Capability-limited, object-oriented machine code is explained by Kenneth Hamer-Hodges in his trilogy on Industrial Strength Computer Science as the flawless solution to the malware vulnerabilities in binary computers. The approach enforces the laws of the Lambda-Calculus (λ-calculus) to creating modular, hardware protected and decentralized functional programs. Assembles like LEGO blocks, in defines application namespaces guarantees security by detecting program bugs and enemy malware, preventing every form of interfering corruption and previously undetected errors using detailed, machine level access rights. It guarantees software is resilient and detects data breaches, hidden backdoors, superhuman AI malware, and ransomware attacks.
In this system, the machine code replaces shared physical addressing with namespace keys that limit access rights to digital objects, enforcing security by detecting every hidden, disguised, and latent software error. Every digital object has a unique immutable namespace key that gives access to just the specific digital object as needed to function, acting as an error filter or digital passport. This method provides programmable security enforced at the most detailed granular level of individual machine instructions as fail-safe program steps. It makes flawless robust codes resiliant to all future attacks.
The idea moves away from centralized operating systems and monolithic virtual machines of shared, compiled code to a modular, decentralized approach, which mirrors how nature works, with each digital unit running independently and protected like a safe deposit box in a bank while contributing to the overall health and stability of the system.
The books by Kenneth James Hamer-Hodges explain what, why and how to achieve Industrial Strength Computer Science and resolve the chilling reality about the very foundations of our digital world. A world enveloped by unguarded, unreliable, poorly constructed hardware, undetected errors, and poor software, plagued by crime, ransomware, and enemy attacks. These three books cover every aspect about future safe cyberspace and the only adequate solution. He reveals the terrifying flaws in our current binary computer systems used daily worldwide. He warns of an impending doom that will destroy Western society as we know it.
Reevaluating Computer designs, Hamer-Hodges reveals that the outdated binary computers are not just flawed, but dangerously so. These digital computers were only intended for mainframe shifts as batch processors in the 1950s, 60s and 70s. The simple instruction sets are challenged by endless software progress. The hardware is overrun by sophisticated machine code for networked crimes impossible and unconsidered decades ago before the Internet.
Worse, the centralized, privileged requirements of dictatorial operating systems that map the physical design of a binary computer into the logical requirements of software are unscientific paving the way for dystopian "digital dictatorship," ruling the information age, leading to unprecedented levels of social oppression and individual surveillance converting western democracies into Orwellian, enslaved societies.
The historical perspective is a stark contrast. Computer science began as the enabler of individuals as trading nations using the abacus and as industrial societies using the slide rule. Tools that created international trade and the industrial marvels of the 20th Century that landed mankind on the moon. They were private, transparent, secure, and reliable. They hid no undetectable errors. This comparison highlights just how far binary computers stray from applied infallible science into the perilous unknown of a superhuman AI breakout and global domination by a handful of digital dictators.
The Church-Turing thesis is the beacon of hope that avoids this grim future. Hamer-Hodges argues that unless we shift computer designs to this modular and decentralized framework, defined by the Lambda-Calculus that empowers the science of the Church-Turing Thesis, cyber society is doomed to the digital dictatorship of binary computers and endlessly exploited by hidden vulnerabilities with catastrophic consequences far more serious than today's arguments over TikTok ownership, false news, and deep fakes
The solution is radical: the digital implementation of the functional lambda calculus computational model embedded in Capability Limited, Object-Oriented Machine Code (CLOOMC). Imagine monolithic software as LEGO objects, each piece a vital part of a secure, robust, engineered, and resilient networked programs called cyberspace. The monolithic binary trajectory is far from the scientifically integrated ideal.
Hamer-Hodges shows how this concept that is our salvation: capability-based, object-oriented machine code. This system distributes power incrementally as digital keys to detect access errors in advance at runtime on the digital surface of computer science. It protects access rights to the function and form of any digital resource on the surface of computer science, guaranteeing flawless security, preventing breaches, and detecting errors. But without action, it stays a dream.
Ken explains the Plessy PP250 system from the 1970s, is a haunting reminder that we once had the means to secure our digital future. The fact that we abandoned this technology is a testament to our perilous path created by operating system designers that only serve as the henchmen of the digital dictators of the computer industry.
His Call-to-Action is a dire warning: society must awaken to the dangers lurking in our digital infrastructure that impact society and will lead to Orwellian authoritarian governments. We must demand digital transparency, ethically fail-safe machine code, transparent software, and trusted computing models that replace flawed binary computers. Cybersociety cannot survive on an unreliable digital foundation. Only trusted Church-Turing Computers can guarantee the security and individual empowerment proven by the abacus and the slide rule. The clock is ticking, and our very future hangs in the balance.
Distribution:
- Tech Conferences
- Academic Panels
- Public Forums
- Industry Workshops
- Government and Policy Briefings
- Media and Broadcasting
- Corporate Seminars
- International Summits
Conclusion
Comments