Phygital Abstraction Conceptual Framework (PACF)
This page describes how phygital objects embody solutions to the digital-physical divide.
Intoduction
Every technical being is an embodiment of an operational scheme that solves a particular problem. Phygitality, being the new genus of technical objectivity, is organised around (1) on the one hand, the split between digital and physical domains (i.e. the problem); (2) on the other, attempts to overcome it (i.e. the schemes). Hence, distinguish the primary and secondary properties of any phygital object, which are (a) a core that remains constant in any of its individuations; (b) its individuations that express this core in their own way;
Accordingly, obtain two types of primitives reflecting: either the conditions of the possibility for combining the material and the virtual; or their concrete combinations;
In the second case, they will be about how programme and thing are unified in a single substance. This operation sets the evolution from simple and monofunctional instances to increasingly complex and multifunctional ones.
At that, there are two ways of such development:
either enhancing the cohesion and interdependence of all components in the respective entity;
or reducing the negative consequences of their joint activity;
The second variant does not concretise anything. Minor transformations are closed on the current state of the structure, and therefore fail to translate the latter into a new one. The limit separating one from the other is unattainable from within their series.Consider the above on the example of a bank card with a magnetic stripe.
Example
The information on it was recorded using MICR (Magnetic Ink Character Recognition) method. The payment terminal interpreted magnetic waves created by letters printed with iron oxide ink. The PIN (Personal Identification Number) of the user was encoded on the magnetic track and calculated through a simple algorithm based on the card number. Obviously, all of this was easy to counterfeit. To strengthen security, IBM introduced DES (Data Encryption Standard) in 1979, which VISA applied in 1980.
But even this did not eliminate the issue - data could still be easily copied from the carrier and the PIN stolen by special ATM read-out tools or viruses.
As can be seen, no local refinements were able to cope with all its flaws. Quantitative succession alone will not produce a new quality. Only smart cards could rectify the situation. Their embedded chip was tamper resistant, and could be programmed for multi-factor and contactless authentication, such as allowing transactions just within the operating area of another device, like a phone.
Thus, transforming the object is accomplished in the manner of a leap. But it does not mean accidentally and without any significance, for such a shift follows the logic of increasing the internal coherence and interdependence of the elements.
Last updated