Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

repetition as mechanisms well understood to entice the mind into a state of ecstasy; ecstasy then being the foundation within the mind for the concept of trust that forms the subsuming infrastructure for the social ecosystems that we, humans, have sought to achieve through the ages at progressively larger scales. Other interactions, as incantations at the beginning of team sports matches, or anthems preceding political rallies, may be studied through this prism.

At a considerably more mechanical level, within the model that we have evolved through the course of this book, prayer is a term we can apply to a transaction protocol. More specifically, it is an application layer protocol within the context of the network reference model that we presented in Chapter 3. Of course, prayer is about much more than simple communication; it embodies the very essence of complex interaction. As such, it is an application protocol that derives stimulus from the hierarchy of needs. It is an appeal that bumps at the boundaries of policy mechanisms by potentially seeking a modification of policy to address or redress our most profound needs. The boundary condition cases are generally the most telling about interactions, whether physical or social.

Throughout the course of this book, we have made a number of allusions to the concept of complex interaction. In this chapter we seek to explore the integration of an emergent species of computers, the transcendent personal device, into a social ecosystem infrastructure as fully capable as religious orders in establishing a framework for complex interaction. In essence, we’re expecting the creation of an electronic, cyberspace analogue to the prevalent historical human interaction mechanism, religion. In this realm, the transcendent personal device will be the person. Through the establishment of identity, it will effect trust and policy considerations on behalf of the person, thereby allowing more effective control of the environment.

The Domain of Trust

The transcendent personal device is emerging from a mutation of a personal electronic device that is based on a standard, highly mobile appliance such as a cellular telephone plus a secure core, an evolution of today’s mobile phone plus its Subscriber Identity Module. Its function is the establishment and conveyance of trust coupled to active participation in the application of policy on behalf of its bearer. As we suggested in Chapter 9, the mechanisms that it uses for these purposes are a powerful connection to the sensori-motor environment of the bearer formed through a reliable processor connected to a user interface that engages all of the human senses along with a trusted container in which to store information and a trusted computer platform on which to perform sensitive computations. As we’ve discussed throughout the book, we view trust as a measure of the probability of predicting specific outcomes of interactions or various aspects of interactions. To be effective in this role, the transcendent personal device must serve to determine that trust is well understood prior to engaging in the interaction. It is indeed important to emphasize that trust implies a probability, not a certainty. We trust the authentication process used to establish the identities of the parties, subsequent to trusting the process used to establish and convey that identity. We recognize that the authentication may be false, but with there being a well understood path to that happening. Accordingly, we expect that within a well structured social ecosystem, this probability of failure can be anticipated properly and subsequent consequences appropriately applied.

The boundaries of a general identification system within a particular social ecosystem are defined by the mechanisms used to establish and project trust to the various components of the system. This essentially defines the scope of the reference model that we’re outlining. A variety of

 

10 Power of Prayer

349

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)