Programming codex

Between Ones and Zeros: The Binary Code Paradox


Computers and the entire global network sphere has suffered much from unpredictable people who refer to themselves as hackers, but I guess that’s the price you pay for taking on the role of the “creator” of sorts. I mean if God despite his great power and wisdom could not prevent the eventuality of the Devil, then the same principle can be seen with anything created and ultimately it will experience failure. However, I’m not here to talk about metaphysics or religion as I am no expert in philosophy but I know a thing or two about computers and programming. In any case the information super-highway has been so convoluted by computer virus et al that it now creates a binary code paradox.

The Finite Paradox

Binary codes and the combination of them thereof can only be paired up to a certain number of combinations and are not infinite. These results in bugs, worms, malwares and viruses that gets into your system and causes minor malfunctions or sometimes wreaks havoc. The binary code system, which has been the basis for our network infrastructure for almost half a century now, hasn’t changed; and usually it is the people who designed or helped developed the system are the ones responsible for data intrusions. If we are to prevent data breaches we will have to completely redesign the network infrastructure.

Multilateral Coding

Many computer programmers and experts in this field feel that a new system is needed instead of a better anti-virus protection system. If we were to use a triangular or even tera-coding (that’s 1×1012) we would make a single character having a very long string of codes that will make hacking a system comprised of such codes almost impossible to penetrate. However, the disadvantage in such a system is that it will use up too much disk space, but if we will not create a system based on multilateral coding then at least we need to design an entry port filter in such ways in order to prevent data intrusions.

Research & Development

Companies that have enough resources may have already considered this publicly or secretly developing it, but the need for such a technology is not a compromise anybody’s willing to make at the moment. So perhaps they will wait for the right moment to introduce it to the public when it is most needed and it favors the creators of such a technology because it will create more demands – and more demands means more profits. The companies who also subcontract to the military may have something of their own version of such a system under development.

The Future of Internet and Global Communication

Essentially in about 2-3 decades from now the internet and global communications will make a quantum leap and soon we will be incorporating nanotech in building our computers. But while nano technology may still be out of reach of ordinary citizens it is certain that databases and servers will be based on such a technology and so quantum processing will also be achieved. The future of Cloud computing will have a nanotech core processor and multilateral coding having an extremely high data encryption level that is impregnable.

What About IT Support and Anti-Virus Protection?

Having an efficient computer means having super strong defensive capabilities and is therefore able to fight off any data corruption or intrusion on its own. But even so networking is still a very big benefit because a network defense like a Cloud-based security system will ensure the highest protection level offered to any remote endpoint user. Hacking will either become very difficult or will be enhanced, but I am doubtful about the latter as it will take a very clever programming to get around a network-based defense such as the Cloud-based security system.

The Most Pressing Problem of All

One of the things that has not been addressed is what kind of virus program will hackers develop and what level of intrusion/damage are we looking at? If our primary programming language will still be based on the C language and Java by 2030, then it’s possible that the virus programs that they’ll come up with will also be based on similar programming languages. But even so with today’s binary computer codes as it is, is still so difficult to detect, analyze and segregated for destruction, how much more if virus programs are written in 4, 6 or 10 combination codex? It will be a virtual nightmare! However, with a Cloud-based security system in place I am confident that it will be a powerful deterrent against intruders.


It would be very nice when we’ll finally get to use this kind of system on a global scale as it will provide excellent protection even for a single computer. It will also provide a vast potential to computer technology and the advancement of human society as well as economic and global stability. Right now the trend moves toward Cloud computing and it is indeed a very promising next step in networking and in terms of providing security and ongoing system maintenance. Until the time comes when world events will ultimately require us to advance and use a multilateral coding system, then we will have to wait for that turning point.


Source by Herman A Skew

Share on facebook
Share on google
Share on twitter
Share on linkedin
Share on pinterest
Share on whatsapp

Leave a comment

Your email address will not be published. Required fields are marked *



Recent Posts