Команда TECTUM является лидером в области технологических инноваций, создавая одни из самых важных продуктов в области программного и аппаратного обеспечения. Сейчас мы продолжаем эту традицию, так как наш мир переходит от сосредоточения внимания на новейших гаджетах к сосредоточению внимания на лучших, наиболее персонализированных впечатлениях.

В TECTUM исследования играют решающую роль в достижении этих прорывов. Наши исследователи, ученые и инженеры оказали влияние практически на все продукты TECTUM.

Наши ведущие отраслевые мыслители также вносят вклад в важные фундаментальные и прикладные исследования в различных областях - от здравоохранения до экономики. Они также обеспечивают интеллектуальное лидерство для лидеров бизнеса и инженеров в таких областях, как машинное обучение, искусственный интеллект и облачные вычисления. Команда TECTUM уверена, что поделилась этим фундаментальным, новаторским исследованием с миром. Мы делаем это с помощью выпускаемых нами продуктов и услуг, а также посредством партнерских отношений с ведущими университетами и исследовательскими организациями.

В TECTUM мы верим в ценность исследований, для нашей собственной работы и для мира, в котором мы живем.

Узнайте Больше в:

Marketnetwork платформа TECTUM создана на основе технологий нейронных сетей и машинного обучения и объединяет преимущества маркетплейсов, агрегаторов контрагентов, CRM систем и социальных сетей.

Пиринговая одноранговая нейронная сеть (нейрочейн) динамической коммутации каналов со скоростью обработки более 6 миллионов транзакций в секунду.

Каждый узел сети(нейронода) представляет собой элемент искусственного интеллекта, который определяет свое место (позицию, положение) в сети при каждой транзакции, в результате чего происходит переконфигурирование нейросвязей сети за счет изменения фактора нейроноды (синапс).

Is GRIG free to use?
GRIG application is free to download and free to use for all authorized users. You don’t need authorization to receive messages from authorized users though. Please visit our Products page to learn more about how to become an authorized user.
What is the benefit of buying GRIG Tokens?
A few. You would have to purchase and hold at least 1000 GRIG Tokens in your GRIG wallet in order to acquire a Promotional GRIG license, the Tokens are not going to be spent and you are free to sell them on one of Exchanges as soon as you decide to quit Grig, we have been working to make GRIG Tokens available on selected Exchanges. Please join our Telegram group to follow the news.
Is Grig mobile application available for iOS devices?
Not at this time, but we a recognizing the need and working on it. We are expecting for an iPhone App to be released before the end of first quarter 2019.
Is it free to participate in Grig Cracking Contest?
Yes, it is. However, you have to be an authorized user and participate in our Official Telegram chat. This is necessary because the transaction Hash will be published on our Official Channel in order to provide the transparency to the procedure. You can visit our Contest page for detailed information.
What are the chances that any of Grig Chat private messages ever get intercepted and decrypted?
None to our knowledge, that is why we position our product as the most secure messaging platform in the World today. In fact, we are unable to decrypt messages ourselves since all the messaging data is kept distributed only in RAM memories of multiple random Nodes – no Hard Disc will ever record a single letter of what our users chat about.
If there is no way to intercept and decrypt Grig Chat messages, how are you going to make sure the platform will never be used by a bad player?
If there is no way to intercept and decrypt Grig Chat messages, how are you going to make sure the platform will never be used by a bad player?
Some messaging platforms have been offering private Chat options with encryption also. What makes GRIG different?
There is a fundamental difference between pull through and core competency products: We have designed the know-how product tailored to the consumer that demands absolute and uncompromised privacy, that’s exactly why we have announced a Reward to the person able to break in our network and decrypt the messages.
Why is the analogue dial panel used to type in the PIN code?
DTMF is an analogue, dial-tone format not visible to most surveillance systems. It is transmitted over Network as a sound frequency and is not recorded by digital hardware.
Why do I have to use a picture file to type a text message over it?
We implement a sophisticated encryption logic which requires using picture format to transmit messages. The data can’t be intercepted with an attempt to decode, and even if it is intercepted it’s perceived as a meaningless puzzle. There is not decryption software nor hardware power in this World sufficient enough to handle such task.
Can I copy a text from another application and paste it into my GRIG text window safely?
No you can’t. When you copy text files, your device caches the data and keeps it. The text data can be intercepted then by the spy software on your device and sent out to the bad guys. Theoretically, you are safe when using brand new or fully reset device but we are not advising you to take such risks unless you are IT savvy enough to make sure you are working in safe environment.
What is asymmetric cryptography?
The principal of asymmetric cryptography is much easier to grasp once you understand the symmetric one. With symmetric cryptography the sender keeps the secret key and sends the encrypted file to the owner of the public key (address) – then the public key holder is faced with a problem of getting the secret key to the recipient over the Network, which is highly unsafe thing to do. With asymmetric cryptography it’s different, the recipient is the only one who possesses the private key and all senders have the access to the public key only, which they can use to encrypt the message but yet unable to decrypt it themselves. This way the private key is not transmitted over the Network at any point in time.
What is Single-device-single-time decryption event?
The SDST decryption event is an algorithm that makes sure the message is decrypted and viewed on single device and only one time. This way there is no opportunity for a bad player to pair the connection and clone the signal to another device.
What is cross authentication?
Cross authentication is the method when the PIN codes of both users to be entered in order for the message to get decrypted - the recipient’s first and then the sender’s. The recipient’s private key is activated only after the sender enters his(her) PIN code in. This is a final touch of unprecedented security level on our Masterpiece – the Grig Chat.