Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

We will delve much more deeply into the mechanisms and facilities of institutions providing content in the next chapter. For the moment, we merely want to recognize that transaction-specific policy is currently a function specific to each individual server that facilitates access to content, in all its various forms. Based on examples found in other social ecosystems, we suggest a number of evolutionary changes that can be anticipated in this domain.

Future Architectures

Current content architectures operate successfully due to a lot of faith and a large amount of goodwill on the part of users. The level of malicious users (and faux-content providers) is accelerating, bringing a number of services into serious jeopardy under current usage models. The amount of e-mail spam is rapidly approaching a serious system failure on at least two levels. First, network bandwidth of both telecommunication channels and of content servers is being consumed more rapidly than the current cost models enable increasing capacity. Second, and probably more damaging, the entire trust model of the system is being called into question. If we reach a point where significant amounts of content cannot be trusted, then the utility of the network is in jeopardy.

One of the major evolutionary pressures is toward independent operation of the personal electronic device trusted core. At the present time, the usage models require too much support from non-trusted platforms for their trusted core to operate. Consequently, the trust conveyance by the personal electronic device from its trusted core to the content provider can become suspect.

The major technological enhancements that we see in future content systems derive in two main areas: first, establishing the independence of personal electronic devices, and second, providing enhanced facilities for the specification and implementation of content specific policy. The first of these areas we will consider in detail in Chapter 9 and the second in Chapter 10. For the moment, however, we need to introduce what we see as the underlying foundation of such policy; that is, a universal policy language component. As we know that many readers didn’t bargain for a lesson in the technological bases of computing in buying this book, we want to emphasize that they don’t need to read the following to understand our book. However, we’re trying to make the concepts as easy to grasp as possible, and we trust that most of you will enjoy learning about the fundamentals of the generations of computers to come.

We now need to introduce a language that is widely used in the computer world: the Extensible Markup Language, or XML. This language provides us with a way in which plain English can be structured sufficiently to convey details to a computer. It is the central tool of services delivered over the World Wide Web. This language was developed over decades to culminate into a lingua franca of the Web. What makes XML so important is that it is the first self-describing computer language meant to be distributed over the network, and actually the first computer language reaching the expressing capability of natural language. Moreover, as you’ll see, it is quite easy to understand.

We will take an example to which anybody can relate, that of an employee whose supervisor changes. Let’s see how computers carry this transaction.

To start with, a computer can say in XML:

182

5 Fabric of Society

 

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)