Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

that is to say we know there are some things we do not know. But, there are also unknown unknowns -- the ones we don’t know we don’t know. And if one looks throughout the history of our country and other free countries, it is the latter categories that tend to be the difficult ones.” What Rumsfeld was expressing in a way that was perhaps somewhat cryptic to the public was in fact a new military understanding of threats, presented for example by Rod Thornton in Asymmetric Warfare: Threat and Response in the 21st Century. Known threats are readily confronted. Unknown threats of a known origin can be prepared for. But, threats that are not even known to exist present a bigger danger: Thornton presents a series of events that changed the nature of war, such as the battle of Agincourt and the attacks of September 11, 2001.

As far as the known knowns are concerned, we can follow our now customary approach and look at the computer understanding of threats. Such works as Threat Modeling, by Frank Swiderski and Window Snyder, provide a systematic approach. The authors classify known computer threats and define processes adept at addressing them. Trust levels afforded interaction agents, entry points of interaction, and possible targets of attacks are evaluated against vulnerabilities to create an overall assessment of precautions and answers. Possible scenarios are accordingly specified to elaborate corresponding approaches to threat mitigation. As with everything regarding computer security, the goal is to identify risks and rewards. Every counter-measure has a cost that needs to be compared to possible losses. The resulting threat model makes trade-offs explicit, and allows putting in place relevant developments and operational practices that are eventually validated by testing and on-going evaluations. One such trade-off is borne of the study of asymmetries.

Asymmetry in the conduct of interactions presents itself in the physical ecosystem where it forms an unstated theme of the evaluation process survival of the fittest. If there are relatively few parameters that define a particular interaction, then a parameter by parameter comparison will likely suggest the outcome if there is a significant asymmetry in the facilities of the interacting parties. If one constrains a rabbit to a cage with a hungry python, then the subsequent interaction outcome is relatively easy to project. Likewise, if one constrains an antelope in a cage with a single, hungry lion, the lion is probably going to feed on the antelope. However, if one places a single lion on the veldt with a single antelope, the outcome is far less certain. In this case, the trust equations for the various components of the interaction become much more balanced and often more complex. In many instances, an antelope will be able to outrun a lone lion. Hence, lions generally hunt in groups in order to stack the odds in their favor. This social grouping mechanism is an evolutionary trait of lions as well as other predators that has given rise to their hunting in groups or packs. Thus, at a very basic level, we view the occurrence of asymmetry in the various aspects of an interaction as indicative of a potential threat in or to the interaction.

Interaction asymmetry carries through to social ecosystems as well. Indeed, various functions of social systems serve to both offset as well as exploit asymmetries in the characteristics of individuals. On the one hand, social structures aim to protect the weak from the tyranny of the strong, but on the other they seek to garner the capabilities of the strong to augment those of the weak. A common thread for both theistic and non-theistic religions is the concept of accommodation of the weak by the strong. Among the beatitudes listed in the Book of Matthew in the Christian Bible, there is no special blessing for the strong, but rather for, among others, the meek and the merciful. Hence, the moral tenets of the religious order demand an altruistic behavior on the part of the strong in favor of those that are weaker. This is a behavior that, in general, runs counter to the individual behavior that one might otherwise expect to see rewarded by natural selection at the individual level.

386

11 Revelation

 

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)