In 1954, one of the pioneers behind cybernetics, W. Ross Ashby, defined homeostasis as behaviour of interconnected machines that "is adaptive if it maintains the essential variables within physiological limits".  Ashby based his definition on experiments he conducted with four interconnected machines that formed a new whole that he called the Homeostat. Operational stability of this new whole is achieved as one of the whole's properties. In fact, Ashby considered this particular property a form of autonomous coordination of activities by and between the various machines.
In today’s age, devices and machines are increasingly interconnected in networks such as the (Industrial) Internet of Things, offering not only new possibilities but also creating rapidly growing threats that we are still insufficiently aware of and to which we certainly still lack an adequate response. Research into the essence of seemingly new technology such as blockchain technology or cybersecurity may produce new combinations for the development of new knowledge and applications.
Blockchain technology and self-stabilising systems
Ashby considered it a given that two or multiple systems can be interconnected. By creating interconnections, different systems acquire an ability to communicate and interact, thus forming a new whole. For Ashby, creating stability in this new whole is a form of ‘adaptive behaviour’. He claimed that “change of stability can only be due to change of value of a parameter, and change of value of a parameter causes a change in stability.”
In the early 1970s, Edsger W. Dijkstra raised the question whether self-stability as a feature of a whole made up of interconnected systems could be interesting on a scale “from a world-wide network to a common bus control.” Dijkstra defines self-stability in systems in this context as follows: “We call the system self-stabilising if and only if, regardless of the initial state and regardless of the privilege selected each time for the next move, at least one privilege will always be present and the system is guaranteed to find itself in a legitimate state after a finite number of moves.” 
That same year, Lamport added the following to Dijkstra’s definition: “Self-stabilizing systems represent ones which are self-correcting:even if they reach an incorrect state through some transient malfunction, they will eventually resume correct operation.” The nuance that Lamport added to the definition opens up the possibility of having networked machines communicate as neighbours as soon as a specific connection has been established between the neighbours. Lamport thus laid the basis for thinking about distributed operating systems that are interconnected in networks, stating that “a distributed system consists of a collection of distinct processes which are spatially separated, and which communicate with one another by exchanging messages. A network of interconnected computers, such as the ARPA net, is a distributed system.”
Reliable exchange of messages makes sure that the functioning of the whole of interconnected systems cannot be disrupted by changes to one or several of the connected systems. Lamport ultimately included the principles of self-stabilisation in the PAXOS algorithm, paving the way for the development of a self-stabilising whole of interconnected systems that, based on collective decision-making and information-sharing, are able to keep functioning, even in the face of changes from outside the system in one or multiple connected systems.
In 2018 , the US National Institute of Standards and Technology (NIST) established that blockchain technology basically originated in the 1980s and 1990s, evolving largely out of the development of the PAXOS algorithm as a consensus protocol that allows interconnected machines to agree on a specific result. These concepts are, according to NIST, the basis for digital currency such as the Bitcoin cryptocurrency.
Singer  argued that, in this day and age, the concept of changes that come from outside the system is more relevant than ever, as we increasingly face cybersecurity issues when an outsider “seeks to gain something from the activity, whether to obtain private information, undermine the system, or prevent its legitimate use”. Willingly penetrating one or multiple networks of interconnected systems or components of such networks, with a view to disrupting the functioning of the whole, is a growing and very current threat to the workings of our society. The extent of this new threat continues to grow, as pointed out by Schneier when he said that “everything is becoming one hyper-connected system in which, even if things don’t interoperate, they’re on the same network and affect each other”. 
Such systems are also referred to as cyber-physical systems. NIST defines such systems as “smart systems that include engineered interacting networks of physical and computational components.”  These smart networked systems are incorporating more and more devices that we use in our everyday life (smartphones, TVs, refrigerators, cars), in our day-to-day work (industrial robots, power grids) and in healthcare (MRI scanners, electronic infusion pumps, implanted glucometers, et cetera). They are all systems that operate in a distributed manner and are connected in networks such as the Internet, communicating and interacting in these networks by exchanging messages.
Systems are furthermore often hard to secure or entirely unprotected. It is becoming increasingly clear that illegally gaining access to one or multiple systems can cause severe disruption of the greater network. Recent incidents such as Operation Cloud Hopper, ransomware attacks on Maersk in Rotterdam and Hydros in Norway, Hatman malware in the petrochemical industry, or crash override attacks on power grids have shown that the vast number of wholes of interconnected systems that we use today cannot simply be assumed to be secure. In light of this, Kello argued that “understanding the cyber question requires a new paradigm of security commensurate with it, one that privileges not just physical but also nonphysical threats and that elevates nonstate actors to a higher level of theoretical existence than the traditionalist viewpoint allows.” 
Understanding the new cyber-threat is impossible without first understanding the essence of the new networks and the devices and machines that operate within them in a distributed fashion, making up cyber-physical systems that communicate and interact in changing combinations. There seems to be, however, real potential in combining the possibilities for self-stabilisation of interconnected systems to enable them to assimilate or correct changes to the behaviour of one or several participating systems, thus protecting their joint security. Still, to further flesh out the new combination, we need greater knowledge of the possibilities for self-stabilisation by collaborating cyber-physical systems and the relation to their joint security.
The technological developments that are shaping our present-day world, such as the Internet, (Industrial) Internet of Things and cyber-physical systems, are the product of rapid development of knowledge over the past seventy years. As knowledge grew, new technologies and applications, as well as new threats, have emerged that together constitute the growing technological enframing of our day-to-day lives and working practices. Heidegger believed that the essence of new technology will only truly manifest itself in a world of ignorance and oblivion. In its current manifestation of interconnected systems that jointly make up a new whole, technology is forcing us to find the essence of this new technology fast, so as to be able to deal with the threats that ensue from this essence and to figure out how it affects us as humans. Like Heidegger said, “the essence of technology lies in what from the beginning and before all else gives food for thought.” 
Research into the essence of new and interconnected technology as it has developed so far should focus not only on new possibilities offered by the technology, but also on the potential threats arising from the autonomous operations of this new whole. Developing new knowledge and insights based on analyses of the history and background to the possibilities and threats that come with interconnectedness can help us overcome our ignorance and oblivion, while also contributing to finding new stability between systems mutually and between systems and humans.
 Ashby, R.W. (1954) Design for a Brain. New York, John Wiley & Sons Inc.
 Dijkstra, E. W. (1974) Self-Stabilizing Systems in Spite of Distributed Control. Commun. ACM 17 (1974), 11: 643-644
 Lamport, L. (1974) On Self-Stabilizing Systems. Massachusetts Computer Associates Inc. 5 December 1974 CA 7412-0511
 Yaga, D., Mell, P., Roby, N., Scarfone, K. (2018) National Institute of Standards and Technology. Blockchain Technology Overview 2. Draft NISTIR 8202. January 2018
 Singer, P. W. and Friedman, A. (2014) Cybersecurity and Cyberwar. What Everyone Needs to Know. New York, Oxford University Press. ISBN 9780199918119
 Schneier, B. (2018) Click Here to Kill Everybody. Security and Survival in a Hyper-Connected World. New York, W.W. Norton & Company. ISBN 9780393608885
 National Institute of Standards and Technology (2017), Framework for Cyber-Physical Systems. Volume 11, NIST Special Publication 1500-201 Version 1.0 Cyber-Physical Systems Public Working Group.
 Kello, L. (2017) The Virtual Weapon and International Order. New Haven, Yale University Press. ISBN 9780300220230
 Heidegger, M. (1964) What is Called Thinking? Translated by Gray, J. G. New York, Harper Perennial. ISBN 006090528X
Ben van Lier works at Centric as Director Strategy & Innovation and, in that function, is involved in research and analysis of developments in the areas of overlap between organisation and technology within the various market segments.
5 en 6 juni 2019 Praktische tweedaagse workshop met internationaal gerenommeerde spreker Alec Sharp over herkennen, beschrijven en ontwerpen van business processen. De workshop wordt ondersteund met praktijkvoorbeelden en duidelijke, herbruikbar...
20 juni 2019 API Management gaat enerzijds over het promoten van API’s en anderzijds over het actief ondersteunen van ontwikkelaars bij het gebruik ervan. Tegelijkertijd gaat API Management over het gecontroleerd en centraal beveiligd ontsluite...
29 en 20 oktober 2019Tweedaagse workshop over probleem-analyse door Adrian Reed.This practical, hands-on workshop by Adrian Reed, focusses on the problem-solving skills that practitioners need in order to collaboratively explore and describe problems...
30 oktober 2019Workshop met BPM-specialist Christian Gijsels over business analyse, modelleren en simuleren met de nieuwste release van Sparx Systems' Enterprise Architect, versie 14.Intensieve cursus waarin alle basisfunctionaliteiten van Enterprise...
6 en 7 november 2019 De wereld van business intelligence en datawarehousing hanteert een unieke terminologie en eigen verzameling technologieën, ontwerptechnieken en producten. Voor nieuwkomers kan dit overweldigend overkomen. Want wat betekenen al ...
13 november 2019Praktisch seminar waarin Sander Hoogendoorn u laat zien hoe u microservices kunt inzetten in uw softwarearchitectuur.Het nieuwste architectuurprincipe microservices lijkt veelbelovend: verkorte time-to-market, schaalbaarheid, autonomi...
10 en 11 december 2019 Vergaar nieuwe databronnen en benut analytics en machine learning om de concurrentie een stap voor te blijven. Er wordt gekeken hoe machine learning en advanced analytics technieken zoals tekst-analyse, sentiment analyse...