 Hello, hello, my name is You know, you know, I am from pristine machine. I'm I'm a founder of the company Let me tell you a brief story right now a couple years back I was sitting at the At the form of the open group responsible for a security for the IOT And discussion over there was it is really very difficult to manage it for so many For us so many the devices are various and it could be get into the millions billions, etc so We did had experts there from from a various aspects of the field and We were trying to bring all different protocols and standards into into the new upcoming open group standard and and One of the ideas Questions, which was brought up is asking is it really possible to assure? IOT swarm against a security Bridge To make it compliant with us with a security and the Consensus was now so I Mean it was actually kind of a very provoking question and and Basically is a goal of our company right now is to prove it wrong and actually we were able to Create invent a technology, which can assure security for unlimited number of devices I Mean a same story Was with with databases a few years back. It used to be here. I can kill and and then suddenly They were all growing in size and the only way to possible to do it was Through the set operation B3, etc. Informix was born Oracle, etc so it is possible to address a problem and to change it to the Frame of mind, I mean open stack is actually huge step in IT Infrastructure and not only in IT infrastructure as a way we understand open stack It is actually a distributed OS Which is capable to recreate unlimited amount of resources and to manage them in traditional way Through the policy managed by the assets through the SELs the same it was done in data centers before is truly impossible so What is our approach is? is to pristine machine approach is is to Create a policy and find a way of how it could be distributed and to embed it into the each node We were able to apply it Before open stack Operating system just as well on the end nodes Windows Linux arm under oil it and we are actually thinking also to embed it into the into the Micro micro devices as well so When we looked at the open stack with we were looking we were trying to Keep open stack open stack so that every API is still possible all of the vendors Equipment it would still work with that so the Client of the open stack can choose the best what that required was to find An API which is possible to run and to manage every single node And such API which we chose it was actually bare metal API So obviously not every open stack cloud is a bare metal cloud so what but we were able to actually use open IP MI and We are also injecting our own OS Very seen OS with part of virtualization Under every node and we can actually with a very simple install which will show you In a bit we can actually Inject that policy into the every node and to the assure that every single node of the open stack Where they tease a compute node or storage node is compliant with a policy chosen so So so so I mean if you would Try to look a type of policies So I mean let's look at how we are actually doing it on on on a picture so on a picture we have a cloud open stack cloud and Then after the install around every node Of the open stack we do have a scene layer It is our pristine OS But but to add but to admin of the cloud it is just still the same opens a cloud It still has the same APIs same upgrades, etc. Linux Fedora Ubuntu I mean it still all works because of injection of our layer so One of our backgrounds before and and we are not Company of just youngsters. We do have a youngsters also as well. We do have some old people who were Involved in the in infrastructure of large companies different IT projects. I mean I worked for it at GM hosting one of our Encryption Guru is actually a Wide beard of the IETF and he is actually co-author of the original internet spec and inventor of our Wi-Fi and the as As as as as their things as well. His name is Robert Moskovits We we also got input from Different people in in field and I say security orc of Freedom tower and we did got some input Very important input into a swarming swark swarmp computing from our people at the Berkeley and And MIT so I mean our goal is to make it is to create is to create a Very transparent layer, but making sure that it is not a niche solution that it could actually cover all Palacy needs of company and that could be a big big customized and injected into the our pristine OS layer So I mean if you look at as as a deploy process, I mean What we see right now in open stack uses TFTP a different protocols and Those are not secure and even so it is possible to segregate it into a network I mean our entire goal is a short is a short security So I mean every protocol every action is actually assured encrypted and it is fully Automated will show in a demo that it is very easy to Install so many if you look at the original bare metal Deploy it is done from a console. It does call tea FTP and Somebody has to create all of the VX lands and to all of their Other things so I mean basically we take the same process and it's still push of the button from a horizon Console, but we are encrypt all of the traffic create all of the subnet etc So what Major advantages major. I mean we do have a different policies and they use cases, but at all Most common one and which are in the news is actually encryption of traffic protection traffic in data in transit even if it is going over the internet between a different cloud or the different nodes and The other one is to if we do have a Deter of company which is classified it should be state classified and not be able to to leak it outside So I mean we can actually create policies of such that Any node of the ecosystem with that data will not be able to leak it outside of the the ecosystem I Deployment itself is extremely easy. I mean if we'll just run it right now. We'll show it to you. I mean at first We're just logging into our console It is It is all common. I mean all this thing is not really pristine things It is just open stack admin stuff which I can exist in Instances it is right now all empty It is a new Dev stack So we do same from a console as well It will be in a second and as you see it is all brand new Open stack right now Which will have our image installed there Imaging image of our pristine OS which will be injected into the each node So I mean right now it is all empty and right now will do We'll do a deploy and we'll actually show what happens in the back end because I mean from user really it is only Choose a new node install it and it will just install itself So I mean right now we'll check the agent in its logs We do have logging off all of the activity possibly for money in getter in us Is required some so many It is a tail of bare metal doll doll Deploy it is right now kicking off and right now it is a change we did created it a node and it is a fully into integrated into the Both network which is a private private private and none management Network as well So right now we are just just connecting to our agent to just see what's happening there And it's just a login and it is all will be on console right away launching a new instance It's in process as Anybody anybody's doing it. It's not a custom dashboard for the I mean Here's just for admin. It's just a plain open stack choose a network launch a Few more logs weights and that will be done basically So I mean for a user. It is a pure open stack pure OS right checking it but on policy level it is all assured. I mean Policy it is not on same network. It's not physically available both to a guest OS and one of the big achievements of the hour R&D even so it is a them multi layer OS Lost of speed is like only only only a few percent touch point on them On networks side Because it is a pass through so and it we just seen it is being done and that's it pretty much So Okay, so basically What we are trying to achieve is to make open stacks are simple simple and the enterprise ready So I mean if there are any new questions, it will will answer it right now or maybe afterwards So I mean it is installed It's finished We're looking afterwards and the net will have everything installed memory use I mean I Okay Thank you very much