@systemvoltage: “I often wonder what if we decide to build a completely new, well thought out computing system (including network) that is totally separate from any legacy system and 100% backwards incompatible.”
Good idea, and then run legacy apps under an emulator. Each instance created and destroyed after use. That way there will be virtually no chance of malware propagating through the system.
Good idea, and then run legacy apps under an emulator. Each instance created and destroyed after use. That way there will be virtually no chance of malware propagating through the system.
reply