summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorGordon GECOS <u@adam>2023-11-01 13:21:48 -0400
committerGordon GECOS <u@adam>2023-11-01 13:21:48 -0400
commit0ea1a4bc2e3d06aa2e664c272a8d885a4ce98420 (patch)
tree3410acf2562029c30724dfd76149e808b581f427
parentaeaf45d8c5d27fda36545cd6c716c4d7e4e53658 (diff)
commit
-rw-r--r--Makefile1
-rw-r--r--freedom.txt4
-rw-r--r--human-communication.txt143
-rw-r--r--tweets.txt8
4 files changed, 102 insertions, 54 deletions
diff --git a/Makefile b/Makefile
index c8ab9fd..c5a63d9 100644
--- a/Makefile
+++ b/Makefile
@@ -4,6 +4,7 @@ pages += bitcoin.txt space monad-tutorial.txt break
4pages += why.txt space con-job.txt break 4pages += why.txt space con-job.txt break
5pages += argument.txt space medium.txt break 5pages += argument.txt space medium.txt break
6pages += introduction.txt $(if $(FINALE),finale.txt) break 6pages += introduction.txt $(if $(FINALE),finale.txt) break
7pages += human-communication.txt
7 8
8output_name = poetrybook 9output_name = poetrybook
9pdf_viewer = evince 10pdf_viewer = evince
diff --git a/freedom.txt b/freedom.txt
deleted file mode 100644
index f115292..0000000
--- a/freedom.txt
+++ /dev/null
@@ -1,4 +0,0 @@
1Slaves are happy to have their lives; the dead are happy to have their freedom.
2
3Few distinguish appearing from being crazy.
4
diff --git a/human-communication.txt b/human-communication.txt
index cea0e63..41fd1b3 100644
--- a/human-communication.txt
+++ b/human-communication.txt
@@ -23,36 +23,36 @@ Follow the logic of the knowledge.
23 23
24 24
25Human beings can transmit to one another two fundamentally different 25Human beings can transmit to one another two fundamentally different
26types of communication: (1) data structures; (2) programs. Programs are 26types of communication: (1) data (2) programs. Programs are the
27the same thing as proofs and the same thing as Russellian denotations; 27same thing as proofs and the same thing as Russellian denotations;
28they have the "sense" that data structures lack. They have the 28they have the "sense" that data structures lack. They have the
29power that data does not have, to transmit knowledge rather than 29power that data does not have, to transmit knowledge rather than
30information. However, it must be understood that programs are highly 30information. However, it must be understood that programs are highly
31sensitive to their runtime environments and for that reason robustness 31sensitive to their runtime environments and for that reason robustness
32is an extremely difficult problem akin to the robustness of life 32is an extremely difficult problem akin to the robustness of life in
33in natural habitats. Human cultural programs are high reliability 33natural habitats. Human cultural programs are high reliability systems
34systems which means they are chaotic systems that have phase after 34which means they are chaotic systems that have phase after phase to
35phase to downshift through (articulated joints through which to roll 35downshift through (articulated joints through which to roll over)
36over) as they take damage and heal from it by phase-changing back 36as they take damage and heal from it by phase-changing back up over
37up over (computational) time (rewriting mental programs to account 37(computational) time (rewriting mental programs to account for unhandled
38for unhandled or mishandled conditions while keeping the programs 38or mishandled conditions while keeping the programs running continuously
39running continuously in a degraded state). Human cultural programs 39in a degraded state). Human cultural programs are far beyond what
40are far beyond what average or even elite programmers can hope to 40average or even elite programmers can hope to construct; they have
41construct; they have been constructed by one-in-a-million prophets who 41been constructed by one-in-a-million prophets who were able to fully
42were able to fully absorb their entire local culture and reprogram 42absorb their entire local culture and reprogram themselves individually
43themselves individually based on reverse engineering that culture to 43based on reverse engineering that culture to become (themselves, as
44become (themselves, as individuals) generators of self-propagating 44individuals) generators of self-propagating generator-regenerators of
45generator-regenerators. Their programs are constructed in such a way 45universal culture. Their programs are constructed in such a universal way as
46as to be rewritten generation after generation according to the local 46to be rewritten generation after generation according to the local
47runtime environment, while preserving an evolving kernel to re-generate 47runtime environment, while preserving an evolving kernel to re-generate
48slightly adapted kernels again and again in new environments -- in 48slightly adapted kernels again and again in new environments -- in
49such a way that the kernel picks up each new environment and carries 49such a way that the kernel picks up each new environment's knowledge
50it into the next without losing what it learned of the previous 50and carries it into the next without losing what it learned of the
51environment -- that is their robustness. It is the same as the genetic 51previous environment -- that is their robustness. It is the same as the
52principle of DNA described by Schrodinger but most especially like the 52genetic principle of DNA described by Schrodinger but most especially
53artificially bred/genetically engineered DNA of the immune system's 53like the artificially bred/genetically engineered DNA of the immune
54antibody-generating cells. These have mechanisms that control the 54system's antibody-generating cells. These have mechanisms that control
55production of novelty, localizing it to one part of the DNA strand, 55the production of novelty, localizing it to one part of the DNA strand,
56while circumscribing every novelty with proof of provenance used to 56while circumscribing every novelty with proof of provenance used to
57protect the system against foreign novelty (a single recognizable 57protect the system against foreign novelty (a single recognizable
58DNA strand that is the same for every antibody; that is, its coded 58DNA strand that is the same for every antibody; that is, its coded
@@ -61,26 +61,29 @@ immunohistocompatibility complex providing the filter mechanism of
61auto-immune tolerance). The word kernel is to be interpreted as in the 61auto-immune tolerance). The word kernel is to be interpreted as in the
62algebraic structure: preserved across a morphism. 62algebraic structure: preserved across a morphism.
63 63
64In a literal kernel, the DNA sequence in the seed's nucleus is a literal 64In a literal kernel, the DNA information sequence in the seed's nucleus
65algebraic kernel, in an algebra of sexual reproduction that includes 65is a literal algebraic kernel, in an algebra of sexual reproduction
66a mechanism amplifying reproductive success of males in Eukaryotes 66that includes a mechanism amplifying reproductive success of males in
67providing an information-accumulation advantage, which was later 67Eukaryotes providing an information-accumulation advantage by more
68jettisoned when Animalia transitioned into the Mammalian super-organism 68reliably capturing novelty, which was later jettisoned in the human
69lineage when Animalia transitioned into the Mammalian super-organism
69phase which gave the next level of meta-advantage in information 70phase which gave the next level of meta-advantage in information
70accumulation as group-shared emotions applied distributed computation 71accumulation as group-shared emotions applied distributed computation
71to sensory information turning e.g. individualized sight into area 72to sensory information turning e.g. individualized sight into area
72surveillance; that super-organism was again jettisoned when Humanity 73surveillance (Eukaryotic sexual sampling came into conflict with high
73transitioned into its cultural message-passing super-organism phase; 74parental investment involved in non-genetic but still vertical transfer
74but remnants of the old system always exist and indeed exist as the 75of acquired environmental knowledge, a sort of Lamarckian epigenetic
75foundations of the newer systems and abstractions are leaky and the new 76thing if you are into analogies YUCK); that super-organism was again
76stuff only has to work just-better than the old stuff so it isn't ever 77jettisoned when Humanity transitioned into its cultural message-passing
77all the way there -- you know how it goes. So capitalism was founded on 78super-organism phase (in fact Humanity remains the mammalian substrate
78the conceptually very different property relations of feudalism, which 79but human subjectivity (the "us" that "we" think "we" are even as we
79only slowly shifted to match the needs of the capitalists, without 80call ourselves human) is produced by the cultural distributed program
80necessarily losing their old-timey words and old white men with robes, 81whose social systems of self-preservation dominate the mammalian levers
81or even the fact that some people get to force other people to fight 82mostly just by spacialization -- I mean, it ain't hard); but remnants of
82in front of them and a spot in the back is the foundation of political 83the old systems always exist and indeed exist as the foundations of the
83power. 84newer systems and abstractions are leaky and the new stuff only has to
85work just-better than the old stuff so it isn't ever all the way there
86-- you know how it goes.
84 87
85Haskell monads show us how algebraic morphisms are as intuitive as 88Haskell monads show us how algebraic morphisms are as intuitive as
86quasiquotation. Thank you Mr. Quine. But these are all just simple 89quasiquotation. Thank you Mr. Quine. But these are all just simple
@@ -89,7 +92,29 @@ how much more complicated to understand them than the far more complex
892+2=4, which even people who are not simple believe to be more simple! 922+2=4, which even people who are not simple believe to be more simple!
90People who think 2+2=4 is simple may be remembering the answer rather 93People who think 2+2=4 is simple may be remembering the answer rather
91than computing it. People who are computing it may not be deriving from 94than computing it. People who are computing it may not be deriving from
92foundations; they may be remembering rather than proving a lemma. 95foundations; they may be remembering rather than proving a lemma. But to
96remember without proving is not enough to transmit knowledge.
97
98Memory transmits only memory. Knowledge can transmit either memory
99or sometimes knowledge. The recipient can interpret proof as
100information (store it) or as program (run it). Running the program
101initiates a mental process whose outcome cannot be predicted by the
102person running it. The frontal lobe executive function will connect the
103ongoing computational process to all stored life memories through the
104salience network, a search engine for emotional resonance; the frontal
105lobe can detect fear of thought; mental flight from fear will prevent
106the process from computing to completion.
107
108(Knowledge can exist in a degraded, not-fully-replicable form; neutered,
109locally contained, but potentially still fully-activated locally.
110Such knowledge or internal programming may be unavailable for mental
111debugging as if its source code were unavailable. When knowledge is
112filtered out by the executive function, it may appear to have this
113neutered locally-activated form, or else be deactivated. Resolving
114the emotional response could activate neutered knowledge and/or cause
115first-time replication of knowledge previously unreplicated. The
116initiated processing requires an unpredictable amount of computing time
117to complete.)
93 118
94This power makes them dangerous; for the same reason that computer 119This power makes them dangerous; for the same reason that computer
95systems control access to programming features (and generally even when 120systems control access to programming features (and generally even when
@@ -105,17 +130,19 @@ reason why these systems are unavailable: they do not make available
105sufficient time to process. Time is even the MOTIVATION for restricting 130sufficient time to process. Time is even the MOTIVATION for restricting
106access in modern computer systems, denial of service being far more 131access in modern computer systems, denial of service being far more
107common than privilege escalation; this commonality is true of human 132common than privilege escalation; this commonality is true of human
108systems as well (older computer systems were highly vulnerable but 133systems as well. (Older computer systems were highly vulnerable but
109modern systems are vastly more secure to trivial escalation attacks, 134modern systems are vastly more secure to trivial escalation attacks,
110though their complexity may lead to spectacularly immense failures as 135though their complexity may lead to spectacularly immense failures as
111breaches of gargantuan executive control structures or even breaches 136breaches of gargantuan executive control structures or even breaches
112of software distribution centralization points whose impact could span 137of software distribution centralization points whose impact could span
113multiple national executive control structures in multiple nations 138multiple national executive control structures in multiple nations
114simultaneously, as indeed have several recent software supply chain 139simultaneously, as indeed happened in a software supply chain attack on
115compromises e.g. Microsoft through their upstream library vendor 140Microsoft through their upstream library vendor SolarWinds. This attack
116SolarWinds. This attack was relatively harmless because it was performed 141was relatively harmless because it was performed by a government that
117by a government that only wanted some spy shit rather than one at war or 142only wanted some spy shit rather than one at war or a terrorist who
118a terrorist who wanted to maximize destruction). 143wanted to maximize destruction). Can't get the time of day from someone
144who doesn't want to spend the time thinking whether you just want the
145time of day.
119 146
120Capitalism and school might be seen operationally as denial of 147Capitalism and school might be seen operationally as denial of
121service attacks on their constituent subordinates' ability to process 148service attacks on their constituent subordinates' ability to process
@@ -126,6 +153,22 @@ of the big picture to change their phase thereby destabilizing their
126binding connection to you (creating a renegotiation, reconfiguration, or 153binding connection to you (creating a renegotiation, reconfiguration, or
127break). 154break).
128 155
156When I was 13 years old I read A Brief History of Time and learned
157that Albert Einstein claimed that calculus proves Parmenides right:
158time is an illusion. Two years later I dropped out of high school and
159took calculus at University of Connecticut to find out for myself. No
160one in my calculus or analysis classes ever talked about Parmenides.
161Why not? Maybe because Einstein may be right: calculus may be able
162to prove something. Then the students could be changed, set against
163their parents like by Jesus' sword. In fact these students are meant
164to change and to change the world -- later. First they must pass
165through the Thymus of society proving they have inscribed its inherited
166knowledge into their shape. Only then will they be permitted a chance
167to compete for the seat at the mic where some lucky MC gets to spit
168something new on top. You're not there yet kiddo, integrate this
169expression. But don't integrate too far. Robin Williams made a movie
170about it, but it sucked.
171
129(Schools follow the corporate hierarchy style proof-of-work knowledge 172(Schools follow the corporate hierarchy style proof-of-work knowledge
130distribution system of transferring knowledge about subordinate worker 173distribution system of transferring knowledge about subordinate worker
131performance up to non-local, locally-inaccessible standard-setters 174performance up to non-local, locally-inaccessible standard-setters
@@ -133,8 +176,8 @@ performance up to non-local, locally-inaccessible standard-setters
133of global information in the local context becomes a liability as 176of global information in the local context becomes a liability as
134either denial of service or maybe baby a nucleation engine for 177either denial of service or maybe baby a nucleation engine for
135crystalization of solidarity with snowflakes dropping through the air in 178crystalization of solidarity with snowflakes dropping through the air in
136a horizontal barrage since no single nucleation point could crystalize 179a horizontal barrage (since no single nucleation point could crystalize
137a horizontally-segregated group. There is a systemic filter to remove 180a horizontally-segregated group). There is a systemic filter to remove
138global knowledge from inputs supplied to the local system as well as 181global knowledge from inputs supplied to the local system as well as
139mechanisms to prevent horizontal information flow within local activity; 182mechanisms to prevent horizontal information flow within local activity;
140you are educated stupid in your timecubicle! and by the way it doesn't 183you are educated stupid in your timecubicle! and by the way it doesn't
diff --git a/tweets.txt b/tweets.txt
new file mode 100644
index 0000000..db61567
--- /dev/null
+++ b/tweets.txt
@@ -0,0 +1,8 @@
1Unsent Tweets
2
3
4Slaves are happy to have their lives.
5The dead are happy to have their freedom.
6
7Few distinguish appearing from being crazy.
8