Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

The complexity arises because, when it’s just printed plastic, it doesn’t take a national mint to build a fraudulent card. All the pure printing mechanisms can be attacked through ever evolving printing technology, and at ever decreasing prices. So, as a way to address counterfeit printing, additional information conveyance mechanisms were added to the card; embossed characters, holograms and magnetic stripes. Each step an increment towards a more secure token and, interestingly enough, often a step toward machine readability as a way to automate the authentication process. So, we’ve now advanced beyond just conveying information and have entered the world of interpretation of that information. Thus, the current incarnation of the banking chip card is a regular banking card with a small computer inside

As we will consider in some greater detail later, communication is an ever more increasingly complex problem. Conveying more and more information is a tough problem, but the intelligent use of that information is even more daunting.

The basic banking chip card physically looks like a credit card with a small metal faceplate on the front of it. That faceplate allows for electrical connectivity between the outside world and the computer embedded in the plastic card. This electrical connectivity is one means of effecting basic information flow between the card’s computer and the outside world, as represented by another computer. First, electrical power can flow across this metal faceplate so that the outside world can provide the power to run the computer in the card. An interesting point, when the card is in your pocket it’s not powered. So, it’s not operating, thus keeping it away from a class of electronic attacks.

Also, across the metal faceplate on the card can flow bits of data, strings of electrical ones and zeros that convey information from the computer in the card to the computer in the outside world. This information flow allows the two computers (the outside world and the card) to cooperate on deciding what to do in certain situations and perhaps even how to do it; that is, they can negotiate and implement policy.

Relate this back to the conveyance of information through various artistic media that we mentioned earlier. There we saw that the true information transfer was often submerged somewhat below the surface of what we initially or easily perceived. Such is the case with trusted computer communications. The early transactions between the outside world and the embedded computer were simple indeed. “Tell me where you come from: Visa, MasterCard or American Express?” But, then cards began to be counterfeited and the questions became, “After you tell me where you came from, tell me your ‘account number’.” Implicit in the question was the fact that the questioner had a way to check on the account number through some mechanism external to the card. But, it was awkward to always have this alternative mechanism.

So, the trusted core evolved to only give up its information if it really trusted the computer it was talking to. “Show me yours and I’ll show you mine.” became a way of doing business, as it perhaps has always been. With such enhanced trust conveyance, more detailed information could be conveyed to and from the core and more involved, and perhaps sensitive and/or valuable transactions pursued. This is the evolutionary pathway that we’re going down; it will be interesting to see where it leads. Whether we use a mobile phone, a personal digital assistant or an ultra-mobile computer, we trust them to represent us faithfully on the network. And that is a real topic for the remainder of the book.

 

1 Tat Tvam Asi

29

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)