In this case, the cyber identity of this file would be a full set of its cyber coordinates in the IP subspace: the computer IP address, its MAC address, a Port number associated with the particular application, and the file name would constitute the full set of cyber coordinates, singularly identifying a cyber object (our file) in cyberspace.
The software will be unveiled later this year and will address many of the frustrations voiced by users of Microsoft Windows, such as slow computer start-up times.