MCE123 Logo

This website uses Cookies, and by using the website, you accept our Terms of Service, Privacy Policy, and other applicable policies set by our Legal Department.

You agree to stay up to date on any changes to our legal policies, as they are posted, by visiting our Legal Department. For your viewing convenience, we are not required to notify you again.

MCE123 - Technology Development

Computers with Multiple Wireless Adapters

Computers should be manufactured or physically built with multiple wireless adapters, and have an OS that supports multiple wireless adapters, such as for the use of multiple Internet gateways through multiple wireless networks, or for connecting local wireless devices to another wireless network – which would be a Personal Area Network (PAN) with Wi-Fi, and additionally have Wi-Fi adapters that can also function as PANs at the same time. Having multiple wireless networks would also be useful to setup bridges between different devices, including with Virtual Local Area Networks (VLANs), which would allow secure tunneling of data between servers and laptops, for an instance, through a dedicated wireless bridge, that would not be available through other wireless networks in the same building or in the same wireless service area. Additionally, multiple wireless adapters would allow for any number of wireless adapters to be used to access the Internet, such as through multiple Internet Service Providers (ISPs), such as AT&T or Verizon through Wi-Fi services available on 5G towers, however also to have any number of wireless adapters available to use for Intranet purposes, even different hardware for different Intranets, such as for buildings that have multiple internal networks on different Intranets, that are not accessible through each other.

Having different levels of security on different wireless adapters in Microsoft Windows is critical to ensure that the Windows Firewall, and a Global Cyber Security Suite of software ensures that different network adapters cannot talk to each other, if configured with this security, by default, even. Additionally, having a Global Cyber Security Suite to secure the operating system and all hardware, as well, ensures that Internet and Intranet traffic is controlled to the point that it is not damaging to internal projects on laptops or desktops or mobile devices, while still allowing services to be offered from servers that utilize multiple wireless or wired network adapters, by allowing only specific services to be accessed over certain physical hardware, not just IP addresses, themselves. Multiple adapters may have similar subnets in use, for an example, so configuring services just for a specific IP address or IP subnet range through a network firewall appliance software suite on the computer system may not be enough to secure the system from network intrusions, if there are, for an example, multiple networks that use the 192.168.0.0 or 10.0.0.0 subnet ranges.

There should also be additional hardware card slots on laptops, to ensure that additional multi-function cards can be inserted, such as by saving specific configurations with specific network hardware, to be able to just plug into multiple wireless networks at a specific location, and then disconnecting completely from the hardware interfaces and software settings, and then having the option to use a different hardware card at a different location. Additionally, hardware cards, and even embedded hardware, should have the option to use a configuration system that embeds its self in a tiny storage device, similar to a SIM card, that can just be changed out for Wi-Fi network settings, especially for secured Wi-Fi networks that use complicated and sophisticated technologies, or require the use of a small USB-C device plugged into the hardware card or networked device to configure the network settings for a specific network site. This could allow the same hardware, or even the same removable hardware wireless network card, to be reused in multiple locations, however the physical configurations could be significantly modified based on the hardware settings based on the physical location, with a login script that works based off an encrypted network login device, such as a USB-C device, that configures the network settings, automatically, even based on any type of network hardware that is in the physical computer system that the USB-C device is plugged into. Additionally, there could be a biometric level of security added to network login scripts, in the hardware, such as a retina scan, or a neural scan, or a fingerprint scan, or a DNA scan, or a password prompt, or the requirement of a specific computer system for the USB-C device to work, or a RFID card or magnetic card swipe.

MCE123 Intellectual Property Rights Management

MCE123℠ invents original concepts in our Technology Development department, such as for new high-tech technologies, which can be purchased ahead of time by other organizations to develop into physical products for a fee. Some of these concepts have already been physically developed by MCE123℠ Technology Development with our partners in the government, and are classified as national security technologies, in which we allow the government to develop the technologies as part of our company, and we own the technologies, since we invented them, and they were never purchased. We may not allow these technologies to be purchased by others, however the technologies must be purchased from our company if they are ever purchased from production, as they are our technologies. There are government policies and government legislation that prevents the technologies from being purchased without MCE123℠ Technology Development being paid for its works to invent the technologies as/for the government.

You must have our authorization to work on our products or services, ahead of time, in physical writing, regarding any invention you read about on our website. Please consult with the MCE123℠ Legal Department before using any concepts from us, as we spend countless hours developing these concepts from scratch, and you must pay us to use these concepts, or even modify the concepts and use the concepts, even with significant modification. All works that derive from our works, including extrapolations or derivatives, are our property if you do not follow due process by obtaining physically written permission from us ahead of time. You must purchase all intellectual property relating to a technology concept before you begin work on any of our products or services. Failure to do so will result in Intellectual Property lawsuits and cases from our attorneys to compensate our company for intellectual and monetary damages that we have incurred due to any third party developing, using, or misusing any of our products.

This Intellectual Property is owned by MCE123℠ Technology Development. By viewing this Intellectual Property, you agree to the rights of the IP holder established under the Intellectual Property Rights Management agreement. To use the Intellectual Property, you must first obtain an Intellectual Property license, and you must pay royalties for each product that is produced using the Intellectual Property license.

MCE123 Technology Usage Policy Disclaimer

MCE123℠ does not support experiments using animals or human beings, at all, and all trials pertaining to or using animals or human beings using technologies invented by MCE123℠ must be agreed to in a physically pre-written contract agreed to between MCE123℠, its attorneys, and each individual, a separately pre-written contract for each technology, a separately pre-written contract for each individual, with the terms of which can be modified in various ways to ensure the security of our staff and the public, and additionally of which each individual contract can be cancelled or audited at any time and at all times by any individual or legal staff in the public. Any usage of our technologies must also be paid for to MCE123℠, or there was no agreement and thus no contract to provide any products or services, not even for scientific experimentation and educational uses. Any unauthorized usage or utilization of our technologies will be filed under the misuse clause, to cease and desist all usage of our technologies by unauthorized persons or organizations.


DMCA.com Protection Status Site Protected by SiteLock