" Ralph Stefanelli, telecommunications manager for Cyber-Port, concedes that the infrastructure of the project won't be revolutionary: "Everyone can spend the money and wire up their building.
In this case, the cyber identity of this file would be a full set of its cyber coordinates in the IP subspace: the computer IP address, its MAC address, a Port number associated with the particular application, and the file name would constitute the full set of cyber coordinates, singularly identifying a cyber object (our file) in cyberspace.