From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,FREEMAIL_FROM autolearn=ham autolearn_force=no version=3.4.4 X-Google-Thread: 103376,5f77b73c5df291a2 X-Google-Attributes: gid103376,domainid0,public,usenet X-Google-Language: ENGLISH,ASCII-7-bit Path: g2news1.google.com!postnews.google.com!t3g2000yqa.googlegroups.com!not-for-mail From: Cedric Lannock Newsgroups: comp.lang.ada Subject: Re: Building a new OS using Ada Date: Wed, 11 Feb 2009 21:50:15 -0800 (PST) Organization: http://groups.google.com Message-ID: References: NNTP-Posting-Host: 77.180.57.200 Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit X-Trace: posting.google.com 1234417815 1369 127.0.0.1 (12 Feb 2009 05:50:15 GMT) X-Complaints-To: groups-abuse@google.com NNTP-Posting-Date: Thu, 12 Feb 2009 05:50:15 +0000 (UTC) Complaints-To: groups-abuse@google.com Injection-Info: t3g2000yqa.googlegroups.com; posting-host=77.180.57.200; posting-account=R80nsQoAAADNWKZhSnWyt-Rp7ZyxrQGD User-Agent: G2/1.0 X-HTTP-UserAgent: Mozilla/5.0 (X11; U; Linux i686; de; rv:1.9b5) Gecko/2008032600 SUSE/2.9.95-25.1 Firefox/3.0b5,gzip(gfe),gzip(gfe) Xref: g2news1.google.com comp.lang.ada:3610 Date: 2009-02-11T21:50:15-08:00 List-Id: > > Each single individual has only a small brain with a very simple > > program but hooking them together by exchanging pheromones when > > touching they can make complex decision within their swarm. We could > > make it similar when developing a new OS. > > As a common rule, a trust is a vulnerability. > > The only exclusion I can see is F2F darknets, where every peer owner > knows owners of neighbour peers (and this isn't necessarily transitive). > > You could experiment with F2F at the moment. No need to wait a new OS. > > As RIAA shuts down torrent trackers and dc++ hubs, people are more and > more interested in preserving their life style. F2F is the answer. > Finally, there is no server. Just people's computers and nothing else. > > You'd have hard time describing f2f benefits for those who haven't used > p2p, but p2p is nowadays not uncommon. > f2f is a concept that looks at different computers hooked to a network. With regard to system theory (http://en.wikipedia.org/wiki/ Systems_theory) this concept could also be used inside the OS. If on a computer only the OS is installed, the OS could look for components needed to fulfill a certain task on other computers it knows. These components could be used if trusted. But there is another aspect in this context: If the components of the OS or other Apps are stored distributedly somewhere in the net then the hole systems relies on the connection to this computers. To handle this the OS could store a list of computers of which it knows that a certain component is available there. When a certain component is needed the OS could query the computers in its list. Each time it queries this computer it could add a success counter to the computers address in its list. If the computer is not available it tracks it by reducing the counter. If the first computer is not available it tries the next in its list. Doing this it has a list of trusted and available computers I can rely on. Furthermore the computer cells within this internet organism could query the lists of available and trusted computers and if the computer queried is trusted it could copy the list for its own work. Having such a concept in place the installation of an application would result in building lists of computers for the components needed. But there should be the possibility to store some or all components locally in case the internet is not available. The user should be allowed to choose how he/she would like to work. But how to distribute a new OS to the users? As the kernel could be comprised of only a few thousend lines of code the OS is small enough to be distributed a worm. It could be DISTRIBUTED as one but not BEHaVE as one. A littel GUI could pop up and ask the user if it could be installed in parallel to the existing OS. If the user agrees the current setup is stored and a boot loader is installed making it possible to run the new OS out of the existing partition. This boot loader should offer the opportunity to uninstall the OS at any time and restore the formly setup completly. Such a thing is only possible if the OS and all applications can be stored distributed and if there is no need to install everything a one machine. Cedric