To get notices of new blogs via email, click here:

Monday, December 13, 2010

The Perfect Virus principle #18: Universalization

As indicated in my post of Monday, 11/22/2010, I am extrapolating Jeff Walker's Principles for the Perfect Application into a discussion of The Perfect Virus. Since Jeff's monograph on the subject did not anticipate stealth or suicide mechanisms, any errors or lapses into stupidity are solely my additions and should not reflect poorly on what I consider to be the biggest single contribution to software application design since the invention of computers. And Jeff, thanks for giving me permission to do surgery on your baby.
THE PRINCIPLE OF UNIVERSALIZATION: The Perfect Virus transcends mere globalization by implementing Black Box Portability (principle #7), allowing it to deploy in any combination of language, cultural, technological or species environments. Not only does The Perfect Virus thrive in all past, present or future technologies on this planet, but it will "grock" any conceivable cybernetic mechanism that presents itself (ie; that queries) to the existing virus host.

Typical specifications for globalization are mostly currency and language related. The typical Oracle nod toward globalization is double-byte characters, to accommodate the Asian markets. The Perfect Virus takes this much further.

It is likely China will be developing (or maybe has already developed) one-of-a-kind technology with which they will conduct cyber warfare. The only common denominator will be TCP/IP. Add to that uniqueness a stronger native encryption algorithm, Chinese language metaphors, and maybe even a new user interface standard, and you have a formidable target. The Perfect Virus must be able to penetrate that target the minute it presents itself to a properly configured host system.

Sound impossible? I have a couple of hypothetical mechanisms in mind I plan to employ in my next novel. I'm sure if you think about the problem for a while, you'll come up with your own.

No comments:

Post a Comment

Implementation suggestions for THE MORGAN DOCTRINE are most welcome. What are the "Got'chas!"? What questions would some future Cyber Privateering Czar have to answer about this in a Senate confirmation hearing?