18-01-2011, 12:34 AM
Jan, I think your assumptions are correct; they are mine as well, and perhaps your comment/question points to the need for us all to be more super-precise if and when possible when discussing this. I have probably succumbed to an easy but bad habit of referring to these kinds of software programs as PROmis as if it is the original version (or even the one modified to have the back door) was the one used or in use when, indeed, it is son-of or great-grandson-of. But we should be sure to stay vigilant and ask for assistance from others who function in the field of computer software at a very high end.
If I understand computer software (not a good assumption), it is simply a chain of commands in certain obscure numeric languages that contain a series of subsets like DNA or a sentence (nay, multiple paragraphs) in English with commas, clauses, semicolons, other punctuation and a burp or two that can be reverse-engineered and re-constructed with ease if you understand the languages, the field, and have the machinery to run and test the program.
I suspect that a great deal of reverse-engineering and re-construction has taken place inside private military contractor organizations which are, both by company and product, proprietary in nature and thus totally unavailable to curious eyes, as well as hiding behind the usual wall of state secrecy.
Thus, at any given point in time, we are not even talking about great-grandsons but distant bastard cousins thrice removed by way of annulments and divorce decrees, marriages with under-aged people in the Church of We-Can-Do-Whatever-We-Want and perhaps even an occasional gene splice.
You will never be able to buy such a product at Operating Systems R US.
If I understand computer software (not a good assumption), it is simply a chain of commands in certain obscure numeric languages that contain a series of subsets like DNA or a sentence (nay, multiple paragraphs) in English with commas, clauses, semicolons, other punctuation and a burp or two that can be reverse-engineered and re-constructed with ease if you understand the languages, the field, and have the machinery to run and test the program.
I suspect that a great deal of reverse-engineering and re-construction has taken place inside private military contractor organizations which are, both by company and product, proprietary in nature and thus totally unavailable to curious eyes, as well as hiding behind the usual wall of state secrecy.
Thus, at any given point in time, we are not even talking about great-grandsons but distant bastard cousins thrice removed by way of annulments and divorce decrees, marriages with under-aged people in the Church of We-Can-Do-Whatever-We-Want and perhaps even an occasional gene splice.
You will never be able to buy such a product at Operating Systems R US.
"Where is the intersection between the world's deep hunger and your deep gladness?"