Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

then be done in relatively small, incremental steps, almost a mutation in the approach to systems development. In addition, as we have previously mentioned, at least one new species of operating system emerged from UNIX based on an open source philosophy; this was the Linux system.

Personal computers emerged as a rather natural result of the progression of miniaturization of electronic components and circuitry. The development of large-scale integrated circuits allowed a fully competent central processing unit to be implemented on a single chip; memory and various interface units were similarly available. Surprisingly enough however, the development and deployment of personal computers also exhibited an almost purely social aspect. The fact that small computers could apparently do things that previously only big computers could do, and could do them with smaller machines that cost a lot less money, was apparently not a sufficient justification in the marketplace for such machines to take off. The earliest personal computers were the products of a variety of start-up companies, and the modest successes that they had involved mostly the establishment of niche markets. Finally, the entire genre was legitimized when IBM offered their first personal computer line in the late 1970’s. It was most interesting that in offering this basic computer platform, IBM, the developer of the most powerful operating systems then known for large and mid-range computers, chose to go to an outside vendor for the operating system of the personal computer. This unknown quantity was Microsoft and the operating system was the Disk Operating System, generally known by its acronym MS-DOS.

If one were going to design an operating system that was the antithesis of the mainframe operating system, MS-DOS might have been the natural result. Perhaps this was the prescient decision of IBM; it’s hard for a mammal to build a cockroach. MS-DOS was an operating system devoid of security but offering extremely efficient propagation characteristics. One could almost think of it as a virus turned loose in a world of large, well-developed organic life forms. The technical expertise required for managing the installation and support of this software component was minimal. Therefore, the system had a natural characteristic that made it a trivial target for malicious software; it had a standard boot procedure that allowed the personal computer user to invoke specific executable programs automatically when the computer was powered up. This batch control file, or BAT file, allowed the invocation of any number of executable images. Consequently, all a piece of malicious software had to do was get its name listed within the BAT file. The earliest computer viruses, once placed into execution on a system, merely wrote their invocation sequence into the BAT file and then proceeded to propagate themselves to various places on the hard drive or floppy disks of the personal computer. From a computer security standpoint, it was as if a large bull’s-eye and the words “Attack Me Here!” marked the most vulnerable parts of the system! However, the propagation characteristics of these systems were indeed akin to cockroaches; they quickly overran the domiciles of mainframes and even mini-computers.

In a startling degree of synchronicity with the explosive deployment of personal computers came the emergence of the communication protocols called TCP/IP from the development nooks and crannies of the Arpanet. When these protocols were included as standard components of personal computer operating systems, the explosion of the Internet began.

Then, seemingly out of the blue came another mutation event. As the anecdotal version of Isaac Newton’s discovery of gravity was stimulated by an apple falling on his head, so was the case of the computer world. Apple dropped on its collective head. Among the early start-up companies, offering their own variants of personal computers was Apple. The early Apple machines developed a strong following of pioneers in the use of personal computers. The real mutational event that was propagated by Apple was the introduction of the first low-end systems with

 

8 In Search of Enlightenment

265

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)