top of page
Search

Low CPU Usage User Interfaces for high level languages

  • Writer: Anthony Matarazzo
    Anthony Matarazzo
  • Oct 15, 2019
  • 2 min read

Updated: Nov 2, 2019

The c++ GUI template DOM can provide the same user interface capabilities to other programming languages as typically the c++ calling convention is supported in a binary fashion. This means that the oldest of CICS can be maintained in a secure fashion without the necessity of an insecure browser. RUST can be provided with a cargo package that links from a binary prespective. PYTHON, a primary language of modern day, has the ability to link directly through a data type conversion layer as well as a binding protocol method. COBOL programs using the Microfocus compiler may also be linked with the library.

The library is useful in these capacities because it is focused on visualization and GUI representation making the subsequent implementation compact and shielded. One reason this is possible is due to the low level c++ language's use in instantiation of many forth generation technologies.

Another realization found within the design is that of a booting image. The image produced can include a Linux based kernel or a L4 microkernel.

If need be, a mask ROM or PROM booting unit that is cost effectively made can be an offering for specific industries. The units may be recycled reusing the most expensive parts such as the LCD, internal data storage mechanism, communication hardware, keyboard, mouse, mother board, touch pad and exterior cover. The capacity for PROM plug ins with a secure locked chassis should be important for the form vision in some implementations. However as a non electronically soldered chip, the possibility for unsupervised replacement exists. In this regard, the process is still physical office security. The ability to use PROM chips may offer a slight decrease in initial production costs compared to a full scale mask ROM fabrication. That is, the boot image data can be written within a secure environment using a PROM burner. This type focus can significantly reduce data exposure within a large scale organizations such as government facilities. Yet the vision is a different hardware architecture than currently available.

Typically arguments have arisen in message boards that claim the ROM boot image technology is a false road. However, I argue that a tested micro Kernel without security holes must be attainable for a form machine. In this regard, the problem is about placing trusted cyber security people and tests at the PROM burning layer or EROM fabrication layer. This will be a vexed discussion that system hackers will use to keep back doors open I think. For the intelligence community, a computing device that is changed yearly, or quarterly is insignificant in costs compared to sensitive data loss.

See Also:

 
 
 

Recent Posts

See All
Critical Economics

Organizations such as unicef must be accounted for in the strategic design of economic systems. With a system of distribution there are...

 
 
 

Comments


bottom of page