Thursday, June 27, 2002

So if I write a program that can only work legally with free software,
and distribute it via a click through license that asks for agreement
before the online web service delivers active parsed and ready to
executable data to the client for secure execution and output data that
can only be read legally by free software?


Also all transformations of the data are licensed in such a way like OpenCyc.


The data would be delivered in secure package signed and encrypted for the recipient.


If we limit the data to a such restrained, restrictive, recursive End
User Click-through license agreement and Terms of usage.



It is RIGHT WING, RADICAL and REVOLUTIONARY.



It is *R*-GPL.



Via its license of the output data a as declarative statement in a new
language, all transformations of that data could be a huge amount.



What makes it recursive is that the further your recursively output new
transformations of the existing data by a interpret function being
executed. This becomes memeoidal when it transfers itself via the
internet and is reinterpreted by a host of new people and modified.



Levels of RGPL(RGPL(RGPL (GPL)))=RGPL(3)


The Recursion level 3 is The RGPL exporting meta data, to a RGPLed
program that is outputing a different set of meta data, which is Read
by a Third instance that is RPL(3).



I think that a secure project on savannah would be the first step.


All source code that interfaces to gpl-ed gcc across the net will be
from registered users to a web service. That would prevent a
proliferation of implementations or availability of accessors to
sensitive data.



This idea builds on top of dotgnu and gcc, on top of emacs and all the
gcc and gnu projects could be web-service enabled.



That would allow the persistent, secure and networked execution over a
secure gnu data network.



Access to the meta data of the CVS, MAIL, Web Pages and coupled with a
GOOGLE API hooked up to a DAML indexer we could layout meta data via
VCG into DIA. Then PDF and Webalize it via Doxygen that is modified to
accept meta data from this data source in an XML data stream.



What do you think?


0 Comments:

Post a Comment

<< Home