Introduction

L1G3R Information Systems is concerned with the technology, data architecture, and presentation aspects of information systems, with the goal of ownership.

An increasingly important concern of information systems is ownership of data from the individual user's perspective. This is motivated by the nature of distributed processing and storage of personal information, where the user is susceptible to abuse, as the interests of the distributed processors and controllers of personal information are often at odds with the individual user.

Let's take the right to be forgotten as an example. Say that a person was involved in a criminal case that was thrown out in court as without merit; however, there was significant on-line news coverage. Further, say that the search results returned references to published articles that presumed the person was guilty. And, finally, say that the published articles that presumed guilt made significant ad revenue, and the publisher was motivated to leave the article published. Without some kind of threat or government intervention, it is difficult to resolve this to the benefit of the person wishing to be forgotten.

Another typical concern about data ownership is the security of data. When personal data is submitted to a controller (a service that collects data), it is expected that the controller take appropriate measures to safeguard data. Likewise, if another service processes the data under the direction of a controller, it is expected that the controller ensure that the processor is taking appropriate precautions.

Top Two Tiers

The very top tier holds the cloud-based processors. Underneath them are the controllers. The controllers collect and monetize data. Some controllers might be cloud-based. Some controllers might also function as processors. There is an extreme proliferation at these tiers as cloud services have expanded through the letters in X (XaaS). Not only is personal data passed back and forth, but the very machinery that runs the processors and controllers, the code, is tied in. For instance, the JavaScript libraries or fonts may not exist at the same physical location.

One perspective is that the top of the pyramid is the leading cloud provider, but As Ken Kesey stated "[we think that here, at this microphone I'm speaking to you from], at the end of this American pyramid, that information flows from this point out, well it don't". Information flows from individuals up. The base of the pyramid controls the pyramid.

Third Tier

Internetworked computers were a bit more robust by design. TCP/IP was intended to survive various disasters man-made and otherwise. Traffic automatically routes around failures. Businesses, governments, and science labs hooked up to the Internet and also networked their on-premises equipment: routers, firewalls, workstations, and servers.

The software of the Internet (or the internet, these days) was mainly written in C. Rather than crowd-sourced technical knowledge and search - programmers, sysadmins, and network administrators would use books. In the early days of GNU/Linux, it took a significant amount of effort to even get everything hooked up and running to even connect to the Internet, let alone getting X configured.

In the movie Inception the dreams go from reality down to four levels. There is a similar form of abstraction in our cloud world. L1G3R is concerned about actual ownership of data, which means controlling, processing, and possessing data over time. At this level there is no cloud, only a Kaypro II and a stack of floppy disks. Like Inception, the reality is that we are in a plane in the clouds. Even if we go down four levels, we are often at the mercy of that reality.

Limbo

Four levels down is limbo. That seems extreme, but think about it. There is no internetworking. There is no Internet working. There is nothing but a single psyche, experience, dreams, and thoughts. There are no social media posts (although your posse is still on the plane in the clouds). It is gloriously isolated. Anything is possible down at this level: build whole cities, wash up on the beach of your unconscious mind.

Ah, but the technology is useful. How do you maintain and implement tech at the fourth level, though? Well, L1G3R is the right place. L1G3R works at the fourth level: within a dream within a dream within a dream on a plane in the clouds.

The original inception perpetrated on Mallorie Cobb was the idea that the fourth level was what was real because of the idea that the current reality was not real. With Kesey’s inverted pyramid, L1G3R insists that the original inception was the truth. And isn’t that perfect, really, in that at the fourth level, one really is forgotten? It is our right. The fourth level is unhinged. The fourth level is dangerous. The fourth level is ten thousand man pages. At the fourth level, then, data ownership is a given. Data architecture is important for both persistence and maintainability in limbo. And, like a phone book, data means nothing if there is not some form of presentation.