Ten years ago, computer security guru Fred Cohen made a revolutionary suggestion, one that inverted the roles of hardware and software. In traditional IS architectures, hardware persists while software is transient; the same processor executes instructions from many programs. This is why we say that software runs on hardware. Cohen suggested building an architecture around mobile programs, applications that would move around a network, recruiting and organizing hardware as needed. In this vision, the programs would endure while the hardware would come and go. In effect, the hardware would run on the software.The primary function that Cohen saw for his mobile programs was ensuring reliable and efficient resource distribution. Most computers spend almost all their time doing nothing; Cohen’s theory stated that mobile programs could find and harvest this unused capacity. If you allowed them to copy themselves?an intrinsic part of the vision?they could distribute themselves in huge numbers throughout the whole universe of unused capacity, attacking very large problems with vast amounts of parallel processing.Cohen, now a senior member of the technical staff at Sandia Nation Laboratories and a senior partner with Fred Cohen and Associates consultancy, also defined a set of situations?primarily where programs needed to interact with many databases?when it seemed to make sense for a program to send copies of itself to each database rather than have one master program sitting in a central location and sending requests. Cohen even wrote two Unix programs, both essentially bill-collection agents, to illustrate his concepts. CIO thought his ideas were provocative and potentially important, and in April 1992 we ran an excerpt from one of his articles. After all, this is how the brain seems to work: Memories appear to persist even as individual neurons are born and die. SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe In retrospect, Cohen should have drawn on this biological connection and given his theory some name like “digital neurobiology.” If he had done so, he probably would have been fighting off potential investors. He was a virus specialist, however, (he even claims to have invented computer viruses) and that is what he called his mobile programs?viruses. From his point of view, the term was technically accurate. His articles came with titles like “Harnessing the Subtle Power of Computer Viruses.” (Our own excerpt was titled “The Virtuous Virus.”) At that time, unfortunately, technology culture was in no frame of mind to burden itself with complicated distinctions between good viruses and bad viruses. Today, computer viruses are a nuisance, threatening the loss of a day or two of productivity, if that. In those days, it was not clear that the threats posed by viruses could not bring down a company altogether. When Cornell graduate student Robert Morris’s experiments with a virus got out of control, he was arrested, convicted, fined and booted out of college. At one point, Cohen himself briefly lost network privileges when an overzealous system administrator discovered the nature of his research. The idea of releasing viruses deliberately, for good reasons or bad, was simply beyond the pale, and Cohen’s ideas sank without a trace.Then in the late ’90s a number of programs appeared that let users contribute unused computing resources to problems of public interest. The most famous is David Anderson’s SETI@home, which distributed the problem of examining radio telescope data for patterns that might indicate extraterrestrial intelligence. The concept caught on quickly, and today dozens of projects in science and medicine are soliciting volunteers (“Help solve the protein folding problem!”), while a number of companies, including one started by Anderson himself (Austin, Texas-based United Devices), sell programs meant to carry what is now called “distributed” or “grid” computing into corporate networks and enterprise computing. Nobody ever even breathes the term virus when discussing grid computing, but the concept has much in common with Cohen’s idea: Programs spread out through the landscape, looking for, recognizing and recruiting unused resources.Of course grid computing clients are not autonomous?users authorize each contribution. But a number of researchers believe that as questions get more complicated and access devices simpler, queries will naturally become self-executing and autonomous. Recently two Dartmouth researchers, David Kotz and Robert S. Gray, predicted (in a paper called “Mobile Code: The Future of the Internet”) that in a few years nearly all major Internet sites will host some form of mobile agents?or as Cohen would have called them, viruses. n“Please open this e-mail message, it contains a good virus.” Yeah right. Tell it to et@cio.com. Related content opinion The changing face of cybersecurity threats in 2023 Cybersecurity has always been a cat-and-mouse game, but the mice keep getting bigger and are becoming increasingly harder to hunt. By Dipti Parmar Sep 29, 2023 8 mins Cybercrime Security brandpost Should finance organizations bank on Generative AI? Finance and banking organizations are looking at generative AI to support employees and customers across a range of text and numerically-based use cases. By Jay Limbasiya, Global AI, Analytics, & Data Management Business Development, Unstructured Data Solutions, Dell Technologies Sep 29, 2023 5 mins Artificial Intelligence brandpost Embrace the Generative AI revolution: a guide to integrating Generative AI into your operations The CTO of SAP shares his experiences and learnings to provide actionable insights on navigating the GenAI revolution. By Juergen Mueller Sep 29, 2023 4 mins Artificial Intelligence feature 10 most in-demand generative AI skills Gen AI is booming, and companies are scrambling to fill skills gaps by hiring freelancers to make the most of the technology. These are the 10 most sought-after generative AI skills on the market right now. By Sarah K. White Sep 29, 2023 8 mins Hiring Generative AI IT Skills Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe