Operating system construction
I have some ideas for a great operating system, but I still have no clue as to how OS's are created. If anyone has any information, I'd appreciate it.
My basic idea is to have all files be the same, read with an advanced software which determines the method of reading it (image, text, music) based on a segment of code at the begining of the file. The memory is constructed as a four dimensional "room", where every file is an "event", and the user can specify where in all four dimensions the event they're looking for is. They can name the spaces too. The internet can simply be a door to other rooms. Files aren't traded between computers, rather, a file is sent into the other computer (which has to be verified by the other's security system), which runs its password and reads the file, and then sends the information back to the user's computer through a higher-dimension information stream, which would be encrypted. Every computer has a security system, which exists in a higher dimensional area of the computer (inaccessible to others. It has the ability to scan through the whole memory for anything foreign, without being directly involved. there can also be another redundancy security system which monitors the primary security system).
Basically, all files are of the same type, run by the same program. This program decrypts the files, then determines the type of output based on a segment of numbers. It then reads the file's information. Memory is stored in a four dimensional array, with a fifth dimensional security system overlooking it, for anything that doesn't belong. All files contain special numbers, some coming from an ID number in the security system (inaccessible anywhere else), some coming from the storage location of the file, which are randomized and stored in a location on the file. When a file is created or brought in from another computer, it is given these numbers. If a file doesn't have them, it is quarantined.
If a file attempts to modify the OS without the verifying information, then it is deleted. The ID numbers cannot be picked out from the numbers in other files, because it is encrypted, so there is no way to fake them. This controls which files can modify the OS. If a file will modify the OS, then it is verified and run by the OS, so that it will make its modifications. The security system also monitors what is being done to the OS at all times, controlling that too.
I've never seen Tron.
I will try and figure out exactly how to explain it, and type it up then. :cool: