EFTA01944766.pdf

DataSet-10 3 pages 799 words document
👁 1 💬 0
📄 Extracted Text (799 words)
To: Neil Gershenfeld From: Jeffrey Epstein Sent Sun 12/8/2013 3:08:15 PM Subject: Re: great . talk and paper. . i saw you showed seth lloyds paper , ? system assumes unlimited resources. even though each calculation is pico scale . no competition . no evolution. analog music and its harmonies ( second order derivatives of the fundamental ) carry more free info . not genetic algorithms as they don't really compete. true biology involves camoflauge, as a strategy. lets design somthing that itself tries to hide from being destroyed. turning itself off to play dead. . change its topology to mimic something else , have the shapes battle it out for energy efficiency including sacrificing some of the group for the benefit of the whole. ie boundary layers creating turbulence at the right moment. second order algorithms, ( electric field generated by the folded protein . not merely the shape key. ). even your token scalable computer, was at heart linear, as opposed to a toplogical space that could / should morhp into the solution. On Sun, Dec 8, 2013 at 9:28 AM, Neil Gershenfeld a wrote: If you get a chance to read it, I wrote that paper as a manifesto for the project. The idea is to make software look like hardware, rather than hide the difference and pretend they're unrelated. Think of this as the substrate for brain-building. Neil On Sun, Dec 8, 2013 at 9:26 AM, Jeffrey Epstein <jeevacation(Thgtnail.com> wrote: I would like to hear more when you have time. computing as compared to calculating?. . relationships as compared to equivalence?. Hillis in the early days wanted a machine that was proud of him. On Sun, Dec 8, 2013 at 9:22 AM, Neil Gershenfeld wrote: Did I send you this paper: http://cba.mit.edu/docs/papers/1 .12.Computing.pdf and talk: http://www-03.ibm.comfibm/history/ibm100/us/en/ideas/oct2011watson.html ? My real interest in thinking about thinking is the mechanisms -- I'm increasingly convinced that there needs to be a do-over ofall of computing. Neil On Sun, Dec 8, 2013 at 9:17 AM, Jeffrey Epstein <[email protected]> wrote: EFTA_R1_00406348 EFTA01944766 either is fine. what would you need to fulfill the popper definition of falsifiable. . masquerade is a deceptive strategy. easily proven to be a false signal. . again the observer, of the interaction. has the more difficult problem as he sees both. of determinng, which image is real. On Sun, Dec 8, 2013 at 8:54 AM, Neil Gershenfeld < wrote: sure, although I was going to include him in an intro to the whole group we sketched, could follow from that On Sat, Dec 7, 2013 at 8:16 PM, Jeffrey Epstein <ieevacationegmail com> wrote: can you introduce me to noam *********************************************************** The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of Jeffrey Epstein Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by c-mail to [email protected] and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of Jeffrey Epstein Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by EFTA_R1_00406349 EFTA01944767 return e-mail or by e-mail to [email protected], and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved *********************************************************** The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of Jeffrey Epstein Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to [email protected] and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved *************************************** ******************** The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of Jeffrey Epstein Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to ieevacation rt gmail.com, and destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved EFTA_R1_00406350 EFTA01944768
ℹ️ Document Details
SHA-256
ca749ca698be2ec957d05ae6e70724fa4245fe2ca5bb8b2510ac06895c316e82
Bates Number
EFTA01944766
Dataset
DataSet-10
Type
document
Pages
3

Community Rating

Sign in to rate this document

📋 What Is This?

Loading…
Sign in to add a description

💬 Comments 0

Sign in to join the discussion
Loading comments…
Link copied!