In last week’s column, we studied the rule of identity. We saw several ways in which identity is implemented, including relational database keys, file paths, and — most significantly — pointers. Think ...