Monday , June 25 2018
Breaking News
Home / ICOs In Progress / Ideal Data Memory [IDM]

Ideal Data Memory [IDM]

Welcome my friends to a new interesting ICO today and let’s see their great idea:

Ultra-secure digital data storage service

IDM has its own licensed information security innovation called SIZE and is getting ready to dispatch another administration – a worldwide decentralized community that interfaces clients who need to store data securely and mineworkers who give memory on their gadgets to create salary. The task improvement group has made a working model of a distributed storage benefit called BoobookBox. The administration was propelled in 2015 and has in excess of 2 thousand dynamic clients. The working model was propelled to test the innovation, both by engineers and outsider associations.

The project vision, mission & path

IDM centers around entirely characterized portions of the purchaser and business market, and exploits a focused market opportunity, to be specific the interest for secure information stockpiling.

Worldwide development of the IDM information stockpiling administration controlled by SIZE innovation, will keep buyers and organizations from losing information, and along these lines, from affliction misfortunes related with programmer assaults and burglary of data. The fundamental target of this undertaking is to raise reserves for the improvement and scaling of the current information stockpiling administration, consolidating SIZE, the inventive innovation of post-quantum encryption, with the blockchain.

The project product

IDM benefit gives a decentralized disseminated cloud information stockpiling framework where security against both misfortune and burglary of information gave by one of a kind calculation SIZE. To acquire the circulated information stockpiling, the administration will lease a free memory from miners for a reward. The excavators everywhere throughout the world would have the capacity to rent memory on their gadgets, including gadgets ethically and in fact out of date (old cell phones, dated hard plates) and get a nonstop compensation.

The venture licensed calculation SIZE backings a fantastic insurance of a document from misfortune (defilement) and can ensure a record recuperation from just 2% of the rest of the information. Organization of the administration will be overseen by blockchain innovation.

The SIZE algorithm

Inside the system of deletion channels display, another technique that remedies mistakes has been created. Amid the coding procedure, utilizing extraordinary calculation, equality information is produced. This equality information makes it conceivable to reestablish deleted channels. Any eradicated information can be reestablished utilizing diverse arrangements of unique information and equality information. The unwavering quality level controlled by the quantity of coding cycles. The higher is the unwavering quality level, the higher are the conceivable reclamation alternatives of the eradicated channels. The procedure where the unwavering quality level increments, and normally prompts the expansion of the conceivable reclamation alternatives of the eradicated channels is depicted as multidimensional equality.

The SIZE technology

SIZE innovation gives the most abnormal amount of security and privacy in the capacity and transmission of data. In this innovation, to secure data scientific calculations are utilized which are known in computerized gadgets. In any case, these tasks have never been consolidated to uncommon calculations in exceptional request of numerical activities ever previously and have never been utilized for the security of the data.

Four innate and indistinguishable characteristics of this innovation, each having special attributes, develop at the same time and make this innovation really unique.

These four characteristics are: Safety, Security, Data Governance, and Scalability.

1) Safety

The principle technique for accomplishing security is the replication strategy. This strategy infers making duplicates of a unique document to be put away moreover as a reinforcement. Should the first document for reasons unknown (harm to the record, disappointment of capacity, and so on.) ends up unrecoverable, a duplicate of this document can be utilized. Generally speaking, a unique document and its duplicates are put away in better places and on various gadgets.

2) Security

The security of information stockpiling remains for an assurance from unapproved get to. Without the approval, no people, either workers of capacity giving organizations, or legislative or non-administrative associations ought to have the capacity to get to the put away data. The security is typically accomplished by scrambling the put away data with extraordinary encryption programs.

3) Data Governance

Information administration is a particular procedure guaranteeing an accessibility of great information for the duration of its life cycle. The fundamental regions of information administration incorporate openness, convenience, honesty, and security. This includes setting up procedures to guarantee the formal administration of essential information resources by the proprietor. The motivation behind information administration is to use and refine procedures of anticipation and settling of different information related issues to enhance the nature of data accessible for use amid the basic leadership forms.

4) Scalability

With scaling up of a storage room, the parameters of SIZE innovation will enhance altogether. Consequently, the SIZE innovation is novel, since it is all the while shows the accompanying qualities:

  • Better specialized and efficient parameters for security than all current stockpiling techniques.
  • Incomparably preferable security parameters over all current crypto calculations.
  • Data administration in light of the inborn parameters of information and it is a straightforward, effortlessly configurable and re-customizable framework;
  • Scaling up a storage room and areas will just expand all stockpiling parameters.

The key features:

  • Highest level of information assurance – the supreme figure, the “one-time cushion” rule and the post-quantum level of security;
  • No “indirect access” – the working standard of the framework does not allow the production of a useful secondary passage;
  • The framework arrangement does not allow an effective (MiTM) programmer assault;
  • The administration does not work by means of DNS servers;
  • No metadata gathering – all metadata is produced and put away just on clients PCs and is never transmitted over the Internet;
  • Independent metadata administration framework enabling clients to oversee, ensure and look inside the put away data;
  • Fully secured individual correspondence channel in view of the project innovation;
  • Possibility for full recuperation of a record regardless of whether the 98% of put away information has been lost;
  • Automatic recuperation and replication of the data from untrustworthy capacity hubs, anticipating dependability of the put away data tumbling to a basic level where recuperation is unthinkable;
  • Inherent versatility. The community is effectively adaptable, contingent upon the quantity of dynamic stockpiling hubs;
  • Non-defenselessness to a danger of monstrous moving separations of capacity hubs in nations and on whole mainlands, which may occur because of catastrophic events, control blackouts, implementation of bans by governments or other able specialists, because of the dissemination of changed information for the capacity over all landmasses and all through the world;
  • Full independence of the ecosystem: the SIZE calculation plays out the observing of capacity hubs, the nature of individual hubs, their notoriety and circulation of information – while all settlements with clients and diggers are directed by means of blockchain;
  • Ability to produce income from renting unused memory on portable or home gadgets;
  • Second existence of memory, the likelihood of utilizing old and never again utilized gadgets;

The Project Roadmap:

2010-2017

  • The SIZE algorithm was successfully tested on CamGrid network
  • Foundation of Equivalence AG
  • An ultra-secure file-sharing program based on SIZE technology was presented
  • The launch of a publicly available version of the BoobookBox for business and private users.

2018

  • Technology has been successfully tested in European cybersecurity laboratories.
  • ICO for the global decentralized ultra-secure storage service IDM

2019+

  • Launch of IDM service
  • Development of the cloud blockchain platform (SaaS) based on SIZE data protection technology
  • Implementation of a marketing strategy for the promotion of the IDM service and SIZE technology
  • Development of a decentralized and distributed cloud platform (PaaS)

The Project Team:

IDM has been designed and created by a highly experienced team of technology experts. The team’s members bring together expertise that gives them a deep understanding of the challenges faced by many crypto enterprises including the legal, regulatory and compliance issues.

  • Drs. Daan Elffers – CEO
  • Iskender Syrgabekov – Inventor
  • Erkin Zadauly – Inventor
  • Tony Dremlyuga – CTO
  • plus the IDM team & advisers

Finance:

  • Token: Ideal Digital Memory
  • Abreviation: IDM
  • Platform: Ethereum
  • Accepting: ETH
  • 1 ETH = 100 IDM

More info:

Tokens Sale availability:

  • Start date: 28.May.2018
  • End date: 28.Jul.2018

 

===================================

About the author (BTC profile)

My passion for everything that means cutting-edge technology, blockchain, cryptocurrency, ICOs and not only made this article to be alive. I’m Alex Hummels and I wish you “happy reading” of others of my articles. Thank you all.

Your donations are highly appreciated. MEW address: 0x70912D44a60D099ECac3Ea568aEeB1dDCa2BA3A5

Check Also

Bitlumens [BLS]

Welcome my friends to a new interesting ICO today and let’s see their great idea: ...

Leave a Reply

 

Your email address will not be published. Required fields are marked *