The fact is, we have pushed to the limits a more than thirty-year-old computing architecture designed by engineers who never envisioned the Internet or the security challenges that such a globally connected computing architecture would produce. The unpredictable and exploding demand for greater computing capability and applications quickly overran these architectures and simplistic solutions such as antivirus and other list-based products.