The Code of the West

The Code of the West

It was my original intent to pattern the structure and operation of the Global Matrix on the principles of "inverse" cryptography. Cryptographic analysis attempts to find patterns of frequency, sequence, and position; or conversely, to hide them. Our goal is to use the same elements of frequency, sequence, and position to generate generic categories, processes, and landscapes.

Compatibility of databases is assured through a shared interface, and all generic traffic is encoded in units of "highest common denominator" status, through the "Generic Sieve." This. Algorithmic Condensation allows for incredible data compression, in both instruction and traffic. The initial coding in any file is an algorithmic instruction for its use. Any two data bases sharing the same co-ordinates can "encode and compress" any generic data.

Since the Global Matrix was built as a facsimile of the Cryptographic environment, both encryption and decryption are facilitated, however, it is intended that the structure of the Global Matrix be as "transparent" as possible. The future of Cyberspace will be determined by open source codes, voluntary effort, and international cooperation.

Development of networking and data bases is important but we need a common reference space, a common logic system, and common generic categories.

With these structures in place, we can develop a Generic Software com-posed of Roots, Modules, and Blocks, which is self-organizing and internally determined by frequency of usage, and generic category.

In order for any "standard" to be universally accepted it must be seen to be both fair and advantageous to all concerned parties. In order for any "standard" to be universally effective requires the participation and concerted efforts of all concerned parties. Global Matrix was designed with these express purposes in mind.

IP Security Protocols Eva Bozoki Dr. Dobb's Journal Dec. '99

 


<BACK     |     NEXT>