Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

In other words, the change we need to make affects not only the initial application, but also the operating system and other applications that depend on it. They need all to be revised.

So when the competence of the machine is changed, its performance can be dramatically altered, to the point of not being able to function. At the least, there is a moment where performance is hampered until applications are changed to adapt to the new competence. That moment allowing to go for a level of competence to another one, and ultimately to a higher level of performance, results in a temporary deprivation of sensori-motor capabilities while the full circuitry of the system is modified. As it is strikingly similar to out-of-body experiences described in ultimate stages of ecstasy, we have considered that it is in fact a good model of ecstasy. When human beings, who rely on unconscious mechanisms to affect their sensori-motor system, actually evolve their competence by altering those mechanisms, they go through stages that map features inherent to the functioning of complex computer systems.

With that said, let the show begin.

Drama

In The Attic Theater: Description of the Stage and Theatre of the Athenians, and of the Dramatic Performances at Athens, Arthur Elam Haigh quotes Plato to mention that in the IVth Century B.C., “It was enacted that a public copy should be made of the works of Aeschylus, Sophocles, and Euripides, and deposited in the state archives; and that the actors, in their performances, should not be allowed to deviate from the text of the copy.” The concept of a scripted play couldn’t be expressed more clearly. Greek productions of the antiquity featured both tragedies and comedies, and the mechanics of their presentations featured a number of techniques still found in the modern theatre. Within the scripted play, a fixed set of characters present a fixed plot. We refer to them as fixed because they’re the same for every instance of a presentation of the play. It is the function of the director of the play to map the script to the actors chosen to play the various roles and to define the details of the setting of the play. The response of the audience to a particular presentation is due not only to the content and the form of the play itself as they have been defined by the writer and interpreted by the director, but also of the degree to which the actors are able to exploit a shared capability for metaphoric experience. A well acted play often elicits a similar reaction from us each time we see a performance. A superbly acted play might well evoke nuances in our interpretation that we had not previously appreciated.

In the theater of secure cores, the typical plot of a performance is that of authentication and authorization within the very limited context of a specific application. In fact, the script is defined by the application and cues for the lines spoken by the token are provided by the application to the token as needed. For example, one application might entail the use of a chip based credit card to pay for a meal at a restaurant. There are essentially five roles in this particular play: the credit card, the cardholder, the point-of-sale terminal of the restaurant, the waiter and the bank managing the account to which a charge is to be made on behalf of the cardholder. When it comes time to pay for the meal, the scripted action is rather straightforward. Trust for this particular script comes primarily from causality; knowing the lineage of the secure core based credit card and the other equipment involved. However, trust in this script also derives from the process through which the credit card and the terminal are provisioned with keys through which identities are authenticated. It is imperative to the trustworthy function of the system represented by this script that the various keys be truly secret within the constraints of their use.

394

11 Revelation

 

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)