Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

threats to the social order of groups of people and to the individuals within the social groups. In a like manner, a central aspect of the extrapolation of these social systems in computers and their networks is the amelioration of threats within these expanded environments. Thus, the primary themes of the phases we want to consider are the means by which threats are identified and addressed while at the same time providing effective participation in all the interactions that present themselves.

The three phases present our assessment of the chronological progression of the capabilities of secure core computer systems from their earliest inception into the relatively near future. This covers a time period that ranges from perhaps two decades in the past to perhaps three decades into the future; a half-century more or less. The first phase is comprised of the ability of computer systems to manage known attacks, and covers today’s state of the art in secure cores. The second phase provides for answering unknown attacks through established means of defense. This is the phase that we’re just entering and encompasses the transition of secure core systems from auxiliary components of computer applications to peer level computing platforms that can begin to function on behalf of human bearers of the secure core. Finally, the third phase anticipates the creation of new answers to unknown attacks, or, in asymmetric language, defense from the unknown unknowns. This is our extrapolation or projection of the direction that transcendent computing systems might take us if they truly follow parallels to human social evolution. At their most capable, they should function as the fully functional interface of the human into the cyberspace of the Internet; interacting with a variety of systems and guarding against threats, both known and unknown, that might be encountered there. The Internet itself seems on a deployment path that will involve ubiquitous interaction facilities with virtually every system that we encounter on a daily basis ranging from every device in our homes to those in our various transportation systems and everything thereby accessible. Moreover, we will be involved in such interactions from the time of our birth and our societal provisioning via education to our ultimate death.

As should be clear by now, our understanding of the evolution of the cognitive facilities of the species is tightly intertwined with the concepts of symbols and metaphors. Consequently, we will make use of metaphorical allusion as we attempt to offer some insights to future directions. Thus, we will relate each of the three phases to a distinct metaphorical interpretation based on the three forms of theatre noted earlier. However, we need to provide a bit of expanded context; it’s hard to understand the play without a quick perusal of the program. First then, we must consider the title of this section. A theatrical mechanism first popularized in Greek drama, deus ex machina provides the artist with a means to extricate a story from total collapse when it is ultimately painted into too constrained a corner. This extreme form of artistic license allows a Gordian knot of plot contrivances to be slashed with a bold stroke. Notwithstanding aesthetic debates surrounding the use of the practice, the words themselves are just too inviting in the context of our current discussions for us to ignore the opportunity they suggest. As we look toward the evolved future of the computer, are we not seeking to extract something of the deities that we derive from or that form the basis of religion? More specifically, we seek to establish something of the trust that we find within religious systems that is ultimately grounded in the ecstasy of faith.

Setting the Stage

A play is a metaphorical expression of the social ecosystems that we have discussed at some length in the previous chapters. The operational objective of the “play” is to be “performed” within a “theatre” for an “audience”, where each of the quoted terms is capable of metaphorical extension. Performing the play manifests a subordinate social ecosystem created in a trust

 

11 Revelation

391

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)