📄 Extracted Text (202 words)
From: Corina Tamita
To: Jeevacation <E >
Subject:
Date: Mon, 24 Aug 2009 22:26:46 +0000
dear jeffrey,
i briefly looked into what we discussed and the most promising approach seems to be a parallel between
computer and network security and infection biology. it seems no one has done it and that amazes me -- because
the more i think about it the more clear it seems.
one example: when you get a computer virus, no anti-virus is good enough to remove it completely. it will
inactivate it and you won't be bothered by it anymore, but its remnants will be left somewhere on your computer.
this seems to be a perfect analog of the junk that is left in the DNA.
i discussed it with a couple of people and they seemed really interested in such a parallel. right now, what would
be great would be to find theorems in computer and network security that could then be translated into infection
biology. that could bring so much insight.
I'm looking into potential people to discuss this with -- ron rivest at mit is very well known but probably very
busy. i have to find someone lower in the food chain first...
EFTA00773972
ℹ️ Document Details
SHA-256
a6fb94ce4940a4f33a56fcae372c01800d42bffdcc6cd641a6116f1d08c9107f
Bates Number
EFTA00773972
Dataset
DataSet-9
Document Type
document
Pages
1
Comments 0