📄 Extracted Text (199 words)
To: Jeevacation[jeevacationegmaitcom]
From: Corina Tamita
Sent Mon 8/24/2009 10:26:46 PM
dear jeffrey,
i briefly looked into what we discussed and the most promising approach seems to be a parallel
between computer and network security and infection biology. it seems no one has done it and
that amazes me -- because the more i think about it the more clear it seems.
one example: when you get a computer virus, no anti-virus is good enough to remove it
completely. it will inactivate it and you won't be bothered by it anymore, but its remnants will be
left somewhere on your computer. this seems to be a perfect analog of the junk that is left in the
DNA.
i discussed it with a couple of people and they seemed really interested in such a parallel. right
now, what would be great would be to find theorems in computer and network security that could
then be translated into infection biology. that could bring so much insight.
I'm looking into potential people to discuss this with -- ron rivest at mit is very well known but
probably very busy. i have to find someone lower in the food chain first...
c
EFTA_R1_01516216
EFTA02441651
ℹ️ Document Details
SHA-256
94e39f6fb09c07fdf08663ea7acdf69a1b9f40b36eae15c9fdb561199bb5bcd8
Bates Number
EFTA02441651
Dataset
DataSet-11
Document Type
document
Pages
1
Comments 0