diff options
author | Gordon GECOS <u@adam> | 2023-11-01 02:17:00 -0400 |
---|---|---|
committer | Gordon GECOS <u@adam> | 2023-11-01 02:17:00 -0400 |
commit | 10dbc78b4f81ef77a7cbb5326a153fa19e121671 (patch) | |
tree | 188e442eeda150ff919f5f2571f96cb7b6f08934 | |
parent | 1c08e140c52378e38d22da877d7a7f01963bd905 (diff) |
human-communication.txt
-rw-r--r-- | human-communication.txt | 88 |
1 files changed, 48 insertions, 40 deletions
diff --git a/human-communication.txt b/human-communication.txt index e8308ac..fd0fa33 100644 --- a/human-communication.txt +++ b/human-communication.txt | |||
@@ -23,7 +23,7 @@ Follow the logic of the knowledge. | |||
23 | 23 | ||
24 | 24 | ||
25 | Human beings can transmit to one another two fundamentally different | 25 | Human beings can transmit to one another two fundamentally different |
26 | types of communication: 1) data structures; (2) programs. Programs are | 26 | types of communication: (1) data structures; (2) programs. Programs are |
27 | the same thing as proofs and the same thing as Russellian denotations; | 27 | the same thing as proofs and the same thing as Russellian denotations; |
28 | they have the "sense" that data structures lack. They have the | 28 | they have the "sense" that data structures lack. They have the |
29 | power that data does not have, to transmit knowledge rather than | 29 | power that data does not have, to transmit knowledge rather than |
@@ -45,17 +45,19 @@ generators of self-propagating generator-regenerators. Their programs | |||
45 | are constructed in such a way as to be rewritten generation after | 45 | are constructed in such a way as to be rewritten generation after |
46 | generation according to the local runtime environment, while preserving | 46 | generation according to the local runtime environment, while preserving |
47 | an evolving kernel to re-generate slightly adapted kernels again and | 47 | an evolving kernel to re-generate slightly adapted kernels again and |
48 | again in new environments -- that is their robustness. It is the same | 48 | again in new environments -- in such a way that the kernel picks up |
49 | as the genetic principle of DNA described by Schrodinger but most | 49 | each new environment and carries it into the next without losing what |
50 | especially like the artificially bred/genetically engineered DNA of | 50 | it learned of the previous environment -- that is their robustness. It |
51 | the immune system's antibody-generating cells. These have mechanisms | 51 | is the same as the genetic principle of DNA described by Schrodinger |
52 | that control the production of novelty, localizing it to one part | 52 | but most especially like the artificially bred/genetically engineered |
53 | of the DNA strand, while circumscribing every novelty with signs of | 53 | DNA of the immune system's antibody-generating cells. These have |
54 | unoriginality used to protect the system against foreign novelty (a | 54 | mechanisms that control the production of novelty, localizing it to |
55 | single recognizable DNA strand that is the same for every antibody; that | 55 | one part of the DNA strand, while circumscribing every novelty with |
56 | is, its coded protein has a specific chemical binding to a matching | 56 | proof of provenance used to protect the system against foreign |
57 | protein (in the immunohistocompatibility complex) providing the | 57 | novelty (a single recognizable DNA strand that is the same for every |
58 | filter mechanism of auto-immune tolerance). The word kernel is to be | 58 | antibody; that is, its coded protein has a strong chemical binding to |
59 | a matching protein in the immunohistocompatibility complex providing | ||
60 | the filter mechanism of auto-immune tolerance). The word kernel is to be | ||
59 | interpreted as in the algebraic structure: preserved across a morphism. | 61 | interpreted as in the algebraic structure: preserved across a morphism. |
60 | 62 | ||
61 | In a literal kernel, the DNA sequence in the seed's nucleus is a literal | 63 | In a literal kernel, the DNA sequence in the seed's nucleus is a literal |
@@ -83,8 +85,9 @@ quasiquotation. Thank you Mr. Quine. But these are all just simple | |||
83 | recursions. They are just the simplest structures that exist. And yet | 85 | recursions. They are just the simplest structures that exist. And yet |
84 | how much more complicated to understand them than the far more complex | 86 | how much more complicated to understand them than the far more complex |
85 | 2+2=4, which even people who are not simple believe to be more simple! | 87 | 2+2=4, which even people who are not simple believe to be more simple! |
86 | People who think 2+2=4 is simple are remembering the answer rather than | 88 | People who think 2+2=4 is simple may be remembering the answer rather |
87 | computing it. | 89 | than computing it. People who are computing it may not be deriving from |
90 | foundations; they may be remembering rather than proving a lemma. | ||
88 | 91 | ||
89 | This power makes them dangerous; for the same reason that computer | 92 | This power makes them dangerous; for the same reason that computer |
90 | systems control access to programming features (and generally even when | 93 | systems control access to programming features (and generally even when |
@@ -100,14 +103,14 @@ reason why these systems are unavailable: they do not make available | |||
100 | sufficient time to process. Time is even the MOTIVATION for restricting | 103 | sufficient time to process. Time is even the MOTIVATION for restricting |
101 | access in modern computer systems, denial of service being far more | 104 | access in modern computer systems, denial of service being far more |
102 | common than privilege escalation; this commonality is true of human | 105 | common than privilege escalation; this commonality is true of human |
103 | systems as well (not the motivation for restrictions; older computer | 106 | systems as well (older computer systems were highly vulnerable but |
104 | systems were highly vulnerable but modern systems are vastly more secure | 107 | modern systems are vastly more secure to trivial escalation attacks, |
105 | to trivial attacks, though their complexity may lead to spectacularly | 108 | though their complexity may lead to spectacularly immense failures as |
106 | immense failures as breaches of executive control structures or even | 109 | breaches of gargantuan executive control structures or even breaches |
107 | breaches of software distribution centralization points whose impact | 110 | of software distribution centralization points whose impact could span |
108 | could span multiple national executive control structures in multiple | 111 | multiple national executive control structures in multiple nations |
109 | nations simultaneously, as indeed have several recent software supply | 112 | simultaneously, as indeed have several recent software supply chain |
110 | chain compromises e.g. Microsoft through their upstream library vendor | 113 | compromises e.g. Microsoft through their upstream library vendor |
111 | SolarWinds. This attack was relatively harmless because it was performed | 114 | SolarWinds. This attack was relatively harmless because it was performed |
112 | by a government that only wanted some spy shit rather than one at war or | 115 | by a government that only wanted some spy shit rather than one at war or |
113 | a terrorist who wanted to maximize destruction). | 116 | a terrorist who wanted to maximize destruction). |
@@ -121,28 +124,33 @@ of the big picture to change their phase thereby destabilizing their | |||
121 | binding connection to you (creating a renegotiation, reconfiguration, or | 124 | binding connection to you (creating a renegotiation, reconfiguration, or |
122 | break). | 125 | break). |
123 | 126 | ||
124 | (Schools follow the corporate proof-of-work knowledge distribution | 127 | (Schools follow the corporate hierarchy style proof-of-work knowledge |
125 | system of transferring knowledge about subordinate worker performance | 128 | distribution system of transferring knowledge about subordinate worker |
126 | up to non-local, locally-inaccessible standard-setters -- depriving | 129 | performance up to non-local, locally-inaccessible standard-setters |
127 | local activity of non-local meaning, depriving local activity of the | 130 | -- depriving local activity of non-local meaning. The presence |
128 | possibility of renegotiating its purpose through local communication, | 131 | of global information in the local context becomes a liability as |
129 | but also creating a conflict between the interests of local power and | 132 | either denial of service or maybe baby a nucleation engine for |
130 | local knowledge about global reality, so that there is a systemic | 133 | crystalization of solidarity with snowflakes dropping through the air in |
131 | filter to REMOVE global knowledge from local activity; you are educated | 134 | a horizontal barrage since no single nucleation point could crystalize |
132 | stupid in your timecubicle! and by the way it doesn't help if the local | 135 | a horizontally-segregated group. There is a systemic filter to remove |
133 | superordinate has global knowledge.) | 136 | global knowledge from inputs supplied to the local system as well as |
137 | mechanisms to prevent horizontal information flow within local activity; | ||
138 | you are educated stupid in your timecubicle! and by the way it doesn't | ||
139 | help the non-local superordinate if the local superordinate has global | ||
140 | knowledge) | ||
134 | 141 | ||
135 | There is the "BITE" model of cult programming, behavior information | 142 | There is the "BITE" model of cult programming, behavior information |
136 | thought and emotion control; institutions in order to fully bind | 143 | thought and emotion control; institutions in order to fully bind |
137 | individuals only need to control behavior enough to force compliance | 144 | individuals only need to control behavior enough to force compliance |
138 | with processing received information, and thought can be disabled by | 145 | with demands to process received information, and thought can be |
139 | increasing the quantity of that information. This also constitutes a | 146 | disabled by increasing the quantity of that information. This also |
140 | parallel denial of emotion, creating potential for emotional control | 147 | constitutes a parallel denial of emotion, creating potential for |
141 | through e.g. selective release from stressors whether through reduction | 148 | emotional control through e.g. selective release from stressors whether |
142 | in demanded processing or other mechanisms; if processing quantity is to | 149 | through reduction in demanded processing or other mechanisms; if |
143 | be the only "lever" then it has to have a minimum quantity demanded in | 150 | processing quantity is to be the only "lever" then it has to have a |
144 | order to retain its binding function reliably; in other words once you | 151 | minimum quantity demanded in order to retain its binding function |
145 | drop the hours down to 20 you end up with MORE retention problems! | 152 | reliably; in other words once you drop the hours down to 20 you end up |
153 | with MORE retention problems! | ||
146 | 154 | ||
147 | FOR YOUR FIRST | 155 | FOR YOUR FIRST |
148 | EMPLOYER | 156 | EMPLOYER |