Systema: Six Hats, Six Coats and Six IDs

I just read an article about OpenID being adopted in France. I am certain that a single ID is a mistake. Of course I would recommend six IDs. One ID for each of the Observer Entities. The ResidenceID would be the SecureID used for the estate including capital.

  1. ConscienceID — Used for charitable access
  2. GovernanceID — Used for citizenry access
  3. ProfessionalID — Used for business access
  4. AcademicID — Used for academic access
  5. ResidentID — Used for estate access
  6. RegularID — Used for routine access

Quadrant Theory

Judah Thornewill predicts: “Major online internet useage research firms will record that over 3 billion people in 2025 managed their incoming and outgoing digital information using a graphical user interface based on Quadrant Theory – as described in Marshall McLuhan’s “Tetrad” model in Laws of Media, Ken Wilber’s Holon in Sex, Ecology Spirituality, and R Buckminster Fuller’s Tetrahedral structures in Synergetics.”


I think this is an interesting prediction by someone trying to develop a product based on an unexplained concept. However the project appears to have vanished along with the website. What I plan to glean from it is Ken Wilber’s work. I plan to give it a read.

System Security

John Zachman’s use of the basic interrogatives to define a system lends itself to alternative analysis. One of these cases is system security. When it comes to security there are only four acts you can commit: Select, Insert, Update and Delete. However, you can commit these acts for each of the Zachman Framework Focuses: Data, Network, Motive, Process, People, Time and each of the Zachman Perspectives: Conceptual, Contextual, Logical, Physical, Mechanical, Instantial. What you have as a product is not just a security table, but a security cube. Below is an example of a security table defining 24 possible violations:


A security cube would define 4 x 6 x 6 = 264 possible violations. It should be added that violations do not always work in isolation. For example spyware is a procedural insert and data selection. How many cells in the security cube would be affected if a plane crashed into one of your facilities?

It is also important to note that preventing snooping (or sniffing) is often an effective way to prevent the other three manipulation operations.  What they can’t see can’t hurt you.