Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

this might well be to portray the sating of appetites as a hierarchical set of related preemptable task queues, with a queue established for each level of the hierarchy. The sating of particular appetites can then be expressed as applications invoked through these various task queues.

The point being that the acquisition of content or perhaps more appropriately stated, the sating of appetites, is a function of the net impact of needs across the full hierarchy. Being hungry for food is virtually always satisfied according to conventions established at a higher level; social conditioning is so effective that only in the most extraordinary circumstances will humans resort to cannibalism to avoid death by starvation. So, with that rather graphic image as background, let’s begin our consideration of the enhancements necessary to realize a truly effective transcendent personal device as determined by the needs of both species; that is, the human species as well as the transcendent personal device species. As prelude, we will consider the architecture of the mutationally derived device.

Architecture

The essence of the required enhancements is to position the transcendent personal device as a fully capable electronic extension of the person; to be owned by the person, to be carried by and operated by the person and to function purely on behalf of the person. This defines not only a set of anatomical and physiological characteristics for the transcendent personal device itself, characteristics that we’ll consolidate under the term architecture, but also a set of policy characteristics that must be established within the salient social ecosystems in which we want the device to function. In today’s typical deployment for example, a secure core is viewed under most policy specifications as the property of its issuer. However, the marketing message that conveys from the issuer to the user generally stresses the utility and security benefits that will accrue to the bearer of the personal device thanks to the secure core. For example, bank chip cards are token based credentials through which trust emanating from the issuer can be conveyed through the token, on behalf of the bearer, to other entities such as content providers. An issue arises with current architectures, however, in that the connection between the token and its rightful bearer is typically rather tenuous. Further, it is usually the prerogative of the service to which the device connects to determine whether this connection has been established to a satisfactory degree; this, we suggest, is a root contributor to the epidemic of identity theft that is sweeping the Internet and other social ecosystems today. Not because such services required too great a level of trust in the authentication of the bearer, but rather because they will accept too little.

From our perspective, to fully realize the utility of the transcendent personal device, a shift in emphasis relative to current personal electronic devices within existent human social ecosystems must occur. The preeminent such system, of course, is the governmental policy infrastructure formed under the auspices of trust established by the Constitution. Consequently, to effect the required policy shift, the transcendent personal device must be considered in operation, under the relevant law, to be a fiduciary agent acting on behalf of the bearer. This shift requires that the complete fiduciary responsibility of the transcendent personal device be to the bearer and not to the seller, provider or any other party. The result of this shift is to directly link the trust infrastructure of the transcendent personal device, as a subordinate trust infrastructure, to the trust infrastructure of the preeminent social ecosystem. This will, in turn precipitate a shift in orientation within the relevant policy infrastructures that will have to be established through law. It will entail modifications to the very fabric of society that we discussed a few chapters ago, particularly as it impacts extensions of this fabric into cyberspace. As this shift occurs, we can then begin to envision these evolutionary descendents of today’s personal electronic devices as

320

9 Mutation

 

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)