EFTA01944942.pdf

DataSet-10 4 pages 849 words document
👁 1 💬 0
📄 Extracted Text (849 words)
To: Jeffrey EpsteinDeevacation©gmail.com] From: Well Gershenfeld Sent Sun 12/8/2013 3:12:14 PM Subject Re: In dividing labor, I'm interested in creating the substrates for asking questions like that; Ed/Sebastian/Judith/... will be good for the strategies. I'll also include in the ping an optimization guru. I know Seth's work (and Seth) well. On Sun, Dec 8, 2013 at 10:08 AM, Jeffrey Epstein <[email protected]> wrote: great . talk and paper. . i saw you showed seth lloyds paper , ? system assumes unlimited resources. even though each calculation is pico scale . no competition . no evolution. analog music and its harmonies ( second order derivatives of the fundamental ) carry more free info . not genetic algorithms as they don't really compete. true biology involves camoflauge, as a strategy. lets design somthing that itself tries to hide from being destroyed. turning itself off to play dead. . change its topology to mimic something else , have the shapes battle it out for energy efficiency including sacrificing some of the group for the benefit of the whole. ie boundary layers creating turbulence at the right moment. second order algorithms, ( electric field generated by the folded protein . not merely the shape key. ). even your token scalable computer, was at heart linear, as opposed to a toplogical space that could / should morhp into the solution. On Sun, Dec 8, 2013 at 9:28 AM, Neil Gershenfeld • wrote: If you get a chance to read it, I wrote that paper as a manifesto for the project. The idea is to make software look like hardware, rather than hide the difference and pretend they're unrelated. Think of this as the substrate for brain-building. Neil On Sun, Dec 8, 2013 at 9:26 AM, Jeffrey Epstein <jeevacation( gmail.com> wrote: I would like to hear more when you have time. computing as compared to calculating?. . relationships as compared to equivalence?. Hillis in the early days wanted a machine that was proud of him. On Sun, Dec 8, 2013 at 9:22 AM, Neil Gershenfeld wrote: Did I send you this paper: http://cba.mit.edu/docs/papers/11.12.Computing.pdf and talk: EFTA_R1_00408848 EFTA01944942 http://www-03.ibm.comJibm/history/ibmI00/us/en/ideas/oct20I I watson.html ? My real interest in thinking about thinking is the mechanisms -- Pm increasingly convinced that there needs to be a do-over of all of computing. Neil On Sun, Dcc 8, 2013 at 9:17 AM, Jeffrey Epstein [email protected]> wrote: either is fine. what would you need to fulfill the popper definition of falsifiable. . masquerade is a deceptive strategy. easily proven to be a false signal. . again the observer, of the interaction. has the more difficult problem as he sees both. of determinng, which image is real. On Sun, Dec 8, 2013 at 8:54 AM, Neil Gershenfeld wrote: sure, although I was going to include him in an intro to the whole group we sketched, could follow from that On Sat, Dec 7, 2013 at 8:16 PM, Jeffrey Epstein <jecvacation mail.com> wrote: can you introduce me to noam *********************************************************** The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of Jeffrey Epstein Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by c-mail to jeevacation@gmail,com and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved EFTA_R1_00406647 EFTA01944943 The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of Jeffrey Epstein Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to jeevacationOgmail.com and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of Jeffrey Epstein Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to [email protected] and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of Jeffrey Epstein Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to [email protected] and destroy this communication and all copies thereof, EFTA R1_00406648 EFTA01944944 including all attachments. copyright -all rights reserved EFTA R1_00406649 EFTA01944945
ℹ️ Document Details
SHA-256
c5533c6ecd72bc28d657ded474520ba63ebd2282992a076bdfda599d095613f0
Bates Number
EFTA01944942
Dataset
DataSet-10
Type
document
Pages
4

Community Rating

Sign in to rate this document

📋 What Is This?

Loading…
Sign in to add a description

💬 Comments 0

Sign in to join the discussion
Loading comments…
Link copied!