Text this: Meaning and Vision of Mimic Computing and Mimic Security Defense