Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

professionals and the individuals concerned; business information, as in banking cards, which allow the personal electronic device to act as a payment broker. And then, we also find non-monetary value in the overall scheme of personal electronic device, as standards battle rage in every corner of that domain of activity, for the various industrial and governmental players to keep their influence and profits. Witness to that are the battlefields of operating systems specifications regarding the functioning of the devices, of governmental practices regarding which country will have less to do in terms of policy changes as the world goes from analog to digital, and in other areas like the format of payment messages and telecommunication operations. Finally, we need to mention that the personal electronic device core content is very controlled in terms of transferability, as much of it is either very private, like health information, or quite expensive to obtain and keep, like bank accounts. In most cases, transferability is in fact not only a matter of personal choice, but also a matter of law. In terms of the satisfaction of needs, personal electronic devices are located at every point of influence, a subject we will develop in Chapter 9.

Location, location, location

As we see, the economics of information is yet to be written in fullness. However, while our species’ pragmatic approach to survival has allowed us to use prose like Molière’s Monsieur Jourdain, without even knowing it, computers couldn’t do that in the little time of their evolution. They had to be taught, and therefore the partitioning of digital content had to be made explicit for them. Only later, as we’ll discuss in subsequent chapters, would they take matter in their own hands, so to speak. For the moment, we need to expand on the very way digital content has been structured and positioned up to now in the computer world. Digital content is located everywhere in computer networks, with means of access in place to produce it, organized in ways that make it palatable, and with the structure of trust that makes it actionable.

Computer data can be found on all sorts of media, so we will concentrate on two attributes of such media for the purpose of our inquiry: duration and security. The media known longest to mankind are rocks and pots, lasting from thousands to tens of thousand of years. If we were to go for duration based on history, that’s probably the media we should chose. Various forms of vegetal products, including paper and tissue, would be next in the list, lasting sometimes up to a few thousand years. And when we reach what is generally considered as a long term medium for computer data, like tapes and diskettes, we already know from experience that they can’t last as long as the other inventions we mention. The maximal length of conservation of our computer data counts at best in decades. Now, if we consider lengths in years, our optical disks, hard disks, storage keys, and other flash products can probably do, if we don’t mind finding their format forgotten at some point, and having to call costly experts to the rescue. Finally, from microseconds to days, we are talking about transient data, data that will be erased, either on their way from a location to another, or as temporary information allowing some processing to occur. With each form of content, going from the decade to the year to the day, various means of security can be invoked; the first element to be considered is always the physical medium. The security mechanisms are the same as for any physical good, as far as storage media used for decades or years are concerned. For transient storage, circumstances differ, as data can be over the air in case of radio transmission, over or underground in case of wire transmission, in a component of a computer system, or in some part of a personal electronic device. During transmission, data have to be considered unsecured. While over the air snooping is quite easy, the snooping of wires is often more difficult. What’s certain is that it can be done, and it has been done often. There is no physical security for data during transmission, in almost all cases (quantum encryption is an exception). Alternative means of protection are needed. For example, in the case of computer

202

6 The Shrine of Content

 

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)