Print this Page
knowledge manager
3.7 Knowledge
03. Fourth Generation Knowledge
Close this Page

37-03. Fourth Generation Knowledge:
1. Business requirements are continually evolving and so data management must evolve in the same way at the same time.
2. SQL has been the standard data management tool for fifty years from 1970 to 2020 - that era must be replaced with something much better.
3. Many alternative NOSQL solutions exist, but most try to emulate the capabilities of SQL and reuse SQL skills with trivial benefits.
4. A disruptive change to a far better data management service is practical that is based on a few foundations as:
  (1) Data must evolve to become Information and Information must evolve to become Knowledge.
  (2) Abstract Syntax Notation (ASN/1) as used by XML and IRDS is the core design to replace SQL with a Tag=Value notion.
  (3) Fourth Generation Language (4GL) as used as the data definiton language for all tags that are independently encrypted.
  (4) Business data is never stored but represented by a three level fragmented data structure.

Glossary:
Image means a storage object that is similar to an SQL table.
Record means a unique encrypted token (as primary key) and one or more encrypted fields.
Field means a variable length encrypted field value, a fixed length encoded field value or a fixed length encoded token.
4GL is a kind of image that defines the internal structure of an associated ASN image.
ASN is a kind of image that represents encrypted business data values.

2. Cyber Warfare:
1. The greatest invention of the past decade may be cyber warfare where intellectual property is silently stolen and exploited.   It is suggested that every company with a Microsoft Exchange Server has had all their emails and attachments silently stolen by many government sponsored agencies.
2. The vast majority of business data is stored in documents and files that are easy to steal and easy to profit from.   The systematic theft of intellectual property increases year on year because very large number of application programs have a untold objective of stealing information.
3. Because the very best cyber warfare attacks are silent and leave no trace, most companies never find out that their intellectual property has been stolen.   Competitors may buy intellectual property from the dark web without understanding they are part of criminal conspiracy.
4. Every business must follow the example provided by politicians to "gather the dirt" on competitors from unsavory sources.   To win an election or to win market share may mean buying information from "consultants" who know in advance the marketing and sales plans of competitors.
5. While some people may imagine that the cyber war will one day be won, the fact is that the people influence public opinion are driven by the rewards of cyber warfare.   Cyber warfare is the greatest invention because it has built in resilience to never be stopped, to continually grow and to feed politicians with the fake news they need to get elected.

3. Benefits:
1. Business data is never stored and so cannot be stolen - all other issues are of little consequence.
2. Field types are simplified as variable length up to 4000 characters.
3. Data structures can evolve and migrate from one layout to another.
4. Encryption methods can evolve from one edition to another.
5. Flexible structures mean a person may have many addresses and many skills without limit.

3. Reportable Data Breach:
1. The primary objective is to eliminate any possibility of a reportable data breach.   It does not matter what it costs or what needs to be done, the possibility of having any business data stolen or lost must be eliminated.
2. Only three ERA things are needed to eliminate the possibility of a reportable data breach of any business data as:
  (1) Encrypt everything so it is worthless to a criminal because business data is never stored and cannot be stolen.
  (2) Replicat all encrypted data to many secret data centers so nothing can be lost or anything that is lost can be replaced.
  (3) Authenticate and monitor every sign-in request to ensure that only approved people can access business data.

4. How it works:
1. A 4GL image defines the internal structure of each ASN encrypted image.
2. An encrypted image holds one or more encrypted records and each record holds one or more encrypted fields.
3. An encrypted field may hold:
  (1) A variable length encrypted field value.
  (2) A fixed length encoded field value.
  (3) A fixed length token to a different image record.
4. As a policy, data is fragmented to a very large number of small images.   For example, a customer record may only hold tokens to records for (1) Person, (2) Address, (3) Bank, (4) Company, (5) Credit, etc..   In turn, a person record may only hold tokens to records for (1) Name, (2) Email, (3) Phone, (4) Job Title, (5) Birthdate, etc..
5. A simple image holds one or more encrypted records that represent an encrypted token with an encrypted field value.   A list of all town names is a typical simple image that enables every instance of a town name to be represented by a token in any record.
6. A current limitation is three levels of images.   For example; an image record may hold a token to a diferent image record and that image record may hold a token to a simple image record.   An image below the root record may be known as a "crum" of knowledge. Records are evolving to assumble a large number of crums of knowledge.

5. Token Design:
1. By design, tokens are designed to look like other tokens, so nothing can be infered by a token value.   For example; the town "Watford" may be represented by a token as "13 Nov 2017" and the currency for Germany may be represented by a token as "13 Nov 2017" and persons email suffix may be represented by a token as "13 Nov 2017".   A persons date of birth may be represented by a token as "12 Nov 2038" and the persons contract preference method may be represented by a token as "12 Nov 2038".
2. A very large number of tokens may look like dates, however the token that is stored in a record is not the same value as the encrypted token stored in a different image.   Every image has its own unique encryption methods for both its tokens and its fields - these methods are defined in the associated 4GL that defines the image.

6. Encryption Design:
1. Many thousands of different encryption methods are deployed in many layers.   All the standard encryption methods like AES and MD5 are used in addition to many lesser known methods.   Fields are encrypted using many different encryption methods. It is expected that any one encryption method can be cracked, but an unknown number of layers using different methods cannot be cracked.   If a specific field is decrypted, all other fields use different layers of encryption methods so most data remains secret.
2. Encryption methods are evolutionary so as continual improvements can be introduced and changes applied at any time.   The encryption methods used are registered within each record, so some records may be encrypted using one method and other records encrypted using different methods.
3. The 4GL definiton holds the "old" and "new" specification of any record so record layout can evolve over time.   Some encrypted records may hold 10 fields and other records hold 20 fields in the same encrypted image.   No more than two different field layouts may coexist at the same time.

Personally Identifiable Information: (PII)
1. For every person, the following crums of knowledge are being relentlessly accumulated:
1. Name: gender, date of birth, place of birth, marital status, mobile, wealth rank
2. Address: birth address, address when married, home phone, culture, ethnicity, religion, politics
3. Company: Job Title, Salary rank, Address, business phone, company rank
4. Skill: clubs, sports, interests, achievements, qualifications, career progression, training
5. Asset: holiday, travel, home equipment (heating), vehicle (transport), purchaing power
* Parent: family, as other named people
* Child: family, as other named people
* Partner: go-out-with, as other named people
* Friend: work-with, neighbour, as other named people
2. The power and value of PII comes not only from the many crums of knowledge, but the person-to-person association.
3. Where a person chooses to live may influence their politics and their political views may influence where they choose to live.
4. A persons religion may be dominated by where they were born, their culture and ethnicity. Religion rarely evolves.
5. A persons environmental attitudes may be identified by their means of transport and heating system.

Document Control:
1. Document Title: Fourth Generation Knowledge.
2. Reference: 163703.
3. Keywords: Knowledge; Fourth Generation Knowledge.
4. Description: Knowledge; Fourth Generation Knowledge.
5. Privacy: Public education service as a benefit to humanity.
6. Issued: 12 Nov 2017.
7. Edition: 1.2.

Bitcoin:
1. Bitcoin is that same thing as a twenty pound note - currency to be transfered between people with no banking overhead and no taxation.
2. A twenty pound note is a promise to pay by the Bank of England that has the right to revoke that promise and to devalue the amount as it chooses.   The value of the twenty pound note has a ten year trend of continual devaluation of 20% to 40%.
3. A Bitcoin is a promise to pay by millions of equivalent people in all parts of the world and each person may revoke that promise and may pay what the buyer chooses.   The value of a bitcoin has a ten year trend of continual growth by many hundreds of percent.
4. One thousand pounds worth of Bitcoins bought in 2011 are now worth eight million pounds while that one thousand pounds left in the bank is now worth 700 pounds.   The risk-reward decision means that some people can become financially independent for life by investing less than one thousand pounds today.
5. Bitcoin is just one or many hundreds of different digital currencies that are traded around the world.   While the majority of people are constrained by governments to bank in local currency with banking overheads, government oversight and taxation, a few have achieved finacial independence based on digital currencies.   While most financial instutions must hope that digital currencies are a bubble that will explode and die, a few people will earn very good rewards without taxation.
6. If a person invests just one percent of their savings in Bitcoins and the Bitcoin bubble bursts, then their savings have dropped in value by one percent that is less than annual devaluation on savings.   If that one percent of savings increases by 800%, then that one percent is worth 9% of savings at the end of the first year.   If that new 9% of savings is kept in Bitcoins for the second year, it will become worth 65% of savings at the end of the second year.   If that new 65% of savings is kept in Bitcoins for the third year, it will become worth 500% of savings at the end of the third year, while the other 99% of savings will have devalued by 10%.   If that new 500% of savings is kept in Bitcoins for a fourth year, it will become worth 4000% of savings at the end of the fourth year, while the other 99% of savings will look trivial.   If that new 4000% of savings is kept in Bitcoins for a fifth year, it will become worth 32,000 times what the original of savings were worth while 99% of the original savings remaine untouched in reserve.
7. If the growth of Bitcoins does not keep on growing or bursts, then 99% of your original savings remain untouched as only one percent was use to speculate on possible financial independence.   Only a small fraction of a percent of the world population have the means to speculate on Bitcoins, some have already become financially independent, more will become financially independent and some may loose some or all of their investment.
£1,000 invested in Bitcoins in Dec 2017 could be worth £3,000,000 in five years - or it could be worth nothing or anything inbetween.
£1,000 invested in the bank will devalue by 2% per year and be worth £900 in five years.
8. GAME: you have a free BC account on your daily diary with an starter pretend investment of say one thousand pounds.   You can monitor your BC account in parallel with your other bank accounts to compare and learn.