Civilizing Cyberspace - Fighting for Digital Democracy
Slider
Fighting for Digital Democracy
Secure Cyber privacy for every Citizen's private data. A cyber society governed of the people, by the people and for the people.
Slider
Industrial Strength Computer Science
Trusted Software in Capability based Church-Turing Machine. Software reliability that lasts for decades without malware the scourge of hacking.
Slider
Object-Oriented Machine Code
Extreme Computer Security for modular mathematical software defined by the Lambda-Calculus and protected by Capability Keys that belong to the individual citizens of cyber society.

Civilizing Cyberspace

Read More

Industrial Strength Computer Science

Read More

Object-Oriented Machine Code

Read More

Church-Turing Machines

The PP250 is of interest because it is the only example of a Church-Turing Machine. Instead of von Neumann's shared memory the PP250 used a Lambda Calculus Meta-Machine to modularize the Object-Oriented Machine code by adding a handful of functional Church-Instructions. These Church-Instructions use Capability Keys and Capability Limited Addressing to protect the substituted implementations of each mathematical symbol. This architecture detects all software errors, malware and hacking on the spot.

The PP250

PP250 was started in 1969 at Plessey Telecommunications Reseach, pioneering object-oriented programing and Capability Limited Addressing. The goal was industrial strength software reliability that would last for decades.
Private digital property secured by the individual citizens of cyber society is the key to Civilizing Cyberspace as a Democracy of, by and for the people. Capability Keys are owned by individual in a dynamically bound private (Lambda Calculus) Namespace that replaces the statically compiled shared machinery of a General Purpose Computer. Dynamic binding is engineered by a Lamb...

Civilizing Cyberspace

Implementing both sides of the Church-Turing Thesis creates Industrial Strength Computers founded on the laws of the Lambda Calculus enforced by Capability Limited Addressing. The Software reliability matches the hardware reliability by detecting and automatically recovering from any software bugs. Digital boundaries are enforced by Capability Limited Addressing administered b...

Industrial Strength Computer Science

Hardened digital boundaries implemented at machine level by Capability Limited Addressing are key to extreme computer security. The Church-Instruction control computational navigation between private frames of computations. Each frame is a Thread, a private transaction through distributed cyberspace.

Object-Oriented Machine Code