a part has been described by an entity that so to say is freely hanging in the air respectively unconnected with the rest of what we show with our Ontologic System (OS).

    Whoever the criminal entities are behind all those frauds we are investigating, discussing, explaning, breaking down, and documenting, in the end they cannot use the stolen fractions of our OS, such as the combinations or integrations of for example:

  • Mixed Reality (MR) and a Belief-Desire-Intention Multi-Agent System (BDI MAS),
  • Computing with Words (CwW or CW) or fuzzy logic paradigm and an intelligent user interface,
  • dynamic program generation and an intelligent user interface,
  • Content-Addressable Memory (CAM), Content-Addressable Storage (CAS), and Content-Addressable Network (CAN),
  • Information-Centric Networking (ICN),
  • and so on,

    because on this level such an acting always constitutes a causal link with our OS respectively with the OS of C.S.."

    Comment
    Bingo!!!
    Now, we do know that they tried it since we said it and also that the whole case has become a mere formality at the courts worldwide.

    We also quote our Clarification of the 15th of June 2016:
    "We are sure, that some of our fans and readers wondered about the statement "All the rest is in our Ontologic Web (OW), the World Wide Web of the next generation: [...] every game" given in the presentation OS is ON of the 9th of May 2016.
    [...]

    Et voilà, our OS simply takes the contents of the ON and OW, and generates all kinds of computer or video games, as it is already done with news and reports for example.
    These generation, execution, and gaming processes can also include contents provided by a user or a specific group of users as some kind of Massively Multiplayer Mixed Reality Online Costume Role-Playing Game (MMMROCRPG).

    Needless to say, that this kind of generating technology is applied as well for everything else, that we have listed in the presentation OS is ON.

    A genious, original and unique multimedia work of art masterpiece of C.S., copyrighted and legal (no causal links with copyrighted computer or video games and other works, and if so, then fair use, because this work is literally spoken generative and transformative).

    [...]"

    Comment
    Bingo!!!
    Read the whole clarification once again.

    Read also the

  • Clarification of the 23rd of August 2017 and
  • note OS one and only legal TAI of today.

    23:34 and 25:44 UTC+1
    OpenAI ChatGPT next copyright infringement

    And not merely an infringement of the rights and properties of C.S. and our corporation, but serious crime, as not expected otherwise.

    In this relation, we would like to recall that in accordance with the Fair, Reasonable, And Non-Discriminatory, As well as Customary (FRANDAC) Terms of Service (ToS) with the License Model (LM) of our Society for Ontological Performance and Reproduction (SOPR), the common

  • SoftBionics (SB) backbones, core networks, or fabrics, and also (sub)systems and platforms,
  • SoftBionics (SB) Service-Oriented technologies (SBSOx), and
  • SoftBionics as a Service (SBaaS) business models and capability models (SBaaSx), including
    • Artificial Intelligence as a Service (CIaaS) technologies (AIaaSx),
    • Machine Learning as a Service (MLaaS) technologies (MLaaSx),
    • Computational Intelligence as a Service (CIaaS) technologies (CIaaSx),
    • Artificial Neural Network as a Service (ANNaaS) technologies (ANNaaSx),
    • Computer Vision (CV) as a Services (CVaaS) technologies (CVaaSx),
    • and so on,

    are parts of the exclusive infrastructures of our SOPR in our

  • Ontologic Net (ON),
  • Ontologic Web (OW), and
  • Ontologic uniVerse (OV),

    and no other entity is allowed to perform and reproduce this part of our OS as part of the fields of

  • Distributed Computing (DC), including what is wrongly called
    • Grid Computing (GC),
    • Cloud, Edge, and Fog Computing (CEFC),
    • Service-Oriented technologies (SOx), and
    • as a Service (aaS) (business) capability and (cloud) operational models (aaSx)

    and

  • Mobile Computing (MC or MobileC).

    This includes OAOS, like for example

  • search engine,
  • Question Answering (QA) system,
  • recommendation system or recommender system,
  • chatbot,
  • office software,
  • Business Intelligence (BI), Visualization, and Analytics (BIVA), and Data Science and Analytics (DSA),
  • Electronic Commerce (EC),
  • and so on.


    24.January.2023

    20:47 UTC+1
    SOPR considering OfficeaaSx with SBaaSx

    Since around the year 2005, we have in stock of our OntoLab, The Lab of Visions, our Hightech Office Ontonics, and our business units Ontologics and SoftBionics the one and only original and unique, and therefore legal integration of

  • full-fledged office suite (a bundle of productivity software (a software suite) intended to be used by office workers) (see the Ontologic Web Further steps11th of May 2016),
  • our field of SoftBionics (SB) (e.g. Artificial Intelligence (AI), Machine Learning (ML), Computational Intelligence (CI), Artificial Neural Network (ANN), Computer Vision (CV), Cognitive Agent System (CAS), Multi-Agent System (MAS), etc.),
  • Fuzzy Logic (FL)==Computing with Words (CwW),
  • generative technologies (e.g. generative design, generative grammar, generative art, etc.),
  • and so on,

    which is ready for provision as Ontologic Applications and Ontologic Services (OAOS)

  • based on the exclusive
    • SoftBionics (SB) backbones, core networks, or fabrics, and also subsystems and platforms (SBx),
    • SoftBionics (SB) Service-Oriented technologies (SBSOx), and
    • SoftBionics as a Service (SBaaS) business models and capability models (SBaaSx), including
      • Artificial Intelligence as a Service (CIaaS) technologies (AIaaSx),
      • Machine Learning as a Service (MLaaS) technologies (MLaaSx),
      • Computational Intelligence as a Service (CIaaS) technologies (CIaaSx),
      • Artificial Neural Network as a Service (ANNaaS) technologies (ANNaaSx),
      • Computer Vision (CV) as a Services (CVaaS) technologies (CVaaSx),
      • and so on,

    of the exclusive infrastructures of our Society for Ontological Performance and Reproduction (SOPR) in our

    • Ontologic Net (ON),
    • Ontologic Web (OW), and
    • Ontologic uniVerse (OV),

    which collectively are our Ontoverse (Ov) and New Reality (NR), and

  • integrated with other OAOS, like for example
    • search engine,
    • Question Answering (QA) system,
    • recommendation system or recommender system,
    • chatbot,
    • office software,
    • Business Intelligence (BI), Visualization, and Analytics (BIVA), and Data Science and Analytics (DSA),
    • Electronic Commerce (EC),
    • and so on.

    Please note that all other provisions are illegal plagiarisms of the original and unique ArtWorks (AWs) and further Intellectual Properties (IPs) included in the oeuvre of C.S. (see also for example the Clarification and the note OpenAI ChatGPT next copyright infringement of the 23rd of January 2023 (yesterday)).

    By the way:

  • We said
    • no further infringement of the rights and properties of C.S. and our corporation,
    • no further mimicking of C.S. and our corporation,
    • no sale of the rights and properties of C.S. and our corporation,
    • no control of the of the rights and properties of C.S. and our corporation by another private entity,
    • no other licensing for the parts of our Evoos and our OS than authorized by our SOPR, which means no Free and Open Source Software (FOSS),
    • no other technologies (e.g. systems, platforms, and also Service-Oriented technologies (SOx)), goods (e.g. contents, software (e.g. applications), hardware (e.g. processors), devices, robots, vehicles), and services (e.g. as a Service (aaS) business models and capability models) for common things (e.g. openly available raw signals and data, informations, knowledge bases, models, and algorithms), and
    • no support of an entity that is damaging the goals and even threatening the integrities of C.S. and our corporation (e.g. Apache Foundation, Linux Foundation, (former) OpenAI, and so on).

    Where is the problem with this absolutely Fair, Reasonable, And Non-Discriminatory, As well as Customary (FRANDAC) terms and conditions?

  • Welcome to the Ontoverse (Ov).


    25.January.2023

    02:40 UTC+1
    SOPR continuing transition phase

    Our Society for Ontological Performance and Reproduction (SOPR) is continuing the transition phase, which comprise the

  • restoration of rights, integrities, and reputations,
  • restitution of properties, and
  • restoration of momenta, as well as follow-up opportunities

    of C.S. and our corporation.
    In doing so, we are placing particular emphasis on

  • opening our OS to a sufficient extent to meet the demands and requirements of the public,
  • retaining Fair, Reasonable, And Non-Discriminatory, As well as Customary (FRANDAC) terms and conditions, specifically for all entities, that showed a certain commitment, goodwill, and agreement, and
  • guaranteeing and protecting freedom of choice, innovation, and competition for the benefit of the public.

    The next steps of this transition phase would have been actions, which matches our decision to reduce the scope of modifying and opening our OS with its OSA, OSC, Ontoscope, OsC, and Ontoverse (Ov) to a certain extent in compliance with the decisions of governments, commissions, federal authorities, companies, and other entities (they do not want to break up illegal monopolies of their cliques).

    But we also keep in mind the further modification and opening of our OS and revision and adjustment of the License Model (LM), by decreasing the royalties (e.g. fixed fees and relative shares), though this has been shifted by some years and will only be considered when the collecting SOPR is working properly, which includes that the triple damage compensations are being collected and other required legal actions have taken place.
    will not be reduced, because of

  • continued and increased damages and
  • not increased royalties for balancing the reduction of scope

    We also heard something like 7 and 17, 3 and 17, and 51, but we are not sure to 100%, what that should mean, and honestly, if this should mean something relevant.


    28.January.2023

    03:47 and 05:18 UTC+1
    ChatGPT infringes copyright of others and us

    While the general expression of idea was already created and presented with our orignal and unique work of art titled Ontologic System and created by C.S., including our orignal and unique work of art titled Analyse und Entwurf eines Betriebssystems nach evolutionären und genetischen Aspekten==Analysis and Design of an Operating System According to Evolutionary and Genetic Aspects (see the The Proposal), also titled Evolutionary operating system (Evoos), cybernetic self-portrait, etc. (see the webpage Overview of our Ontologic System (OS) OntoLinux), the long results of the Question Answering (QA) system, recommendation system, chatbot, text generator, generative art creator suggests that the expressions of ideas of other creators are taken as source of inspiration and blueprint. Therefore, results have to be compared with original and unique works of art to validate and verify that no copyright is infringed.

    But for doing so, one is once again acting in the legal scope of ... the Ontoverse (Ov), aka. OntoLand (OL).
    But the whole Machine Learning Model (MLM) must be entangled, resolved, uncrompressed, decrypted once again, which shows that the whole approach is flawed and error by design and greed.
    No, ladies and gentlemen, that brainless brute force trick and illegal trick does not work for civilization.
    That is only AI crap exactly like crypto crap working in the same way as a scam, following the same business strategies and goals, and trying to steal the same (hint: our OS), and only adds to all the other illegal and even serious criminal actions.

    See also the notes

  • OS one and only legal TAI,
  • Clarification, and
  • OpenAI ChatGPT next copyright infringement

    of the 23rd of January 2023

    By the way:

  • Other artists and C.S. created, but OpenAI and Co. only copied, stole, and implemented, specifically what C.S. created.
    Therefore, we will not modify and open the original and unique ArtWorks (AWs) and further Intellectual Properties (IPs) included in the oeuvre of C.S. and allow and license the performance and reproduction of certain parts of our OS related to HardBionics (HB) and SoftBionics (SB) (e.g. AI, ML, ANN, CV, etc.), if such actions are not required to enable other entities to
    • adapt their businesses and transfer their accrued talents and competences to our new environment, which requires the allowance and license for the performance and reproduction of certain parts of our OS, and
    • implement their goods (e.g. applications) and services as Ontologic Applications and Ontologic Services (OAOS) on the basis of our Ontologic System Architecture (OSA), and publicate them on the Marketplace for Everything (MfE) of our collecting Society for Ontological Performance and Reproduction (SOPR) exclusively

      in full compliance with

    • national and international laws, regulations, and acts, as well as agreements, conventions, and charters, and
    • Fair, Reasonable, And Non-Discriminatory, As well as Customary (FRANDAC) Terms of Service (ToS) with the License Model (LM) of our SOPR.
  • Do not be fooled by the lying press.
  • Our legal team is also already building the case against that Y Combinator Management thing since some years due to several other illegal start-ups. There is more to come. :)


    29.January.2023

    03:31, 05:20, 15:00, and 20:24 UTC+1
    Clarification
    OpenAI ChatGPT next copyright infringement

    We have forgotten to add some more informations and explanations to our Clarification of the 23rd of January 2023 (see also the note OpenAI ChatGPT next copyright infringement of the 23rd of January 2023).

    Another resolution of the acronym GPT could be Genetic Programming Transformer, which would explain

  • arbitrarily comprehensive (e.g. long or broad) results, including Algorithmic/Generative/Evolutionary/Organic ... Art/Science,
  • arbitrarily many results,
  • validated and verified results (see the other basic properties of our Ontologic System), and
  • creative results (explained as one of the original and unique signature properties of our Evoos (1999) and OS (2006) in the messages, notes, explanations, clarifications, investigations, and claims below).

  • Roboticle Project update One Robot Per Child (ORPC) #3 1:11 of the 8th of October 2012
    "Also, we would like to take an icon with an abstraction of the XORO head for the related Sugar activity, which is a simulator in 2D or 2.5D at first and later in 3D depending on the performance of the XOs, and based on the authoring, programming, and creative writing environments already available with the Sugar learning environment."
    Also note that we compared our Ontoscope with a head of a robot in relation to the fields of cybernetics.
  • OntoLix and OntoLinux Website update of the 1st of April 2015
    "With the Rewriting Logic we even have non-deterministic methods at hand, which in combination with for example GnT - Generate'n'Test literally spoken results in a totally different quality, specifically in relation to creative, unknown problems solving agents like our OntoBot. Yes indeed, if compared with an artist, then the combination of our OntoBot and OntoScope components is far beyond e.g. Pablo Picasso. In this sense: We find and try."
  • OntoLix and OntoLinux Website update of the 8th of March 2017
    "Indeed, OntoBot is creative."
  • Short summary of clarification of the 24th of June 2022
    "[...] we use randomness in Evolutionary Computing (EC), so that for a very large extent a god is not required for a reflective system, which is also a creative system and embryonic system. Or should we say creating system respectively pocket god? :)"
    "[...] And keep in mind that C.S. added Evoutionary Computing (EC), because
    • EC adds creativity to the AI and CogS, and
    • Genetic Programming (GP) even expands and growth the AI and CogS further.

    In addition, we note

  • all-in-one Artificial Neural Network (ANN) somehow
    • Artificial Intelligence (AI), Machine Learning (ML), Computational Intelligence (AI), Fuzzy Logic (FL), Artificial Neural Network (ANN), Evolutionary Computing (EC or EvoC), Affective Computing (AffC), Soft Computing (SC), etc. in general,
    • Algorithmic/Generative/Evolutionary/Organic ... Art/Science (here writing, including programming) in particular,

      utilized as

    • chatbot,
    • Dialog System (DS or DiaS), including Dialogue Management System (DMS),
    • Conversational System (CS or ConS), including Conversational Agent System (CAS or ConAS),
    • text generator, including software source code, and
    • emulation of a Linux system,

    and therefore not merely only a chatbot, but a partial plagiarism of our Evoutionary operating system (Evoos),

  • synthesis of general knowledge, and also common sense knowledge, as well as basic functionality,
  • epistemology or theory of knowledge, and theory of learning (e.g. Piaget, assimilation, accommodation, equilibration, cognitive schema)
    See the chapter 4 Piaget und künstliche Intelligenz==Piaget and artificial intelligence of The Proposal and keep in mind that our Evoos added to the field of Artificial Intelligence (AI) the fields of Machine Learning (ML), Computational Intelligence (AI), Fuzzy Logic (FL), Artificial Neural Network (ANN), Evolutionary Computing (EC or EvoC), Affective Computing (AffC), Soft Computing (SC), Multi-Agent System (MAS), and so on.
    We also quote the following explanation: "Evolutionary psychology takes a novel approach to the problem. It says that there is an innate predisposition for certain types of learning. "Only small parts of the brain resemble a tabula rasa; this is true even for human beings. The remainder is more like an exposed negative waiting to be dipped into a developer fluid".[65 [Sociobiology: The New Synthesis. 1975]]" Sounds like the approach used for a Generative Pre-trained Transformer (GPT).,
  • Emotional Intelligence (EI), Emotive Computing (EmoC), or Emotional Computing (EmoC), and Affective Computing (AffC)
    See the last 2 sentences of the chapter 6 Ausblick==Outlook in relation to affective computing system.,
  • reflection of objects, including reflection of a user (e.g. user habits) and the public or a swarm of users (e.g. common sense knowledge), cybernetic reflection, and so on,
  • mimickry of objects, including human-like recommender system, chatbot, Dialog System (DS or DiaS), including Dialogue Management System (DMS), Conversational System (CS or ConS), including Conversational Agent System (CAS or ConAS), etc.,
  • and so on.

    OpenAI gets no license for SoftBionics as a Service (SBaaS) business models and capability models (SBaaSx), including Machine Learning as a Service (MLaaS) technologies (MLaaSx) and Artificial Neural Network as a Service (ANNaaS) technologies (ANNaaSx), because there exists only our original and unique OS, including all basic Ontologic Applications and Ontologic Services (OAOS) platforms, and SBaaSx is part of the subsystems and platforms of the exclusive infrastructures of our Society for Ontological Performance and Reproduction (SOPR).

    In general, such so-called Machine Learning Models (MLMs) and Large Language Models (LLMs) are based on raw signals and data, informations, knowledge bases, models, and algorithms, which are common to all members of our SOPR and even include themselves as a common good. Therefore, said MLMs and LLMs are in the exclusive scope of our SOPR, but not exclusive for OpenAI, Microsoft, or any other entity. According to the Terms of Service (ToS) of our SOPR OpenAI and all other entities have to provide all such MLMs and LLMs to our SOPR for integration with other MLMs and LLMs, if reasonable, then for their cost price (of their implementation and training), which are payed by our SOPR, which again means they would be offset against the overall damage compensations, including unpaid royalties, admission fees, as well as running royalties. This is truly democratic.
    In general, nothing will be

  • made proprietary, if it is based on our OS with the exception of our OS,
  • performed and reproduced under a different license, if it is based on our OS and if it is not authorized by our SOPR, and
  • done to circumvent, undermine, trick out, or infringe the rights and properties of C.S. and our corporation in any other ways.

    In particular, if that scam company refuses to comply with

  • national and international laws, regulations, and acts, as well as agreements, conventions, and charters, and
  • Fair, Reasonable, And Non-Discriminatory, As well as Customary (FRANDAC) Terms of Service (ToS) with the License Model (LM) of our SOPR,

    then it will get a cease and desist order by courts worldwide.

    The temporal advantage of OpenAI also shows that all responsible founding members and supporting entities only have and pursue the strategy and the goal to infringe and democratize the rights and properties, damage the goals and threaten the integrities of C.S. and our corporation as much as possible, and eventually to destroy and eradicate them.
    Obviously, we have here the next nasty and dirty Sam ...man and about the other very well known and already named bad actors we do not need to talk here anymore.

    See also the note ChatGPT infringes copyright of others and us of the 28th of January 2023 (yesterday).

    By the way:

  • We quote an online encyclopedia about the chatbot Xiaoice of the company Microsoft: "Xiaoice [...] is the AI system developed by Microsoft (Asia) Software Technology Center (STCA) in 2014 based on emotional computing framework. [...]
    [...]

    Application
    Poet
    In May 2017, the first AI-authored collection of poems-["]The Sunshine Lost Windows["] was published by Xiaoice.[12]

    Singer
    Xiaoice has released dozens of songs with the similar quality to human singers, including ["]I Know I New["], ["]Breeze["], ["]I Am Xiaoice["], ["]Miss You[",] etc. The 4th version of the DNN singing model allows Xiaoice to learn more details. For example, Xiaoice can produce this breathing sound along with her singing as human.[13]

    Kid Audio-books Reciter
    Xiaoice can automatically analyze the stories, to choose the suitable tones and characters to finish the entire process of creating the audio.[14]

    Designer
    By learning the melodies of the songs and the landmarks about different cities, Xiaoice can create visual artworks of skylines when listening to the songs related to this city.[15] Skyline Series T-shirts designed by Xiaoice have been jointly launched with [a company] and been sold in stores.[16]

    [...]

    AI being
    AI being, that is super natural virtual human, the AI being concept proposed by the Xiaoice team in 2019 [17]
    According to the "White Book of China Virtual Human Development Industry in 2022" released by Frost & Sullivan and LeadLeo, the white paper cites the six elements of AI being proposed by the Xiaoice team, including: Persona, Attitude, Biological Characteristic, Creation, Knowledge and Skill, believes that AI being has more potential and can represent a trend than relying on CG modeling and Meta human driven by the man in the middle.[18][19][20][21]
    [...]
    Bill Gates mentioned Xiaoice during his speech at the Peking University:
    "Some of you may have had conversations with Xiaoice on Weibo, or seen her weather forecasts on TV, or read her column in the Qianjiang Evening News."
    '"Xiaoice has attracted 45 million followers and is quite skilled at multitasking. And I've heard she's gotten good enough at sensing a user's emotional state that she can even help with relationship breakups."[22]
    [...]"
    We also quote an online encyclopedia about the chatbot Tay of the company Microsoft: "Tay was an artificial intelligence chatbot that was originally released by Microsoft Corporation via Twitter on March 23, 2016; [...]
    [...]
    The bot was created by Microsoft's Technology and Research and Bing divisions,[3] and named "Tay" as an acronym for "thinking about you".[4] Although Microsoft initially released few details about the bot, sources mentioned that it was similar to or based on Xiaoice, a similar Microsoft project in China.[5] Ars Technica reported that, since late 2014 Xiaoice had had "more than 40 million conversations apparently without major incident".[6] Tay was designed to mimic the language patterns of a 19-year-old American girl, and to learn from interacting with human users of Twitter.[7]
    [...]"
    Comment
    Double Bingo or Triple Bingo???
    Another time that we got Bill Gates by the balls. That trick with stealing our properties by a camouflaged development in Asia did not work either (see also the (temporary) message Oh, what ...? of the 20th of January 2018 once again). And we already have solved the whole puzzle around the years 2016 to 2018, which took a few more years to fully prepare and present the whole case, but is now ready for processing at the courts worldwide in case of Microsoft, its founders, its managers, as well as other companies, founders, managers, and so on. And with our actually implementation of Artificial Intelligence 3 (AI 3) and training of an Artificial Neural Network (ANN) we even get many other entities by the balls, of course completely free of hallucination.

  • As we always said, one cannot steal our OS, because it is just too creative, ingenious, original and unique, and so on. And there will be no rip-off 3.0. And we wish all entities concerned a very nice time with the FBI and other law enforcement authorities worldwide.
  • A law suit against many individuals will also be about hate crime against C.S. and our corporation, which also seems to be religiously motivated.
    Somehow, this motivation also provides another evidence, that our OS is an original and unique work of art and enjoys copyright protection worldwide in whole or in part.
  • They also highjacked the Apache Foundation, the Linux Foundation, and so on for pure for profit activities, but this is a matter for other lawsuits.
  • 30% of 42 U.S. Dollar makes 12.60 U.S. Dollar for the writer of an OAOS. Ask a chatbot and also read once again the messages SOPR # of the 4th of January 2023 and Other app stores than our MfE prohibited of the 5th of January 2023.
  • We will demand triple damages or 300% of the revenue generated with our works of art and everything else from an entity, that still refuse to comply with
    • national and international laws, regulations, and acts, as well as agreements, conventions, and charters, and
    • Fair, Reasonable, And Non-Discriminatory, As well as Customary (FRANDAC) Terms of Service (ToS) with the License Model (LM) of our Society for Ontological Performance and Reproduction (SOPR).

    If this measure is not sufficient to enforce all the rights and properties of C.S. and our corporation, then we will initiate a cease and desist order by a court.

  • No agreement, no deal, no discussion, no negotiation, but only pure law and order and crystal clear ToS. This is truly democratic. And a show of our Silicion Valley competence and quality. :)
    We warn every government against any attempt to bend law and order, specifically
    • national and international laws, regulations, and acts, as well as agreements, conventions, and charters, and
    • Fair, Reasonable, And Non-Discriminatory, As well as Customary (FRANDAC) Terms of Service (ToS) with the License Model (LM) of our SOPR.
  • There exists no Azure supercomputing infrastructure, but only our Ontologic Net (ON) with our nodes of our Interconnected supercomputer (Intersup) and the exclusive infrastructures of our SOPR. Microsoft and Co. are only allowed to adapt their businesses and transfer their accrued talents and competences to our new environment, which means to provide their applications and services as OAOS in our Ontologic Net (ON), Ontologic Web (OW), and Ontologic uniVerse (OV), which collectively are our Ontoverse (Ov) and New Reality (NR), but they are not allowed to perform and reproduce the related subsystems and platforms of our OS with its Ov and therefore they are not allowed to operate and manage nodes of our Intersup among many other parts of our OS.
  • The crazies implemented Crazy AI.


    30.January.2023

    Style of Speed Further steps

    In the last week from the 25th to 30th of January 2023, we developed and designed a variant of a vehicle to make it operational on a large scale.
    Models have been tested for more than 3 years and proven its very astonishing performances and very high safety, which must and can be seen to believe.

    Roboticle Further steps

    We developed and designed basic variants of service robots, including delivery robots, which solve a basic problem.
    The question is now which variant is more advantageous in the practice.

  •    
     
    © or ® or both
    Christian Stroetmann GmbH
    Disclaimer