Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

Internet access. A potential problem of course arises if a cost structure based on content is implemented. The problem is that priority of service is likely to follow the amount of revenue; it may become more likely that your speed of response to Web queries will become dependent on the traffic generated by the middleman or content provider being accessed. Some Internet carriers would then apparently take their control prerogatives to more intrusive levels.

In an October 19, 2007 wire from Associated Press, Peter Svensson reported that Comcast, a cable television and Internet access provider was limiting the volume of traffic that could be delivered between certain Web services sites and their customers. The news report suggested that the manner in which this limitation was accomplished was with Comcast software insinuating itself into the protocol stack. Some traffic was slowed down while other was kept normal. Svensson commented that this is akin to a telephone operator intervening in conversations. As we have noted previously, in a voice-based conversation between two people, trust related to the conversation itself is partially enabled through biometric voice recognition between the two conversing parties. In a digital exchange, the fact that the mechanism attributed to Comcast can actually be used suggests a problem in the network protocols’ abilities to authenticate the identities of the conversing parties. This is obviously a deficiency to be addressed in the mutational progression of the network and its derivative mechanisms.

Another driving factor in the evolutionary development of the Web is the applicability of social ecosystem consequences to Web transactions. The relative anonymity or ambiguity of the identity of the various parties to such transactions makes it difficult if not impossible to apply normal rules of engagement. The application of time based, age based or location based constraints is extremely problematic, and this same identity ambiguity makes the application of after the fact sanctions difficult as well. Consider the fact that a significant fraction of e-mail traffic on the Web today is spam; totally unsolicited, highly suspect messages from not just anonymous, but often fraudulent senders. In a similar vein, consider the fact that stolen merchandise can be more readily traded across the Web than through previously used illegal distribution channels. If one throws in the threat posed by sexual predators soliciting contact through the myriad interaction facilities offered by the Web, then we see that the scope of the problem ranges across the full spectrum of our needs hierarchy. So, we would have to assess that if the migration of business models is a driving force for evolutionary change, then enhanced safety and security needs should be considered as well, while catering to the rights of privacy and freedom of speech. As we noted in our Prologue, one of our species’ most general admonitions of social interaction is “Don’t talk to strangers!” This rule is hard to apply when we invite strangers directly into our homes through our network connections.

Finally, a large variety of personal electronic devices are currently engaged in something of a maelstrom of market selection. Over the past few decades, a number of facilities have come into increasingly common use; facilities which speak to much of the range of the human needs hierarchy. As this collection of devices has engaged the market evaluation process, no specific combination of form and capabilities has yet resulted in a clear winner in the race for species supremacy. We can, however, observe many of the specific enhancements that offer the prospect of blending into a true mutational advance of the genre. The question then arises, “What provides the superior stimulus for mutational success?” We suggest that the answer lies with the replication of the social mechanisms that enable human-to-human interaction. Current network connectivity affords an artificial extension of the human sensori-motor experience, but only a partial extension. Central to the full enabling of social systems is the incorporation of mechanisms to facilitate the formation and functioning of groups that allow an equivalent evocation of trust to that found within direct, personal interactions. Based on this capability, an ontology of the relevant social order should allow a mutation-class device to more fully participate on behalf of the human bearer

 

9 Mutation

303

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)