To get notices of new blogs via email, click here:

Tuesday, December 7, 2010

The Perfect Virus principle #13: Stratification

As indicated in my post of Monday, 11/22/2010, I am extrapolating Jeff Walker's Principles for the Perfect Application into a discussion of The Perfect Virus. Since Jeff's monograph on the subject did not anticipate stealth or suicide mechanisms, any errors or lapses into stupidity are solely my additions and should not reflect poorly on what I consider to be the biggest single contribution to software application design since the invention of computers. And Jeff, thanks for giving me permission to do surgery on your baby.
THE PRINCIPLE OF STRATIFICATION: The Perfect Virus is layered to eliminate maintenance, automatically add new functionality, facilitate not-yet-invented innovation, and (once the layer has outlived its usefulness) strip out functionality as demanded by Performance (principle #4),  Stealth (principle #14 to be discussed tomorrow), Mutation Control (principle #6 as dictated by principles #8-10), or a change in goal or policy as communicated from the dashboard under Prosumption (principle #11). True, Stratification is really an enabling methodology to facilitate Mutation Control, and it's certainly possible that a future technology may replace this principle. If so, Stratification will…heh heh… allow this to happen.

Because The Perfect Virus has the attribute of Self Awareness (principle #3), appropriate human analogies might be:
  1. Perform a tonsillectomy or appendectomy on yourself;
  2. Amputate both legs five inches below the knee and install spring steel prosthetics that allowed you to run faster and jump higher; or
  3. Do brain surgery on yourself to remove a tumor.
Having built upon the first 13 principles, tomorrow we'll be ready to consider the real live-or-die attribute of The Perfect Virus: Stealth. Remember your assignment to rent or buy and then watch the DVD movie Zombieland. Do this before reading tomorrow's post.

No comments:

Post a Comment

Implementation suggestions for THE MORGAN DOCTRINE are most welcome. What are the "Got'chas!"? What questions would some future Cyber Privateering Czar have to answer about this in a Senate confirmation hearing?