Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

characteristics that are quite random in their development and their subsequent randomness is adequately influenced by the statistics of extremely large numbers such that we can establish a very low probability that the characteristic will develop identically in two different individuals in a population sample the size of the population of the earth (and then some).

To engage in a trusted authentication protocol, the transcendent personal device must be able to request a biometric entry on the part of the bearer. To do this, it must incorporate the necessary sensors to capture the proffered biometric image or images. Given the capabilities of currently available technology, probably the most plausible architecture is for such biometric sensors to be incorporated into the transcendent personal device body. While this may be slightly less attractive from a security standpoint, the form factor impact of requiring biometric sensors on or within the trusted core agent is a severe limitation on the construction of this element. However, this is also a possibility given that fingerprint sensors (a fingerprint is the iconic biometric characteristic) are already available that can be included directly onto a secure core.

We’ve observed that a human biometric characteristic is a good mechanism through which to bind the human bearer to her or his transcendent personal device. It would be extremely useful if similar characteristics were available for equipment assemblies such as the transcendent personal device itself. Well, in fact, such characteristics are available in limited areas and the technology offers the prospect of enhanced utility within a wide range of equipment. Scott Guthery, a long time colleague of the authors and a founder of Mobile-Mind, Inc., has done a review of this area and has suggested the name mechanimetrics for a characteristic of machines based on electromagnetic processes that parallels that of biometrics for living organisms. This characteristic potentially allows for tamper-evident behavior of a token and its auxiliary attachments through the measurement of the aggregate differential identity of the mechanism. Central to the ability to effect a policy infrastructure is the ability to identify the players within that infrastructure to whom policy can be ascribed. Trust in a secure core derives from the immutable nature of the computer hardware and subsequently its software. The integrated circuit chip provides a relative self-contained computer system that is difficult, if not impossible to change. Its software is stored in read-only memory which is also difficult if not impossible to change. Mechanimetrics extends these trust mechanisms to more general device architectures.

Transcendence Effected

We can recapitulate the primary requirements of the transcendent personal device as we’ve derived them from the needs hierarchy of people as reflected in the anticipated needs of computer networks. The need of transcendence itself mandates the connection of the primary trust infrastructure of the human social order with the primary trust infrastructure of the network. To meet this need within the device will require mutational changes within the human social order as well as within the technical facilities of the device.

Given a comprehensive environment, the capabilities of the device to function on behalf of the bearer derive from the need of self-actualization. The device must function through peer-level interactions with the external world that it encounters through its basic physiological capabilities. This functionality is guided by an ontology of the relevant social orders and network architectures. Specific interactions are engaged through processing capabilities derived through aesthetic needs on the part of the device and the device bearer. Through such aesthetic means, the actual trust equations of pending interactions are determined. Cognitive needs provide a basis through

 

9 Mutation

339

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)