Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

define the way they acknowledge messages to each other in order to avoid losing information. Finally, the session layer allows the two computers to recognize when messages belong to the same stream of conversation, allowing them to exchange information back and forth in a sustained fashion.

The next two layers are about making sure that the computers actually understand each other. Just as two humans can’t communicate if they speak different languages unknown to each other, computers need to make sure that they speak the same language. That’s the function of the presentation layer. Finally, even if they speak the same language, humans speak differently, depending on circumstances. Each situation is a particular application of our communication capabilities. Similarly, computers speak about different topics and with different rules depending on the circumstances. That’s what the application layer does; it establishes context.

All together, we see that computers interact in pretty much the same way as humans. They need to find a communication medium, they need to establish readiness to talk and then they need various conventions to converse effectively. The physical characteristics of humans and computers dictate different techniques and technologies, but the general order of operations, as well as their nature, is similar. In many cases, it’s just a matter of nuances. While it is customary for computers to talk through other intermediate computers, it is a less usual situation with humans. However, there are indeed cases where humans communicate through intermediaries; for example, through messengers. Conversely, humans actually establish several channels of communication at once in face-to-face conversation. Hand gestures, body signals and facial expressions are all part of communication that accompany the mouth-to-ear channel. Computers are typically more reserved, using only one channel at a time. In fact, they use one channel at once like people do when they talk by phone.

The reference communication model of computers actually expresses a hierarchy of needs. To communicate, two computers require electricity for a physical link, they need to associate with each other reliably, and they need to exchange meaningful information. In the same way, humans need food and links to each other, they need to be accepted by others and gain their approval, and then they need to engage in meaningful and fulfilling exchanges. While at this point we will not claim an immediate parallel between the two models of behavior, we can see that Maslow, as a psychologist, and the Open Systems Interconnection committee, as computer scientists, chose to model humans and computers with similar means. The very commonality of approach will allow us to examine in turn each level of the human and computer protocols and examine in depth where they converge and where they differ. In the end, we will suggest that in fact the needs hierarchy of humans has a parallel adjunct in the application layer of computers. Similarities and dissimilarities will be equally revealing, and will be the ferment for subsequent inquiries.

Characteristics of the Infrastructure

Beginning with the Open Systems Interconnection reference model as a starting point, a rather general model of interactions can be constructed that encompasses general human interactions as well as human to computer and computer-to-computer interactions. This model of interaction infrastructures results from merging the connection facilities of the Open Systems Interconnection reference model, an interaction impetus model based on Maslow’s hierarchy of needs, and a trust model derived from the physiological basis of human interactions. At this point, we’re only going to go part of the way towards this model. Specifically, we’re going to consider the model as based on the security characteristics of computer networks. We’ll defer the inclusion of a human trust

98

3 Environment

 

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)