Intelligent Dog™ v1.4.0 “Eiffel Tower Plus 2nd Generation”

Not a watchdog. A wolf-class order system.

Not self-aware, just more aware. We block the door, not the person.

5spatrol cycle
gate checks
4avatars in sync
0manual enforcement
Hero key visual

Elevator Pitch

Intelligent Dog™ isn’t a single daemon. It’s a multi-avatar system: Detective (container), Enforcer (host/agent), Commander (website brain), and Electrician (network). It turns operations from human-ruled to rule-of-law to preserve security, stability, fairness, and compliance.

Container — Detective

Shell hook + process polling; track UID/PID/GPU/CPU/Mem; real-time anomaly reports.

Host — Enforcer

Pull the plug, ban, destroy/recover dirty containers; business keeps flowing.

Website Brain — Commander

Policy, queue, fairness timers, alerts. Someone always takes the ticket.

Four avatars diagram

v1.4.0 “Eiffel Tower Plus 2nd Generation”

Dual Gates

Gate 1 issues access_token + cookie; Gate 2 pre-VNC cookie match; mismatch = 401.

Hard Limits

GPU power cap / CPU cores / Max RAM — no abuse, no “stolen cores”.

Forensics by Default

UID/PID/Shell + timestamps packaged on host desktop.

Gate 1 → Gate 2 → VNC flow

How it works (30s)

  1. User starts → token issued; Nginx gets key; browser gets cookie.
  2. Session opens → second local check; legit passes through.
  3. Run guard → hard-limits + 5s patrol; anomalies cut traffic only.
  4. Closure loop → protect → forensics → Alerts (optional email) → order cleanup.
  5. Human handoff → support contacts fast; mistakes forgiven, malice pursued.

Value

Safer

Dual-gate + patrol + hard-limits.

Stable

Isolate violations; queue & business don’t stop.

Fair

Native queue, countdown, expiry cleanup; no ghost machines.

Compliant

Evidence chain complete; “Dog kicks, humans follow”.

Operable

Decoupled avatars; rolling upgrades under control.

What it handles (Ops)

The website cleans up expired data, schedules startups, queues, corrects data errors, rejects "ghost machines," issues offline alerts, and covers human errors; it also dispatches machines for shutdown. Agent: Covers heartbeat, destruction, and backstopping. Container: Intelligently analyzes illegal operations.

Pinned alert banner