Leveraging Nature’s Key Design Principle

WELCOME to the Science Of Technology—affording deep and rational insight into Synergetic Systems. The goal of Synergetics is to employ technologies in ideal structural/procedural combinations—whereby specially arranged configurations of things deliver whole system behaviours with the most advantageous outcomes.

We are now entering the 4th Industrial Revolution; whereby technologies combine hardware, software, and biology (cyber-physical systems), placing emphasis on advances in communication and connectivity. It is the fusion of these technologies and their interaction across the physical, digital and biological domains that will make this new age fundamentally different from any other. 

Our focus is on the creation of profoundly humanistic—plus environmentally sustainable—technology. Learning from nature’s vast library of ‘secret’ design principles—or proven methods—both animate and inanimate—is a key goal; whereby we identify, copy and apply certain universal design/operating principles.

In particular, the key principle of Synergy can help us to address the complex challenges of the new era—and to create technological solutions with real unity of purpose; whereby we embrace total thinking; and create comprehensive systems with truly beneficial outcomes.

What is Synergy?

Understood correctly, the Universe is nothing more than—Energy—flowing here and there—in a near infinity of matter-shaping processes. Whereby everything happens according to the laws of nature— and the whole procedure is what we call reality—or the Physical World.

Nonetheless, the Universe would be a very chaotic place without another fundamental law of nature—Synergy—which is the direct corollary of Energy.

Energy refers to the ability to make CHANGE happen within a specific region of the physical Universe—typically consisting of unrestricted or free-flowing Energy which impels DISORDERED CHANGE; whereby Energy is naturally chaotic in nature (ref. centrifugal or explosive energy which is energy-loosing). 

Synergy—is the ability to CREATE/MAINTAIN ORDER—that is to cause structured Energy patterns to form which persist and are energy-conserving in nature (they tend to guide Energy across space/time and are centripetal).

The upshot is a fundamental truth often overlooked by Physicists, Chemists and Biologists—that Synergy is the key operating principle of the Universe; and because it provides evident structure(s) amongst the chaos. Synergy refers to generalised Energy patterns—which are often useful and/or pertinent to a particular outcome.

Synergy is maximisation of order within a region of the Universe—and is recognised when energy forms/flows in a particular kind of idealised pattern that might not otherwise occur (in any other way).

Synergetic Design

The Universe is a constant battle between chaotic and Synergetic energy structures; whereby energy patterns form, then stabilise and later dissolve over time.

Evidently, the Universe has certain general Energy patterning tendencies—including small-scaled examples such as sub-atomic, atomic, and molecular energy/matter structures—plus large-scale ones such as gravity. However in between these extremes—exists a vast number of other general-purpose—or universally applicable—Synergetic patterns (many of which have yet to be discovered).

Synergy refers to the surprising affects of combining Things in a certain way; whereby what happens—is wholly determined by changes in Energy patterns across particular elements of the whole. Whereby new behaviours and possibilities are enabled due to the nature of the pattern itself.

Synergetic patterns—as fundamental laws of the Universe—are discovered and not invented. Synergetic design is the application of general Synergetic patterns to a specific application area; and multiple patterns may be combined to affect complex results.

It is important to realise that we humans make constant use of Synergy (ref. organised technology designs)—existing in modular assemblies/hierarchies of Things/Energies—to build/operate various tools, computers and machines. However it does not follow that we are always able to successfully apply Synergetic principles in optimal way(s)—primarily because we often lack sufficient knowledge of how to efficiently locate the most opportune solutions (highest ordered Synergetic designs).

Put simply, we need full knowledge of what Synergy actually is—and the different forms/classes of Synergy patterns that are possible—to solve problems in the most advantageous ways. QED.

Flow of Energy and Information

The universe is comprised of vast numbers of overlaid, interlacing and coordinated systems, whereby structures of things and processes exist and inter-accommodate at every scale from the quantum level to the cosmic. Humanity articulates the behaviour of systems—using natural and human-made technologies—to solve problems; and by directing resources towards particular aims. 

A refined way of viewing a system is as a set of structures and processes for efficiently organising specific flows of Energy and Information. The job of the system is to apply Intelligence—or useful problem solving capability—to purposefully manage these same assets. Whereby all three elements are the Synergetic Facets of a system.



Aetiology of a Smart Technology

Source: ‘The Science Of Smart Technology’ (2020) – by Alan Radley


A basic question is: are there general principles of design and self-organisation irrespective of the nature of the individual parts of a system?  

Often we find that the answer is yes; because Synergetic Systems, just like living organisms, have coordinated parts that operate in close harmony with all environmental requirements. A Synergetic system is self-regulating and intelligently applies resources precisely where, when and how they are needed—without wasting any energy/information—a procedure known as Synergetic Inter-Accommodation.

Synergetics aligns the natural with the artificial—in auspicious ways; and usefully merges the humanistic outlook with automated/computerised elements.

Synergetic Systems

Synergetics is the study of systems in transformation, with an emphasis on total system behaviour unpredicted by the behaviour of any isolated components, including humanity’s role as user, participant and observer of universal operating principles.

Synergetics adopts the most advantageous Macro-Micro viewpoint, seeking to co-opt natural principles favourably, plus apply human and machine intelligence comprehensively—using holistic design principles—to create technologies that fully meet the needs of the environment (in the broadest possible sense(s)).



Operacy of a Synergetic Technology

Source: ‘The Science Of Smart Technology’ (2020) – by Alan Radley


Synergetics eschews the role of specialists who deal only in parts—championing the approach of the generalist who applies a wide array of knowledge from a wide variety of subjects. A key question follows: how do we—avoid the dangers of analytical fragmentation—and Think in Terms of Wholes?

Classical and Smart Synergetics

Buckminster Fuller (1895–1983) first coined the term Synergetic; and attempted to define its scope in his two-volume work Synergetics. Fuller suggested that when looked at from the synergetic point of view, all problems and their solutions are seen from a single unifying perspective; whereby both macroscopic and microscopic points of view must be taken fully into account—for the benefit of all.

Classical Synergetics is a very broad discipline, and embraces a range of scientific studies including tetrahedral and close-packed-sphere geometries, and various ‘system operating’ concepts in thermodynamics, physics, engineering, chemistry, psychology, biochemistry, economics, and philosophy etc.

But there is also another type of synergy—named here as Smart Synergetics; whereby technologies (Things/Systems) and People exist in ideal synthesises, often remotely arranged, but always within streamlined intelligence/action/information sharing networks. Here one technology is comprised of many sub-technologies which are bundled together in collections and/or groups—but notably these parts are then able to collaborate purposefully by means of a digital network.

Smart Synergetics is largely concerned with systems that provide enhanced Human Intelligence (Virtual/ Augmented Reality, Knowledge Machines) and/or Artificial Intelligence (AI, Robotics, IoT). Typically an AI system will employ Situated Intelligence and/or Distributed Intelligence

In summary, a Synergetic System consists of certain natural phenomena programmed and orchestrated in an optimal fashion for some carefully considered purpose(s). QED.

Key Technology Topics

Our goal is to establish the founding principles for seven key areas of the Synergetic Technology landscape; named as:

  • Data Protection, Privacy and Cybersecurity
  • Augmented Human Intelligence and Artificial Intelligence (AI)
  • Automata: Robots, Computers, and Smart Tools 
  • Communication Networks (M2M, H2M, M2H)
  • Virtual and Augmented Reality (VR)
  • Knowledge Machines, New Media and the World Brain (H2H)
  • Internet Of Things (IoT) and Smart Products/Services

We wish to become an authoritative source of knowledge for each of these seven industry defining topics—and to probe related matters in great depth. Obviously we cannot achieve such an objective alone and/or right away; but we do aim to take significant steps towards the same goal by means of logical, integrated and holistic perspective(s)—combined with use of the scientific method.

Already we have made significant progress in the Cybersecurity field along these same lines—and by supplying a scientific framework that allows theoreticians and practitioners alike to develop, share and apply state-of-the-art Cybersecurity principles and practical knowledge. Please take a few minutes to read our reviews—and note the eminence and job-titles of each reviewer.

Our hope is that the principles and theoretical models developed herein—can be used used to create eminently practical technological solutions that are in close harmony with humanistic principles. Nevertheless, and despite remaining optimistic, we must admit that the Age of Intelligent Machines has many potential dangers; and not the least of which are the increased likelihood of data breaches, hacks and system exploits. Henceforth we shall begun our analysis with Cybersecurity.

Science Of Cybersecurity

WELCOME to the Science Of Cybersecurity—where we establish the first founding principles of a new science of Information Security.

Some experts are adamant that Cybersecurity can never be established as a science. This is claimed to be so because—any and all social accessibility protections which are put in place will always have human opponents. That is, in this field alone, human antagonists exist—who work constantly to try and break any security measures present. Accordingly, Cybersecurity is not a science—but is more akin to a game, war or political struggle.

Whilst we do acknowledge the existence of vital social elements within the boundaries of the highly technical field of Cybersecurity; it is our belief that application of the scientific method—consisting of a combination of empirical observation and logical reasoning—must always play a significant and foundational role in any Cybersecurity scenario whatsoever. QED.

Our goal is to bring formalism to a field that doesn’t even have one—that is to bring unity, consistency and order—to the field of Information Security. Strangely absent is any kind of top-level theory, and missing are fundamental definitions and/or first-principles etc. Ergo, the system-designer’s job becomes one of—collecting partial formalism(s)—before somehow stitching them together. The net result is—partial truth(s) and/or sub-optimal approaches—or at least major difficulties.

Conversely, we seek to establish a foundational framework for the entire field of: Information Security; and by means of logical, integrated and holistic perspective(s)—combined with use of the scientific method.

Cybersecurity Crisis

The field of Cybersecurity is currently experiencing a major of Crisis Of Confidence—and in terms of the questionable truth/validity/usefulness of its most fundamental premises, arguments, conclusions and recommended security methods. Whereby data breaches, hacks, system-exploits and computer intrusions are now common-place.

In search of answers—we adopt a scientific approach to Cybersecurity—with the stated aim of eliminating all of the confusion, uncertainty and risk which plagues the subject area. Importantly, you will not find elsewhere any part of our new theory of Cybersecurity Science—because these materials are unique and they are not available on any website, book, blog, course and/or certification.

Everything here evolved from Alan Radley’s much-heralded book: ‘The Science of Cybersecurity – A Treatise On Communications Security—which established the founding principles for a new science of Information Security. Whereby we have coined over 60 new terms in a comprehensive Cybersecurity Lexicon, identified 62 Cybersecurity Axioms, plus mapped 500 fundamental classes of Cybersecurity entities, states and processes etc.

And all of this information has been approved by over 100 leading Cybersecurity experts—so you know that it is pertinent, useful and correct.

A Quest For Insightful Answers

How do data breaches, hacks, system exploits and computer intrusions happen—and why? What occurs when Cybersecurity really works effectively, and can we systemise it? Or will the clever hacker always break into any networked device, sweeping all defences aside?

On a quest for insightful answers in his ground-breaking book and associated website, Dr Alan Radley proceeds to completely deconstruct, rationally analyse, meticulously rebuild and then sanely reassess the entire field of Cybersecurity.

A rigorous scientific methodology is applied to networked system design, leading to a comprehensive new model—and accurate taxonomic tree—of all possible types and classes of cyber-attacks and associated countermeasures. The upshot is a wholly original, astute and fearlessly honest—yet practically oriented—treatise on Cybersecurity.

Outlined here for the first time is a logical explanation of the fundamental theory and principal axioms of Cybersecurity as developed from first principles, and in a format ideally suited to both—the engineering-minded professional—and the less technically-oriented.

Solid Foundation

Our new theory of Cybersecurity is grounded on a set of core principles, including for example the Cybersecurity System Access Gateways (CSAG) diagram.

The CSAG diagram teaches that in order for a Datum or Datum-Copy—existing on a networked computer system—to have its inner meaning ‘extracted’ by either a legitimate user or else an illegitimate intruder—then that same party must first possess a means of opening up a PHYSICAL GATEWAY in order to see/touch the physical FORM of the Datum held on a Media of Storage, Transfer or Access (i.e. obtain a physical copy). 

Next on said media the party traverses one or more VIRTUAL GATEWAYS to obtain the Datum’s raw format (i.e open a virtual copy). Finally the party in question—must decode the Datum’s inner meaning or CONTENT by traversing one or more of 3 kinds of MEANING GATEWAYS: named as the Metrical, Selectional and Descriptive layers—which may be nested together, one on top of another, in a russian-doll fashion.

Cybersecurity is then defined simply, and completely, as the continuous processes of PROTECTING (i.e. Locking, Blocking and/or Concealing) all necessary gateway types—that is defending the Datum’s inner meaning from unwarranted disclosure—whilst at the same time ENABLING legitimate users to access said Datum’s inner meaning by means of readily accessible system gateways. QED.



Cybersecurity System Access Gateways

Source: ‘The Science Of Cybersecurity’ (2017) – by Alan Radley



System Entry Method(s)

Source: ‘The Science Of Cybersecurity’ (2017) – by Alan Radley

Your Trusted Source…

At ScienceOfTechnology.org we seek to establish and apply the fundamental principles of the new era of Synergetic Technology; but patently this goal can only be achieved with the help of our knowledgeable readership.

Luckily, already a large number of security experts have contributed to our developing Science Of Cybersecurity Framework—and said theory reflect(s) the knowledge of several hundred of these academic researchers, engineers and practitioners. In a like manner, hopefully we can recruit the support of experts in the new subject areas as well.

We are on the lookout for partners/contributors; plus seek details of the very best resources—so drop us a line!

Dr Alan Radley , Blackpool, UK.

Email: alansradley@gmail.com.

KeyMail – Risk-free Data Transfer

KeyMail is used to send confidential items directly to colleagues across the Internet—with Absolute Security—and no third-party copies. KeyMail affords the strongest possible encryption protection for your private communications (RSA 4096 / AES 256)— and it meets/exceeds US Government standard for Top-Secret Data.

In a nutshell, having no vulnerable ‘third-party’ or ‘Cloud’ copies—of client-data, logins and encryption keys—to attack / steal—means no hacking chances for any and all Threat Actors. You can read more about KeyMail here.




KeyMail – Apple macOS Catalina