{"id":9,"date":"2015-06-17T21:09:52","date_gmt":"2015-06-17T21:09:52","guid":{"rendered":"https:\/\/glonetcomp.com\/?page_id=9"},"modified":"2015-06-17T21:33:59","modified_gmt":"2015-06-17T21:33:59","slug":"a-closer-look","status":"publish","type":"page","link":"https:\/\/glonetcomp.com\/?page_id=9","title":{"rendered":"A Closer Look"},"content":{"rendered":"<p style=\"color: #000000;\"><span style=\"text-decoration: underline;\">THE PROBLEM<\/span><\/p>\n<p style=\"color: #000000;\">\u00a0The current architecture for computers is obsolete.\u00a0Essentially unchanged since 1945, it was originally designed for a stand-alone computer. With the Internet providing connection to a billion other computers, it is inherently defective.<\/p>\n<p style=\"color: #000000;\">\u00a0The modern computer&#8217;s basic architectural defect has been overlooked in today&#8217;s golden age of specialists because of its sheer generality and utter simplicity.\u00a0The big problem is that existing computers have only a single, unitary hardware structure.\u00a0Consequently, computers have no effective internal hardware defense to prevent even a single virus or any other software malware from going absolutely anywhere inside the computer or doing anything, however destructive, without any fixed limit.<\/p>\n<p style=\"color: #000000;\">\u00a0By its very hardware structure, then, existing computers are innately vulnerable to Internet attack by software malware and cannot be successfully defended internally by software alone.\u00a0All that is required for successful attack is entry into the computer, which Internet connection to millions of malware sources now virtually ensures.\u00a0Some malware inevitably gain entry and just one can be fatal.<\/p>\n<p style=\"color: #000000;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"\/assets\/images\/Slide2.jpg\" alt=\"Slide 2\" width=\"679\" height=\"525\" \/><\/p>\n<p style=\"color: #000000;\"><b>\u00a0<\/b>Consequently, however high tech they may be otherwise, existing Internet computers simply cannot be made reliably safe.\u00a0In terms of basic structural architecture, they are only as high tech as the\u00a0Titanic, with essentially the same basic structural defect.<\/p>\n<p style=\"color: #000000;\">\u00a0<span style=\"text-decoration: underline;\">THE SOLUTION<\/span><\/p>\n<p style=\"color: #000000;\">\u00a0The solution is a simple new computer architecture to solve the overwhelmingly complicated problem of Internet security.\u00a0A new, inner\u00a0<span style=\"text-decoration: underline;\">Private Unit<\/span>\u00a0is created by using an uncomplicated inner hardware firewall\u00a0to protect the computer&#8217;s Central Controller (together with microprocessor and memory), making them inaccessible from the rest of the computer and thereby also inaccessible from the internet.<\/p>\n<p style=\"color: #000000;\">\u00a0The remaining\u00a0<span style=\"text-decoration: underline;\">Public Unit<\/span>\u00a0includes one or more additional microprocessors (or cores) and memory, and is connected to the Internet.<\/p>\n<p style=\"color: #000000;\">\u00a0The computer&#8217;s Internet-disconnected\u00a0<span style=\"text-decoration: underline;\">Private Unit<\/span>\u00a0controls the Internet-connected<span style=\"text-decoration: underline;\">Public Unit<\/span>.\u00a0Communication between Units is generally one way only, outbound fromPrivate Unit\u00a0to\u00a0Public Unit, so the Central Controller functions generally like a TV remote controller (signals out only).<\/p>\n<p style=\"color: #000000;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"\/assets\/images\/Slide4.jpg\" alt=\"Slide 4\" width=\"679\" height=\"525\" \/><\/p>\n<p style=\"color: #000000;\"><b>\u00a0<\/b>In effect the new architecture subdivides the computer into two separate parts, creating a\u00a0<span style=\"text-decoration: underline;\">new bilateral structure<\/span>.<\/p>\n<p style=\"color: #000000;\">The bilateral structure is particularly useful now, when microprocessors are also evolving from a uni-processor into a multi-core structure using two or more processing cores, like the Intel Core 2 Duo.\u00a0The new bilateral structure is architectural change at the simplest, most fundamental possible level.<\/p>\n<p style=\"color: #000000;\">Copyright 2010 by Frampton Ellis<\/p>\n","protected":false},"excerpt":{"rendered":"<p>THE PROBLEM \u00a0The current architecture for computers is obsolete.\u00a0Essentially unchanged since 1945, it was originally designed for a stand-alone computer. With the Internet providing connection to a billion other computers, it is inherently defective. \u00a0The modern computer&#8217;s basic architectural defect has been overlooked in today&#8217;s golden age of specialists because of its sheer generality and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-9","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/glonetcomp.com\/index.php?rest_route=\/wp\/v2\/pages\/9","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/glonetcomp.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/glonetcomp.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/glonetcomp.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/glonetcomp.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=9"}],"version-history":[{"count":2,"href":"https:\/\/glonetcomp.com\/index.php?rest_route=\/wp\/v2\/pages\/9\/revisions"}],"predecessor-version":[{"id":26,"href":"https:\/\/glonetcomp.com\/index.php?rest_route=\/wp\/v2\/pages\/9\/revisions\/26"}],"wp:attachment":[{"href":"https:\/\/glonetcomp.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}