Friday, August 26, 2011

Notice These Posts Have Been Reordered


Don't forget to check out God's Computer Manual 2
Old Testament computing was never like this.  

Please note the posts in this blog have been reordered to a top-down order and grouped all within one month for your convenience. The posts give a better read when the #1 etc. sequence is followed.

These posts are only suggestions you may use at your own discretion.

The guarantee you'll want to hold tight to is quoted here from Psalm 126:6

He that goeth forth and weepeth, bearing precious seed, shall doubtless come again with rejoicing, bringing his sheaves with him.

My own mission is in the "Grandfather's Psalm" 71:18:
 
Now also when I am old and grayheaded, O God, forsake me not; until I have shewed thy strength unto this generation, and thy power to every one that is to come.

Thursday, August 25, 2011

1 - Intro

God’s Computer Manual - 1 - Intro

Trios are so neat - whether it’s singers, shapes, or scriptures. Triangles are simple yet the most strong rigid shape God has given us. It’s no wonder then He presents Himself to us in the Blessed Trinity.

I’d like to present another God-given trio to you.
1. Certainly, always first, is God Himself. He reminds us often He never changes.
2. He gave us technology; computers. They change every day in speed, price and complexity.
3. Doesn’t it just thrill your soul, in all His wisdom, He gave us the Bible; THE perfect computer companion for Christians? The Bible is the absolute pinnacle of direction to show us how to use technology in a way that pleases Him (and puts us at our best). He never leaves His loved ones (you and I) hanging.

WHY DO CHURCHES CONTINUALLY ROB CHILDREN…” is the beginning of my blog I’d like to nail to every God-fearin’ church door (and the others too!). The rest of the statement is:
Why do churches continually rob children and their parents of desperately needed scriptural principles of technology use and safety? Yet they employ the latest presentation and administration technology in services, classes, and conferences - often to show recognized attendance downtrends - especially among youth.

Another of mine is: “Moving technology from the pocket to pulpit messages.”
Possibly we need to (lovingly) preach to the pulpit(s), the principles from scripture regarding the technology that has become the idol of the church and backbone of all those who attend.

I’m a Christian, programmer, and Bible reader for many years. I’ve found that old black book with yellow ragged pages, stained with tears of stormy weather, to be a goldmine of tips, truths, and tests for our keyboards, mice, and the fingers that touch them.
This won’t be the last time I remind you of the promise of 2nd Tim 3:16, 17… all good works.

These ‘GOD’S COMPUTER MANUAL’ topics are the DIRECTIONS arm of Evangelism Computing©. (Do you remember the other arm is DECIPLING?)

All of the Evangelism Computing resources are available for free, no strings attached; download at godscomputermanual.com.

Psalms 71:18

Wednesday, August 24, 2011

2 - Look What's Missing


God's Computer Manual -

Ever noticed what your Bible is missing?


Those 66 writers all penned what its one Author dictated. We are so blessed to have inspired scripture in our own language and allowed to read and share it openly with pride.


But have you noticed what’s missing?


As a book-taught computer programmer for over a quarter century, the how-to manual for my favorite computer program has 1293 pages and is almost 3 inches thick. Even with all those pages the authors thought there would be too much left out, so they included a CD in the back cover. 

Now what’s a bit disturbing is that I can’t get all the directions about doing a certain thing without having a computer system nearby to look on the CD for any additional information for which I’m searching. Often I’ll check out a library book and its CD will be missing, not compatible with my CD drive, or even scratched.

With great joy I open my Bible to its back cover and see it missing!... any required CD or its pouch. 

I can savor all of God’s precious word with no more tools that searching hands and an open heart charged with faith!

Now that’s not all… Also in my computer book is a final page that has a website URL on it. The page tells me to go to the website to find out all the mistakes and additional omissions that are required to make my programming book reliable.


Oh! This gets good!

Look in the back of your Bible and THAT’S MISSING TOO! There is no place we need to go to for corrections and additions. God has it all right there in your hands.
Furthermore, God has placed a guardian over your Bible with terrible consequences if anyone takes away or adds to scripture. Two of the last four verses of scripture say so.


We are so blessed to have Bibles available to us. You can say they are less than free. (or is that more than free?) We can download on-line Bibles for free that ALSO include search functions, integrated dictionaries, commentaries, maps, word pronunciation, personal note storage, and compatibility with other publishing software.


I can hardly wait to begin showing you all the neat computing PRINCIPLES our Bible contains so you and your loved-ones can creatively, safely, honor God with your keyboarding efforts.


My Bible even has tears in it from my stormy weather moments. 
That won't happen with a CD.


Oh! He’s so good to you and I. He sure loves to be told that often…


Psalms 71:18

Tuesday, August 23, 2011

3 - Strange Database

God’s Computer Manual

As we begin this series
 of finding computing PRINCIPLES in scripture, this is nothing like doin’ DiVinci Diversions, or hunting space ships, or aliens in scripture. We won’t be using any software to discover hidden code. We’ll be seeing truths already in scripture teens and above can understand and share. You can likely find some of your own…The process uses only three tips as follows:

1. Read your Bible slowly… actually 
FEED on the inspired words.
2. As you 
FEED, open your heart a little wider.
3.
EXPECT to be blessed… God said He would… put your PRIDE in the sleep mode.
 
Look at any telephone book list. The phone list has a definite shape to it.
Last names, then first, an address, and then phone number. Each line is like that.
 
A list like this is called a database. Computers use up databases like children go through ice cream. 

I want to show you something that thrills me no end. Turn to Matthew chapter 16.
 

Jesus asks some questions of His disciples that demonstrate a perfect database with an intriguing twist. Look in Matthew 16:9.
 

Do ye yet not understand, neither remember the five loaves of the five thousand, and how many baskets took ye up?” And in the next verse, “Neither the seven loaves of the four thousand, and how many baskets ye took up?” 

Now, remember the phone list? …
Name, --address, --phone number…
name, --address, --phone number. Jesus’ database list is
Food used, --people served, --leftovers…
food used, --people served, --leftovers.
Five loaves, --five thousand, --baskets left.
Seven loaves, --four thousand, --baskets left?
That’s a perfect example of how a database list is shaped.
Wow!. Organized computer thinking taught from God’s Word.
 

Jesus quizzes His deciples with:
 

how many baskets ye took up? how many baskets ye took up? How is it that ye do not understand…” 

The twist I see is, whenever we relate these two catering events, we concentrate on the people and the provisions. Jesus was trying to get His disciples to think on a higher level… LEFTOVERS.
 

Leftovers. When the obvious is separated from the whole, what is left over? Why is it left out? Is there some good we can get out of it?
To demonstrate this principle, students can make a database on their computer, whether they have one or not. They can list ALL their neighborhood friends. They can add a column showing each one that came to the backyard picnic. And then add a column of the ones that came to the sticky Jell-O battle. Etc. etc.
Now, because the list of neighbors and their attendance is in a database format it is very easy to see which events were the most popular.
But what about the leftovers? Who didn’t come to any event? Why didn’t they come? Could they be timid? Do they need a friend? Do they need transportation? Could they have hearing or speaking challenges?
Has God placed them as my neighbor for me to learn some neat things from them? Shall I work harder to become their friend?
 

Gentile believers are the most blessed of leftovers. We were adopted into a family God calls His own. If that don't make you shout and share with someone your blesser is broke.
Psalms 71:18
Share with a friend and invite them to the forum.

Monday, August 22, 2011

4 - Don't Touch That Keyboard!

Gods Computer Manual 

Someone once said, “The most important part of computing is what is done before you touch the keyboard.” He was referring to preparation. A crucial part of that preparation is called, Computer Grace.

We should begin with a simple analogy.
 
Your mouth is watering big-time as you sit down to the dinner table. The smells of all your favorite foods give promise of really good things about to be enjoyed. Your mind can hardly squeeze in reminders of proper table manners and rules of the road. Way off in the distance your racing thoughts try to warn you what happens when you eat too much of this or not enough of that. Your eyes tell the hands to pick up the spoon over here and the fork over there and dive in.
 
But then… reality grabs control of you. You admonish yourself with, “Hey! Wait a minute. I need to thank God for all this tasty food, the work that went into preparing it, and a wonderfully designed body to enjoy it. Then I also must ask God to lead me in using its energy to glorify Him.”
 
Table grace has become an important prelude to our meals. It is a systematic reminder to us and the rest of our family of our gratitude for God’s provision. We practice table grace because Jesus Christ did. He taught His followers this crucial beginning to every meal. Take a moment and review the reasons why you practice table grace.
 
Now. For the very same reasons, and more, we MUST practice Computer Grace. Scripture makes it very clear that technology comes from God and we are to use it to honor Him as we carry out the Great Commission. 1st Tim 3:16, 17 tell us that our operating manual on how to do this is scripture itself.
 
A simple but powerful promise is listed in Matthew 6:33
 
"But seek ye first the kingdom of God, and his righteousness; and all these things shall be added unto you."

Our Computer Grace prayer to God would include:

• Praise to Him for His Goodness and Who He is.
• Thanks to Him for His gifts of technology and talents to use it.
• His leadership in us not wasting our keyboard time and His provisions.
• To tithe part of our keyboard time to evangelism and our local church.
• Focus and determination to see the project through.
• His blessing on the results of our work.

If you don’t practice Computer Grace, you don’t really understand the power to build up and destroy just beyond the keycaps… and you don’t understand the power of heartfelt words followed by Amen, that can build, protect, and chastise.

Psalms 71:18
Godscomputermanual.com
Reply With Quote

Sunday, August 21, 2011

5 - Computer QUICKSAND!

God’s Computer Manual 

Scripture gives many warnings/principles about deceitful and lying communication and God’s wrath on those who participate. Numbered among the Ten Commandments, lying (bearing false witness) is a critically important sin in God’s eyes, and it should be in ours also.

The importance of resisting the temptation to lie is really driven home to those people who have to be told things more than once. Read Proverbs 6:16-19:

These six things doth the LORD hate: yea, seven are an abomination unto him: A proud look, a lying tongue, and hands that shed innocent blood, An heart that deviseth wicked imaginations, feet that be swift in running to mischief, A false witness that speaketh lies, and he that soweth discord among brethren.”

In this list of seven things that God says He hates, THREE of them refer to lying and deceitful communication. Which are they?

2nd Timothy 3:13 uses the crucial phrases needed to really nail down the matter: “But evil men and seducers shall wax worse and worse, deceiving, and being deceived.” God’s inspired words, “wax worse and worse” describe the continual downhill destruction of the human soul. These evil men are even deceiving themselves, as they deceive others.

But in the very next verse, God’s matchless truths provide the remedy:

But continue thou in the things which thou hast learned and has been assured of, knowing of whom thou hast learned them.”

In this Fast Track Technology Age, evil deeds have never been greater. Have you noticed how they prey on small children? Scares me and I started programming computers before there were hard drives. We stored our programs on cassette recorders. (I’m old... man![68])

We must continually monitor our witness – our communication. Especially with the characteristics of computer communication. Satan never takes a vacation from trying to snare us and destroy our testimony for Jesus Christ.

Psalms 71:18
Godscomputermanual.com

Saturday, August 20, 2011

6 - Power Google

God's Computer Manual 

At a fast food restaurant you take a seat with your food. Your receipt simply states, “3 pc dinner, + breadstick, - hush puppies, + baked potato, - French fries.” Looking at the receipt only, what is on your tray and what does it say is NOT --assuming the clerk and computer were paying attention to each other? Everywhere a + appears on your receipt substitute the word “AND”. Also, replace the – with “NOT”. 

Long before desktop computers, God explained that the Jewish people could only eat certain groups of cattle (beasts). The features of these edible cattle were explained in Leviticus 11:2-12. The features were:

“Parteth the hoof”, AND “is clovenfooted” AND “cheweth the cud”  = OK to eat.
 Supper had to meet ALL THREE of these requirements because of the “AND” words. God gave the people an example of an animal that DID NOT meet all three characteristics as He talked about swine in verse 7:

 And the swine, though he divide the hoof, and be clovenfooted, yet he cheweth not the cud; he is unclean to you.

Divided hoof AND is clovenfooted NOT cheweth the cud = DO NOT eat.
In the verse, you could be fancy and replace the “AND”s and “NOT”s with plusses and minuses.
 +Divided hoof   +clovenfooted    cheweth cud   =   do not eat.

When searching the web for things, the same kind of advanced selecting is being used, as in Leviticus 11. You’re selecting hits from over a TRILLION webpages based on detailed characteristics. You want web pages (called ‘hits’) that have this AND this AND this but NOT that. 

When writing statements like the previous statement, the rules of logic notation developed by George Boole, a British mathematician in 1815, are being followed. Is it possible George was a Bible reader and actually learned his notation from our Creator by reading Leviticus 11?

The Internet search engines like Yahoo, Bing, and Google use advanced query statements in the search window using Boolean Logic Notation. The very same advanced detailed logic can be used in looking for a book at a library’s digital book catalog.

It’s a blast to find principles for better computing in God’s Word. It becomes even neater to find them in the “old” part of God’s Word. In referring to Leviticus 11, God could say, “You heard it here first.”

Psalms 71:18
Godscomputermanual.com

Friday, August 19, 2011

7 - Passwords

God's Computer Manual

At shallow Jordan River crossings Gileadite soldiers identified the enemy Ephraimite soldiers with a strange password. The password, “Shibboleth” was not able to be pronounced correctly by the enemy soldiers. The enemy soldiers, all 42,000 of which were not able to pronounce the word correctly, were put to death. Judges 12:5, 6.
Today, passwords are spoken, typed and handwritten in many ways, but the purpose is always the same; to select and protect.

Choosing a Password

The greatest evil incidents have in most cases been possible because of some sloppy management of security measures. Probably the most obvious is the choice and storage of passwords.

In spite of repeated emphatic security training in the choice of passwords, people still foolishly choose street numbers, family names, familiar objects, and hobby items as their passwords.

There are even computer virus programs that can test thousands of possible passwords to discover an access code, in an instant, all automatically. 

Storage of a Password

The second foolish thing people do, especially in the business world, is create a list of passwords sometimes even with a description of where each password is used. As time passes, the old list is put in the trash dumpster. Dumpster Divers are evil individuals who climb down into trash dumpsters and search through discarded paperwork THAT WAS NOT SHREDDED. Diligence often pays off with finding someone’s password list. If possible, don’t store the whole password in the same list. Make them cryptic, non-sensical.

Sending a Password.

This practice is terribly dangerous. Search the web for best safeguards and processes.

Psalms 71:18
Godscomputermanual.com

Thursday, August 18, 2011

8 - K.I.S.S. Computing

God's Computer Manual 

Keep It Simple, Stupid!” has been voiced in my hearing more than I can remember. It does remind me that anyone can string lots of words together. There are those high-minded people who can use words far above our language levels that only serve to annoy and confuse.

Some years ago roadside signs were more pleasurable than today, as were the Berma-Shave signs. A series of 6 to 8 signs with a couple words on each sign gave the passerby a thought, verse, or rule to live by. The style of these signs has made great effect on my authoring through the years.

The book in Proverbs in the Bible uses much of this KISS principle in guiding you and I toward a life more pleasing to God.

The gospel according to Mark, compared to the other gospels, is smaller in text because he wrote about our Savior to the Romans who were military-minded and always on the move.

A verse comes to mind in Ecclesiastes 5:2: 
Be not rash with thy mouth, and let not thine heart be hasty to utter any thing before God: for God is in heaven, and thou upon earth: therefore let thy words be few.

 Psalms 71:18
Godscomputermanual.com

Wednesday, August 17, 2011

9 - Money/Data Transfers

God's Computer Manual
 It’s almost scary to think of transferring money or critical data via on-line services these days. Personal information, bank, and credit data only start the list of information we can never unsend once hackers or nosy terminal neighbors lay their hands on. 

Fancy encryption software has been developed and continually revised to protect its users. Every hour that goes by, evil people find new ways to steal money and other objects of greed.

My Bible reading led me through a passage of secure transfer of gold and silver that reminded me of God’s principles of safety of possessions… especially His. 

In Ezra 8:24-34 is the transfer wrought with many witnesses at the sending. Also were many witnesses at the receipt and counting of the freewill offering for the church in Jerusalem
The principles of transfer are not only plain about witnesses, but also written records of all that was done. 

Because data entry via computers is so fast and efficient, we are doublely responsible to maintain a good ‘paper trail’ of our actions between individuals and businesses. This is even more important as we manage the offerings of our churches as being ‘the Lord’s money’. 

Psalms 71:18
Godscomputermanual.com


Tuesday, August 16, 2011

10 - Data Trinity

God’s Computer Manual
 “I GOT IT!  It’s in here somewhere!” I hear these words often from my packrat spouse. The words surely come from behind messy stacks of boxes and bags.
The years I’ve spent as an inventory control technician in giant warehouses urge me to leave our box jungle attic while shaking my head. 
Paying strong attention to the Data Trinity in your world eliminates lots of frustration while protecting personal information from dangerous consequences. 
By my definition the Data Trinity has three arms, SORTING, STORAGE, and SEARCHING.
Do you notice which comes first? In lots of lists the most important ingredient is at the top. Putting extra wisdom and planning in SORTING will yield large dividends when STORING and SEARCHING
I’ve wasted hours searching hard drives, CD’s, jump drives, flash chips, and on-line storage for data I knew I had, but never could find. If only I had rubbed elbows with Melville Dewey as he created the catalog/sorting system we’ve all used in libraries over the years. Technology advancements have enlarged our storage capacity footprints beyond imagination, with staggering file types that really complicate the SORTING for STORAGE process. Our hard drives quickly become data attics of piles of stuff we’re sure we can make great use of, later. 
Sorting goes far beyond keeping objects or files that are similar, together… say by date, customer, storage bin etc. Our inventory of data containing personal information, passwords, date-dependent, even climate controlled and contamination considerations must be thought of. Maybe a quick example might be contribution data a missionary in a tropical location has on his/her laptop where locked doors and locked rooms would be impossible. 
The principles to consider have to do with SORTING your data.
However odd it seems, you’ll get some valuable guidelines for sorting, and then storage, and especially advanced Google searches in the Bible. In fact, in the Old Testament scripture dealing with the Israelite menu and also leprous patients beginning in Leviticus 11. 
Following is an excerpt from our eBook Fine Tuning the Powerhouse in My Shoes. (Chapter 3 used with permission)
 - - - - -
SORTING It All Out. 
None of us could live a day without SORTING things. Stated again, we do it instinctively. We will touch on several types of sorting presented in Leviticus. The most popular one is Groups within Groups. 
§        Groups within Groups type of sorting is illustrated in Lev. 11:13-23. Of the flying things, insects (v 20+) is defined as a subgroup. Examples of this subgroup are listed in verse 22. We see this technique used in
o       Creating an outline,
o       A company organizational chart,
o       The Dewey Decimal System at libraries,
o       Grouping files in folders and subfolders, on our hard drive.
Here are some other sorting methods taught in scripture and used by our computers: 
§        Grouped by Association type of sorting is shown in verses 24-40. If a Jew came in contact (associated) with something that was dead, he/she was pronounced, “unclean”. Your computer makes great use of associations in how it works with regard to filename endings. Click on ‘help’ and type in ‘associations’ to find out.
§        Grouped without Subgroups type of sorting is illustrated in verses 41-44 regarding creeping things. NOTHING that creeps is to be eaten.
§        Grouping that Never Changes type of sorting is called “static” grouping. It is demonstrated in the gender grouping of newborns and the mother’s purification in Lev 12:1-8.
§        Grouping that Continually Changes type of sorting is “dynamic”. In Lev. 13 – 15, the subject of Leprosy diagnosis and treatment is covered. The condition of the group of lepers changed almost daily and would certainly be “dynamic.”
 God’s word teaches us efficiency, safety, and especially how to Honor Him with the technology tools He has given us.
 Psalms 71:18
Godscomputermanual.com


Monday, August 15, 2011

11 - Little By Little Computing

Sometimes our computing projects don’t come together as fast as we’d like. In fact composition is most effective with pen and paper rather than on screen. We purchase and upgrade to the latest fastest technology. But soon we’re reminded that God’s timetable is likely not the same as ours. Our Creator holds time in His hand and is the master of it.

It’s something like our Bible reading. We can race right past some real gems of productivity and progress. ‘Little by little’ is a phrase we often use but seldom enjoy. As with all principles and truths important to our lives, God’s precious word describes ‘little by little’ and will amaze you with His reasons.

In scripture the phrase becomes ‘little and little’ and refers mostly to God’s slower calculated pace for His children to conquer their promised land ‘flowing with milk and honey’… and enemy giants too!

Two verses that seem at first to not be worth close examination are as follows:

By little and little I will drive them out from before thee, until thou be increased, and inherit the land. Exodus 23:30

Because God purposely did not destroy all the enemy nations all at once, fields would still be planted and tilled. The cattle would also be maintained also. Can you see the result is that God is blessing us mightily by having others begin the work we are to continue?

And the LORD thy God will put out those nations before thee by little and little: thou mayest not consume them at once, lest the beasts of the field increase upon thee. Deuteronomy 7:22

The verse refers to the wild beasts that would flourish uncontrollably upon the countless corpses that Israel could not have buried fast enough.

He shows us step-by-step, little and little, that He hears and wants to answer our every prayer to be victorious in His name. And He wants us to savor and share every morsel of His blessings with others.

No matter when your project ‘drop-dead date’ is, ask God to be your computing leader in projects large and small.

Psalms 71:18
godscomputermanual.com

Sunday, August 14, 2011

12 - Write Plainly

Computer operations should be written plainly so mistakes may not be made.

ISO 9000 is a certification many industrial customers require of their manufacturers. Simply, it says, “Write down what you do and do what you write down.” In the certification process our company found many redundant or missing processes that diminished the quality of our products and gave our competitors an edge. Instructions written clearly also make sure the training of new trainees was always the same. It becomes the baseline for a worker’s accountability.

In one sense, the Lord is ‘ISO 9000’ certified when He gave us His written word, but we must study it continually and use it in training others.

Habakkuk asked God a question and in chapter 2 God gives His answer, but first gave instruction:
And the LORD answered me, and said, Write the vision, and make it plain upon tables, that he may run that readeth it. Hab 2:2.
The word ‘run’ in the verse gives us reason to take an even closer look at the reverence.

When I began emailing many years ago, I quickly learned how easy it is to misinterpret what was said when we have only text input. Our communication includes body English, tone, mood, etc. This all gives depth to what we say and hear, yet is sadly missing in email and text messaging. Even misspelled words tell the reader we were too busy, disinterested to run a spell check of our message.

Another simple New Testament reference I use so often is 1st Corinthians 14:40: Let all things be done decently and in order.

Psalms 71:18
Godscomputermanual.com