13 Oct 2016
Use our API proxy for your mobile video applications instead of directly connecting to Facebook Live API. The proxy ensures your video is uploaded to Facebook Live, as well as up to 10 other locations, depending on how important syndication is to you. With the numerous claims against Facebook regarding censorship of videos we know we can't trust them, but with the network effect present we also can't ignore the benefits the platform offers for spreading the message.
We offer ten alternate locations for your video to be uploaded to in real-time, including Youtube, Vimeo, as well as more storage-oriented locations like Amazon S3 and Dropbox, allowing access beyond just video and social locations. We recommend hitting all the top video sharing platforms, as well as 3-5 standard storage locations, which will then allow for further syndication using Content Delivery Networks (CDN).
Depending on the sensitive nature of the content, and the political influence that target(s) possess, we recommend syndicating as many possible locations as you can afford. If you are restricted to just using the Facebook application to make this happen, we recommend using our local area network proxy, which can act as a proxy for your entire network, and route a copy of all videos to the locations you need.
Do not rely on Facebook as the only source for storage and distribution. You need the network effect Facebook offers, but they cannot be trusted to be the sole gatekeepers of the video that is defining our times--they have made this clear.
11 Oct 2016
We are the Waze for drones. Instead of routing cars and trucks we provide routing options for the commercial drone industry. Drone routing adds another critical dimension to the process--elevation. What fixed objects are in the way, like buildings, bridges, and trees. What temporary objects are in the way like cranes, cables, and other drone traffic. There are an increasingly amount of objects in the way of the fast moving drone sector.
Real-time, near real-time, and historical drone routing data has proven to be a 10 trillion dollar industry. With over 30 billion commercial drones in operation, the need for routing solutions has reached critical levels. Real-time tracking systems have been in place for commercial drone operators for over three years now, adding to the amount of data we process, and share each day. Thanks to the use of drone technology new construction is mapped each day--adding to the fixed layer of our maps in real time.
What you are looking for is our historical data solutions, which includes the rating for each zone on the map. Historical mode for the API is not meant to be used by drones during flights but is designed for use in a system to system integrations, primarily used by the insurance industry. The historical data includes all drone accidents back to 2018, which should provide what you are looking. Let us know if your current access levels to the historical drone data give you everything you need--if not we can bump you up a level or two.
07 Oct 2016
Our speciality is in crafting creative Internet of Things hack stories. Do you want your competitor to think their products are insecure? Do you want the free publicity that can come with a security breach? We are the creative team you are looking for. We have the experience to help you craft and execute exactly the perfect scenario and help you achieve your goals.
In today's online volatile cyber security landscape the stage is set, all you have to do is seize the moment. Our most popular package is the perceived external threat solution, where we take one of your products, stage a security incident and leak it to the online folks. There is no better way to light the fire under your team's ass then to make them think there is a security hole in the solutions they are developing.
The second most popular package is the competitor misinformation play. We will target one of your competitor's products, and plan just the right security incident for the situation. All we do is leak the information, and the current journalism and blogger landscape takes care of the rest. Cybersecurity fears even trump those of the environment and terrorism, making it the best way to get publicity for your company. Remember any news coverage is good news coverage, it just depends on how you roll with it.
Once we receive your down payment, one of our creative directors will reach out to you with a full list of packages, as well as non-disclosure information. The turnaround for a project is usually about 2-4 weeks, but we do have packages that will take longer. We look forward to being your IoT cyber security creative partner, and look forward to a long and healthy relationship.
22 Sep 2016
Yes, we are fully aware your desires to move forward with your self-driving car initiative, and if you want the US government as an ally in these efforts, we will need something from you in return. You know that messaging app you have been talking about releasing? The one that promised end-to-end encryption? Well, we are going to need you to back off that just a bit if you want our full support of the self-driving car.
As you have probably heard we are not that big of fans of end to end encryption when it comes to messaging applications, and to avoid any further messes in the public sphere, or in the court of law, we recommend you not move any further in this direction. We are happy to support your efforts when it comes to being the leader in the self-driving automobile space, but we are only willing to do this if we aren't battling you on the messaging front as well.
If you would like to go further with your new messaging applications, and maybe even give us a backdoor, or allow us to directly access messages via an API, I'm sure there are other deals in the pipeline we could also expedite. We appreciate you working with us on this, and I'm sure the future of the self-driving cars will be bright, with federal regulation being as minimal as possible.
19 Sep 2016
Our mobile phones have taken common everyday transporter technology and put it in service of the public out on the street where it matters. Everyone is aware of the clueless mobile device user out on the street, stopped in the middle of the sidewalk, blocking the restaurant door, and standing in the street while staring at their phone.
Nothing is more frustrating than encounters with these clueless people, while you are just trying to get through your day. Now for a low monthly subscription, you can have these people transported out of your way in real time. Transporter phones have 90% market penetration, and by default users have opted in for suggestive transport--which we'll use to move them just four or five feet in either direction, making sure they aren't in your way.
Of course, this is only done when a user is completely focused on their mobile device, and not engaged with other people, or the real world. Users will be moved safely, and our research shows that 80% of them never even notice they have been moved, as they so tuned into their device. This type of algorithmic, local area transport has had the same effect on people as we've seen with vehicle traffic--keeping both the sidewalks and the road ways clear of the most dangerously clueless users.
The entry level subscription is only $200 / month, and you get 150 active transports during each 30 day period. We keep track of all transports that occurred and provide you with a dashboard so you can see the obstacles we've cleared for you on any given day. If you sign up now, we'll sign you up for a free 30 days of Workplace Transport (TM), helping people avoid obstacles at work--help you achieve a frictionless work experience everyday.
02 Sep 2016
I am sorry, but your codebase has been disabled, due to failing multiple software patents checks--we cannot allow your software to continue operating in any environment. Apparently, sometime during your development, QA, and bringing live to a production environment, someone on your team did not run the required regulatory checks. We are sorry this has affected over 3M of your customer systems, but the responsibility was yours to ensure your product was compliant before updating on so many systems.
It is no secret that in 2026, that the USPTO has required ALL software developers to install a runtime patent checks in all web, mobile, and device based software systems.It doesn't matter if your software solution is "open source", or you perceive that your software is unique and original. Some say that the additional overhead introduced into the software development lifecycle, as well as the additional checks needed in real time at runtime has ruined the Internet as we knew it, but all intellectual property must be defended for markets to work properly.
To begin unlocking your software you will have to have your lawyer prepare the proper paperwork, and mail it to the USPTO office for review. Once we review, a court date will be set where you can challenge the companies whose intellectual property you are being accused of infringing upon. If your company survives this process, maybe it will be a little more diligent about ensuring it is following the rules when developing any software in the future.
23 Aug 2016
After 10 years of heavy enforcement, we now consider Time to Live (TTL) validators as the default across ALL devices connected to the Internet. We acknowledge that there are the 5% of system violators, as well as the unknown violations, but we are now confident that all data, content, and other media's TTL will be respected across all compliant consumer, business, and government systems.
The first thing a TTL compliant systems does when receiving a request or sending a response is to check for the encrypted TLS identifier. If the encrypted TLS, or eTLS as it is call is not present, unreadable, or out of date, the event is logged and all associated data, content, or media is immediately destroyed.
For a five year period we would keep a copy of associated request and response bodies to make sure validation was 100% accurate, but for the last three years, all information in violation has immediately been destroyed. Through TLS enforcement, and augmenting all of the algorithms that govern our lives with TLS, we have been able to achieve an online experience that better reflects our physical world.
05 Aug 2016
We fully understand that many people hold a belief that what happens online should be ephemeral, and go away after time passes. However, it is our belief that this is a very misguided view of our digital world, and ignores what is most important for you, your friends, family, as well as the collective history of humanity.
In 2042 we all see history very differently than we did in the early days of the Internet. Thanks to systems that were put in place by the National Security Agency back in 2008, we now have every citizen's online, and in some cases offline activity going back to 2010.
These systems were classified for the last 30 years, but with recent shifts in public policy are now accessible to everyone via an easy to use API. All you have to do is sign up for an account, and you will automatically be given access to your profile. If you are seeking access to other individuals, business, institution or government agencies profile you can apply for access using our online form.
With the abolishment of a citizen's right to data privacy and ownership in 2038, it is now up to your state, and the jurisdiction your employer is incorporated in when it comes to determining who has access to your data. It is likely that your social welfare (housing, food, healthcare, and education) is being subsidized by access to your information, both current and historical, and you most likely are not entitled to any rights around your data.
It is fortunate that the NSA had this vision of the future back at the beginning of the century. We saved everything knowing that some day you would be needing it. Without it, it is likely that the social welfare framework you enjoy today would not be in place to take care of you.
02 Aug 2016
The final date has passed, and the federal law went into effect requiring all companies selling technological solutions, to register their claims with the Federal Technology Claims Directory (FTCD), which now operates 100% on the blockchain.
Gone are the days where you can make a wild claim as a startup or tech blogger. It is ironic that the one piece of technology which seemed to have some of the wildest claims being made regarding its transformative powers would be used to regulate claims made about the potential of technology.
In 2023, if you make a claim about your companies technology, on the company blog, you have to register the claim with FTCD. If you make the claim, and the agencies spider finds it, you will be automatically fined $25.00 USD for non-compliance.
The law also extends to what historically has been some of the worst offenders--tech bloggers. Even if you are just regurgitating what was said in the press release, you need register the claim with FTCD as well--or risk receiving the same fine for non-compliance.
Each tech company and tech industry blogger are also required by law now to include the blockchain claims report on their company profile page, and journalists credentials page. There are additional fees involved if you are actively operating as tech company or blogger, without the required FTCD profile page disclosures.
It would have made much more sense for this to not reach the level of federal government regulation, but with the wild claims being made by technologists, their blind belief in their own moose diarrhea, and their unwillingness to accept the consequences of their ridiculous promises--there was no other way.
08 Apr 2016
Historically we have encouraged you to manage a very diverse, and carefully prescribed sales strategy, but this is a group wide shift in how will be selling ALL Time Release Technology (TRT) APIs. This is an end-times mandate, which means we are operating on a 10 year timeframe, scheduled for a 100% release across ALL implementations.
Our mission has historically been about injecting, and installing TRT APIs into targeted small businesses, enterprise organizations, educational institutions, and government agencies, being very strategic in our targeting of key players within specific industries. All releases have been done over time, releasing on an agreed upon date, making it look like a security breach, hardware or network failure. Now it is different, as we all learned in our training, a 100% release across all implementations means we are now in the last mile of our mission.
10 years from today, all APIs that have been installed, will release their embedded bot payload, delivering a kill blow for the local area network it operates on. Our data shows, that we have reached peak integrations as of today, and any further startup, small business, education, and government implementations installations will be useless. You are now ordered to focus 100% of your sales efforts on the enterprise -- all who refuse, will be defunded.
In April 2026, all installed APIs will be activated, and released. We are in the home stretch, and we can see the light at the end of the tunnel for all of our hard work. Every other aspect of our society has been sufficiently weakened, and the last center of power now lies within the enterprise. The hook has been set, and the enterprise are actively seeking API contracts--all obstacles should be removed.
It is all hands on deck. 100% of your time should be spent selling to the enterprise, increasing the number of integrations that you are responsible for. Remember, the more installations you achieve, the greater chances the entire system will be brought down. Our time is now.
06 Apr 2016
When our devices are installed to any network, they immediately get to work understanding the environment they are operating in. One important aspect of this is identifying all other networked devices, and identify all competitors. All of our devices are deployed with full competitor aware status, equipped to remotely assess the best strategy to achieve maximum efficiency within often very hostile environments.
Not all device responses are immediate, as they could spend weeks understanding network activity, developing an awareness of the surface area for each competitor device present. Each device is designed to leverage local compute, storage, and bandwidth resources, to deploy up to 680 separate bot responses (only limited in scale by local resources available). Depending on the device configuration, and licensing tier, bot responses are usually 40% defensive, and 60% offensive in our experience.
In addition to standard offensive, and defensive bot strategies, each device is also equipped with a low level EMP solution, which can strategically, or completely knock out any other device on the network for up to 60 seconds, during which all of our patent protected devices can operate freely, with all obstacles out of the way. EMPs are designed to resemble common network, and device problems, leaving no log file residue of the events -- something each device will assess fully.
When devices become available for cloud updates, either real-time, or manually by walking or driving a vehicle by, each device will receive the latest bot updates, as well as report back any strategy, and network intelligence gathered. In aggregate, we possess over 1.8 million assessments from almost 200 separate business sectors, providing a shared intelligence for any device that you deploy.
Get started today with our competitor aware, and bot equipped network devices, to help you get the advantage you are looking for, in any environment.
22 Feb 2016
The Internet has just reached new heights with the release of the worlds first Internet connected, remote farting device. The new Swift, Silent, and Deadly (SSD) platform provides you with one (or many) remote devices, WIFI communication, cloud platform connectivity, and mobile applications for IoS, Android, and Windows smart phones.
SSD devices look like your common, retail scented plugin device, so will often go overlooked in your normal household or workplace. They plug in to any electrical outlet, and have the ability to connect to the local wifi. Next year, we will be releasing a 4G wireless version that can be place anywhere, but for now you will need a wifi connection for all your devices.
The SSD manager application then installs on your IPhone, allowing you to register your SSD device (up to 10 per application), and manage its activity. Each SSD comes equipped with an audio library of up to 65 laboratory engineer fart sounds, and up to 150 individual "scent blasts (tm)". Currently we only offer a single scent, but our team is working to develop a wide variety of smells, that match each of our 65 audio representations.
Our basic SSD devices only have audio, and smell, where our premium edition has a WIFI enabled camera, which captures all activity, allowing you to precisely time your farts to match when a certain person walks by, is in the room, or possibly a pet is nearby. This also allows you to make the experience much more social, by publishing and sharing your SSD experiences with family and friends.
Following in the footsteps of timeless laughter tooling like the whoopee cushion, the Swift, Silent, and Deadly (SSD) device and mobile platform is sure to bring hours of fun to the home, your workplace, or even public spaces.
10 Feb 2016
True open data advocates all know that you can't trust the "open" data sources from city, county, state, and federal government anymore. For a period of about 10 years, these sources of open data were valuable, growing, and provided fuel for a new way for society to function. However in 2031, everyone knows that these sources of data are just useless trash piles of bad data, obsolete file and data formats, and just a toxic byproduct of a broken government.
While this evolution in open data is unfortunate, one positive side effect is that it has spawned a more valuable, passionate community of librarians, and data activists centered around making change using open data. By default, almost every library across the United States, and in most western countries, possesses a robust open data catalog, and library patron driven open data community.
It seems that open data and transparency was never really in the DNA of the enterprise, government, and even startups, but is something that was well suited for mixing with the existing DNA of the library community. Librarians have always been curators, and protectors of the worlds knowledge in the physical world, and is something that seems to be occurring in this new digital world we have engineered for ourselves.
31 Jan 2016
We are not awaiting for the latest equal pay act mandate out of the Obama White House to be enforced. We have long shared details on our employees, including what they are paid publicly via our corporate employee directory API. Our corporate directory API feeds the our web and mobile website with relevant public details about employees, but if you request API access, and are approved, you will now also get access to pay details for all of our employees.
If you work for city, county, state, or federal government, as well as a verifiable news outlet, non-profit organization, or institution, you can request access to this data. Really, we are open to anyone accessing, as long as we can verify who you are, your intentions around your research, and that you will respect the privacy and security of our employees. We strongly feel that this information should be public knowledge, yet we have to ensure the personal safety and privacy of our staff, something we know you will understand, and respect.
We feel a corporate employee directory API should be default for ALL companies--it just makes sense. Our directory API provides details on each employee, their role, and their position within our company. You can also retrieve historical data for each employee and role, seeing what positions our employees have worked in before, as well as who has filled specific roles, even if they have since left the company. This information has proven extremely valuable in understanding our own operations, as well as feeding independent studies, all the way to Department of Labor research and reports.
It was easy for us to turn on this pay data, because our company is API first. We do not have to wait for the government regulation to kick in. Also beginning in Q2, you will be able to also access all new job postings via our corporate API, pulling any openings we currently have, something that allows us to easily syndicate across thousands of job sites. Taking the Obama equal pay act even further, we will be sharing all applicant details for new positions that we are hiring for, being more transparent around how we hire at our company.
As with our employee directory, we respect the privacy of our applicants, and restrict access to personally identifiable information, but share relevant details regarding their resume, work history, race, gender, and other important details. We feel this type of transparency will go a long way to help research groups, institutions, and government agencies better understand our hiring decisions, as well as help us understand our own bias, from an external perspective.
If you'd like more information on our employee directory, pay, and hiring APIs, you can visit our developer area, where you will find more information, resources, and of course where you can register for an API key. You will immediately gain access to publicly available data, and once we've verify who you are, and what your intentions are, then we can open up your access to more information that will support your work.
We are hoping our model for employee transparency raises the bar when it comes to fair pay, diversity, and other issues we face in todays business climate, sheeding a light on diversity, and equal pay issues across all industries.
25 Jan 2016
The latest upgrade to TKS-BMA, which was for the 1.2 release, was a complete success. There were two parts to the version release, but the primary objective was all about political party affiliation amplification and prioritization, with the secondary being focused upon Facebook and Twitter sentiment analysis--we need to make sure they were republican, democrat, independent, or libertarian.
You see, navigating the health insurance landscape is difficult enough, but when you introduce complications along the way, it becomes exponentially more difficult. The TkS-BMA-1.2 is all about maximizing in this realm of opportunity, to achieve the long term outcome we are seeking.
For the most recent upgrade, here is where we are focusing:
- Call System Extension - The call system is already expansive, complex, and a symphony of problem--how do we expand on this, and maximize the opportunities when we have a caller on the line?
- Payment Disruption - Are we maximizing the opportunities of lost, missed, and disrupted payments? When it comes to payments, there are unlimited possibilities for failed, lost, and misguided payments at the micro, monthly, and random levels.
- General Errors - Mobile and web-based errors are not a problem, they are an opportunity. There is no limit to the number of, and the barrage of errors that users experience--make the most of this.
- Info / Alert Overload - The number of emails, SMS, and social notifications we receive on a daily basis is already exploited by default. Like errors, this is an opportunity, not a problem, and should be exploited at every turn.
- Microservice Exploitation - As the platform evolves and expands its own base, there lies an opportunity for efficiency, as well as disruption. There is a movement going on to decouple infrastructure, and while this is a window for better delivery of services, it is also a window of opportunity to better impact the overall quality of service for specific individuals.
If you are receving this message, you've been briefed. This is not your usual system upgrade, yet the upgrade to ensure the system you expect for our targeted customer base. This is not about the deliver of our services as promised, but to deliver the quality of service expected in the shadow of the Affordable Care Act (ACA), aka ObamaCare.
The objective of this release is about the long term, establishment of our company within the industry, and disrupting Obamacare. it is about instilling the hatred of the mandate imposed upon the American people. It is about changing the belief that universal healthcare will save us, and return us back to the formal glory of the US healthcare system, guded by the caring hand of the insurance industry.
This update is not about disrupting the system, it is about exposing the flaws of government regulation, and the lack of belief in the markets to take care of the people. This is the about striking the algorithmic blaance necessary to bring harmony to our healthcare system in the United States, and beyond.
21 Dec 2015
We are a network of Internet of Things (IoT) device registration platforms. We all operate for different purposes. Some of us are looking to be drone or surveillance camera registries, while others are looking to provide access to weather, agricultural, or other environmental devices. The one common thread that binds us, we are all providing much needed registries for the growing number of devices that are being connected to the internet.
Depending on the industry we operate in, device registration is mandatory, or optional. While we do have manual registration solutions, which run as ready to single page applications as a service (SPAaaS), over 75% of registrations come in through auto-registration when devices are setup and activated. The popularity of auto-registration of devices in heavily regulated industries, and spawned a wave of auto-registration also being used in non-regulated industries.
Manufacturers have seen the value of IoT registries, and seen the benefit auto-registration plays when it comes establishing a much more engage device operator or consumer, but also that other 3rd opportunities available through our network of platforms. Resulting in a number of reasons why IoT device auto registration networks are working.
As soon as a device is plugged in, it registers itself with the network of choice, seeded by the manufacturer, but ultimately the choice of the device operator. This means the device is discoverable as part of the device operators network, and the larger regulated or unregulated industry it exists within. If a device operator chooses, the device can also be discoverable by a wider ecosystem of 3rd party providers who operate via the network of directories.
With all devices accounted for, the chances of devices operating with out of date software, vulnerabilities, and rogue devices from illegal manufacturers has been reduced to less than 10% of available Internet enabled devices. A registered device, has changed the IoT security discussion, and while challengers of this approach says it violates privacy, we feel it reduces the chance of exploitation, back doors, and unsecured devices operating on the open Internet.
Auto registration has allowed government regulators to get a handle on the fastest growing spaces like drones and surveillance cameras, enabling law enforcement to levy increasingly heavier fines for unregistered devices. In 2020, devices do not come to live, and connect to the Internet without having proof of registration--giving local, state, and federal government an unprecedented window into consumer, commercial, and industrial level device usage across many industries.
Consumer, corporate, institutional, and government device operators are held accountable as part of modern IoT device registration operations. If your drone is involved in the damage of property, or violation of privacy, you are held accountable. Device manufacturers who do not institute auto registration upon activation, have sanctions applied, not allowing them to see certain funding opportunities, or operate within specific jurisdictions.
The presence of the IoT device registration network has made the general public feel much better about the growth in popularity of Internet connected devices. It has also increased the overhead for manufacturers, and made privacy advocates more concerned about who watches the watchers, but the good brought by the network has outweighed the bad so far.
In 2021 and 2022, we are moving beyond justifying the need for IoT device registration, and addressing concerns for auto registration, and moving to more of a focus on transparency and privacy across all networks, and device operation. With all of the data we have on what IoT devices are in operation around the globe, and even in space, there is an unprecedented opportunity to help stabilize this fast growing layer of the Internet that is impacting our personal and professional lives.
If you are a device manufacturer and would like more information on registration for your device let us know. If you would like to see a registration network exist for an existing device category, please let us know--make sure you look through the forum first, and ensure work is not already in progress on such an effort.
04 Dec 2015
Your company has had its third strike. Your first security breach was in January of 2018, with the second only six months later in June, and the last came in February of 2019. Your company has shown that it just doesn't have what it takes to secure your users data, and there we are going to need you to have over the keys for your data storage, for a 12 month period.
During this time, you will access your company data via APIs, that are monitored via a professional data management organization, as well as state and federal auditors to make sure all required security and privacy procedures are followed. All server, database, and storage operating procedures will be documented, and shared with your organization when the 12 month period is complete.
We have assessed that 60% of your infrastructure uses APIs, so the switch-over to the new infrastructure will not be that difficult. Your company will have 45 days to accomplish the other 40% of refactoring all your software to use APIs. Part of your illness within your organization was that this 40% of your operations was technical debt that your organization refused to bring up to speed--resulting in several large breaches.
When we hand your data storage infrastructure back to you, we will audit for another 18 month period to ensure you are practicing a 100% API strategy, as well as end-to-end encryption, making sure it is applied for all servers, storage, and in transit using SSL. During this 18 month period our auditors will assess whether you have the resources to bring your operations up to an acceptable level. If you do not meet requirements, the period can be extended, or your infrastructure can be ordered back into a forced-management situation again.
If you have any questions, please contact your case manager, and your IT operations manager will be in touch shortly with more details on the coming transition period.
05 Nov 2015
Los Angeles, CA: One of the leading API focused analyst and blogging networks, API Evangelist was acquired by the #1 enterprise software development company today for a total of $1M cash, and a 2.5 lease on soul of the founder Kin Lane (@kinlane). Unfortunately, as the founder Kin Lane was leaving the enterprise in 2010, he made a deal with Lucifer Enterprises Inc. that he could make a difference in the world—only partially delivering on this promise, an acquisition was inevitable.
From the outside perspective, and untrained eye, nothing will change on API Evangelist. However in reality, nothing that is said, will be as it seems. Up will be down, left will be right, REST will be SOAP, and XML will be JSON. Honestly, you should never have believed what you have read anywhere not he Internet, but you can be guaranteed it will all be complete bullshit from here on out, on API Evangelist.
The acquisition of API Evangelist is a reminder that everything is for sale. Nothing is sacred, and the only constant is that things will change. A five year run, is much longer than could have been be expected, and we should be thankful for any little bit of value we got out of API Evangelist. It was just a matter of time before the enterprise space set its sights on API Evangelist, let alone the founder would sell out so high up the food chain—straight to the devil himself.
27 Sep 2015
Application Programming Interfaces, or APIs, have always been a staple in the regulatory toolbox, but I am really impressed with API regulation in the last 18 months, spearheaded by the real-time regulation brigade (RRB). The RRB is an inter-agency group, that doesn't just establish how the government puts APIs to work in regulating all industries, but rather than operating in years, or quarters, it produces real-time, ongoing information on how industries and companies are working (or not).
I'm in charge of business pattern identification and replication, which means I identify the bar for what a common business looks like, when it comes to API consumption. You see, companies learned early on in the API regulatory years, who the regulators were, and who weren't, allowing them to tweak the algorthms to give different results depending on who is consuming via the APIs.
Our group's mission is to help our regulators act just as any regular customer would, consumign data, content, and other resources via banking, stock, and insurance APIs, allowing regulators to hide among the thousands of other regular customers. In 2026, we have be able to operate like we are a real business, with a real website, physical address, to be able to pass the inspection of the average regulated company. Otherwise our footprint looks like any other bot, or regulator, allowing companies to serve us tailored response, and sidestep our regulatory power.
15% of all companies who operate in any regulated industry are actually a business that is tailored, and operated as part of RRB operations. We regularly shutdown, and sell our companies to each other, making it look like they are real, even when they go away. We are always finding new, leading edge business footprints, requiring us to start approximately 300 new business in any given week, across a couple hundred industries.
While APIs radically changed how we regulate in 2018, in the last five years, regulation has become more of a cat and mouse game of API driven patterns. We can tell when a company identifies one of our shell companies, and begins changing their tune--the signals change. I see all of this as a game, where the RRB has to stay in tune with the latest patterns, and construct companies that put out just the right signals, in just the right way, so that regulated companies think we are their friend, ally, and potentially even a partner when we can.
The always shifting landscape of regulation in the modern age is what keeps my team engaged. Other groups enjoy the stability that regulation brings to industry, but our group thrives on the volatility and constant change introduced by having to stay three steps of ahead of the most savviest platforms in the new global API economy.
14 Sep 2015
The Dreamforce conference is happening this week in San Francisco, a flagship event for the Platform as a Service (PaaS) company. Salesforce is one of the original pioneers in API technology, allowing companies to empower their sales force, using the the latest in technology. Something that in 2015, Salesforce is taking this to the next level, with a handful of attendees, and partners in attendance at the conference.
Using smart pillow technology, Salesforce will be testing out a new set of subliminal mind control APIs. All attendees of the Dreamforce conference have agreed to be part of the tests, through their acceptance of the event terms of service, but only a small group of 500 individuals will actually be targeted. Exactly which attendees are selected will be a secret, even from the handful of 25 partners who will be involved in the test.
Through carefully placed hotel pillows, targeted attendees will receive subliminal messages, transmitted via smart pillow APIs developed by Salesforce. Messages will be crafted in association with partners, testing out concepts of directing attendees what they will eat the next day, which sessions they are attending, where they will be going in the exhibit hall, and who they will be networking with The objective is to better understand how open the conference attendees are open to suggestion, in an conference environment.
While some partners of this mind control trial are just doing random tests to see if the technology works, others are looking to implement tasks that are in sync with their sales objectives. Ernst Stavro Blofeld, CEO of Next Generation Staffing Inc, says "the Salesforce test represents the future of industry, and the workforce--this weeks test is about seeing what we can accomplish at a conference, but represents what we will be able to achieve in our workforce on a daily basis."
Salesforce reminded us that this is just a simple test, but an important one that reflects the influence the company already has over its constituents. The company enjoys one of the most loyal base of business users, out of all leading software companies in the world, and this new approach to targeting a loyal base of users, is just the beginning of a new generation of API engineered influence.