Technology and Business Proposal of Phantosys

Technology &Business proposal for IDV, VDI or Thin-client Solutions selection

IDV: Intelligent : ● Centralized management, but local execution ● Layered images delivered intelligently (layered images are virtual environments constructed on the fly that include system software, application software, application data, user preferences and user data) ● Intelligent device management that uses the capabilities available on the machine in the most intelligent way (Graphs would be processed locally, If a system has a high performance graphics system, for example)---- Issued by VDI: Virtualized Desktop Infrastructure: Desktop virtualization is software technology that separates the desktop environment and associated application software from the physical client device that is used to access it. Desktop virtualization can be used in conjunction with application virtualization and (Windows) user profile management systems, now termed "user virtualization," to provide a comprehensive desktop environment management system.( From Wikipedia, the free encyclopedia)

Thin-client:

A (sometimes also called a lean, zero or slim client) is a or a computer program that depends heavily on some other computer (its ) to fulfill its computational roles. (From Wikipedia, the free encyclopedia)

!

!

© Generated by Steven Chiu,Phantosys Ltd. Technology and Business Proposal of Phantosys

TABLE OF CONTENTS 1

! Page !1

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

Background ...... 4 Introduction of current major solutions in the marketing ...... 4 1. Citrix 4 2. 5 3. VMware 7 2. Phantosys Technology ...... 7 1. Challenges of Enterprises/Government/educational IT Environments ...... 8 1.2.2 Service Availability ...... 9 1.2.3 Service Performance ...... 9 1.2.4 Service Access ...... 10 1.2.5 Escalating Total Cost of Service Availability...... 10 3. The Phantosys Solution...... 12 1.3.1 How Does Phantosys Solution Work? ...... 14 1.3.2 Phantosys Solution Manages User Services Easily ...... 16 1.3.3 What's DOEc™ Protocol?...... 20 1.3.4 The Phantosys solution shows the following features: ...... 21 1.3.5 Phantosys Solution Compared to Other Computing Models ...... 22 2. System Introduction—Unique and outstanding technologies ...... 24 2.1. Autonomous Transmission protocol ...... 24 2.1.1. DOEc™ Protocol: “Please refer to “What's DOEc™ Protocol” on page 19 ...... 24 2.1.2 EDSC Protocol: Ethernet Disk Sector Communication...... 24 2.2. Cross-platform Cluster Files System—PIM ...... 26 2.3. Multiple OS, Nodes and Inheritance Technology ...... 27 2.4. Local HDD as cache ...... 27 2.5. Top secure level design ...... 29 1. How secure we are ...... 29 2. Three models for Option: ...... 30 2.1. Diskless — just like any thin-client (server-based )solution did...... 30 2.2. Local cache—HDD as cache ...... 30 2.3. All Local cache—Whole HDD as cache ...... 31 6. Input/output ports blocked ...... 31 7. Internal and external network completely separated centrally ...... 32 8. Mini OS guide control System ...... 33 9. Multiple authentication security mechanism ...... 34

! Page !2

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

10. No back door of detection or monitoring for any organization or government ...... 34 11. 801.1X authentication ...... 35 12. Friendly Interface, localization and useful DLL ...... 35 3. Application fields ...... 37 1. SOE be centrally managed, deployed and dispatched ...... 37 2. Mobile Devices Security Management ...... 39 2.1. Solution brief ...... 39 2.2. Design Concept: ...... 39 2.3. Running Windows Operation System on mobile devices ...... 39 2.4. Running MAC Operating System on mobile devices ...... 41 2.5. Solution advantages: ...... 42

3. FTP/Email/File etc. servers security...... 43 4. Website server security management—Machine gun ...... 49 5. Anti-Ransomware solution ...... 50 6. Education field applications --Computer room, Classroom, Administration...... 53 6.1. IT problems and management issues in current environment ...... 53 3.6.2 Digitalization of teaching in any classroom environment ...... 54 7. Phantosys advantages for education, training center ...... 55 3.7.1 SOE, central deployment and management via WAN or ...... 59 3.7.2 The virtual lab. And Experiment Environment Established ...... 60 8. Government/Enterprises/Defence fields applications ...... 66 4. Cost comparison and analysis ...... 73 4.1 ICT manpower saving ...... 73 4.2 Idle loss ...... 74 4.3 Licenses fee issue ...... 74 4.4 Power consumption in whole environment ...... 75 4.5 Invisible Intellectual Property Loss cost ...... 79 1. System requirement and supporting ...... 80 6 Criteria for handling our solution ...... 81 7 ROI analysis and Business Model ...... 82 8. Typical Reference Sites ...... 82 9.Future 84

! Page !3

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

Background

Introduction of current major solutions in the marketing

There are a lot of VDI, IDV or thin-client solution in the market. As we known major players are Citrix, VMware, MS etc.

1. Citrix

Citrix(NASDAQ︰CTXS) Is the leader of thin client solution provider of the world

Using ICA the remote display protocol, the client transmits user input to the server, and the server returns screen updates of the user interface of the applications from the server to the client

Citrix merged the virtual technology supplier Xen at US$ 5 hundred million 。Citrix attempt to involve in server & desktop virtualized marketing. Xen technology let a server virtualizes multiple independent PC to provide multiple OS+AP service on desktop. To solve the problems of thin client had before.

! Page !4

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

!

2. Microsoft Microsoft(NASDAQ︰MSFT)

Owned WBT technology. RDP is designed to provide remote display and input capabilities over network connections for Windows-based applications running on your Windows XP Professional desktop.

! Page !5

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

!

! Page !6

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

3. VMware

!

!

2. Phantosys Technology Our logical thinking is most clients are more powerful with lower price date by day and bandwidth is always very limit compared to application contents, its resolutions and

! Page !7

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

clients growing. Why not apply local client’s resources (CPU, RAM, HDD etc.) for processing. Therefore central management but local computing concept be implemented.

!

1. Challenges of Enterprises/Government/educational IT Environments In a fast-emerging knowledge economy, an enterprise IT competitive edge depends more and more on networked computer systems on which the work forces (users) relies to access information services. Information services are outcome of data being processed by applications running on that are in general categorized as servers or clients. Emphasis on data availability has placed server computers at the center of data processing in an enterprise IT environment, where mission critical data reside on well- guarded expensive storage systems such as SANs and NAS's while service availability is maintained by high-caliber system administrators and technical personnel. Such policy poses a problem in an IT environment where client computers get disproportionately low support in terms of both user services and user data despite their outnumbering server computers by orders of magnitude. With ever-increasing portion of enterprise value accounted for by user-involved knowledge work compared to traditional nonstop operation, the total cost of service availability to client computers (whereon users access information

! Page !8

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

services for knowledge processing) grows faster than the total cost of service availability to servers (whereon the enterprise operational data are processed) does. A skewed IT resource allocation will end up with higher total cost of service availability for the entire enterprise.

Along with the effort to reduce the total cost of service availability, an IT environment must accomplish the tasks of:

▪ maintaining, timely and cost-effectively, high user service availability ¨C including necessary system restoration after system failure ▪ support of users IT ad hoc requests for restoration/recovery of system integrity

▪ ensuring adequate service performance by balancing the convenience of homogeneous all-encompassed client service environment with the versatility of service varieties provided by prevalent powerful personal computers ▪ extending access to business-critical applications to dispersed users regardless of connection, location or device

These challenges have made enterprise-wide service availability even more daunting because prevailing computing models have skew emphasis placed on server computing.

1.2.2 Service Availability From a management perspective, traditional enterprise IT environment adopts costly process in its deployment of application services and in maintenance of service availability. Not only do administrators have to physically distribute applications to every client computer, but they also have to deal with tedious works of version control, remote support, multiple system configuration and data replication. A work force of thousands of users can easily put the cost of service availability out of control. In case of system failure on a client computer, current maintenance process always requires dispatching an IT professional to do field support including system restoration or system integrity recovery.

1.2.3 Service Performance

! Page !9

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

With more productivity tools delivering user services that demand computing power, the IT environment must be so constructed that user service performance is not sacrificed. The IT service's performance degrades dramatically when the administrator addresses his convenience of maintenance by providing users with a virtually all-encompassed computing services. On the other hand, users suffer service inadequacy if they are provided with the homogeneous minimally-included services such as office tools and web accessing tools only

1.2.4 Service Access Today's enterprise computing addresses more on mobile information access. In one form, it is the user service availability anywhere. Services should be delivered to where the user has access to the access device, instead of being confined to a specific .

1.2.5 Escalating Total Cost of Service Availability Service availability entails costs, which can be described by the term Total Cost of Service Availability (TCSA).

To make IT services constantly available to users requires one-time costs and recurring costs. The one-time costs include such things as initial acquisition cost for both hardware and software and cost for attaching the hardware to the enterprise IT infrastructure. The recurring costs pertain to installation/deployment and recovery work performed by the IT personnel, as well as the users' work losses during system downtime. In a typical enterprise IT environment, the recurring costs usually account for over 80% of the TCSA and relate essentially to management and delivery of services that vary with heterogeneous accommodating platforms ranging from full-PC such as powerful servers, desktops and notebooks to thin-PC such as Java-based network computers, Windows- based terminals and handheld information access devices. To aggravate the variety of service platforms, users demand more flexible and rich services on multiple platforms that may be dispersed around the world in branch offices, homes, hotels, customer sites and many other places. The exponentially growing complexity of service availability has added overwhelmingly to the TCSA.

! Page !10

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

TCSA

Each client or server computer’s TCSA can be calculated as:

client TCSA = Cost of acquiring the client computer and its application services + Cost of setting up the client + Cost of installing/deploying the client's services + Cost of updating/deploying the client's services + Cost of support to recover the client’s services + Cost of work loss to all users using the client

server TCSA = Cost of acquiring the server computer and its application services + Cost of setting up the server + Cost of installing/deploying the server’s services + Cost of updating/deploying the server's services + Cost of support to recover the server’s services + Cost of work loss to all users relying on the server

where the cost of work loss is the user productivity loss due to service unavailability:

Cost of work loss = User wage ´ Hours of service outage

and the Total Cost of Service Availability is calculated as: Enterprise TCSA = (# of servers) *(server TCSA) + (# of clients)*(client TCSA)

! Page !11

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

3. The Phantosys Solution The Phantosys is a solution to address the problem of escalating total cost of service availability to any IT environment where a lot of clients (PC farm) such as in governments, military, schools, enterprises.

The Phantosys Solution is essentially a storage area network addressing the availability of IT services to the users, by shifting focus to management of disks as media for service delivery. The rich set of powerful management tools for user disks facilitates significant reduction in the total cost of service availability to the users, a most desired feature in any IT environment.

Storage networking has been proliferating in the past few years, thanks to awareness of the crucial role of business data availability in an enterprise. The awareness stops regrettably at enterprise data availability only. With user-generated knowledge accounted for larger portion of the enterprise value, the user service availability becomes more important. Existing storage networking models failed to address these needs.

The Phantosys Solution minimizes the enterprise TCSA according to the following benefits or cost saving in the client side:

! Page !12

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

!

A further assumption of Nc = 100 units, install deployment cost = $50, update deployment cost = $25, #of updates = 8 (for the PC's life cycle), recovery cost = $50/hr, average downtime = 208hr (for the PC's life cycle), and user wages = $12/hr, then the total cost saved during each PC's life cycle is calculated as:

(install deployment cost) + (# of updates) * (update deployment cost) + (recovery cost + user wages)* (avg. downtime) = $50 + 8 * $25 + ($50/hr + $12/hr) * 208 hr = $13146

This is a significant saving considering the average cost of acquisition of PC hardware and software together with the initial setup cost is about $4000. The downtime-caused cost saving, which is $12896, contributes to the major portion of the total cost saved. It is obvious that the Phantosys Solution approach reduces the PC life cycle cost down to the initial acquisition cost and the setup cost plus negligible average installation cost and update cost when the total number of deployment is large (in our example, 100 units is large enough to pull the cost of installation and update down to 1% when averaged across the whole IT environment).

! Page !13

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

1.3.1 How Does Phantosys Solution Work? The Phantosys Solution is a platform for management and delivery of user services, using the popular disk-based computing model. It is a new architecture, by further layering the disk access path in the conventional disk-based computing architecture (Fig. 1) and placing management functions in the path (Fig. 2).

Phantosys solution can automatically swift from disk-based computing mode to DOE mode

!

Fig. 1 Conventional disk-based computing model

! Page !14

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

!

Fig. 2 DOE-based computing architecture

The Phantosys OS Server provides the storage space to be used by the client PC as a disk. These storage spaces are managed by the Server as an image file. The Server implements a rich set of management functions to manipulate these image files for all client PCs that have registered with the Server for operation.

• The system administrator can easily handle the deployment of services after software is properly installed or updated. • A failed installation or update of software does not mean a laborious rollback/ cleanup work prior to re-installation. • User service recovery means slashing the user's ill disk image to force using the parent image, in case of novice user who is fully incapable of the simple task of managing his/her own disks.

! Page !15

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

Properly managed disk image files manifests many useful features as desired by each user of the client PCs:

• A user is granted to version his/her disk at will. An analogy is to provide virtually unlimited number of disks for him/her to perform the "mount new disk"-->"duplicate disk"-->"unmount and put away the disk" system backup procedure. The conventional practice entails hardware costs (of the disks) and labor costs of physically performing the mount-duplicate-unmount procedure or at least, in the best case of doing it on the network disk, the cost of bandwidth (or of the user's precious time) of making duplication after elimination of the mount-unmount activity. • A user is given total control of his/her 'disks' in a extremely user-friendly way. No novice user will find managing his/her own disks intimidating. • User disk versioning is intrinsically the Windows directory branching and navigating within is trivial for average Windows users. • When coming to recovery of disk, it is as simple as dropping a subdirectory and moving up to the parent directory. The user no more have to go through the painful and lengthy "locate the lately put-away disk and mount it"-->"duplicate disk"-- >"unmount disk" procedure.

1.3.2 Phantosys Solution Manages User Services Easily

The Phantosys Solution manages user services to execute on the client PC. It helps the system administrator maintain easily the users in relation to authorized software services. As shown in Fig. 3, the status screen monitors both the Phantosys Server status (in terms of the resource being used) and the Phantosys Solution status (in terms of the network and storage access).

! Page !16

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

!

Fig. 3 Phantosys Server monitoring screen

Each user in an enterprise is usually assigned a client PC which can boot up using specified or selected disk image. The Phantosys Server manages user by specifying the user client's configuration, as well as controlling the operation of the client PC -- booting it up, shutting it down, rebooting it, or disconnecting it from the server. (Fig. 4)

! Page !17

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

!

Fig. 4 Phantosys Server user management screen

! Page !18

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

The Phantosys Server manages the computing services available to each user by specifying disk images the user can access. Based on each accessible disk image, the user can further manipulate versioning of the disk. Each version of such manipulation is termed a node. The Phantosys Server is able to manage the parameters specifying the node tree a user can manipulate. (Fig. 5)

!

Fig. 5 Phantosys Server client images & nodes management screen

! Page !19

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

1.3.3 What's DOEc™ Protocol?

DOEc™ protocol is a disk management and delivery protocol defined by Phantosys Limited. It is the foundation of the Phantosys Solution. DOEc™ stands for Disk-on- Ethernet Communication.

The fundamental principle behind DOEc™ protocol is the disk-based computing architecture, with service package managed and delivered as a disk, to a computing platform (client computer in the Phantosys environment), just like the conventional PC’s disk that holds services available to run on the PC.

The DOEc™ protocol essentially covers the presentation layer and the session layer of the seven-layered OSI model. It comprises groups of protocol command to do disk accessing and disk management (e.g. construction, destruction, resizing, duplication, access blocking, etc.)

Third-party tools can easily be implemented using the DOEc™ protocol for sophisticated management of the enterprise services designated for use by individual member of the work force.

On the client is an DOE™ disk emulator that communicates via DOEc™ protocol with the DOE™ delivery server, which most likely also hosts the management module. The DOE™ disk emulator presents, after getting the disk blocks from the server, a disk to its hosting client computer.

The DOE™ server manages a storage pool and dynamically constructs up, through the presentation and application layer, virtual disks for client computers that request for disk services. Upon receiving request, the DOE™ server will authenticate the user request first and start providing disk access for authenticated user.

Role of DOEc DOEc™ is flexible and powerful it allows access and management of virtual disks over the network. No specific constraint except security requirement is exerted on the transporting

! Page !20

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

or linking mechanism. So the DOE™ server and client module can be implemented on top of any kind of SAN architecture.

1.3.4 The Phantosys solution shows the following features: ! Supports any applications programs and operation systems: Full range of application services (business and personal productivity tools) can be deployed and delivered to run on any client computer on the Phantosys Solution.

! Supports clients of varying computing power: The Phantosys Solution focuses on managing services available to client users, instead of the client computing power.

The obvious benefits of Phantosys Solution is the reduced total cost of service availability (TCSA) for the schools, defenses dept., government, enterprise etc. any IT environment.

With centrally managed services and user-initiated self-maintenance, the enterprise computing network is easily maintained, resulting in high user service availability at very low cost. The saving is significant for schools, defenses dept., government, enterprise etc. any IT environment with thousands of user client computers to be supported.

What is Disk-based Service Provisioning?

Most of existing PC computers operates on the disk-based computing architecture. The directly attached storage device (DASD, or disk) provides a media for storing the data and software (OS and applications). It also serves as an optional system bootstrapping mechanism.

In essence, the PC’s disk is a self-sustaining service package as a whole. It contains OS and applications that are executed on the PC to provide services to its user. A user is only allowed services installed on the disk. This is the very first model of providing services via disk.

As the work force grows in parallel with schools, defenses dept., government, enterprise etc. any IT environment, the above described primitive disk-based service provisioning

! Page !21

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

model becomes hard for IT personnel to support. Installation of software onto each user disk (the application deployment process) is tedious and painful.

By virtualization of pooled storage into manageable disks, the service packages can be easily constructed, duplicated, deployed, all done centrally with no need of field visit on the client computer.

1.3.5 Phantosys Solution Compared to Other Computing Models

Three models are used in modern computing: (1) server-based computing, (2) network computing, and (3) traditional client/server computing. While all models have valid roles in today’s schools, defenses dept., government, enterprise etc. any IT environment, it's important to know the differences between them. In the traditional client/server model, processing is conducted on local resources. In the network computing model as defined by Sun, Oracle, Netscape, IBM and Apple, components are dynamically downloaded from the network into the client for local execution. In the server-based computing approach, users accesses business-critical applications without requiring them to be downloaded to the client. In the Phantosys Solution architecture, the applications are accessed just like they reside on the local disk, and employ full local computing resources for processing. This approach provides considerable saving on the total cost of service availability since service packages are centrally managed and delivered to requesting and authenticated user.

! Page !22

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

Some of the other differences in the four computing models are listed in the following chart:

Computing Phantosys Server-based Network Traditional Architecture Solution Computing Computing Client/Server Computing Processing remote disk access 1 0 0 % s e r v e r download for local local Model for local execution execution execution execution Hardware Diskless/disk PC thin client or diskless diskless PC Full PC PC (computing (full computing (sub-computing (full power) power) (sub-computing power) computing power) power) Native Device variable function variable or fixed Variable function variable (PC) function (PC<, NPC, (NC) function (PC)

NC, WBT) Application 2 - /3 - ti e r c l i e n t/ monolithic, component-based 2 - / 3 - t i e r Architecture server component or 2-/3- client/server tier client/server Native Window W i n d o w s Java applets W i n d o w s Application applications, applications or Java applications services applications, Java applets applets, etc. Service F u l l s e r v i c e s Limited services, Limited services, Full services Completenes delivered bandwidth hog bandwidth hog supported s usually excluded usually excluded Easiness of Full spectrum of Near-full spectrum of Specially designed Services hard Service off-the-shelf off-the-shelf services, services, centrally to deploy and Deployment services, centrally centrally managed m a n a g e d f o r manage m a n a g e d f o r f o r d y n a m i c d y n a m i c d y n a m i c deployment deployment deployment

! Page !23

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

U s e r s e l f - Fully empowered Limited user self- N o u s e r s e l f - No user self- maintenance user, able to do maintenance maintenance maintenance self-maintenance

Basically, the Phantosys solution computing approach delivers all the benefits of both host (server-based) computing and personal computing.

Host computing benefits

• Single-point management

• Universal application access

• Predictable service availability cost

• Mission-critical service availability

Personal computing benefits

• Thousands of off-shelf applications

• Full multimedia services provided

• Standards based

• Wide choice of peripherals

• Full compatible with any external devices

2. System Introduction—Unique and outstanding technologies

2.1. Autonomous Transmission protocol

2.1.1. DOEc™ Protocol: “Please refer to “What's DOEc™ Protocol” on page 19

2.1.2 EDSC Protocol: Ethernet Disk Sector Communication EDSC(Ethernet Disk Sector Communication) It is a protocol for transmitting data between DOE NetDisk Server and DOE NetDisk (network electric HDD) via the most standards, popular Ethernet. EDSC is compatible to Win2000,2003,2008,2012 /Win XP Vista/Win7/Win 8.1 and Linux all versions and work in very high efficient ! Page !24

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

which can provide Instant-on, instant backup, instant recovery system, centralized remote Ethernet hard drive maintenance and management (monitoring system information, hard disk space, network flow) and backup restore Mechanisms

Based on EDSC transmitting protocol, we implement Client SAN (Client Storage Area Network Architecture) structure which provide mainframe’s advantages---management and storage centralized) then keep distributed computing (local execution) characteristics of (apply full advantage of client's hardware resources). The performance and habit is same as standalone PC or station’s functions or compatibility. Fully implement CSANA (Client Storage Area Network Architecture) effectiveness to make whole performance, compatibility usage same as standalone PC linking to LAN or WAN easily. Due to providing SOE(standard Operating Environment) make maintain and update more convenient and efficient then reduce TCSA (total cost of service availability)。 DOE NetDisk Server infrastructure is based on DOS and Linux platform which is autonomous development with easy understanding, excellent anti-virus and secured characteristics. Its unique EDSC (Ethernet Disk Sector Communication) is operating at MAC layer(The next layer of OS operating system)—Not like ICA of Citrix which operating at layer upper than OS. Its principle and structure are totally different. Therefore security level is very distinguish also

Principle as below:

A P Application Program layer

O S Operation System Layer

MAC BIOS layer and EDSC protocol

From the structure, may know EDSC protocol at (Client Storage Area Network Architecture) can work well in Linux and Window even Mac too and be compatible to any application programs smoothly at al.

! Page !25

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

2.2. Cross-platform Cluster Files System—PIM

!

!

! Page !26

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

We integrate different operation systems (such as Microsoft and Linux) and application programs in different “group nodes” in one image in our own format (PIM). Those group nodes are like recovery points which deploy proper environment (OS+AP) to different clients on demand

2.3. Multiple OS, Nodes and Inheritance Technology

!

Each node operates independently but mother and daughter node can be inherited well For example, If node B be deleted, node C will replace B position and inherited what node B has (which application programs at group node B). Each node is recovery and booting point and can be boot from any node on demand or management.

Based on the unique technologies we have, we can keep the image in very compact (compared to another solution have to install application programs in one image) all the time to make each group node in very efficient

2.4. Local HDD as cache We make HDD as cache function, no matter in formatted partition or unallocated partition as well.

! Page !27

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

Sector table be randomly saved in server and clients, only integrate “Mini OS guide control System” then the client can be booted and worked properly.

Due to the technology we have, we can neglect the network environment (band width) but can keep the standalone PC’s high performance and keep in very high secured capability on client sites.

!

! Page !28

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

! 2.5. Top secure level design

1. How secure we are a) We design own our Autonomous Transmission protocol to run at Medium Access Layer (MAC) layer b) With diskless, local cache or full local cache (with AES128/256bit encryption) modes for potions c) Input/output ports block function can be manageable in LAN or offline mode in desktop or mobile devices. d) Inner and outer (internal and external) network completely separated centrally, clients are not capable to change the configuration at all e) Clients cannot edit computer name, user name, network bands themselves and integrated perfectly with AD f) 802.1X authentication supported

! Page !29

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

!

2. Three models for Option:

2.1. Diskless — just like any thin-client (server-based )solution did. OS+AP are in server not at client site but run in client site. While client disconnect to server, can’t work or find OS+AP at client site

2.2. Local cache—HDD as cache

Partial local cache: if data leakage is not concerned, may set client at this mode

Partial OS+AP be loaded into unallocated partition. While client disconnect to server, client cannot work and the image cannot be found at client site.

Full local cache: if data leakage is not concerned , graphic intensive programs be used,mobile devices(NB, Netbook) be applied and poor network environment is existed, may set client at this mode ! Page !30

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

Full OS+AP be loaded into unallocated partition. While client disconnect to server, client can still work well and the image cannot be found at client site (if AES 128/256 encryption tool or partial be applied).

2.3. All Local cache—Whole HDD as cache

!

a) If data be leaked from clients site is concerned

b) AES 128/256 bit encryption technology in unallocated partition

!

c) Clients can boot from ”local boot manger” or server authentication via network setting

Even HDD be lost, the data will not be stolen and kept secured firmly

6. Input/output ports blocked

All Input/output ports of clients can be blocked via MAC layer from sever in LAN or offline mode in desktop or mobile devices in different network environment (internal or external network or AD)

What devices we can block

! Page !31

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

! We block any input and output port from client site. Even storage from portable devices is NOT capable of applying into client site to access any data or information at all. 100% protection of data leakage from client site any more

7. Internal and external network completely separated centrally

Due to duty hour, clients be forced to select working environment which authorized roaming in LAN environment and accessing data/file servers. In the same time all input/ output ports are blocked. If clients would like to access , have to select another environment to boot. In the condition data/file servers accessing be blocked and all input and output ports be open as normal clients as well.

Therefore all secret data in file/data servers will not be stolen via Internet or client site any more

! Page !32

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

!

!

8. Mini OS guide control System

The boot menu of client is a mini OS guide which is 2M Micro core system, supports fundamental I/O and native ATA comment. HDD’s read and write must via PXE ROM driver

! Page !33

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

of Mother board linking to server via EDSC protocol and transmit by data frame and MD5 algorithm. It can guide client to selected/indicated group node (recovery point)

9. Multiple authentication security mechanism Client site not only identify via ID, password but also computer name, user name and MAC address etc. In some condition only can work in specific image

!

10. No back door of detection or monitoring for any organization or government Such mechanism has verified by xxxx special organization which has more than 2,000 mater hackers and IT experts for testing and verification more than 3 years.

! Page !34

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

Even now the organization is still verifying continuously. Therefore, our solution is top pure and clean for any customer applying.

11. 801.1X authentication

From Wikipedia, the free encyclopedia

! IEEE 802.1X is an IEEE Standard for Port-based Network Access Control (PNAC). It is part of the IEEE 802.1 group of networking protocols. It provides an authentication mechanism to devices wishing to attach to a LAN or WLAN.

This authentication is very rigorous one because no matter access LAN or WAN have to verify first. Most condition is requested by defense department or high confidential department from government or enterprises. We are proud of announcing that our solution supports the spec.

12. Friendly Interface, localization and useful DLL All control panel/console are graphical Interface which make user more easily to understand, control and manage the system

! Page !35

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

We can provide any language for the control panel/console on demand, Now English, Chinese (traditional and Simplified), Japanese, Korean, Portage, Spanish etc. are available

We provide DLL to any partner to develop his own API to fit any demand from local marketing. Programmer master one of language( C++ , VB ,C#) is avaiable to develop it well.

13. Watermark technology on any screen

In Phantosys architecture, data access on the endpoint is closely monitored and controlled by the Security Agent, together with a tightly integrated disk access structure. Both are in constant link with the Phantosys Server.

The Phantosys Client Security Agent (PCSA) initially shuts the Phantosys endpoint’s I/O ports via which data can transfer onto portable media that easily evades company scrutiny process and reaches outside. Portable media include hardcopy printout besides storage media such as DVD, CD, USB drive, etc. Blocking data transfer onto portable media prevents most of information leaks.

Non-portable I/O media such as display unit and local storage are under PCSA’s direct control. A watermark shown on the display unit deters information leak in the form of photos or videos taken from the display. The PCSA disk access structure assures that the local storage is clear of traces left behind after the data is accessed by the application program.

Any attempt to tinker with the virtually convoluted PCSA and the disk access structure will bring OS operation to instant halt and result in subsequent OS boot failure. Either outcome will render the tinkered Phantosys endpoint being banned from further access to corporate classified data

! Page !36

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

!

3.Application fields

1. SOE be centrally managed, deployed and dispatched From Wikipedia, the free encyclopedia A Standard Operating Environment (SOE) is a standard implementation of an operating system and its associated software. Other common names for this are: • MOE - Managed Operating Environment • COE - Consistent or Common Operating Environment • MDE - Managed Desktop Environment • DMS - Desktop Managed Services[citation needed] • OSP[citation needed] • SDE - Standard Desktop Environment. • "Standard Image"

! Page !37

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

It is typically implemented as a standard Disk Image that can be mass deployed to more than one computer in an organization. It can include the base operating system, a custom configuration, standard applications used within an organization, software updates and service packs. An SOE can apply to servers, desktops, , thin clients, and mobile devices. The major advantage of having an SOE in a business environment is the reduction in the cost and time to deploy, configure, maintain, support and manage computers. By standardizing the hardware and software platforms used within an organization, the IT department or service provider can deploy new computers and correct problems with existing computers quickly. A standardized, repeatable and automated solution creates a known, expected and supportable environment. A standardized solution ensures known outcomes are maintained, with automation providing the key to speed, repeatability and standardization. Examples There are many Windows deployment guides and tools available from Microsoft and other vendors. Many businesses endeavor to build their own SOE solutions using the Microsoft Business Desktop Deployment (BDD) solution accelerator or Microsoft Deployment Toolkit (MDT). However, some do not have the capability to build all features in one single SOE and their processes often include documented manual configuration steps. SOEs on Mac OS X, Linux, and other Unix/Unix-like systems can typically be made simply by creating and deploying disk images. This can be achieved using tools such as Disk Utility and dd. Whereas deploying a disk image originating from a system with non- identical hardware will often result in boot failure with Windows, the process is generally achievable on Unix systems with the caveat that the systems must be of the same computer architecture and drivers will need to be installed on the image for all the possible hardware configurations. Since Apple does not have third party computer manufacturers usually only hardware add-ons are a concern with respect to drivers. On Linux most hardware with kernel support can be auto-detected. Boot scripts can be used for automated post-deployment configuration. There are also a number of vendor specific SOE systems for various Linux/Unix-like distributions. For Solaris the use of jumpstart scripts is more frequent to ease the automation of setting specific parameters for each system. In Red Hat Enterprise Linux this is typically done by using kickstart scripts, there are specific products to create and manage an SOE like Red Hat Network Satellite Server which avoid the disk space usage and maintenance difficulties of managing disk images. However ONLY Phantosys can be compatible to Windows all series from Windows XP, Vista, Win 7, Win 8.1 or Windows server 200,2003,2008 or 2012 and Linux all ! Page !38

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

versions(depended on its popularity and market demand) for desktop, Notebook, graphic , Industrial PC and servers etc.in one image simultaneously.

2. Mobile Devices Security Management

2.1. Solution brief At present most executives or sales/marketing staffs are daily using a portable office, most of these notebook computer run Windows Operating system and MAC operating system. However, with the IT technology development, scattered notebook management is headache problems. Executive corporate desktop environment and individual personalized desktop environment mixed with then often use it outside. Their safety issue is not capable of controlling effectively. How to establish a secure environment, ensuring data security of Notebook applications have become IT management top priority because those executives are high-level employees and have tons of top security data be handled.

2.2. Design Concept: Based on the above requirements, we recommend the organization implement Phantosys Systems, executives or sales/marketing staff’s notebook into the cluster management platform. Through the Phantosys centralized deployment, security policy definition, users ' enterprise desktop environment and personal personalized desktop environments separated completely then ensure the security of corporate information. Simultaneously also meet user’s individual need and be in accordance with the existing user experience. We will create different management models for running Windows operating system and MAC Operating system on notebook etc.

2.3. Running Windows Operation System on mobile devices For internal running windows Operating system on movable devices, we will separate the user's hard drive into two portions. Part to be installed retaining the user's own

! Page !39

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

personalized desktop environments and part to be deployed the unified corporates desk environment which assigned by Phantosys. In the condition may keep user personal demand and habit but secure enterprises data security (will not leak from mobile devices) completely.

! User select different environment node for booting. When the user selects a personalized desktop environment, enter and use the personal desktop environment and data (cannot access enterprise data storage or environment).While selecting an enterprise desktop environments, users can see the Phantosys System-assigned C:/ disc and data storage D:/ disc. Two desktop environments are completely isolated and data is invisible and unreachable mutually. Phantosys system can block local drive and I/O ports etc. from MAC layer while enterprise environment be used and the data

! Page !40

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

can put in enterprise data storage or in virtual data disk created by Phantosys where personal environment can not visible and reachable at all---top security.

2.4. Running MAC Operating System on mobile devices For the internal running MAC Operating System on mobile devices, installed a virtual machine in MAC System. Individual personalized desktop environment will be based MAC systems as usual---will not change user habit. Corporate desk environment will be run virtual machine which system assigned by Phantosys. Enterprise environmental data will be stored in data disk created by virtual machine.

! Sscenario is an example here; Foxxxxx has more than 2,000 Executive notebooks to be managed. In conservative calculation, one server supports 200 hosts. total needs 20 Servers ( one main and another one Redundancy) to build the platform for the entire system ! Page !41

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

(Virtual server can also be used to build the platform and redundancy---- Phantoys Server is for management purposes , Without taking into account their performance ). We recommend the deployment of “Phantosys Web services centralized management platform” for server farms centralized management.

2.5. Solution advantages: 1、 All notebook operations performance based on a local hardware, Login slow on VDI architecture/poor user experience/offline unworkable will not happen here.

2、 Offline operating modes that can be set, even network broken or server crashed , mobile devices still can work well. 3、 Take full advantage of hardware performance of mobile devices.No need to rebuild the server clusters for computing resources. Server is just for management purpose only. The setup is at very low investment, efficiency and huge feedback but high performance and return.

4、 Effective realization of data isolation between the local(personal) system and work(enterprise) system, Compared with VDI, background administrator cannot touch/ access executives user's data.—more secure. 5. Even mobile devices or hard drive inside lost or leaving control of servers, the data in mobile devices would not be illegal rendering and reading.

6、 All operating system(environment) can be quickly update and recover remotely.

7、 The solution is fully compliant with current Windows X86 Standards. Compared to VDI or virtual machine solution, no risk for subsequent applications compatibility and peripherals ongoing support but secession mechanism of risk is extremely low. 8、 Support 802.1X network authentication ,to let security level reaches into unassailable realm.

9、 System construction at very low cost , no prejudice to the personal use , no extra network environment and high-level MIS personnel needs

! Page !42

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

3. FTP/Email/File etc. servers security

Phantosys Volcano More Advanced, More Equipped and Safer FTP Structure

FTP has the history for more than 30 years, till now a complete FTP standard has been developed. However, the safety of FTP has always been an issue. Most of the problems are not brought by FTP, but mainly caused by the operation, the management, the operating system and the terminal access.

3.3.1 The reasons of creation for the problems are

1.When the FTP is distributed in different departments, the service ability and the safety of the FTP are not fully guaranteed because the operation of the FTP is influenced by the level, the mobility, the responsibility and the benefits obtained of the operating staffs, and other factors. 2.The system reinstallation and the operating policies of the server may have configuration problems due to negligence. 3.The safety problems of the FTP operating system cannot be identified and eliminated thoroughly after long time operation. 4.FTP operating system cannot have a thorough safety scan and test after it is being updated. As the result, the system safety issue cannot be evaluated in time and executed an effective strategy to prevent the hidden safety problems. 5.Once the FTP server is crashed, its recovery period is longer, which will affect the progress of the business. 6.Once the FTP server is invaded by virus or Trojan, it is not capable of notice and treating immediately. 7.The host side has very limited verification mechanism, it assures the access only from legal users, but it cannot identify from what (whose) equipment or network accessing. If the user side be invaded and taken over, the legal account name and the passwords can still be obtained. The local data can be stolen too. The invasion may

! Page !43

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

become a springboard which may influence the FTP servers. According to the scenario above, the fundamental safety problems of FTP is NOT only by the FTP system itself because the problems are relative to the operation, management and integrated safety platform etc. infrastructure at all.

3.3.2 Our thinking of the solution is

1.The centralization of FTP servers: When the physical safety of the servers are guaranteed, it is easier assured the stability of the manage team and the level of the serving and supporting ability. 2.The server system’s operation and maintenance be unified : Under the condition of assuring the operation of the FTP and the safety of the operation system then instant delivery may guarantees the high reliability and stability of the system. 3.Anti-attacking and invasion With only the operation system or firewall, the FTP servers are NOT capable of fighting with the hackers. Let the FTP server does not have time tolerance and conditions of attack and invasion;

4.The safety strategy of the hosts accessing: The host side equipment and the system environment are provided and delivered by the management centrally which guarantee the account, information, equipment etc. linking permissions corresponding binds to FTP servers. The diary logs of hosts operating system and job logs of FTP hosts can be collected and concentrated into the background for audit. This design has the anti-deniability which guarantees the users cannot deny the operating to the data and clarify the responsibility as well. Furthermore, this also assures the safety problem will not happen in future because of the improper management. Hackers also cannot use those devices or the accounts as a springboard to attack the FTP servers any more. 5. Data and account information security

! Page !44

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

The FTP server only manages the business message/ information.Account names and password data are not on the same physical machine.Even though the FTP is invaded, the Account names and password data details will not be uncorked.

Topology diagram Phantosys Volcano:

LAN !

3.3.3 The operation mechanism of Volcano:

1. Phantosys Server provides all system environment of the FTP: According to a principle mentioned in the book “Endpoint Security” written by a top security specialist Mark S. Kadrich that once the safety problems such as Trojans

! Page !45

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

virus happen to the system, no other reliable ways can clean the virus thoroughly except re-install the system. Therefore, the FTP servers recover system be supported a brand new system and be restarted every time is obtained at a regular time. Then hackers cannot reside in any Trojan virus in FTP server system any more. Simultaneously different security policy of system environments can be delivered which makes the hacker cannot find the loopholes of the system and also can instantly deliver patches to hundreds of FTP servers simultaneously and make a full scan of the system environment for security vulnerabilities. 2. The user details, account information and the FTP Server are separated by the firewall: Even though the hackers are able to hack into the FTP Server, the remaining time is insufficient for them to break the firewall to enter the file Servers or the MySQL database to steal the user data and account information because all FTP system will automatically recover to pure clean environment by plan. 3. Vendor Phantosys Server provides all the system environment of the Vendors’ FTP hosts: Having the same control logic as the FTP Server, hosts make every time recovery when restart to ensure that the system is stable and secure environment and no local administrator is required. This guarantees no one can get the local administrator account password and no one is able to crack the password of the administrator. The local safety and control policy can be defined centrally which assures the FTP hosts will not become zombie computers or the springboards. Data transmission ONLY can be done while these specified FTP hosts account match to corresponding file directories of hosts account to ensure data be transmitted on controllable hosts

4. Firewall Control takes charge of access control of FTP hosts side of vendors/ subcontractors

! Page !46

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

Only the FTP hosts which connect to the Phantosys Server at vendor/subcontractor can get same group authorization from the FTP Servers to ensure that does not happen a lot of hackers denial of service attack and also assures only a controllable FTP hosts are connected to the FTP Servers. Therefore there is no accessing risk and issue for the FTP security issue any more.

3.3.4 The Security and Unique of Phantosys Volcano

1. The system does not only lock the IP but also bundle MAC address and Image. Only authorized image can run on the machine with assigned MAC 2. Except all data be encrypted normally, specific protocol operate in MAC level which make hackers more difficult to invade then increase the security level. 3. Based on special tuned Filezilla and with MS Firewall authorization, only the machinery equipped with the Phantosys format and central authorization can operate and download data. 3.3.5 The Advantages of Phantosys Volcano

1. FTP system principle be unified: After a period of using time will not be unable to make sure whether the previous strategy and functionality into force. All image be dispatched centrally and recovery by plan make system be unified 2. Anti-hacking OS: Recovering image within a fixed period time making no Trojan virus remained. Switching the system at all times, unable to find system loophole.Timely delivery of system in security, compliance and no loopholes environment. 3、No internet hacked is possible: Only the authorized hosts can enter the control, Decentralized delivery system environment would like to access or attack, FTP server will not respond at all.

4、Easy deployment:Virtual servers only need to create a blank virtual machine from then system environment be delivered centrally

5、Easy maintenance: Patches and routine maintenance, only need to update one ! Page !47

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

machine is enough.

6、High security:Timing recovery server, the server and hosts can be set in group to define a range of hosts accessing to the specified server then greatly reduce the risk of being attacked and invaded

7、cost and manpower reduce:

a. Management of virtual servers without relying on high price software such as Vcenter anymore.

b. Cache and fast reconstruction of virtual servers save huge investment on storage and HA need.

c. Can save a lot of manpower if hundreds of servers be operated

8、High efficiency:Hundreds FTP Server can simultaneously update and patch

9、High adaptability:Such as FTP, WEB, OA etc. application servers can be applied to this structure and suitable for multiple network structure- LAN, WAN, low bandwidth applicable

3.3.6 Potential customers list

a. Data security deemed absolutely essential to protect and Data security is the lifeblood and competitiveness of the company

b. The industries which with large scale data must transmit via FTP in order to complete the division and task such as manufacturing and design etc. industries.

c. The industries have a completed satellite system which requires the prevention of the leakage of data.

d. The neglect of changing the account and password in time, the staffs who used to taking charge of the access of the FTP can still use the FTP to download the data with any external machinery after their resignation.

! Page !48

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

3.3.7 Actual implementation and verification case

More than 300 pcs FTP servers be operated perfectly more than 18 months in Foxxxxx—the biggest EMS in the world.

3.4.Website server security management—Machine gun Most website server always been hacked then may know be hacked and make necessary recovery or rebuild system if Trojan program is invaded. Those approach cannot be prevent method but just only solve it in hard job. May be occurred some damage or lost then may make trouble shooting. As we know firewall or DMZ cannot guarantee the system behind it will not be hacked or data be stolen at all no matter how expensive it is.

Only Volcano program of Phantosys can avoid this happening in enterprises, defense and government dept. the program be implemented in Foxxxxx (the biggest EMS in the world) more than 18 months already and be approved effective via real environment or theory already. Even Foxxxxx have 4 sets DMZ which valued more than US$ 13.3 million but still cannot prevent hackers’ invasion at all.

Based on Phantosys unique structures we can change group nodes scheduling which group nodes with different OS+AP, fire ware and anti-virus etc. environment and let hacker and tools are not capable entering or staying in servers to get any data or information out because even high-end hackers need to take a couple of days to weeks to penetrate firewall and anti-virus program into server to integrate its tool to stole the data out. However Phantosys change the environment without any notice then recover to brand new environment and each group node has different firewall or anti-virus and let hacker’s tool be clean and recovered and does not allow hackers have enough time to integrate tools to take something out at all. ^_^ Shift main server image and firewall by scheduling as structure below

! Page !49

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

! 1. Shift firewall by scheduling

! 2. Shift server image scheduling

! Based on light resource need of Phantosys server, we may run 20-30 pcs virtual servers in Wmware ESXi

In advanced technology(developing) we can really time detect any change the content or re-edit the registration of any setting by hacker then recover to original environment right away. it is very high added value for Phantosys-Machine gun. We provide the leasing program for -Machine gun program if any enterprises or government are faced this problem and need to solve it in cost effective way.

3.5. Anti-Ransomware solution

! Page !50

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

!

!

! Page !51

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

!

!

! Page !52

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

! 3.6. Education field applications --Computer room, Classroom, Administration.

3.6.1. IT problems and management issues in current environment

What problems occurred in IT environment in schools (from elementary to university?) ● Clients work abnormally caused students operate in malfunction or malicious damage. ● Installed programs or material be deleted or destroyed ● Clients work abnormally caused by virus invasion ● Take a lot of time for system updating or new application program installation no matter recovery card or system be implement ● Not capable of implementing diversification teaching ● Difficult to manage local HDD ● Would like to apply DVI or Thin-client solution but performance and cost always be concerned

! Page !53

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

● IT people is always shortage and may not have powerful knowledge( most IT people are on a part-time job (or position)in schools. Most of computer room use recovery card (Hardware approach) or recovery program (software approach) as a management tool. However both of them cannot be total centralized. For Example, A server manages many computer rooms or integrates different OS +AP remotely well in the same time.

There a lot of diskless solution in the market too. But still have bottleneck of management of quantity of clients in the same time (client/server ration) and limitation of bandwidth of networking at all if clients would like to keep standalone PC (desktop) performance

Thin-client or virtual machine is very hot recently in university. However may not all universities in different territories are capable of offering the expense at all

For most of schools from elementary to university would NOT want to change current hardware equipment and network environment because of limit budget but would like to have management centralized, standard operation environment, regular updating and dispatching, keeping current standalone desktop performance and reducing handle cost (most schools may not have professional IT people and enough time to in charge of it)

No matter recovery card, software, diskless, thin-client or virtual machine may have some items or functions cannot be satisfied or offer able at all. Only Phantosys can meet all requirements for educational marketing, with client computing and centralized management structure. Therefore Phantosys solution has standalone PC performance even in 10/100 base-T network environment and excellent compatibilities but can be centralized management, updating or dispatching well. Any X86 machine can be fitted , Windows all series from Windows XP, Vista, Win7, Win8.1 to Windows 2000,2003,2008,2012 and all Linux versions are compatible which meet any teaching requirement.

3.6.2 Digitalization of teaching in any classroom environment In IT higher developing countries, those ICT integrate computer/NB, Electronic White Board, Projector, cloud data storage, Electronic books etc. for different teaching purpose.

! Page !54

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

Such scenario requests very high compatibility for fitting any applications. If recovery card or program be applied, it cannot put a lot of Electronic books for different curriculums to meet teachers need. If put Electronic books in cloud will make heavy loading of network even full Giga environment be applied. If read Electronic books via CD-ROM drive may take a lot of time and may not read it successfully every time once CD-ROM drive used for a long time. Neither recovery card/ program can support these applications nor thin-client, server based solution can finish the mission at all. Because all of them have to set environment mode at “every time recovery”(not allow teachers store Electronic books contents into C:/) to minimize image size. Otherwise its RAM and image will be exploded then make system very slow even crashed. Phantosys with local cache and full all local cache technology allow teachers save any contents at clients just like his own computer and will not affect clients performance or need to down load from private cloud data server. If the network environment in LAN under this scenario, recovery card or program solution, thin-client Server-based solution, virtual machine etc. cannot satisfy teachers and courses training need. Phantosys provide almost unlimited installation just like standalone station did. Once clients have any problem just make recovery remotely is OK.

3.7. Phantosys advantages for education, training center Server’s OS, hardware and licenses cost and management issues ● Any PC can be server, A virtual server can manage up to 1,180 clients and boot 924 clients simultaneously (be verified well)

! Page !55

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

!

! Page !56

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

!

● A PC manage almost entire clients in elementary and junior high schools

● Run Win7,Win 8/8.1 Win 10 as server OS is enough

● Remote Server control

● Web based administration console supported ● Client-based but WAN structure ● Low level technical need—who can mater Windows XP,Win7 ,Win 8/8.1,Win 10 is enough ● maintain a server is enough(Almost maintenance free of clients) ● No need to add any H/W or S/W cost for clients or network or change clients habit

● Server monitoring function—can inform customer, dist. automatically once server crashed Network issues

● No need of full Giga port HUB and no need of CAT 6 cable to clients

! Page !57

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

● VALN access capability

● Inner/outer network and flow control capability

● Run well in poor network environment or server level Unique and outstanding features

● Multi images and group nodes capability ● Multi-recovery points which can recover to any recovery point and anytime, almost unlimited recovery points

● Unique tree structure and inheritance infrastructure technology ● Multicast,P2P or background synchronizing technology for image or group node down load

● Offline using 14 days independently(server crashed or network broken, clients still work well)

Excellent Compatibility and performance

● Excellent compatibility for Windows all series and Linux ● Support multi Windows and Linux OS simultaneously in one image ● Support any application programs which compatible to Microsoft and Linux ● Support any external devices which used on any client ● Excellent compatibility and performance of OS and AP on any client ---same as standalone PC has.

● Curriculums scheduling weekly for different dept. or grades ● Disk or diskless mode can be applied(auto switching)

● Local C: protection ● Every time recovery or manual recovery can be applied any time anywhere ● Diskless, partial and Full local cache on HDD or offline modes option—operate any OS ,AP(graphic intensive, multimedia)smoothly in PC full power performance ● Offline usage for 14 days—No matter server crashed or network broken, clients still function normally

! Page !58

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

● LAN, Wi-Fi or WAN authentication—easily use in NB, Netbook mobile devices ● File sharing capability(option)—teacher can collect data from students ● no need setting every time recovery mode of clients site

For more detail information and compassion please refer to

“Why Phantosys in schools 2014.exe”

“Management method comparison 2014.exe”

You may fully identify what the real advantages are

3.7.1 SOE, central deployment and management via WAN or cloud In the same time we provide WAN-base structure for whole university in different campus, whole schools in a county, state to become real centralized management of updating and dispatching and control OS+AP(licenses usage) to reduceTotal Operation Cost (TOC )or Total Cost of Service Availability(TCSA)

!

! Page !59

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

3.7.2 The virtual lab. And Experiment Environment Established In most of educational environment, school cannot provide one set H/W (PC) and S/ W(program) for each student learning and the time in schools is very limited—may be only 1 to 3 hours per curriculum in a week. However most students have their own PC/Notebook which are very powerful and with good performance. Why not let them use their own device and facility to do homework and make practice at home or dormitory at their convenience to let enlarge the effectiveness of learning and teaching? You may NOT have students install variable programs at theirs PC/NB because of license issue, installation skill etc. Only Phantosys can use their own PC/NB local resources (CPU/RAM/HDD) to create virtual environment for such application.

Step 1 Just setup a “Virtual Experiment Website Platform”—PhantosysPHP_web for example. School can allocate students login ID and PW then down load Virtual Machine module( local boot manager prepared, Phantosys server IP be fill it out etc.) from “virtual experiment website platform” – form example” classdemo “ here to local D:/ or E:/(non system partition) or USB drive of students PC/NB at home or dormitory

Step 2. Install latest virtual machine program such as VMware Player here in physical station (PC/NB) where would like to implement the lab. experiment environment

! Page !60

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

Step 3. Open “classdemo” file via correct path. For example D:\ Virtual Machine \classdemo. Double click classdemo.vmx in the file

! Page !61

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

Step 4. start/open VMware Player then see pop-up tips, select “I copy it” then click Player—Manage—Virtual Machine Settings. select “Network Adapter “from pop- up window to make sure the mode is “bridge” and select “ Advanced” at low-right corner of window then you can see MAC address information ” 0050562F244C “

! Page !62

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

Step 5. Set computer name and MAC for the virtual experiment lab. environment for PC/NB at student’s home or dormitory Fill “computer name” and “MAC address” information of virtual machine on pop-up window on “Computer reservation” (预约计算机)menu“ of “Virtual Experiment Website Platform”

! Page !63

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

Step 6. Then add user to authorized group nodes—experiment or lab. Environment divided by different department (assigned by administrator or selected by student). For example,

“Computer dept.—Android developing environment” (计算机系—Android开发环

境) here then click ”OK” to confirm the setting

! Page !64

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

Step 7 Restart VMware Player and implement Virtual Experiment Platform and can see the group node and select the group node student want then he/she can work on it well just like the environment(included OS and AP) they have in schools

! What advantages the scenario can offer

● Let student can learn any curriculum not only in school but also at home or dormitory to enlarge the learning effectiveness and may let students no excuse say” H/W and time at school is not enough.“

● Schools do not need provide enough H/W quantity for students learning

● Use limited licenses of application programs to make maximum usage

! Page !65

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

3.8. Government/Enterprises/Defence fields applications Government/Enterprises/Defences customers have SOE and requirement same as educational market but they may more care about licenses fee for application programs , those effective usage and huge expense, data leakage, clients performance and convenience etc.

Based on Chapter 2 introduction, our core technologies make your PCs become mainframe structure—Central management, local computing; Use terminals at their full PC power, manage PCs like mainframe terminals—easy patch or update

!

! Page !66

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

!

Compared to thin-client, server-based or VDI solution, bandwidth will not be bottleneck any more. Even enterprise would like to apply VDI or thin-client solution, customers will not need to scrap they have at client site such as PC/NB, they also can be mainframe structure and save huge investment for renew hosts device, network and volumes of fat server etc. Just install Phantosys program then may have a trail. No risk for withdraw at all once thin-client or server- based solution cannot meet actual need because customers do not need to invest and have actual scenario environment for testing and verification.

We provide centralized and virtualized, thin-client solution’s advantages for enterprises applications. However client site will not have disadvantages such as poor operation responding, poor peripheral hardware supporting (such as printer, USB devices, and scanners), lock the smooth operating media, 3D or graphic intensive program or limitation of poor network environment.

! Page !67

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

! We also provide WAN/cloud centralized structure for any enterprises application which can apply in poor network environment.

! Page !68

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

! Most government/enterprises/defence fields would like to 7-11 24 hours system stable and work fine. Some department may care data leakage from internet or clients site. Standard Operation Environment and centralized management always are demand. But clients wouldn’t want to reduce client site’s performance and habits under limit budget.

Server-based or solution may help to reach centralized or anti-leakage goal but performance, compatibly and expense may not be accepted in different department, scenario

In thin-client solution , one high-end severs may only manage 20-50 clients well(depended on what programs be run , how many clients link and work in the same time and server’s performance etc.)

Its performance, compatibility and C/P value cannot be accepted in different scenario (environment) such as at workshop, manufacturer, laboratory or complicated environment (different hardware or graphic intensive programs)

! Page !69

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

Only Phantosys solution can manage desktop, graphic , thin-client, NB, Netbook, ultra book, industrial PC and servers(any X86 system), different OS(Windows XP, Vista, Win7, Win8.1, Win 10 to Windows 2000,2003,2008,2012,2016,2019 and all Linux versions in a server simultaneously at any poor network environment at high performance, excellent compatibility and cost effective(no extra H/W or S/W need) way

You have a lot of routine jobs as below in IT department as below. MIS people just like blue worker to maintain clients working properly, do not have enough time to make plan for future and not capable of provide valuable analysis, report and suggestion for company competitiveness.

!

You may be would like to know the comparison between Phantosys and major players in the market. Please refer to ” “VDI Solution Comparison_VMWare_Citrix_Phantosys02052014-Phantosys.xls” for detail.

Once Phantosys be implemented, enterprise can get the advantages as below right away.

! Page !70

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

!

Data security is always be a major concerned, a lot of tool can avoid the data leakage via email, network etc. but cost a lot too.

Only few solution can protect data will not be leaked from client such, such as USB, print or IDE ports etc. This leakage way is most value or security data is stolen. Not via third party or network but the employee or who quit from the company.

If above concern be care, please refer to Chap. 3.3 top secure level design for detail for application as well

Some data stored in FTP or file servers may leak too. Please refer to Chap. 3.3 FTP / Email/File etc. servers security for outstanding solution—“Phantosys Volcano”

If you face following problems or have concerns described below, you may review our solution detailed ● MIS or IT people’s turnover rate is your headache or cannot find proper person to handle it

● MIS or IT people always like firemen to solve routine or emergency recovery issues

! Page !71

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

● Would like to have SOE environment but do not satisfy its performance, compatibility and cost.

● Your organization has many branch offices and has hundreds or thousands of PC farm which would like to manage centralized but poor network environment (very limit bandwidth and limit budget.

● Would like to thin-client(centralized)solution but wouldn’t give up current hardware on client site

● Would like to have private cloud solution but cannot find proper one under your budget

● Your organization have a lot of suppliers and subcontractors and have a lot of private and valuable documentation transferring via FTP upload and download

● Do you care organization data be leaked via Internet or stolen by employee

● Would like to have a system solution run very stable but in cost effective way. Even it crashed but recovered in very short time

● Would like to have a system solution which can handle all devices in the organization no matter those devices are desktop, graphic workstation, Notebook, Netbook, Ultra book, industrial PC or server in one console to run Windows XP, Vista, Win7, Win8.1 to Windows 2000,2003,2008,2012 and all Linux versions in different departments simultaneously

● Windows dispatching and application programs, anti-virus updating frequently takes a lot of effort to do it.

● Would like to guide into VDI, IDV, thin-client, server-based or virtual machine solution but without a lot of confidence or already applied one of above solutions but feel poor performance, compatibility, expensive or budget limitation. DO NOT need to purchase any hardware for clients, server or network or software for improvement. Just installing it for a trail.

! Page !72

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

4. Cost comparison and analysis All parameters in attached .xls file for cost comparison and analysis can be edited or changed to meet your local actual value and let the comparison and analysis be more made sense and valuable

! In general, Compared to thin-client, virtual machine, DVI etc. solution, our TCO will ONLY be just an half to two-third of them

Scenario: 1,000 desktops or Notebook (included 200 pcs workstations for R&D) in a company, cost is based on China (RMB is the based). Different territories may adjust parameters to fit individual situation.

4.1 ICT manpower saving For 1,000 PC/NB, the maintenance work can be handled by IT personnel who used to support 10 PC/NB(servers) is enough Foxxxx, Inc. cuts IT support persons from 500 down to 2 after Phantosys solution be implemented ! Page !73

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

Please refer to” cost saving analysis.xls”

4.2 Idle loss

Time cost definition: Time costs are entailed by user idling due to disk failure, system upgrading, software maintenance, virus-caused system down, etc. Here we only include explicit user salary paid for non-productive idling. Other business impact and implicit costs are not included.

Each year, about 4%~8% of PC/NB users’ time has been idled while waiting for clearing of software faults. Total working hours: 1000 PC x 8 hours/day x 250 days = 2,000,000 hours/year Total idle hours:: 80,000 ~ 160,000 hours/year For easy calculation, assume the manpower unit cost to be RMB15/hour. The cost of down time range for client PC/NB equals 15 x 80000 = RMB1,200,000/year to 15X160,000=RMB 2,400,000/year

Please refer to” cost saving analysis.xls”

4.3 Licenses fee issue Phantosys enables an enterprise to precisely purchase software licenses based on its maximum concurrent usage. Enhanced utilization of software licenses!! Cost down 70% of unused licenses!!

Software Suggested Qty Total retail price required amount

OS (Win 7 bundled) 600 1000 600,000

Office 2007 2500 1000 2,500,000

! Page !74

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

Soware Assurance/year 150 1000 150,000 if thin-client or DVI soluon be applied

Security tool 100 1000 100,000

Photoshop 5000 200 1,000,000

AutoCAD 20000 200 4,000,000

UG 120000 200 24,000,000

Pro/E 90000 200 18,000,000

In accordance with the Intellectual Property Regulations, license fee is incurred when the software is installed on the PC/NB. Note: The above software list only exemplifies the minimum Configuration required in an RD-oriented enterprise. Cost for acquiring software licenses exceeds RMB50,350,000

Please refer to” cost saving analysis.xls”

4.4 Power consumption in whole environment Power consumption comparison for Phantosys V.S. thin-client and server-based etc. solution—please refer to

“Energy consumption contrast of Phantosys & other solutions.xls”

It is our pleasure to disclose the real situation to you all about hidden cost of power consumption/ solid and real comparison to cloud/DVI/ thin-client etc. solution.

Most of cloud/DVI/ thin-client solution said they are very power saving (green) product and said traditional desktop need 250-300W/host. However, they just ONLY highlight client

! Page !75

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

side power consumption. NEVER tell customers that they need a lot of servers which need running and cooling system for 24 hrs./day, 365 days/year(If server shut down and restart daily, system will get big trouble and headache). Attached Excel file is real power consumption for your study. Any parameter can be changed on demand, you may simulate the scenario for the data you have. The Excel file is very workable and realistic to show any potential customer who would like to apply VDI/thin-client or cloud solution. Combine the slim PC as below (65W/hour) and 22” LED monitors (http:// energyusecalculator.com/electricity_lcdleddisplay.htm) (30W/hour) which power consumption for a host is just around 100W/hour and only work 8~10 hours for duty hour. Unlike thin-client or server-based solution, Except power consumption at clients site at duty hours, all servers have to work and be cooled 24 hrs./day, 365 days/year then may provide service to clients properly.

!

Simple, Basic, Low cost/Optimum performance for offices usage

! Page !76

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

Value added - It can be compatible to various LCD/LED monitor models!

Combine hardware (Slim PC with LED monitor) and Phantosys will be the best C/P value solution(not also in cost issue but also in performance standard) compared to ant VDI and Thin-client solution in the marketing.

! Specification is just for reference and be variable and changeable by manufacturer.

!

! Page !77

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

It is H/W cost(Slim PC+Monitor) also very attractive and could be around US$300.00 to US$350.00 Without OS (depended on performance of slim PC and volume)

Except power consumption issue, please highlight follow concerns to potential customers as well 1. What is the average H/W cost (hosts/network environment renew/ new servers) of host for DVI or thin-client solution? ---Normally it will cost around US$ 800.00 The cost will be geometric progression increased while hosts increased but Phantosys no need more fat (expensive) servers 2. Did customers precisely calculate the Microsoft license cost for DVI or VMware solution if every OS has to be legal? 3. Can client suffer the poor performance of DVI or thin-client solution?---only can run very limited application programs 4. Can suffer high maintenance expense and high level technician need( high cost also)? 5. Do customers have excellent network environment to support thin-client or virtual machine solution? If not, have to prepare huge budget to renew to whole Giga environment or invest a lot of expense on fat serves 6. A lot of peripherals (printer, scanner etc.) and applications programs based on PC developed are easy compatible to support thin-client or virtual machine solution? 7. Have concern the withdraw risk once DVI or thin-client cannot meet the target (performance/ cost/convenient/user friendly etc.)

What major advantages Phantosys IDV solution (Intelligent Desktop Virtualization) are a. The highest C/P value and lowest power consumption solution in the marketing b. A system can manage desktop, NB, thin-clients, workstations and server into one system for different departments simultaneously.

! Page !78

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

c. Based on current hosts, network environment and server can run well for central man agent for private cloud structure, no need to make any change of user habit, hosts etc. and no risk to implement and extra hardware investment. d. Hosts can run Linux, Windows all series OS, any application programs smoothly and be compatible to any peripherals/ external device easily. e. Will not sacrifice host performance once for central management of hosts---central management but local computing. f. WAN accessibility, offline capability, excellent defense security level (approved by China defense dept.) implemented in Foxxxxx and a lot government and defense organizations

4.5 Invisible Intellectual Property Loss cost All companies, government, defense dept. does very care about this issues and concern but current solution may NOT provide total answers for customers(some can block from Internet well, some can block input/out ports in AP layer well----Not secured enough) or the solution’s expense too high to offer at all

Intellectual Property cost cannot be estimated or calculated at all. If loss, may cause company’s crash, lost competition or business opportunity etc. All of them are very serious issue at all.

Based our unique and outstanding infrastructure, an autonomous transmission protocol (EDSC(Ethernet Disk Sector Communication)and DOEc) run at MAC layer, which make hacker very difficult to invade or access any data and information and complicated and multi-authentication security mechanism, internal and external network control, computer name, IP address environment cannot be changed, input/output ports blocked at MAC layer which make hosts/clients steal data/information from devices are impossible.

! Page !79

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

Apply our solution can 100% protect company’s intellectual property in private cloud environment no matter client is desktop PC or mobile devices (NB, Netbook, ultra book etc.) which has been approved more than 3,500 customers( enterprises, governments, defense organizations—included Foxxxxx( the biggest EMS in the world) for more than 10 years already

5.1.System requirement and supporting

5.2. System server specification. What server criteria we request is reliable not performance, just apply entry-level one is enough for most applications and customers CPU:P4 3.2 GHz or faster Memory: 2GB or more, more huge will be better. HDD: SATA 80GB, one pcs is at least Network card: 100/1,000 Base-T, Giga port will be plus USB port: 1 pc 5.3. System client specification Any client based on x86 system can be compatible no matter it is Intel or AMD solution CPU: P3 or faster Memory: 512MB or more, 1.5GB minimum is recommended by Microsoft for Win 7 HDD: IDE 20GB at least, Better with SATA one Network card: 10/100/1,000 Base-T, BIOS supports network boot version PXE2.0 or later 5.4. Minimum network requirement For LAN: Switching HUB: Plain one, Non manageable (without sophisticated networking management) Ports: 100/1,000 Base T x 2 ports for server (1,000 base T will be plus)

! Page !80

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

10/100/1,000 base T ports for clients Cables: CAT 5 cable to clients CAT 5 or CAT 6 cable to server (CAT 6 will be plus) Protocol: TCP/IP; UDP/IP DHCP server: if there is no DHCP server in the environment, Phantosys can offer simple DHCP server service Bandwidth or throughput will affect the performance while diskless or local cache mode is applied and first time deployment speed in volume clients

For WAN No minimum requirement at all, any thin-client, DVI or server based solution can apply, we can work well 5.5. Versatile support of Operation System and Application Programs Windows based: Windows 2000,2003,2008,2012,2016,2019 Windows XP, Vista, Win7, Win 8, Win 8.1 Linux: All versions (Ubuntu/Centos/Fedora/Suse/Redhat/Vine/Debian/gOS) if have volume for order we can adjust program to fit special requirement) Any application program can run at Windows and Linux such OS well; it can be applied on Phantosys smoothly and effectively. 6 Criteria for handling our solution

● Who dedicated in system integration in educational, government, enterprises and defence segment ● Who mastered security solution has exist channels or customers and can sell solution’s core value in reasonable price ● Who has strong engineering teams who very professional in Computer, Microsoft, and Networking domain knowledge. With Microsoft(MCSE/MCSD/MCSA or MCSM and Cisco(CCNA,CCIE RS SP Security)etc. certification engineers will be plus ● Who understand thin-client, DVI, virtual machine or server-based solution will be more helpful ! Page !81

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

● Who understand limitation and bottleneck of thin-client, DVI, virtual machine or server- based solution and would like to look different one for approaching ● Who look for distinguished solution from the existed marketing ● Who understand bottleneck of current security solution and look another one to emphasis or substitute ● Who would like to emphasis current product lines and chase more high margin in near future ● Who understand customers would like to implement SOE etc. management centralized but budget is limited or who would like to promote private cloud, DVI thin-clients concept to customers.

7 ROI analysis and Business Model

Please refer to “ROI evaluation for Phantosys business.xls” Colourful row and column can be edited because staff salary, expense based, licensed quantity be sold, margin per licenses etc. condition are totally different from country to country. You can fill it out then you may have real idea for it. Regarding to business model, it is very flexible, either licenses outright or leasing will be acceptable depended on partner’s capability and idea to fit local market Welcome potential partner provide BP for approaching 8. Typical Reference Sites

Typical customers in different fields Educational filed.---for cost saving in management(existed hosts centralized) Japan: http://www.wasay.co.jp/s_story/story1.htm More than 2,000 schools applied the solution and implemented very stable for more than 10 years such as famous universities東京都 和光大学 , 大阪工業大 学 枚方キャンパス from elementary schools to universities

Germany: http://www.phantosys.de/ : More than 700 schools applied the solution.

China: http://www.fengsoft.net/ ! Page !82

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

More than 3,000 primary and secondary schools applied More than 700 colleges and universities applied • All985,211of Beijing colleges and universities ,as well as other well-known colleges and universities nationwide, Taiwan: http://www.phantosys.com.tw/ More than 700 schools applied the solution. Mexico: http://www.phantosys.com.mx/ More than 200 schools applied the solution. Brazil: http://www.phantosys.com.br/ More than 200 schools applied the solution.

Enterprises segments:----- for hosts performance, compatibility ,cost saving and security, • Foxconn Enterprise Group Foxconn (the world's largest IT OEM(EMS) companies) more than 15,000 devices from finance, legal, R &D departments workstation, product line etc. • Suntech Power Co., Ltd. (the world's largest solar companies) • Zhen jiang Da quan Group(multinational electrical manufacturing company) • Catcher Group(the world's largest manufacturer of CNC) • Suzhou Institute of architectural design, Gold Mantis design company • Canadian Solar Inc. Artes CSI(Canadian Solar Inc.) • Yun tian hua Group(China's largest fertilizer enterprise) • Yan tai Wan hua Group(the world's second-generation enterprise polyurethane, ultra Bayer) • Qing dao Sai lun(China tire industry leader) • Shenzhen Airport, China Merchants Bank, the Postal Savings Bank, the Shanghai Public Security Bureau and other famous units • Beijing Automobile Research Institute • Anhui Heli Forklift • Jiang Yin Ji xinWind • Golden Phoenix Hotel Furniture Group • Changan Suzuki • Jordanwon the Technology Group in Shen zhen Sanitary Commission • Ocean Motor Group • Ma wei Shipyard Huangpu Shipyard

! Page !83

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

Defense and Military filed---- for hosts performance, compatibility and security, • AVIC Shenyang Aircraft Design Institute(AVIC 601)) • CLP14 Research Institute(Asia's largest military institute) • AVIC Chengdu Aircraft Design Institute(AVIC 611) • AVIC Institute of Computer(AVIC 631) • Nanjing Keruida Electronic Equipment Co., Ltd.(CLP Group 924Factory) • China Academy of Engineering Physics(Nuclear nine homes) • Lianyungang716(CSIC information technology demonstration unit) • CSIC714(State Security Assessment CSIC sub-centers) • China Gas Turbine Research Institute(AVIC 624)) • Shen yang Engine Design Institute(CNAC 606) • Aerospace Science and Industry, Guiyang 061bases(emphasis aircraft research and production base) • AVIC115Factory(1370 Desktop scale units)) • Luo yang missiles(AVIC 014) • Lianyungang716(CSIC information technology demonstration unit) • AVIC treasure titanium seven CLP • Hon Hai Precision Inc. • Catcher Technology Inc. • Daxon Technology Inc.

You may key word ”Phantosys” to see how many reports on it or Youtube for the video looking.

9.Future

1. IDV+VDI+Hybrid cloud infrastructure manage, control & maintain all kind of devices and secure data well. The IDV is applied INDOOR for desktop, NB, workstations(R &D) at big screen, best compatibility and performance for education, government and enterprises marketing, VDI is applied OUTDOOR for Tablet PC/smart phone for convenience

! Page !84

! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys

and mobility and DATA can shift from private cloud to public cloud by API at demand in very security way. 2. Support iPXE booting: Let clients can be booted from Wi-Fi and keep security

3. top Secure clients solution

• Client must be running Windows 10. • Client can be joined Windows domain. • Client must has TPM chip ( TPM2.0 ). • Client must be installed BitLocker Network Unlock feature, and activated TPM/Bitlocker full- disk encryption. • Client must has UEFI ( spec 2.3.1 ) DHCP drivers (one of PXE features) and can be Network Unlock clients. • To properly support DHCP within UEFI, the UEFI-based system should be in native mode without a compatibility support module (CSM) enabled. • Client can be enrolled both WDS Key Server’s PKI and Networking PKI certificates. • Client can be configured Network Unlock Group Policy settings. • Client’s network stack must be enabled to use the Network Unlock feature. • Equipment manufacturers deliver their products in various states and with different BIOS menus, so the network stack must has been enabled in the BIOS before starting the computer. 4.

! Page !85

! © Generated by Steven Chiu, Phantosys Ltd Version 1.