👁 1
💬 0
📄 Extracted Text (799 words)
To: Neil Gershenfeld
From: Jeffrey Epstein
Sent Sun 12/8/2013 3:08:15 PM
Subject: Re:
great . talk and paper. . i saw you showed seth lloyds paper , ? system assumes unlimited
resources. even though each calculation is pico scale . no competition . no evolution. analog
music and its harmonies ( second order derivatives of the fundamental ) carry more free info .
not genetic algorithms as they don't really compete. true biology involves camoflauge, as a
strategy. lets design somthing that itself tries to hide from being destroyed. turning itself off to
play dead. . change its topology to mimic something else , have the shapes battle it out for energy
efficiency including sacrificing some of the group for the benefit of the whole. ie boundary layers
creating turbulence at the right moment. second order algorithms, ( electric field generated by
the folded protein . not merely the shape key. ). even your token scalable computer, was at
heart linear, as opposed to a toplogical space that could / should morhp into the solution.
On Sun, Dec 8, 2013 at 9:28 AM, Neil Gershenfeld a wrote:
If you get a chance to read it, I wrote that paper as a manifesto for the project. The idea is to
make software look like hardware, rather than hide the difference and pretend they're
unrelated. Think of this as the substrate for brain-building.
Neil
On Sun, Dec 8, 2013 at 9:26 AM, Jeffrey Epstein <jeevacation(Thgtnail.com> wrote:
I would like to hear more when you have time. computing as compared to calculating?. .
relationships as compared to equivalence?. Hillis in the early days wanted a machine that was
proud of him.
On Sun, Dec 8, 2013 at 9:22 AM, Neil Gershenfeld wrote:
Did I send you this paper:
http://cba.mit.edu/docs/papers/1 .12.Computing.pdf
and talk:
http://www-03.ibm.comfibm/history/ibm100/us/en/ideas/oct2011watson.html
? My real interest in thinking about thinking is the mechanisms -- I'm increasingly convinced
that there needs to be a do-over ofall of computing.
Neil
On Sun, Dec 8, 2013 at 9:17 AM, Jeffrey Epstein <[email protected]> wrote:
EFTA_R1_00406348
EFTA01944766
either is fine. what would you need to fulfill the popper definition of falsifiable. .
masquerade is a deceptive strategy. easily proven to be a false signal. . again the observer,
of the interaction. has the more difficult problem as he sees both. of determinng, which
image is real.
On Sun, Dec 8, 2013 at 8:54 AM, Neil Gershenfeld < wrote:
sure, although I was going to include him in an intro to the whole group we sketched,
could follow from that
On Sat, Dec 7, 2013 at 8:16 PM, Jeffrey Epstein <ieevacationegmail com> wrote:
can you introduce me to noam
***********************************************************
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
Jeffrey Epstein
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by c-mail to [email protected] and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
Jeffrey Epstein
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
EFTA_R1_00406349
EFTA01944767
return e-mail or by e-mail to [email protected], and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
***********************************************************
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
Jeffrey Epstein
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to [email protected] and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
*************************************** ********************
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
Jeffrey Epstein
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to ieevacation rt gmail.com, and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
EFTA_R1_00406350
EFTA01944768
ℹ️ Document Details
SHA-256
ca749ca698be2ec957d05ae6e70724fa4245fe2ca5bb8b2510ac06895c316e82
Bates Number
EFTA01944766
Dataset
DataSet-10
Type
document
Pages
3
💬 Comments 0