[Home]

Computer Theology

Intelligent Design of the World Wide Web

Bertrand du Castel and Timothy M. Jurgensen

(Notes by Bertrand du Castel)

Saturday, January 30, 2010

Shed the mask

In Auditory Masking with Complex Stimuli (pp. 343-352 of The Cognitive Neurosciences, Fourth Edition, MIT Press, 2009), Virginia M. Richards and Gerald Kidd, Jr. study the effect of perturbations on auditory signal perception. They call those perturbations masking, and they make the distinction between physical and informational masking.

An example of physical masking is noise from the street that makes the speech hardly audible. An example of informational masking is interfering conversations that make it hard to make sense out of the speech. The authors study those distinctions for a better understanding of human auditory processing.

The question I'm wondering about is how prevalent is masking, both physical and informational, in our perceptory system and its accompanying processing capabilities. The shadow of night is physical masking, and the combination of odors is informational masking. Venetians masks are both physical and informational maskings?

A person with a mask has an identity, just as the same person without a mask. Those identities are at the same time same and different. In terms of Computer Theology (p. 304), the explanation is that the two different identities are those of the person with the mask and of the person without the mask. We call those identities differential. But there is another identity, which we call experiential. In this case, there is one experiential identity for the person in front of you, whether carrying or not carrying a mask.

Back to the auditory system. Is physical masking experiential and informational masking differential? Let me know what you think.

Sunday, January 24, 2010

Olfaction or consciousness?

In Olfaction: From Percept to Molecule (pp. 321-342 of The Cognitive Neurosciences, Fourth Edition, MIT Press, 2009), Yaara Yeshurun, Hadas Lapid, Rafi Haddad, Shani Gelstien, Anat Arzi, Lee Sela, Aharon Weisbrod, Rehan Khan, and Noam Sobel present a correlation of two first principal components. One, a first principal component of olfactory perception, which they name pleasantness, and two, a first principal component of physicochemistry, which they name molecular weight.

Their interest is in identifying vectors of research similar to those of other sensations, like pitch and frequency for auditory signals, in order to support a parallel investigation for olfactory signals, even though those latter signals are processed by the brain differently from other signals; olfactory signals go directly to the cortex before going to the thalamus, whereas other signals go to the thalamus first.

My interest here is different, and I definititely plead weirdly ignorant here. There is something in my own feeling of consciousness that is reminiscent of my feeling of odor. This is just a hunch. When I say "I feel good this morning", it that pleasantness related to consciousness; and if it is, is that pleasantness scale similar to that of odor in terms of its relationship to a physical vector which would be that of consciousness?

Saturday, January 23, 2010

Rituals and attention

In Selective Attention Through Selective Neuronal Synchronization, Thilo Womelsdorf and Pascal Fries say (p. 298 of The Cognitive Neurosciences, Fourth Edition, MIT Press, 2009):

Therefore these findings suggest that inter-areal communication during attentional top-down control is conveyed particularly through rhythmic synchronization in a high beta band, either in addition to or separate from the frequency of rhythmic interactions underlying bottom-up feedforward signaling.

Top-down attention is directed attention, as in "look at that cat," while bottom-up attention is triggered attention, as in "something is amiss in this picture." Attention and rhythm; that forms a nice underpinning for social behaviors.

Zimbabwe Inanke

In the Wall Street Journal today Jan 23, 2010, a nice description of Zimbabwe's Inanke cave. The landscape, animals, shamanistic references are so similar in design and significance to the Pecos river cave paintings that the continuity between the two civilizations has to be recognized; but from South Africa to the south of the United States, is that longest of trek testimony to a single religious culture?

I note again that Zimbabwe's paintings are said to be post-glacial (5,000 to 10,000 years ago) by the article. Quite different from the pre-glacial (up to 35,000 years ago) cave paintings of the south of France and north of Spain, which I still don't believe are comparable in terms of religious expression. Where are the pre-glacial African cave paintings? Are there any?

Tuesday, January 12, 2010

Mirror neurons and consciousness

Interesting talk just posted on Ted of VS Ramachandran's The Neurons that shaped civilization.

What he considers is mirror neurons in my prefrontal cortex allowing me to sense when somebody touches something. They mirror the neurons that are fired when I (not somebody else) touch something.

Ramachandran says that when I actually touch something, my hand (say I am touching with the hand) sends signals of touching to my prefrontal cortex and that's how I differentiate direct neurons from mirror neurons.

Now Ramachandran says that if my arm is anesthesied, my direct neurons don't get the usual signals but are still looking for them so they get them from me seeing the other hand. Therefore my brain concludes that I am touching with the hand of somebody else. Ramachandran says that I have just assumed somebody else's consciousness.

But Ramachandran doesn't say: what happens with the mirror neurons then?

I think that the answer is that there are not both direct and mirror neurons, but rather one set of neurons that reacts to touching. However, that set can be linked to a representation of my hand (that's for direct touching) or/and to the representation of somebody else's hand (that's for mirror touching). If I see both my hand and that of somebody else each touching something, my neurons are activated, with a link to my hand (strong because reinforced by my hand signals) and another link to the other hand (weak). If my arm is anesthesied and the strong signal disappears, the only signal around is that from the other hand, even if weak, and it takes the place that would normally be taken by my own hand's signal.

That assumes that seeing my own hand, anesthesied or not, primes my neurons for searching signals from it. That sounds right, but now somebody needs to tell me if my explanation fits the neurological evidence. From what I have read of the original litterature on mirror neurons (see the reference in Computer Theology, p. 420: Mirrors in the Mind, by Giacomo Rizzolati, Leonardo Fogassi and Vittorio Gallese, Scientific American, November 2006), it is. In their original discovery, the authors had a monkey's neuron monitored by sound when the monkey touched a banana. One day the operator, instead of the monkey, touched a banana and the monkey's neuron resonated. I was actually the same neuron, which is what I say in my explanation.

Now a final point. My touching neurons get input from both the image of my hand and that of somebody else, but how do they themselves communicate where the input was from? The only explanation I see to that is that the recipients for the strong signal out (which means that my touching neurons think, rightly or not, that I am actually touching something) and those for the weak signal out (which means that I am watching somebody else touching) are, in the former case, far from my touching neurons, and in the later, close to them. Attenuation would make the difference. I have no idea whether that's a realistic hypothesis. If not, what else?

Friday, January 8, 2010

Saliency and attention

In The Quest for Consciousness (Roberts & Company Publishers, 2004, p. 161), Christoph Koch gives the following title to a section of the text:

Salient Objects Attract Attention

Maybe he should have said instead:

Attention Makes Objects Salient

That would be consistent with the computer theory of exceptions. Exceptions are raised when the brain cannot otherwise handle the situation; a situation that can't be handled by the regular process is salient.

Or an otherwise unremarkable object, i.e., an object fitting the current process, may be subject to attention. It then becomes salient, and therefore triggers an exception.

As with computers, the exception is an opportunity for the exception-handling procedures to examine the process that raised the exception. A process that can so be examined is called reflexive in computer science. So the brain uses the exception-handling procedure to investigate itself. That's what consciousness is made of.

You may ask at this point: how does a computer bring an object to attention? Technically, it sets for that object an explicit Throw procedure. That procedure goes out of the current process to find the next Catch procedure, that manages the exception thrown. In the absence of attention, the Throw procedure is implicit and simply triggered when the on-going process finds it can't handle the case at hand (it has found a salient object).

How does the brain know where to set up an explicit Throw procedure. Well, we've now moved the discussion of consciousness to that of attention. The way a computer does it is while it is in exception mode, i.e. when it is capable to look at a reflexive process, it can intervene on that process as dictated by the exception procedure.

Add to this recursivity and voila. We've built a conscious brain.

Friday, January 1, 2010

Clerics and war

Reflecting on the past decade, it dawned upon me that clerics, from shamans to priests to imams, have historically be fond of blessing acts of war (and sometimes war itself) and celebrating their consequences, while they don't appear to participate in the same way in acts of police.

In the computer theology (Computer Theology, Midori Press, 2008, p. 373) recursive hierarchy of trust and policy infrastructures, that would mean that wars involve trust infrastructures, while police involves policy infrastructures.

So war would be about trust, or the lack thereof. One analysis would be that as long as two parties' trust infrastructures are compatible, everything goes fine, but when the context (or the trust infrastructures themselves) changes, incompatibilities demand resolution.

In Computer Theology (p. 141), we emphasize that, under breach of the trust that consolidates it, the social ecosystem is quick to revert to the physical ecosystem. That would reinforce that analysis. War would be an act of trust, albeit externally oriented, police an act of policy, internally oriented. Trust being a religious matter, clerics come into play on the war theater.

That begs the question of today's context or trust infrastructure changes. Might be one of those context changes the radical shift in information sharing brought in the past two decades by the Internet, that shaped a new perception of economic realities?

Thursday, December 31, 2009

Symbolism vs. number of neurons in the brain

Christoph Koch writes in Biophysics of Computation (Oxford University Press, 1999, p. 87):

Given an approximate density of 100,000 cells by mm3 in the primate, a synaptic density of 6 x 108 per mm3, a total surface area of about 100,000 mm2 for one hemisphere, and an average thickness of about 2 mm, the average human cortex contains on the order of 20 billion neurons and 240 trillion synapses (2.4 x 1014) [...]

This reasoning is not yet complete as while the number of synapses falls from the argument, the number of neurons doesn't. However, in The Quest for Consciousness (Roberts & Company Publishers, 2004, p. 71 note 5), the same Christoph Koch says:

Given a packing density of 50,000 cells per mm3, a total surface area of 2 x 100,000 mm2, and a thickness of about 2 mm, the average human cortex contains on the order of 20 billion neurons and 200 trillion synapses (2 x 1014).

Also in The Quest for Consciousness (Roberts & Company Publishers, 2004, p. 26), Koch says:

All the visual information that the brain can access is implicitly encoded by the membrane potentials of the more than 200 million photoreceptors in the two eyes.

Since photoreceptors are neurons, those facts combined provide a formal proof (we insist on the terms "formal proof" here) of the elaboration of symbols by the brain. The proof is that if each image is using 200 million neurons, only 100 images (100 x 200 million = 20 billion) can be stored by the entire brain, obviously insufficient. Information needs to be reduced (which we actually know it is, but that's besides the argument here).

This sets the scene for a formal study of symbol construction, starting with a very small number of photoreceptors and going up from there.

Tuesday, December 29, 2009

Cloud Computing Definition

Computer Theology's definition: Cloud Computing is the global optimization of computer resources.

Saturday, December 26, 2009

Christof Koch and Roger Penrose

In Computer Theology (2008, Midori Press) we wrote (page 40):

There is indeed a tendency to observe a reducing perspective on computers, and particularly on computer systems. For example, Roger Penrose seems to suggest as much when he bases his analysis on an equation of computing with Turing machines in The Emperor’s New Mind, even considering the extreme example of a Turing machine with infinite memory, infinite state variables and unlimited computing time; there is more to computing than theoretical equivalence.

In The Quest for Consciousness (2004, Roberts & Company), Christof Kock writes (page 8, note 12):

Penrose's books (Penrose, 1989, 1994) are among the most lucid and best-written accounts of Turing Machines, Gödel theorems, computing, and modern physics I have read. However, given that both monographs nominally deal with the human mind and brain, they are equally remarkable for the almost complete absence of any serious discussion of psychology and neuroscience.

This is most remarkable in that, as we observed in Computer Theology, we should extend Koch's mention of a lack of serious discussion ... to computer science. Turing machines, as important as they are, are a minuscule part of any cursus in computer science, or, for that matter, of theoretical computer science. But that's all that Roger Penrose and Christof Koch speak about when they think of computers. In the case of Roger Penrose, it's just sad. In the case of Christof Kock, it's also surprising, as his most wonderful book of neuroscience is entitled Biophysics of Computation (1999, Oxford University Press) and is so exquisite in its description of neural computation. But again, all he seems to know about computer is Turing machines (he also make some references to computer hardware, but they are even more of a case of ignoring mainstream computer science). See for example page 469:

The brain has frequently been compared to a universal Turing machine (for a very lucid account of this, see Hofstadter, 1979). A Turing machine [...]

and then Koch explains differences between Turing machines and the brain's operations. What's remarkable is that it's obvious to a computer scientist like me that Turing machines are the wrong metaphor. I'd rather think of the theory of exceptions when considering consciousness, or of object-oriented concepts when examining miror neurons, or more generally, in mapping the brain, of ontologies, of Bayesian networks, of stochastic grammars, and many other computer science constructs. That neither Roger Penrose nor Kristof Koch, great scientists in their fields and purporting to address computer questions, would stop at computer science 101 reflects the dire state of interdisciplinary studies. If this note encourages them to dig into a science that would indeed benefit so much from these most important scientists' insights if they were more informed, I'll be happy.

Sunday, December 6, 2009

A neurological source of spatial metaphors?

Computer Theology discusses at length the role of spatial metaphors in language and cognition (p. 281; see also Generics and Metaphors Unified under a Four-Layer Semantic Theory of Concepts).

In A Right Perisylvian Neural Network for Human Spatial Orienting (chapter 17 of The Cognitive Neurosciences, MIT Press 2009), Hans-Otto Karnath presents the symmetry between the right and left perisylvian networks:

"I appears as if this lateralization of spatial orientation to the right hemisphere network parallels the emergence of an elaborate representation for language in the left-sided perisylvian network."

In non-human primates, both the right and left perisylvian networks lead to spatial disturbance when they are damaged. In humans however, right network damage leads to spatial disturbance while with the left one there are only traces of such spatial disturbance. In a major difference with non-human primates, the human left perisylvian network is rather totally associated with language and praxis, with damage leading overwhelmingly to aphasia and apraxia, instead of spatial disturbance. (I need to point out here that I have expressed that carefully to leave the question open of the rudiments of language found in monkeys and chimpanzees -- and I would suspect more to come, since we are still on the discovery path).

If the language and spatial systems are then in fact symmetrical, this is no wonder that spatial metaphors ("I am staying on that table" vs. "I am working on this topic") are fundamental to language?

Sunday, November 22, 2009

Computer Theology illustrated

Something that Tim and I have been considering for some time is to illustrate Computer Theology. We refrained from it because for displaying images either in the book or on the web we think that we'd need to get individual copyright release for every image, an impossible task for the time being. So what we've decided is to just put an external link to images that we think are relevant to the text, which redirects readers to the external site, so that we don't access the site ourselves. An early version of it is at:

http://www.midoripress.com/computer_theology/653295239572397523957570-381.html.

It's not as pretty as when pictures are actually interspersed in the text with an internal image link, but it allows at least to start working on the project. Incidentally, a possible benefit could be that Google may find our text more interesting and the images it points to more popular, giving both more salience in the sea of the web. Something puzzling is that Google themselves show images that they have uploaded on their own web site from external sites when one makes a web query with "Images" turned on, so perhaps we could do like them and put the images in the text after all, in the web version at least. Something to explore.

Saturday, November 14, 2009

Consciousness ain't hard

In her interesting presentation at Ted, Rebecca Saxe talked about the "hard problem of consciousness." Hard for neuroscientists, but what about computer scientists?

Let's imagine that I replace my visual system with an artificial one, as we are on the verge of being capable of. This doesn't affect my consciousness, so I can progressively replace my entire sensori-motor system and still be conscious alright.

So I'm left with the brain. I can now store out all my memories, and I'm still doing OK as the rest of my brain does whatever it has to do. But now I'm going to eat away at those circuits be replacing them one by one by a computer equivalent.

After a while, I'm all bionic and I never had the opportunity to loose my consciousness, so it's still around. Consciousness is an emergent property of our nervous system in combination with our sensori-motor apparatus, quite mechanical indeed.

But can I loose consciousness? Sure I can. A good night sleep, a coma, and other events will do the trick. In each case, my sensory system stops to stimulate my brain enough that I answer perfunctorily to effect my motor system in return, if I do at all. The loop of consciousness is quite large then.

Let me now drive on the highway. It's a good day, light traffic, and before I know it I have driven 20 miles of which I have no memory whatsoever. I have lost consciousness of my driving, albeit not that of whatever I was thinking about while this all was happening. I can use here the same explanation as above; a set of sensory inputs were answered mechanically by motor output while not involving parts of the brain that were free to be processing other information.

But again, we see a regular pattern here. Routine activities are handled by sensori-brain-motor activities that may be sophisticated yet unconscious, while leaving place for consciousness to operate. Now, a truck enters the highway from the right without respecting a signal, forcing me into an evading manoeuvre. I sure get conscious of that, sweating the event.

Even if the reaction to the truck may have triggered my evasion before I got conscious of it, I can still draw the conclusion that at the same time my brain is conditioned for routine activities (that are likely to be unconscious), and is also conditioned for exception-based activities (that trigger consciousness). Notice that routine activities can become non-routine, for example when I "put my mind to them."

In computer terms, we have a routine environment and an exception environment. The exception environment allows observing, and also correcting accidental modifications to the routine environment. But it also allows inspecting various aspects of the routine environment (in
computer terms, we call that "reflexivity"). Well, that's consciousness, and it is all natural to the computer scientist. It probably puzzles neuroscientists because they have the wrong idea of what a computer metaphor is.

If a neuroscientist of good tenure (Rebecca Saxe?) would contact me, I would tell them which experiments to conduct to confirm the theory; how to look at exception mechanisms and where to find the chemical release they trigger and that we experience as consciousness. Then we'd write an article making a parallel between the computer view and the neurological view and we'd win the Nobel prize. To get ready, I'm currently reading the fourth edition of The Cognitive Neurosciences (MIT Press, 2009), a 1255 pages compilation of 89 up-to-date articles that cover the field. A pleasure.

Wednesday, November 4, 2009

Privacy is the provisioning of identity

Recent work in sociology (e.g. Theory and Research on Human Emotions, Elsevier, 2004) equates emotion with status. We constantly scan our environment to evaluate our status. A status that lowers is source of negative emotion, a status that improves is source of positive emotion.

In the volume cited above, there is a seminal publication by Sheldon Stryker, Integrating Emotion into Identity Theory. It is to be combined with Charles Cooley's proposition (in Human Nature and the Social Order) that identity is the self viewed by others. Stryker demonstrated from experiments that we establish and conserve our identity via constant evaluation of status. Emotions allow us to measure our identity and act on it.

That leads us to a new definition of privacy:

Privacy is the provisioning of identity.

With this definition, privacy is the reservoir from which we can draw to modify our status, and therefore, hopefully, maintain a satisfying identity.

Sunday, November 1, 2009

Minimalist definition of teleology

Reading Teleological Realism, by Scott Sehon (MIT Press 2009), I finally figured out that a minimalist definition of teleology could be the difference between (1) and (2):

(1) Mary went to the kitchen because she was thirsty
(2) Mary went to the kitchen to have a drink

(1) would be related to causality (logic) and(2) to intent (teleology). But now look at:

(3) Mary went to the living room because she was thirsty
(4) Mary went to the living room to have a drink

(3) is now teleological (she must have an intention) and (4) logical (clear explanation). That would make teleology a contextual (extensional) concept, as opposed to an intrinsic (intensional; yes, with an "s") concept. We'll leave it here for now.

 

Reversibility of mirror neurons

Thomas J. Sheff says in Violent Males: A Theory of Their Emotional/Relational World in the book Theory and Research on Human Emotions (Jonathan H. Turner, Ed. 2004 Elsevier):

According to Lewis (1971), persons in whom shame is deeply repressed "would rather turn the world upside down than turn themselves inside out."

In the same book, Stryker says in Integrating Emotion into Identity Theory that he paraphrases Mead with:

society impacts self impacts social interaction (p.2)

Stryker also says (p. 8) :

A basic tenet of a symbolic interactionist frame is that persons have selves insofar as they respond to themselves as objects primarily through internalizing the response of others with whom they interacts."

So this reiterates that identity is the self viewed by others (our formulation of Charles Cooley's perspective on the question). We use our understanding of others to project their view of ourselves, how they affect us, and that's our identity. But reading the quotes above, I realized that it also works the other way. Our internalized perception of identity is something we can use to affect others. The example given by Thomas Sheff is using anger towards others to protect our shame. So we both absorb identity (mirror neurons) and project identity (usage of mirror neurons in reverse).

Back to Lamarck

Let's assume that a particular species of, say, monkeys, discovers that throwing stones helps kill birds, and that this knowledge is transferred from generation to generation in those monkeys, as we now know is happening with many species of animals.

We would naturally expect that those monkeys with a better arm or better aiming capabilities would have an evolutionary advantage that would end up, by Darwinian natural selection, favoring those genes that provide for such performance.

So at the end, we would have monkeys that have a genetic advantage in throwing stones accurately. They might reach a point were killing birds becomes they way of surviving. Would these monkeys be in a situation to "forget" their new-found capability of throwing stones for a living?

If the answer to that question is "no," we have demonstrated a mechanism for Lamarckian selection of acquired traits to propagate.

Definition of religion (improved)

Religion is the association of ecstasy and ritual in establishing a system of trust.

According to this definition, the discovery of religion may have been the source of the great leap forward as formulated by Zimmerman'sTheory.

Grounding of metaphors

The University of Texas Computer Science department (UTCS) has a project called The Spatial Semantic Hierarchy (cf. Kuipers 2000). That's an ontology of a human's spatial environment. That could be used as a basis for metaphoric understanding such as that described in Computer Theology p. 281 and Generics and Metaphors Unified under a Four-Layer Semantic Theory of Concepts. For example: "These ideas dominate the field" relates to "These mountains dominate the field" (I chose this example because it shows both the "ideas <=> mountains" metaphor with word mapping (cf. Computer Theology p. 281) and the "field <=> field" metaphor with word registration (cf. Generics and Metaphors Unified)). Using the spatial semantic hierarchy, one can conclude that challenging those ideas is akin of moving mountains; it is, isn't it?

Autistic Behavior In Front of the Computer

Have you noticed how sometimes the computer baffles us so that once we find a solution to a problem we always go through the same routine to solve it, even if we are aware that there is probably a simpler way?

That looks similar to autistic persons, overwhelmed by sensory input, using tedious routines. That might also be their way to make some sense out of the perceived chaos. And if it works, i.e. if it allows living, why change it?

I'd go one step further, this time turning to a particular class of computer users; that is programmers. Once they know a computer language, they have a tendency to specialize in it and not want to try something different. Is that an autistic savant behavior?

Survival

Tim gave me Deep Survival, by Laurence Gonzales, to read. The first pages gave me the intuition that cognition is the engine of ritual, while emotion is the engine of ecstasy.

Or, to recall Computer Theology's mapping of ritual to proof by induction, and ecstasy to proof by negation, cognition allows building arguments out of purported facts, while emotion allows creating those facts.

What's interesting in this new insight is that while Computer Theology presents how making up new entities (like proof by negation does, or like religion does, or like other creative endeavors do) helps solve problems of life, whether scientific, spiritual, or otherwise survivalist, it had not foreseen that the engine of building up these new entities might be the emotional system.

The way it would work is that the emotional system would scan the cognitive system and use it for constant establishment of metaphors (metaphors are "spirits") that would then be used right away or fed back to the cognitive system if the situation allows (in terms of reaction time).

That's a beautiful hypothesis. Quite emotional indeed.

Smart

Most of us are smart enough to know that we are not smart enough, and we cope with it in various ways.

Some are not smart enough to know that they are not smart enough, and some are too smart to know that they are too smart.

There lies the difficulty.

Tolerance

The hard part of tolerance is tolerance of intolerance.

Metaphor of Illegality

Last week in two different articles the New-York Times contrasted "illegal outposts" (May 27, 2009) that would be taken down in the West Bank , and settlements that would keep expanding (May 28, 2009), ostensibly legal then. The later article mentions views that all the settlements are "a violation of international law." The law in question is Geneva convention's Article 49, which can be read as making all the settlements illegal for moving populations from an occupying country into occupied territory. This gives us an opportunity to explore the semantics involved in the application of the word "illegal" here.

We previously explored the mapping of spatial properties of our immediate environment to abstract concepts via metaphors. For example, in Computer Theology (p 281) we study the sentence "We have a warm relationship. It works well. We are very close." The proximity statement ("We are very close.") is in fact a spatial property mapped into the more abstract world of relationships via this metaphor.

In that context, we have two spaces. One (abstract; New-York Times) in which "illegal" and "legal" correspond to advertised statuses of outposts and settlements, the other one (spatial; Article 49) where "illegal" and "legal" correspond to geographical location. The latter space, concrete, is not a metaphor, but the labeling of locations. The former space, though abstract, has its metaphoric base in a partitioning that is geometric in nature: here it's illegal, there it's not. Therefore, the abstract definition maps to a geographical representation that is different from the other one. In summary, the word "illegal," while belonging to the ether of justice, is in fact, concretely, about territorial feud. Two different mappings of the word to geography, indirectly via metaphor or directly via definitions, illustrate it. This deconstruction illustrate how a computer could come to reason about the subject.

Speaking is hearing in reverse?

In Scientific American of June 2009, Erica Westly reports on the article Somatosensory function in speech perception, by Takayuki Itoa, Mark Tiedeab and David J. Ostry, published in the Proceedings of the National Academy of Science of the United States of America (January 21, 2009). The authors have shown that the mouth position affects hearing. Certain positions of the mouth make us favor certain readings on ambiguous sounds.

The authors are by no means saying this, but this creates the puzzling, and perhaps crazy, idea that we could reverse speaking. By moving the mouth to spell the words, then we would hear them. But isn't that exactly what we are doing when we are lip reading? So here is how the story would go: when we are reading the lips of somebody else, we hear the words; it's just a matter to "read" our own lips; perhaps we'd start with a mirror?

All of this to say that a formidable challenge of linguistic analysis is still up for grab. Is there a symmetrical system accounting of both production and consumption of language? Or, to put this in more technical term, is our neuronal grammar reversible (here, I use "grammar" in a very large scope, encompassing for example Richard Montague's Formal Logic, and, say, Nicolas Asher's model-theoretic semantics )?

Definition of Identity

Computer Theology's definition of identity:

Identity is the self viewed by others

It's pretty close to how Charles Horton Cooley (Human Nature and the Social Order) may have defined it, an insight that we got from Daniel J. Solove's The Future of Reputation: Gossip, Rumor, and Privacy on the Internet (p. 31).

So in the 1922 edition of Human Nature and the Social Order, we find (p. 126) "I may say here that there is no view of the self, that will bear examination, which makes it altogether distinct, in our minds, from other persons." We have looked recently on how to program a bird to make it have its usual behavior of feeding itself or its chick via the same mechanisms. We could do the same to program humans to define their identity just as they define that of others. In the meantime, it's easy to imagine this program written and look at the self and society in that light. Which is what Cooley did.

Programming a Bird

A few weeks ago, we wondered how birds are programmed to account for their behavior in feeding their chicks. The interesting part here is that whether they feed themselves or their chicks, they behave exactly the same as far as finding food is concerned. The only difference is that in one case they slide the worm into their chick's throat, in the other case in their own throat.

Here is how the program would look, reduced to its bare minimum.

1. First we need the concept of a bird, which is expressed in some variant of the following in many programming languages:

Class Bird extends Animal {}

We just said that a bird is a class of animal, and we are setting up the braces as a placeholder for further definition.

2. Then we need the concept of feeding, which we get as follows:

Class Feed extends Action {}

We just said that feeding is a class of action, and we prepared for further definition.

3. We now need to express that a bird can feed, so we complete the definition of a bird:

Class Bird extends Animal {
    Function feed () {
       return new Feed ();
    }
}
Here we said that a bird can feed, and that this is accomplished by setting up a new action of feeding.

4. Now we need to complete the definition of feeding:

Class Feed extends Action {
    Function start (bird: Bird) {
       ... A sequence of actions ...
    }
}
The action of feeding has a start, which is triggered once the bird to feed has been set. We dispense with the actual specifications of the ensuing actions, as they are beyond our present purpose of illustrating how a single programming allows a bird to feed either its chicks or itself.

5. We are now ready to write our program. First, let Tweety feed another bird:

Tweety.feed.start (new Bird);

and now let Tweety feed itself:

Tweety.feed.start (Tweety);

That's it; we've shown that a single programming can account for a bird feeding both itself and its chicks. We didn't need mirror neurons for that ... just neurons.

Definition of Privacy

Computer Theology's definition of privacy:

Privacy is the control of one's personal interactions.

Far-fetched?

In The Rock Art of Texas Indians (University of Texas Press, 1996), W. W. Newcomb says p. 108, talking about the introduction of horses in America: ".... no doubt this strange animal and his equally exotic rider were painted and scratched on many rock surfaces for the edification of those who had not yet seen this new phenomenon."

We've previously discussed the fact that while post-glacial rock art has overwhelming evidence of shamanistic influence, the same can't be said of pre-glacial rock art. This leads me to formulate an hypothesis: what if some (much?) of pre-glacial cave painting was for edification, of, say, women? That would explain why artists didn't mind overlaying previous work, why the art could be secluded, and why the art was often accompanied by feminine symbols.

But then, it doesn't somehow sound as deep as shamanistic projections.

Kandinsky on the Pecos

Just a glance at the Pecos river 5000 years old White Shaman rock art. Then another glance at Kandinsky's 1923 Black and Violet painting. Not only do the colors match, but the human and ancillary representations are similar. I discovered this by chance as I received Connaissance des Arts with Kandinsky's Composition 8 on the cover. The magazine was laying on the floor and I was wondering where I had seen that painting before; actually I was simultaneously reading Newcomb's Rock Art of Texas Indians with Kirkland's illustrations; enough for the flash of recognition to occur. Kandinsky is no more abstract than our predecessors of Texas, who had to learn living together in the canyons surrounding the Pecos River at the junction with the Rio Grande, combining their ecstatic experience with ritual representations of religious bounds.

Can we say that the Pecos contains the art of religion, while modern times have cultivated the religion of art? That would indicate an earlier gathering of trust followed millenia later by trust derived from art reflection. That's consistent with the emergence of modern art in secularity.

Newcomb notices p. 65 of his book that mescal beans of the Texas montain laurel, used most probably (from remains found in shelters as well as contemporary observations with native Americans) as ecstatic proppant by the Pecos river civilization, "can produce nausea, vomiting, delirium, long-lasting unconsciousness, and death." This answers a question that I have long pondered: why would somebody give an elevated status to a shaman as pertains to understanding the underworld passage that Carolyn Boyd has deciphered in her Rock Art of the Lower Pecos?

The answer may be that somebody who can fall in long-lasting unconsciousness via savant dosage of the toxic beans may rightfully claim knowledge of inferno and resurrection.

Birds and Empathy

There is a bird's nest next to my dining table outside on the patio. Incessantly, the father and the mother fly away and bring back small worms to their 5 chicks. I was wondering how I would program the parents to accomplish this feat. Clearly, they are doing just what they are doing when they feed themselves, but they stop before swallowing. It's very improbable that they would use separate circuitry for feeding themselves or their progeny. It's rather more rational to think that they use the same circuitry, with a switch orienting to whichever swallowing mechanism is in play, either internal in their case, or external for their children.

Actually, I would also program the swallowing with only one circuitry. The switch would only say, "external" or "internal". And that would be it. An ultimate exercise in empathy, and an illustration of mirror neurons that doesn't require any special mechanism. In this case, mirror neurons are just the regular neurons, used in two contexts.

Time geometry

Today in Strasbourg, France, President Obama answered questions about the NATO summit with his usual eloquence. I was watching his hands accompany the speech, in the light of the study made by David Mc Neil in Hand and Mind: What Gestures Reveal About Thought. According to McNeil, the gestures are the metaphoric bases of the speech. For example, if the speaker says that a country is above another, s/he will show a gesture of relative position, with, say, the hand flat towards the earth, and moving one step up as the sentence is pronounced. When Obama said "during this time," he used his right hand, oriented vertically toward the right, to push an imaginary space further to the right. So through his hand gesture he moved the time he was talking about to make room for the new time he was going to talk about. We see here vividly illustrated the geometry of time, or how the mind uses spatial metaphors to illustrate time.

Leonard Cohen's Brain

The first show of Leonard Cohen's new tour in Austin's Long Center for the Arts yesterday was an exhibition of words and music blending so fully that it's hard to understand how Noam Chomsky could really believe in a specific language ability. Music preceded words, and the fact that we remember words accompanying music much better (In my way, I have tried, to be free ...) should have been an early indicator that language evolved in concert (sic) with music. Noam Chomsky was my role model and the reason I got into linguistics, and publishing next to an article of his in Linguistic Inquiry (Spring, 1978, issue) was a life honor. But he was wrong, and Richard Montague (author of Formal Philosophy) had it right. There is no syntax, just semantics, building metaphors on our physical and emotional experiences, both of which resonate (sic again) with music. (That doesn't change the fact that Noam Chomsky was the great introducer of formal syntax, epistemologically a great tool of linguistic analysis. But epistemology it is, not ontology.)

Jean Clottes and David Lewis-Williams got it wrong?

In The Shamans of Prehistory: Trance and Magic in the Painted Caves, Jean Clottes and David Lewis-Williams extend Lewis-Williams' previous work on post-glacial San rock art of south Africa (less than 12,000 years ago) to pre-glacial rock art primarily of France and Spain (from more than 32,000 years ago to somewhat less than 15,000 years ago). The theory if presented further in David Lewis-Williams' The Mind in the Cave: Consciousness and the Origins of Art. In his Cave Art, Jean Clottes presents a vast panorama of pre-glacial rock art, and some post-glacial rock art. The difference is striking, and even more when we explore deeper post-glacial rock art with, say, Carolyn Boyd in Rock Art of the Lower Pecos.

The shamanistic influences on post-glacial rock art are very well-documented, by both modern ethnological evidence and scene analysis. However, there is no ethnological evidence for pre-glacial populations, and there are very very few scenes in pre-glacial rock art. Moreover, post-glacial works have generous descriptions of people, with numerous shamanistic representations (half person/half animal in particular), whereas pre-glacial works rarely present people, and shamanistic properties of those rare people are at best unclear. So we're left with an uncomfortable impression that the extension of post-glacial, shamanistic analysis, to pre-glacial work is somewhat contrived. Finally, pre-glacial rock art is heavily dominated by animal representations; post glacial rock art also has mostly animal representations, but hunters show up frequently with the animals.

An alternative explanation would still leave place for shamanism, but from a broader perspective. In Computer Theology, we've equated trust and aesthetics. Aesthetics, by both surprising (the ecstasy of novelty) and comforting (the ritual of order), provides reassurance of human control over events and nature. Representation of animals would induce trust in a community as to their position within the fauna of the time. If taken from there, it is natural to then ease into Jean Clottes and David Lewis-Williams analysis, as ecstatic and ritual participation in art is concomitant with religious experience and learning. In that perspective, we could not only present rock art over the ages as representing the gradual understanding of human power over nature, including animals and humans, but also we would understand an obvious phenomenon. Art has been deeply associated with religion, but art can also exist without religion. If art is at the origin of it all, this latter point is encompassed by our new explanation.

Alvin Ailey's Revelations (1960)

First, individual ecstasy. Second, ritual community experience. Third, building from nature's lessons. Fourth, communal joy in the big. All built on the dance's reflection of our metaphorical experience. The pretergenesis table in action.

Lamarck 1 Darwin 0 ?

In a 2008 publication to the US National Academy of Science, the authors show how a 36 years evolutionary span on an island of the Adriatic sea were enough to present important evolution in lizards of "head morphology, bite strength, and digestive tract structure," after they were introduced to that island of Pod Mrčaru.

If we consider bite strength, for example, a Darwinian view would have us consider that some lizards were born with a stronger bite strength, some with a weaker one, and that the latter would have been eliminated for the plants of the new island are tougher to eat than those of their previous island of Pod Kopište.

While head morphology and bite strength can be related, the evolution of the digestive tract structure to support a shift towards plants of "high cellulose content" would reasonably be considered independent. So for the new presence of cecal valves in lizards of the new island, a Darwinian view would consider, again, that some lizards would be born with it, others not, and that the former would remain alive to procreate.

A Lamarckian view would consider that the tougher staple would lead to a stronger bite, that the cellulose would trigger the digestive change, and that those characteristics would then be inherited and fixed in the population. This view is considered laughing matter, at least as long as DNA modifications are considered. So we're left with the view that in 36 years, somehow, two independent variables would have been changed amongst the innumerable other changes that might have to be considered, and somehow natural selection would have found a path in that probabilistic ocean.

For the admittedly innocent bystander, Lamarck sounds pretty good here. And by pushing the reasoning, would he also sound pretty good then for longer span evolution? We would love to hear comments countering this bystander's erroneous ways.

Rapid large-scale evolutionary divergence in morphology and performance associated with exploitation of a different dietary resource
Anthony Herrel, Katleen Huyghe, Bieke Vanhooydonck, Thierry Backeljau, Karin Breugelmans, Irena Grbac, Raoul Van Damme, and Duncan J. Irschick
Proc Natl Acad Sci U S A. 2008 March 25; 105(12): 4792–4795.

Trust and Deception

The US government is asking the Swiss bank UBS, which has a US subsidiary, to disclose the name of American account holders. The Swiss law precludes Swiss banks to disclose the name of their account holders. This illustrates deception built on trust, whereas deception would seem to elude trust.

The idea is that a deceiver, say a tax evader, would trust an institution that deals with deceivers. Further, the deceiver trusts the government that warranties the trust in that institution. So, we're talking of trust being extended to a government involved in deception by transitivity. Trust seems to be comfortable with deception indeed.

This would seem to confirm Computer Theology's definition of trust as the measure of expectation of an outcome, independently of judgment.

Rock Art Linguistics and Word Archeology

In The Archeology of Rock-Art, in his article "Finding rain in the desert: landscape, gender and far western North American rock-art," David Whitley describes as follows the relationship between landscape and shamanic representations regarding far western North American rock art (page 19): "Male shamans used feminine-gendered rock-art sites, because on one level their entry into the supernatural was conceived as a kind of ritual intercourse." Apparently unbeknown to him, he has himself, in these modern times, associated with the parietal trope an archeological trace of the English language, by using the word "conceived," itself expressing a metaphor linking sexual conception to the realm of ideas.

Later on in the article, Whitley does it again, this time describing the "up/high/mountain" versus "down/low/valley" landscapes (page 23): "Indeed, this directional symbolism was sufficiently strong that, among some groups, it even affected the sexual division of labor: Miller (1983: 74) notes that in Numic house-building, men were responsible for erecting the upright pole supports, while women made the floor mats and the wall-coverings [...]." Note the use of the word "erecting." A sexual expression maps an archeological concept with just the same metaphoric content, but now in the English language.

In another article of the same book, Pictographic evidence of peyotism in the Lower Pecos, Texas Archaic, Carolyn Boyd shows that the Pecos River rock art of Texas and Northern Mexico makes ample place to descriptions of peyote, an hallucinogen doubling as medicine (she expands this further to datura, another hallucinogen with medical properties, in her book Rock Art of the Lower Pecos). Whether the medical use of the plant gave credibility to its ecstatic revelations, or whether the hallucinations confered miraculous properties to the medical, the well-recorded dual function of shaman and medicine-man is hereby understood. Again, the English language embodies that association: "Drug" is a word that applies for both medicine and ecstasy.

English is not alone. "Conception", "erection", and "drogue" are French words with the same metaphoric relations. How far and how wide this archeology traces back may be yet to be investigated. But coming back to rock art, this makes us wonder how much of it is a metaphorical illustration of processes otherwise registered in language, and furthermore in elementary cognition. If we started from archeological traces of metaphors in language, how much more clarity would be brought to bear to rock art, and therefore anthropological, interpretation?

Christopher Chippindale and Paul S. C. Taçon (editors). The Archeology or Rock-Art. Cambridge University Press, Cambridge, UK, 1998.

Carolyn Boyd. Rock Art of the Lower Pecos. Texas A&M University Press, College Station, TX, 2003

God in Trust in God

Computer Theology considers the two forms of trust: trust through causality (Chapter 7: In His Own Image) and trust through process (Chapter 8: In Search of Enlightenment). They are reflected in ecstasy and rituals, enablers of religion. Recursion in trust through causality leads the search for ultimate cause to Trust in Trust, or Trust in God, or God in Trust.

However, religions based on trust through process, such as Buddhism, dispense of gods, and dispense of God. Trust through process also has a recursive end, ultimate trust in the detachment from our sensori-motor relations, where everything starts anew. The realization of ecstasy is the final proof, although here again, some do not need this reach anymore than the gods.

Perhaps Taoism is close to a formalization of another approach to the build up of trust, that of recognizing the effective network of trust granted by the functioning of the world without us humans. As an extension of this world, we can assume trust conveys, and then even Taoism is superfluous. Science has some connotations of this.

However, so far, the latter approach seems to have vanquished always under the power of the former approaches. The power of recursion reaches confines of our mind that, for many, overwhelm by their transformational power, building new forms of trust that breed their own recursive reinforcements.

Hands, Trust, and Satyam Rock Art

Computer Theology (page 399) studies the role of rock art in the build-up of human societies. The difficulty with rock art in archeology is that of relating it to modern experience, although considerable progress has been made with the work of David Lewis-Williams in South Africa relating recent rock art with 19th century accounts of its elaboration. More recently, Carolyn Boyd has used ethnographic evidence from today's Huichol population of Mexico's Sierra Madre Occidental to decode 4000 years old rock art of the lower Pecos region of Texas.

Computer Theology has on its cover the hands of the Cueva de las Manos rock art of Patagonia, dating back some 7000-5000 years ago. More ancient still are the hands with missing fingers of the Cosquer, Gargas, and other caves of Southern France and Northern Spain, dating back to 20,000-30,000 years. A great contribution to the understanding of rock art would be a totally contemporary version of it, that could be readily interpreted in the context of its production. That just happened, as illustrated in a picture by Mahesh Kumar of Associated Press shown in the New York Times of Saturday, January 10, 2009.

This picture shows a wall poster made by the employees of Satyam, the company from India whose CEO has been jailed for cooking the books. The poster shows a row of people, with inscriptions around them like "Together we can!" and "PROUD TO BE SATYAM" and "We are one". But most strinkingly, it also shows imprints of hands (at least 5 blue, 6 green, and 12 yellow marks made by people applying their hands first in pigment and then on the wall). Just like our forebars 4,000, 10,000, or 30,000 years ago, the employees of Satyam implore us by this most intimate gesture of trust, the laying-on of hands. Grooming.

Art Recursion

Computer Theology examines the role of aesthetics in communicating trust. Recently, we translated Siboney, sung by Connie Francis, illustrating the role of metaphor. Today, we translate Gracias a la vida, the song of Violeta Parra, which is to Chile what Siboney is to Cuba:

Gracias a la vida que me ha dado tanto
Thank you to the life that has given me so much
Me dió dos luceros que cuando los abro
It gave me the eyes and when I open them
Perfecto distingo lo negro del blanco
I see clearly the black from the white

Y en el alto cielo su fondo estrellado
And sky high in the back the stars
Y en las multitudes el hombre que yo amo
And in the multitudes the man I love

Gracias a la vida que me ha dado tanto.
Thank you to the life that has given me so much
Me ha dado el oído que en todo su ancho
It gave me the ear wide open
Graba noche y día, grillos y canarios
Catching night and day crickets and Canaries
Martillos turbinas ladridos chubascos
Hammers turbines barks and squalls
Y la voz tan tierna de mi bien amado
And the voice so tender of my dear love

Gracias a la vida que me ha dado tanto
Thank you to the life that has given me so much
Me ha dado el sonido y el abecedario
It gave me the voice and the alphabet
Con él las palabras que pienso y declaro
And the words that I think and declare
Madre amigo hermano y luz alumbrando
Mother friend brother and the shining light
La ruta del alma del que estoy amando
The way to the soul that I love

Gracias a la vida que me ha dado tanto.
Thank you to the life that has given me so much
Me ha dado la marcha de mis pies cansados
It gave me the march of my tired feet
Con ellos anduve ciudades y charcos
With them I have walked the cities the puddles
Playas y desiertos montañas y llanos
The beaches the deserts the mountains and the plains
Y la casa tuya tu calle y tu patio
And your house your street and your patio

Gracias a la vida que me ha dado tanto
Thank you to the life that has given me so much
Me dio el corazon que agita su marco
It gave me the heart that pulses
Cuando miro el fruto del cerebro humano
When I see the fruit of the human brain
Cuando miro al bueno tan lejos del malo
When I see the good so far from the bad
Cuando miro al fondo de tus ojos claros
When I see the bottom of your clear eyes

Gracias a la vida que me ha dado tanto
Thank you to the life that has given me so much
Me ha dado la risa y me ha dado el llanto
It gave me the laughter it gave me the tears
Así yo distingo dicha de quebranto
So I part happiness from sorrow
Los dos materiales que forman mi canto
The two materials of my song
Y el canto de ustedes que es mi mismo canto
And your song which is the same song
Y el canto de todos que es mi propio canto
And the song of all which is my own song
Gracias a la vida que me ha dado tanto
Thank you to the life that has given me so much

Metaphors are left behind, and yet the song reverberates: the last verses illustrate the role of recursion in aesthetics. All songs reflect in one, the beauty is beauty alone, and the lover is lost in words. Sharing is the foundation of trust.

Unique Religion

Michael Tomasello has written an article in the New York Times magazine of May 25, 2008, called How Are Human Unique? He argues that the difference between humans and apes is the greater commitment of humans to group cooperation. According to Computer Theology, that cooperation is built on trust, fostered by ecstasy and enforced by rituals. Religion is the epitome of trust, allowing to realize trust on a wide scale, and further on to expand into forms of government that formally express their relationship, or lack thereof, with religion. As humans differ from apes, so do computers then, with their collaboration built on explicit trust models.

Martyr of Metaphor Symmetry

Computer Theology (page 281) studies in details the structure of metaphors. What it does not mention is the symmetry of metaphors. That understanding came to my mind when learning that wood floor installers use a tool called a "martyr" in French to push the planks next to each other. The martyr is a piece of wood that is used between the hammer and the plank to avoid damaging the plank. The concept of martyr is readily understood and the metaphor is striking.

Wouldn't a laborer using the martyr everyday get a stronger understanding of the human form of martyr? In that perspective, every facet of a term serves to reinforce all others, a strong form of cognitive reinforcement. When considering the additional hypothesis that a common term supporting various metaphorical senses serves as a cognitive bridge allowing associating ideas during the stream of a conversation, a new cognitive dimension emerges.

More missing fingers

A source of inspiration for Computer Theology is the observation of the missing fingers in paleolithic caves of France and Spain (page 401). More rock art with missing fingers has been described beyond that mentioned in the book, for example in Egypt (picture) and in the USA (Canyon de Chelly: description [certainly, a picture is missing here; in the book?]). Perhaps the additional evidence will bring more understanding on the sacrificial nature of the message left on the rock. Or perhaps will it find a different explanation (see for example the surprising if original thesis of Guthrie that it's all graffiti). Independently of the analysis, the fingers are missing and this has been communicated to the rock. That's the point that Computer Theology emphasizes when comparing this with missing information, particularly of the unexpected and therefore threatening kind, in computer networks.

Trust Reversal

Computer Theology page 246 illustrates the concept of trust reversal, the mechanism by which a trust network can be used against itself, by providing an example from computer networks.

Another example is the recent Bernard Madoff scandal. In a New York Times article entitled Madoff Exploited the Jews, Ronald Cass explains how Bernard Madoff used trust to lower barriers to inquiries into the fundamentals of his ruse. Computer Theology triages between trust by causality and trust by process. While using a common religion is an example of the former, the latter can be illustrated by repeated success, exactly the fodder of a Ponzi schemes. "I paid the last guy, so I'll pay you alright."

That begs the question of the mortgage-backed securities at the center of today's financial crisis. We could hypothesize that they also involve a reversal of trust. Being produced by the biggest names of Wall Street, trust by causality was invoked, and involving complex procedures, it was complemented with trust by process. If that analysis is correct, we might be observing a hole in the trust that's at the center of financial efficiency.

Trust lost is hard to regain. That, unfortunately, would call for a difficult rebound.

Affective Neuroscience

In Affective Neuroscience p. 12, Jaak Panksepp says:

"I will develop the position that a hybrid discipline focusing on the neurobiological nature of brain operating systems (especially those that mediate motivational and emotional tendencies) is needed as a foundation for a mature and scientifically prosperous discipline of psychology."

The words "operating systems" speak directly to the core thesis of Computer Theology, that trust calibrated by emotions is at the heart of both human and computer cognition. Computer Theology adds that religion is the epitome of such.

Jaak Panksepp. Affective Neuroscience. Oxford University Press, New York, New York, 1998. ISBN 0-19-509671-5

Arrullo de palma

Siboney, from Ernesto Lecuona, by Connie Francis, a most beautiful primal song where she pushes the feminine voice to extremes (our translation, aiming at the ensuing discussion):

Siboney yo te quiero yo me muero por tu amor
Siboney I love you I am dying for your love
Siboney en tu boca la miel puso su dulzor
Siboney in your mouth honey flows its nectar
Ven a mi que te quiero y de todo tesoro eres tu para mi
Come to me I love you and of all treasures you are for me
Siboney al arrullo de la palma pienso en ti
Siboney to the lullaby of the palm I am thinking about you
Siboney de mis sueños si no oyes la queja de mi voz
Siboney of my dreams if you don't hear my voice moaning
Siboney si no vienes me moriré de amor
Siboney if you don't come to me I'll die of love
Siboney de mis sueños te espero con ansias en mi caney
Sibony of my dreams I wait with anguish in my interior
Siboney si no vienes me moriré de amor
Siboney if you don't come to me I'll die of love
Oye el eco de mi canto de cristal
Hear the echo of my song of crystal
No te pierdas por entre el rudo manigual
Don't lose yourself in the rough and parse nature

Computer Theology studies the role of aesthetics in communication, and the grounding of communication in metaphors. Could it be, as we tried to express in the translation, that the beauty of this song comes from two readings, one populated with palm trees, cabins, and rough patches of vegetation, and one referring to the palm of a lover, her thoughts, and the path to love?

A most interesting expression is "arrullo de palma". The lullaby of the palm tree, or the lullaby of the hand's palm? Perhaps both. In the latter interpretation, we would observe a superposition of two metaphors. The coo of comfort, and the palm of welcome, then articulating a new meaning that reflects in inner thought and the travel of Siboney to the crystal of love. This is reminiscent of Computer Theology's discussion of a poem by Edmund Spenser ("... the lodestar of my life ...").

International Trust Infrastructure

In the November 25, 2008 Wall Street Journal article "Does Europe Believe in International Law?" Jack Goldsmith and Eric Posner, authors of "The Limits of International Law" (Oxford University Press, 2006), observe that "Europeans hold their values and interests dear, just as Americans do, and will not subordinate them to the requirements of international law."

Computer Theology shows that policy infrastructures are subordinate to trust infrastructures, with trust being derived from causality or process. In comparison with smaller human congregations, there is less of both in international affairs, and consequently a weaker basis for supporting laws. As trust infrastructures find their roots in religious concepts, the international stage is an observatory of their evolution. The word "secular" comes to mind, but is probably not reflecting accurately the melting pot of religions (say from Confucianism to Taoism and from Christianity to Islam) that reaches into international law.

Soldiers, Ethics, and Religion

In A Soldier, Taking Orders From Its Ethical Judgment Center (New York Times, November 24, 2008), Cornelia Dean writes about machines making decisions on the battlefield. The article forgets religion. Computer Theology shows how machines can derive ethical decisions from religious considerations. Who's on top?

Attributes, Intension, Extension

Computer Theology provides pp 279-283 a review of cognition languages. In particular, it shows how metaphors can be understood by computers. We could have gone further, and, for example, shown how computers can understand the difference that humans make in "I love eating duck" and "I love eating this duck". In the first one, no specific duck is indicated, in the second one, an unlucky duck is presented. That difference has several names; one of them, in logic, is "intension" for the first case, and "extension" for the second one. "Intension" is a variation on "intention", the idea being that the concept of duck is involved. "Extension" tends to indicate that we're talking about an actual duck, that, may, for example, be part of a count of ducks. Well, do cognition languages used by computers make the difference? Yes they do (here we are going to be technical, going beyond the book's habitual practice of using only layman terms to reach a wide readership). Those who are familiar with the XML language can look at the difference between:

(1) <animal type="duck"/>
(2) <animal>duck</animal>

It appears that (1) would be related to intension, and (2) to extension. The nice aspect of that observation is that it gives a theoretical foundation to what would otherwise be an artifact of convenience. We'd love to hear if this was noted by somebody before us, so that we can provide a reference, or/and to hear contradicting arguments.

Trust, banks, and mortages

Computer Theology studies the relationship of trust and policy, using in particular the concept of trust formalized in computer network to understand better human networks, or, as they are known, human societies.

This morning, US Treasury Secretary Paulson declared that the Treasury had decided to not use the $700 billion authorized by Congress as originally planned a month ago for buying distressed assets in the form of mortgage-backed leveraged security, but instead that the proposal would be that they be used to take ownership in banks and other financial institutions. While he was speaking, the Dow Jones dropped 300 points, and then up to 400 points.

Computer Theology defines trust as follows (page 9):

Trust is an expectation of an outcome with some degree of assurance.

Secretary Paulson explained that he shouldn't be blamed, but rather lauded, for the new turn, because "the facts changed." The analysis that this is confusing trust and policy would explain the Dow Jones drop. According to the definition of Computer Theology, included in the initial trust is the expectation of a model that would allow to provide a level of prediction of facts with some degree. If that degree of assurance is proven to be low by declaring that the facts are outside of the model, then trust is affected accordingly. Related policy is trumped, as modern economies are based on money, an ultimate embodiment of trust.

Readable on line

Computer Theology is now readable on line, deep in the theology:

Contents
Prologue: Dieu et mon droit
Chapter 1: Tat Tvam Asi
Chapter 2: Mechanics of Evolution
Chapter 3: Environment
Chapter 4: Physiology of the Individual
Chapter 5: Fabric of Society
Chapter 6: The Shrine of Content
Chapter 7: In His Own Image
Chapter 8: In Search of Enlightenment
Chapter 9: Mutation
Chapter 10: Power of Prayer
Chapter 11: Revelation
Bibliography
Index

I can say anything to a god, but I can't say everything to a psychologist

Computer Theology studies the relationship of religion and trust, and of trust and computer networks.

The International Herald Tribune today quotes a Taipei man consulting with a shaman: "I can say anything to a god, but I can't say everything to a psychologist."

The "anything" expresses full trust, while the "not everything" expresses partial trust. Here is condensed in one sentence the nature of Computer Theology's trust by causality. Computer Theology's trust by process is not involved here, so we have a pure case of determination.

Also, the sentence confirms the particular status of the shaman as direct conduit to the god (under ecstatic conditions, as indicated in the article). In computer terms, the shaman is the broker, arbitrager of trust, the intermediate that provides the trust necessitated by the conditions. An example of such an arbiter is Google: when we search and they present a list, we automatically attribute trust to that list. If the first item in the list made it that high, we think we can trust it; never mind that it is just an artifact of Google search algorithm.

Barack Obama

Here are the opening words of Computer Theology, commenting the United States Declaration of Independence (see Computer Theology page 1):

These seminal words of the social order of the United States of America provide a rare direct illustration of an evolutionary event known as speciation; the creation of new species from old. From these words, we can begin to draw parallels between biological processes and social order. The Declaration of Independence is grounded in the metaphorical understanding from which is derived context sensitive communication. Consider that a mere 15 years after it was published, a subsequent defining document of the social order, the Constitution of the United States of America prescribed that men were significantly superior to women and that black men or women were distinctly less than equal to either white men or women. Women of any hue were not allowed to participate in the governance so divined and black people of any gender were declared worth three fifths of a person for purposes of establishing participatory power within this governance structure. Otherwise, they could be property owned and traded as chattel goods. The words “equal” and “Rights” were metaphors meshed in the social interactions of the time. That one could look upon these words and derive from them something other than gender independent suffrage, and in particular could draw from them an acceptance of human slavery, is critically foreign to our current mores. Such is the double-edged sword instilled in metaphorical understanding. As the 42nd President of the United States suggested to us, “It depends on what the definition of ‘is’ is.” Despite its somewhat self-serving nature, this was in fact a prescient observation.

According to Computer Theology then, we've observed with the election of Barack Obama to the presidency a metaphorical change in the trust infrastructure of the United States. Following Computer Theology, a change in the policy infrastructure would ensue.

Laughter and Play

Computer Theology explores the role of Maslow's hierarchy of needs in both human and computer societies.

However, even as laughter and play might seem about absent from Maslow's original hierarchy, they should find their place in it, from both a human and computer perspective. Any parent knows that it is very hard to keep children from playing, and laughing; that in itself is an expression of a need. Later in life, attendance at sport events and comedy also expresses those needs. We suspect that a better understanding of laughter and play in humans would provide a fruitful path to understanding their role in computer networks. Or should it be the reverse?

Would laughter and play be a reflection of aesthetic needs?

Both are certainly heavily involved in various art forms. Both seem to engage the establishment of altered states of consciousness. Thus, both would seem to lay along the spectrum that we label as ecstasy. Both seem to impact the establishment of the trust infrastructure within the individual. For example, in politics it is perhaps more typical to attempt to paint your opponent as a fool through the use of humor than to discuss specific aspects of policy. In other words, try to impact the trust infrastructure, not the policy infrastructure.

Piaget noted that during the various development phases, the emerging human thinks in different ways. Is not the play of the child the likely precursor to the more structured art forms of the adult? Indeed, it would seem that some artistic endeavors of the adult retain the playtime characteristics of the child; e.g. farce in theater, whimsical music (a common characteristic of bluegrass and country music), slapstick comedy and the like.

Here we are. Since Computer Theology investigates the role of aesthetics in both human and computer societies, we're on the path.

Oscar Niemeyer

Computer Theology explores the relationship of trust and policy infrastructures in the fabric of society.

The Church of St Francis by Oscar Niemeyer sits on the bank of lake of Pampulha in Belo Horizonte, Brazil. Its parabolic shape is matched by the parabolic shape of the pulpit, reflecting inside the church the word of God from outside. The overall form of the church is that of a gentle wave continuing the waves of the lake, with the mosaics of fish extending inside the church, itself opened to the lake, in a transparent allegory. The confessional is folded in another wave, with but one place. Outside, the cross is dwarfed by the overbearing hammer and sickle that grow from the building. Trust and policy in a single place, and the quietness of water.

Bonobos' religion

Susan Savage-Rumbaugh has shown bonobos that read, write, play music, make tools, make fire, and play with masks. Computer Theology shows that computer networks evolve similarly to human societies with religion. The religious bridge between bonobos and religion may or may not yet be built.

 

Nobel Prize in Economy

Computer Theology uses Maslow's hierarchy of needs to study both human and computer societies. In particular, the hierarchy has aesthetics in its scale. If we consider that aesthetics is a need for difference, then it is the need that nourishes the theory of Paul Krugman, who just got the Nobel prize in Economy. Aesthetics sells French wines in Italy and Italien wines in France. It sells Corona in the US and Budweiser in Mexico. Computer Theology shows how aesthetics feeds trust, and how trust enables policies for governance.

Meditation and Contemplation

Saint Bruno, founder of the Carthusian order almost a thousand years ago, defined the scale bearing his name:

Reading => Meditation => Prayer => Contemplation.

This corresponds to the scale of Computer Theology:

Policy => Evaluation => Invocation => Trust,

a scale that applies to human as well as digital social orders. Computer Theology spells out each step by comparing the elaboration of religion with that of computer networks. The following quote by a Carthusian monk provides an encompassing description of the religious scale (our translation into English of the original French text):

Contemplation is mainly a matter of the heart, in its progression it differs totally from discursive meditation, where intelligence has the largest part.
Whereas intelligence easily partakes in its own conceptions; vanity is its obstacle as well as its own punishment.
The heart is humbler; it goes with simplicity and without counting, without searching oneself, toward the loved one; et when day and night, as the Carthusian monk does, it nourishes its desires from this divine marrow that the Holy Scriptures contain, and particularly the Psalms, it transforms itself, becomes flame and raises without reasoning towards regions that intelligence ignores; its faith, its adoration, its hopes exhale in a single loving effusion; it is no longer a prayer, it is an ascent, it is burning transports, it is a passionate surge; under the impulsion of the Holy Spirit, it goes once and irresistibly toward God ...

La contemplation est surtout une affaire de coeur, dans sa démarche elle diffère totalement de la méditation discursive, où l'intelligence a la plus large part.
Or l'intelligence se complaît facilement en ses propres conceptions; l'orgueil est son obstacle en même temps que son propre châtiment.
Le coeur est plus humble; il va simplement et sans calcul, sans recherche de soi, au devant le l'être aimé; et quand jour et nuit, comme fait le Chartreux, il nourrit ses désirs de cette moëlle divine que contiennent les Saintes Ecritures, et en particulier les Psaumes, il se transforme, devient flamme et s'élance sans raisonner vers des régions que l'intelligence ignore; sa foi, son adoration, ses espérances s'exhalent dans une seule effusion d'amour; ce n'est plus une prière, c'est une ascension, des transports ardents, des élans passionés; sous l'impultion de l'Esprit Saint, il va d'un coup et irrésistiblement jusqu'à Dieu ...

Dom Jacques Marie Mayaud. Le Chartreux, origines, esprit, vie intime. Imprimerie de Parkminster, Partridge green Sussex 1927. (Quote seen at the museum of the Grande Chartreuse, France, Isère).

Credit Derivatives and Faith

Computer Theology analyzes societies, whether of people or computers, as nested trust and policy infrastructures. Borrowing and lending moneys involve policies that are immediately related to trust. If I don't trust you, you won't get money from me, or, if you get it, the strings attached will be tantamount.

In most circumstances, trust is quantified by the credit rate. The more I trust you'll perform, the better the rate. Otherwise, the rate will be quite high. For example, credit agencies evaluate the borrower, and the rate ensues. But what about credit derivatives? In other life endeavors, a derivative is also a measure of trust.

A derivative measures change. A high derivative predicts lots of change, a zero derivative predicts no change. In other words, the derivative assigns a level of trust as to the future evolution of a phenomenon. When applied to credit, of course, a derivative measures the future evolution of credit. Since credit is trust, a derivative assigns a level of trust to the original trust.

We call speed the derivative of the distance a car runs. A value change in speed multiplies in the value of the distance traced by a car over time. In the same way, a small change in the trust derivative affects considerably the original credit trust. A market change in credit derivatives yields a leveraged effect to the trust associated with the original credit.

So natural market fluctuations may by themselves be sufficient to bring down the original credit trust. There may then be no other culprit than the derivative itself. Trust doesn't easily suffer being second-guessed. Here lies perhaps a formal definition of faith.

Wikipedia Society

Computer Theology is about computer networks becoming hosts to digital societies, either with humans on the network, between computers themselves, or in a mix of people and computers. A society of the first kind is best observed with Wikipedia. For the casual user, Wikipedia is an encyclopedic publication of articles written by volunteers, editing at will each other's writings.

The rationale for the publication is that in due course, some kind of consensus will emerge, perhaps representing some level of "truth". Certainly, the result, at least in terms of volume of information, is spectacular, as evidenced by the high ranking that Wikepedia takes on Google requests. Whether more "truth" is found in Wikipedia that in other knowledge repositories of repute is the subject of on-going debates.

An interesting and hidden part of Wikipedia reveals itself to any author seriously interested in doing more than local modifications to articles. Emerging from the Wikipedia society is an elite organization of about 1600 persons (at this writing) called administrators who function as arbiters as well as purveyors of governance policy within the society. Administrators have superpowers in that they can perform drastic changes, including blanking out sections of, or even deleting entire articles. The rationale for such changes derive from obvious rules like copyright violations, but also from much less obvious ones such as the forbidding of "original research".

Thus, we observe in vitro the evolution of a new social order, where creators and enforcers are yet finding their natural places, selected by their effectiveness in promoting or degrading Wikipedia articles. At the present time, a strong parallel to the Wikipedia society is that of a clergy administered religion where the enforcers have the last word, striving to maintain the creators in the "no original research" box: contribute as you will, as long a nothing original comes of it. The deity? Confucius over Diderot.

http://en.wikipedia.org/wiki/Wikipedia:Administrators
http://en.wikipedia.org/wiki/Wikipedia:Deletion_policy

Memorability of Religious Expressions

Computer Theology explores evolutionary tensions consistent with religions' role in human expansion. Bringing Ritual to Mind (p. 85) adds one not mentioned in the book: that of memorability of religious expressions, noticing that in a pre-literate society either they are remembered, and they stay, or they are forgotten, in what constitutes a selection process. Then the book proceeds on studying memorization mechanism in details, bringing good science to a subject hitherto anecdotal.

Robert N. McCauley and E. Thomas Lawson. Bringing Ritual to Mind: Psychological Foundations of Cultural Forms (2002). University Press, Cambridge, UK. ISBN 0-521-01629-0.

Ordinateur

[In relation to a comment by Yvon Avenel on "ordinateur" (the French word for computer) having been coined in a 1955 letter to IBM with consideration of a religious connotation.]

The approach of Computer Theology is very much in line with the reasoning of Jacques Perret in suggesting the name of "ordinateur" for the machinery that has become well known as the computer.

Computer Theology concerns itself with establishing a model for "social orders," an interesting term in its own right given that it suggests a mechanism through which to achieve a specific end; an infrastructure (social order) through which to bring order to a social (that is group) setting.

We suggest that for collections of computers to function in a manner akin to social orders, we must define for them a theology. Through this theology, we establish the basis of trust necessary to support an effective policy infrastructure. All social interactions occur within the confines of this policy infrastructure.

Hence, our perspective of the individual computer and of networks of computers, could well be viewed as an illustration of "Dieu qui met de l'ordre dans le monde."

Jacques Perret's letter reference (in French): http://www.languefrancaise.net/news/index.php?id_news=253

Generics and Metaphors Unified - Logic and Rhetoric

Computer Theology is written for the large public, and therefore avoids the formalism that would otherwise be part of its discourse, preferring instead to point interested readers to more intricate material. For reference, one of the articles presenting such formalism is now available on line:

Generics and Metaphors Unified under a Four-Layer Semantic Theory of Concepts
Bertrand du Castel and Yi Mao

"We establish a unified semantics to interpret generics and metaphors, showing that they have much in common beyond their apparent differences, with no firm line separating the two. This proposition unifies logic and rhetoric, separated by Greek philosophy more than 2000 years ago."

Religion and Politics

Computer Theology provides a model of interaction between religion and politics, using the concepts of trust infrastructure and policy infrastructure.

In democracies, the politics is essentially one of two sides battling each other, while typically only one religion dominates. Whether democracies or not, we do not see countries where two religions would share the population evenly, as soon as we exclude geographical considerations such as the North-South distinction in Nigeria; in countries where religions seem to be competing evenly, the country is actually an assembly of territories each having a dominant religion. In politics, there are geographical identifications, but overall, the opinions are mixed in the population.

That is compatible with the model of Computer Theology which considers that trust infrastructures cap policy infrastructures (which themselves cap trust infrastructures that cap policy infrastructures in a recursive way).

That is also compatible with an appreciation of a US system based on a global Christian trust infrastructure caping a bipartite policy infrastructure ("I pledge allegiance to the flag of the United States of America, and to the republic for which it stands, one nation under God, indivisible, with liberty and justice for all.").

IACSR

International Association for the Cognitive Science of Religion

From www.iacsr.com:

"The objective of the IACSR is to promote the cognitive science of religion through interna­tional collaboration of all scholars whose research has a bearing on the subject. This objective is attained through scholarly activities such as the arrangement of biennial conferences as well as interim local meetings, the encouragement of research projects and support of scholarly publications, and the exchange of information through electronic or other means."

Transcendent Personal Devices

Computer Theology defines Transcendent Personal Devices as computers that represent humans on digital networks across the entirety of their cognitive prowess. Here is a recipe to build one. The article has been prompted by a personal question by Merlin Donald, whom we thank here for having triggered this reflection.

John Updike's Roger's Version

Perhaps the first mention of Computer Theology in fiction:
http://books.google.com/books?id=PXtbAAAAMAAJ&q=%22computer+theology%22&dq=%22computer+theology%22&pgis=1

John Updike. Roger's Version. New York: Knopf, 1986. ISBN: 0-7366-1297-1.

Zimmerman's theory of the great leap forward

There is a quantum leap between earlier human artifacts and the paleolithic cave paintings of southwestern France. Jared Diamond has called Great Leap Forward whatever progress allowed this advance in human cognition and societal prowess. Tom Zimmerman spelled out to me a theory for it derived from Computer Theology.

Computer Theology presents the convergence of the Internet and the World Wide Web in the beginning of the 1990's in a way that Tom compared to the Great Leap Forward. Computer Theology explains in details how the technology behind the World Wide Web dates back to the 1960's via clearly delineated changes, and the Internet also traces back to its predecessor of the 1970's, the Arpanet, and in fact even to the end of the 1960's.

Tom observed that the combination of two progress streams created a sudden and explosive progress that translated very rapidly into the recursive formation of digital societies in and on the worldwide network. That leads to the hypothesis that the two streams that Computer Theology associates with religion, creative ecstasy and conservative rituals, may be the source of similar progress by human beings in the form of religion enabling the constitution of larger and larger groups through shared trust infrastructures.

What I found particularly interesting is that in this perspective there is no need to invoke a mutation. If the convergence of two innovative streams is clearly at the source of the explosive growth of digital networks, perhaps the same cause was at the origin of our own explosive growth.

Jared Diamond (1999). Guns, Germs, and Steel: The Fate of Human Societies. New York, NY: W. W. Norton. ISBN 0-3930613-1-0.

Olympics, Trust, and Policy

   

Computer Theology studies the respective roles of trust and policy, in both human societies and computer networks.

Olympic medals were published August 24th, 2008 in the Austin American-Statesman. The policy was evidently to list medals by ordering first on gold medals.

However, in a possible conflict between trust and policy, the United States were listed first, albeit with less gold medals than China. In the web version, trust and policy concord, in an ordering based on the total number of medals. (24-Aug-08 1:45 pm CST: www.statesman.com/sports/content/sports/other/olympics.html)

Definition of trust

Trust is an expectation of an outcome with some degree of assurance.

Definition of religion

A religion is a system of trust provisioned by ecstasy and sustained by ritual.

Aesthetics and symmetry

The relationship of aesthetics and symmetry is well-studied. Symmetry allows to minimize description, and therefore replaces an otherwise random construction by one that is built on rules, or, said otherwise, in process. Computer Theology associates process with trust, in that with set processes comes predictability, and henceforth trust in results. Aesthetics is therefore a means to establishment of trust, itself an aspect of religion. In computer networks, aesthetics can also be considered in relationship to symmetry: an example is the concept of elegance of an algorithm.

Donald E. Knuth. The Art of Computer Programming:
Volume 1. Fundamental Algorithms, Third Edition. Reading, Massachusetts: Addison-Wesley, 1997. ISBN 0-201-89683-4
Volume 2. Seminumerical Algorithms, Third Edition. Reading, Massachusetts: Addison-Wesley, 1997. ISBN 0-201-89684-2
Volume 3. Sorting and Searching, Second Edition. Reading, Massachusetts: Addison-Wesley, 1998. ISBN 0-201-89685-0

Hermann Weyl. Symmetry. Princeton, New Jersey: Princeton University Press, 1952. ISBN 0-691-02374-3.

Recursion

Recursion plays a central role in Computer Theology, in particular in the parallel build up of groups in human societies and computer networks. In human societies, one application of recursion is the description of Maslow's hierarchy of needs applying equally for the family, the clan, the tribe, the congregation and that next grouping we call égalité. ComputerTheology considers the same needs, expressed in a digital form, in the constitution of computer groups.

Going beyond Computer Theology, one may wonder about other possibilities of recursion. A frightening thought is that from individual suicide to communal forms of suicide, is there an end to that recursion?

Abraham H. Maslow. Toward a Psychology of Being. Van Nostrand Reinhold Company, New York, NY, 1968. Library of Congress Catalog Card Number 68-30757

Theory of Content and Content Model

As Computer Theology explores the relationship between human societies and computer networks, the concept of memory takes an important role, detailed in Chapter 6, The Shrine of Contents. Scholarly studies of Theory of Content(1) and Content Model(2) address human and computer cognition. Written for a general audience, Computer Theology presents human and computer content memories together in an encompassing framework subsumed by an overall trust infrastructure qualifying that content.

(1) Jerry A. Fodor A Theory of Content pp. 230-249 Mind and Cognition: An Anthology. William G. Lycan (editorr), Blackwell Publishing, 1999, ISBN 0-6312054-5-4
(2) A Semantic Web Content Model and Repository. Max Völkel. pp. 254-261. Proceedings of the 3rd International Conference on Semantic Technologies, Graz, Austria. September 2007. xam.de/2007/2007-05-voelkel-ISEMANTICS-swcm-CR.pdf

To Bruce Schneier

Quote from Bruce Schneier's CRYPTO-GRAM newsletter today:

"That's what a good design looks like. It's not just secure against known attacks; it's also secure against unknown attacks. We need more of this, not just on the internet but in voting machines, ID cards, transportation payment cards ... everywhere. Stop assuming that systems are secure unless demonstrated insecure; start assuming that systems are insecure unless designed securely."

Computer Theology shows how a computer can defend against unknown attacks using mechanisms similar to humans, i.e. guiding mythologies, and then theologies, that provide repeatable and transmittable guides for action. Their working is their warrant of survival, less they adapt. How such mythologies and theologies are provisioned in the mind is the other subject that Computer Theology covers on the topic, showing how rituals linked with ecstatic states convey between human and computer societies.

Reference: Bruce Schneier, Chief Security Technology Officer, BT, http://www.schneier.com, the quote is at http://www.schneier.com/crypto-gram-0808.html#11.

Review

Today we got a review from a very well-known editor, but it is a private review not for attribution, so we'll leave it at that. The content was very interesting, as the reviewer agrees with members of the Computer Theology Review Committee, in that he thinks that we diverge sometimes from the central theme, which is how the new generation of computer devices (e.g. cellular phones, smart phones, chip bank cards) takes more and more the guise of our digital representation to the network at large. Doing so, they build interactions in the network akin to our interactions in societies. And historically, societies have built up with religion at the center.

Our thinking is that we're not diverging, but rather constructing our argument with the rigor it deserves, taking each trace of similarity between human societies and computer networks and following it to enough length that we are comfortable with the parallel we're establishing. On this we got good reviews, but readers will need to judge by themselves. We sure appreciate the feedback.

Artificial Life

At Artificial Life XI (Alife XI) in Winchester, UK, great video on humans and animals robots evolving movement through self-organization in reaction to sensori-motor input. For example, when a human robot gets sensory input in reaction to spontaneous movement, it would try, say, to minimize the length needed to describe it. We see then that this evolves into movements that are getting close to mimic ours, or at least ours when we were infants.

Computer Theology then explains how this construction of minimal descriptions is the basis for mimetics and then metaphoric elaboration at the center of our cognitive system. The mechanism of evaluation via minimum descriptions is a foundation for the trust system that allows progressive self-actualization.

The associated paper clearly explains what's going on in the video:
Ralf Der, Frank Güttler, Nihat Ay (2008). Predictive information and emergent cooperativity in a chain of mobile robots. In S. Bullock, J. Noble, R. A. Watson, and M. A. Bedau (Eds.) Proceedings of the Eleventh International Conference on Artificial Life, MIT Press, Cambridge, MA. [To appear: the link above is to the conference pre-proceedings]

Metaphors

At least since Metaphors We Live By, cognitive science has been rooted in the metaphors derived from the human sensori-motor experience. Computer Theology shows how computer cognition is rooted in the sensori-motor experience of the computer. Evolution of the computer towards new interfaces on one hand, new computer representations of human artifacts on the other, bring the two cognitive systems closer together.

George Lakoff and Mark Johnson (1980). Metaphors We Live By. Chicago, IL: University of Chicago Press. ISBN 0-226-44801-1.

To the Olympics

During the opening ceremony on NBC, one commentator outlines the references to Taoism, Confucianism, and Buddhism in the magnificent dances and presentations. The hoisting of the Chinese flag was preceded by children carrying it to the military who then slowly raised it while the Chinese hymn resonated with the audience standing up and Hu Jintao singing along. Using the trust and policy infrastructure model of Computer Theology, is that the state (the policy infrastructure symbolized by the military) reclaiming the religion (the trust infrastructure symbolized by the dances)?

To Daniel Dennett

Is laïcité free-loading, or is religion free-loading? Computer Theology looks at computer network properties akin to religion, centered around trust as a formal concept. Then if trust is indeed at the center of human societies as an expression of religion, would it be a valid hypothesis that laïcité also provides a source of trust, independently from the religion that is historically in the culture of that society?

Daniel C. Dennett (2006). Breaking the Spell: Religion as a Natural Phenomenon. Penguin Books, New York, New York. ISBN 0-670-03472-X

To Justin Barrett

Computer Theology compares computer networks and human societies, with the proposition that the trust infrastructure found in religion is indeed providing "utility" (Justin Barrett, page 58). However, it also considers that ecstasy, in the form it spells out for both human societies and computer networks, is, combined with rituals, the establisher of trust, be it trust by causality or trust by process. In human societies, theism correlates.

[1] Barrett, Justin L. (2007). Is the spell really broken? Bio-psychological explanations of religion and theistic belief, Theology and Science, 5:1, 57 - 72. URL: http://dx.doi.org/10.1080/14746700601159564

To Stuart A. Kauffman

Computer Theology considers and compares the emergence of human societies and computer networks. Also emerge principles of orders that are parallel; the analysis of order in human societies in contrast with order in computer networks allows to present vectors of emergence. Order in computer networks emerges from the intelligent design of computers and communications.
Stuart A. Kauffman. Reinventing the Sacred: A New View of Science, Reason, and Religion. New York, New York: Basic Books, 2008. ISBN 978-0-465-00300-6.

To Maupertuis

Maupertuis, Oeuvres completes (Complete Writings; Tome 1 published in 1761 and Tome 2 in 1768; scan by Google of the versions owned by Oxford University) (Note: Lamarck was born in 1744 and Darwin in 1809) [our translation from French to English]:

Page 11, Tome 1, Essai de cosmologie:

But couldn't we say that in the fortuitous combination of Nature's production, as there were only the ones which had certain rapports of convenience, which could subsist, isn't it marvelous that this convenience is found in all the species that currently exist? Chance, could we say, had produced an innumerable multitude of individuals; a small number found itself built in such a way that the parts of the animal could satisfy its needs; in another infinitely larger, there was no convenience, nor order: all those died; animals without mouth couldn't live, others that were lacking organs for generation couldn't reproduce: the only ones that would remain are those where order and convenience are found; and those species, that we see today, are only the smallest part of what a blind destiny had produced.

Page 84, Tome 2, Vénus physique:

It is true that when we say that the embryo is formed by the mixture of both semens, we are far away from having explained this formation: however, the obscurity, that remains, should not be held against the way we reason. Who wants to know an object laying too far, and who discovers it only confusedly, has better success than who sees more distinctively objects that don't make up that one.

Although I respect infinitely DESCARTES, and that I believe, like him, that the embryo is formed with the mixture of both semens, I cannot believe that anybody be satisfied with the explanation he gives, neither that we can explain by an intelligible mechanics how an animal is formed by the mixture of two liquors. But however the manner by which this prodigy is done keeps being hidden for us, I still believe is nonetheless certain.

Page 90, Tome 2, Vénus physique:

If each part is united to those that should be its neighbors, and only to those, the infant is born into perfection. If some parts are too far away, or of a form that is not appropriate, or too weak in union rapport to unite to those to which they should be united with, there is born a monster by default. But if it happens thats superfluous parts still find their place, and unify with parts whose union was already sufficient, here is a monster by excess.

Intelligent Design of the World Wide Web

While each part of the world wide web is the product of set design processes, the association of these processes generates patterns similar to those of human societies, that built up in numbers in the same way the World Wide Web has built up in numbers. The study of these patterns brings religion as organizational principle. Whereas intelligent design in human societies is a subject of controversy, intelligent design in computer networks is a matter of recent history.

Secure core

Computer Theology uses the term secure core for either a secure computer or the secure part of a computer. This term encompasses, and is more general than, the term Trusted Computing Base introduced in 1985 by the US Department of Defense:

"The security-relevant portions of a system are referred to throughout this document as the Trusted Computing Base (TCB)."
Page 65
Department of Defense Standard
Department of Defense
Trusted Computer System Evaluation Criteria
DoD 5200.28-STD December 26, 1985

To Deane William Ferm and W. Paul Jones

Two pioneers in Computer Theology, for perhaps the first mention of the term in the body of an article, and its first appearance in the title of an article:

Deane William Ferm (January 1984). "Outlining Rice-Roots Theology". Christian Century 6 (1): 78. Chicago, Illinois: Christian Century Foundation.

W. Paul Jones (April 1986). "Computer Theology: A New Era for Theology". Quarterly Review 6 (1): 41-55. Nashville, Tennessee: The United Methodist Publishing House.

To Robert P. Scharlemann

Computer Theology establishes a recursive model of a trust infrastructure encompassing a policy infrastructure to account for the role of religion in both human societies and computer networks. The formalization of this model, based on computer concepts, is compatible with Sharlemann's more informal description. The hypothesis that an explicit theological model provides a benchmark of evaluation that can be differentially discussed against other scientific models is made in Computer Theology in terms that are nicely completed by Scharlemann's study.

Robert P. Scharlemann. Theological Models and Their Construction. The Journal of Religion, Vol. 53, No. 1 (Jan., 1973), pp. 65-82

To Scott Atran

Computer Theology provides strong support to multi-level selection for allowing groups to build, interact, and develop following their own hierarchy of needs, a reflection of individual hierarchies of needs. Computer Theology shows how each level of multi-level section builds from the latter hierarchies to the former.

To Kim Cameron

A theology for the identity god? Computer Theology defines differential and experiential identities and assembles them in a hierarchical model reflecting Maslow's hierarchy of needs. According to Computer Theology, differential identity reflects trust by causality, and experiential identity reflects trust by process.

To Tim Berners-Lee

To Tim Berners-Lee: "This upper ontology of the semantic web, and all our thanks for building the foundation that made this book possible." Computer Theology builds a theology that finds its formalization roots in the semantic web, allowing to present in a unified framework the elaboration of metaphors necessary to the build-up of the human mind, as well as the organization of trust and policy infrastructures that form the backbone of societies.

Two points

Relationship of Computer Theology and Asimov's robot rules [Claude Baudoin].
We could (should?) have mentioned those rules in the book, which provides a formal framework for agents that would subscribe to them, from both a trust and policy perspectives.

Filiation of Declaration of Independence to Magna Carta [Eric Schoen].
Yes, we should have mentioned that this very filiation fits perfectly well with the relationship that Computer Theology establishes between political and economical systems via a unifying model of trust and policy extending recursively to many aspects of a given society.