VIA x386 The Zhaoxin KX-U6780A a redesigned CPU for RISC-V to support Intelligent OS?

3 components of the design of a computer you need to own the intellectual property.

1) CPU which you now own VIA.

2) GPU is still missing.

3) Chipset including all components eg Sound, Network, WiFi etc.

4)Optimising all memory components to achieve maximum I/O for memory address registers and instructions sets.

The best path is still open source and if you are able to merge all your hardware on RISC-V by 2021, software can be easily any Linux OS on x386 and as long as I can ensure compatibility with my Intelligent OS, there will not be a lack of technology innovations and you might end up being ahead depending on your R & D resources you commit. This I can easily help you to achieve supercomputer status.

Singapore researchers tapping quantum cryptography to enhance network encryption

This new crypto standard is unhackable and forms the cornerstone of my Blockchain 3.0 without using keys, even a supercomputer will have a hard time figuring out it’s secrets.

With *QKD technology, the laws of quantum theory — with the highly sensitive nature of quantum signals — are tapped to distribute private keys over an insecure network. They can detect any attempts on eavesdropping, offering a secure form of encrypted communication, according to the Singapore organisations. 

“The secret key is transmitted using a sequence of carefully prepared single-photon quantum signals. If the secret key is intercepted, the quantum signals will be disturbed and keys will be rendered useless,” they explained. “This enhances the security of digital communication as data cannot be intercepted or eavesdropped.”

The main drawback of Quantum Key Distribution is that it usually relies on having an authenticated classical channel of communications. In modern cryptography, having an authenticated classical channel means that one has either already exchanged a symmetric key of sufficient length or public keys of sufficient security level. With such information already available, one can achieve authenticated and secure communications without using QKD, such as by using the Galois/Counter Mode of the Advanced Encryption Standard. Thus QKD does the work of a Stream Cipher at many times the cost. Noted security expert Bruce Schneier remarked that quantum key distribution is “as useless as it is expensive”.[1]

Quantum key distribution is only used to produce and distribute a key, not to transmit any message data. This key can then be used with any chosen encryption algorithm to encrypt (and decrypt) a message, which can then be transmitted over a standard communication channel. The algorithm most commonly associated with QKD is the one-time pad, as it is provably secure when used with a secret, random key.[2] In real-world situations, it is often also used with encryption using symmetric key algorithms like the Advanced Encryption Standard algorithm.

Contributed by Oogle.

*PS I created the concepts but I did not invent this technology. I can easily modify it for WiFi, LiFi, LTE, CDMA or any networks. This also forms part of my consensus mechanism except it is on a Distributed network based on DNS client using Mac address. Who knows how to decipher it? 

I have perfected the Fully Optimised System where I Max out everything beyond Moore’s Law

Acer Laptop ES1-132-COCP Technical Specs

Intel CPU Celeron DuoCore

Dual Channel 2GB DDR4 Ram (Original 1GB DDR4 Ram)

Storage eMMC 32 GB

Intel Intergrated Graphics

OS : Windows 10 Home

Fast I/O Maximised

Virtual Memory disabled

Windows Update Disabled due to background processes

Basic Tasks only allowed

No Over Clocking

Performance Benchmarks on everything : Research Secret

Reached beyond 100% increase with

Next to experiment on Rasberry Pi 4 8GB Clusters on memory management and threads

Finally on RISC-V processors to modify configurations and performance