Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

the Internet. In fact, they could be connected, since many actually are TCP/IP networks, but it is doubtful that this will be done rapidly due to the depth of established security procedures involved. In fact, this might be a good example of where convergence may not happen for a long time.

In the US, cable television is operated over a private cable company TCP/IP network. In a similarly ubiquitous fashion, in Europe, for example, another technology than cable, Digital Subscriber Line (DSL), allows various companies to deliver to home computers both Internet for their personal computer and video-on-demand services for their television. On personal electronic devices like mobile handsets, television can be served through third generation cellular phone services, or through another path specifically designed to that effect, Digital Video Broadcast for Handsets (DVB-H). We discussed earlier about third generation; digital broadcast allows direct broadcasting to handsets using a part of TCP/IP for the one-way communication typical of television applications, i.e. IP broadcasting. Convergence is at hand between digital subscriber line and third generation technologies, as both are TCP/IP based technologies. Essentially, this will facilitate video access on the general Internet. Digital cable delivery of Internet content together with voice services today means that cable has already converged in the US, and the same can be said of digital subscriber lines in Europe and elsewhere. Broadcast, whether by satellite or DVB-H, may be part of another convergence phenomenon, that of general broadcasting over the Internet, but this may not be actual before the next generation of Internet.

Current Content Architectures

In the next chapter, we’re going to explore the rationale behind an interaction model for computer networks. Essentially, the approach provides client-server access from an individual client to content that is accessible on the network on a server. For the moment, however, we need to lay the groundwork for personal electronic services to support this access to content. In the general network model, we will consider four basic constituents: (a) the trusted core of the client personal electronic device, (b) the client personal electronic device, (c) the content service gateway, which provides access to the content institution, and (d) the content service institution, where the server lies.

From a purely networking perspective, at issue is individual access to an institution, or the work product of the institution, via the network. The trusted core of the personal electronic device represents the identity and credentials of the individual, the personal electronic device provides a means to connect to the network, the gateway provides an entry point, a sentinel if you will, to the network content, and the institution contains the data or processes that the individual needs to access.

Personal electronic devices use a trusted core, whether called a Subscriber Identity Module in telecommunications, a chip card in banking or simply a smart card in other applications like television and government. The personal electronic device provides power to the trusted core, and uses it to communicate to the network. When the personal electronic device establishes a link to an institution on the network, it points to the secure core for the institution to identify whom it is talking with. In order for the secure core to function in a device, it needs to be accessed by a class of software that we earlier termed middleware. Secure core middleware in the personal electronic device allows the device to talk with the secure core, and to use specific functions of the secure core that the device is interested in, typically information about you and your preferences.

180

5 Fabric of Society

 

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)