History of Object Capabilities

Practitioners concerned with solving computer insecurity won't wish to miss this video on how Mark S Millers work has led up to JavaScript at cusp of being a first class object capabilities based programming language.

YOUTUBE AP0EtBNvS-o Gravity and the history of computing: Small talk, Self, object capabilities, Xerox Parc, Mark Miller, stateful, multiagent programming language

Persistent orthogonal pattern languages are discussed.

Could orthogonal persistence overcome CPU enclave insecurity by decentralizing networked resilient computer security?

In turn give rise to collaborative federated security models for emergent projects such as Gravity and Wiki? page

In particular JavaScript programming language support for the concept of orthogonal persistence, a technique for the uniform treatment of objects irrespective of their types or longevity. paper

tl;dr

"Another potential avenue for development is to target emerging application styles such as cloud applications. The development of such applications could be significantly simplified by a system supporting programming over resilient distributed objects transparent manner, abstracting over replication and physical location in the same way that orthogonal persistence abstracts over storage hierarchy [49]." "Another avenue for investigation is how the unique features of orthogonally persistent systems may be exploited to improve current software development technology [18]. For example, the integration of first-class code and data within a persistent store that enforces referential integrity makes the hyper-code paradigm possible. This could be extended with more sophisticated support for application system evolution, analogous to refactoring tools provided by modern IDEs [50]. Hyper-code allows source code to be reliably associated with all code objects."

Does Caja implement persistent orthogonal javascript?

On Smalltalk and software linage. Altos and Alan Kay's compute was too expensive and not needed on a secure LAN. On the public internet security thru object-capabilities is revisited.