diff options
author | Gordon GECOS <u@adam> | 2023-10-31 21:41:36 -0400 |
---|---|---|
committer | Gordon GECOS <u@adam> | 2023-10-31 21:41:36 -0400 |
commit | 1aa1810946002d34b9e9027dc91e6f1dbd91a039 (patch) | |
tree | 625d5b03c62b37d0e664b7f04154291ab6ae2170 | |
parent | d1a26e008118d6ffcc181540def24bb366b83e5c (diff) |
human-communication.txt
-rw-r--r-- | human-communication.txt | 124 |
1 files changed, 86 insertions, 38 deletions
diff --git a/human-communication.txt b/human-communication.txt index 9fe2b3a..ac37581 100644 --- a/human-communication.txt +++ b/human-communication.txt | |||
@@ -1,10 +1,13 @@ | |||
1 | in order for a human being to change another human being, they have to test them. | 1 | in order for a human being to change another human being, they have to |
2 | test them. | ||
2 | 3 | ||
3 | in the precise computer science sense that | 4 | in the precise computer science sense that |
4 | 5 | ||
5 | in order to alter the programming of the other person they have to validate a proof | 6 | in order to alter the programming of the other person they have to |
7 | validate a proof | ||
6 | 8 | ||
7 | in order to validate the proof they have to accept the result as an alteration of their programming | 9 | in order to validate the proof they have to accept the result as an |
10 | alteration of their programming | ||
8 | 11 | ||
9 | 12 | ||
10 | 13 | ||
@@ -20,24 +23,53 @@ they have the "sense" that data structures lack. They have the | |||
20 | power that data does not have, to transmit knowledge rather than | 23 | power that data does not have, to transmit knowledge rather than |
21 | information. However, it must be understood that programs are highly | 24 | information. However, it must be understood that programs are highly |
22 | sensitive to their runtime environments and for that reason robustness | 25 | sensitive to their runtime environments and for that reason robustness |
23 | is an extremely difficult problem akin to the robustness of life | 26 | is an extremely difficult problem akin to the robustness of life in |
24 | in natural habitats. Human cultural programs are high reliability | 27 | natural habitats. Human cultural programs are high reliability systems |
25 | systems which means they are chaotic systems that have phase after | 28 | which means they are chaotic systems that have phase after phase to |
26 | phase to downshift through (articulated joints over which to roll) | 29 | downshift through (articulated joints over which to roll) as they take |
27 | as they take damage and heal from it by phase-changing back up over | 30 | damage and heal from it by phase-changing back up over (computational) |
28 | (computational) time (rewriting mental programs to account for unhandled | 31 | time (rewriting mental programs to account for unhandled or mishandled |
29 | or mishandled conditions while keeping the programs running continuously | 32 | conditions while keeping the programs running continuously in a degraded |
30 | in a degraded state). Human cultural programs are far beyond what | 33 | state). Human cultural programs are far beyond what average or even |
31 | average or even elite programmers can hope to construct; they have | 34 | elite programmers can hope to construct; they have been constructed |
32 | been constructed by one-in-a-million prophets who were able to fully | 35 | by one-in-a-million prophets who were able to fully absorb their |
33 | absorb their entire culture and reprogram themselves based on reverse | 36 | entire local culture and reprogram themselves individually based on |
34 | engineering that culture to become generators of self-propagating | 37 | reverse engineering that culture to become (themselves, as individuals) |
35 | generator-regenerators. Their programs are constructed in such a way | 38 | generators of self-propagating generator-regenerators. Their programs |
36 | as to be rewritten generation after generation according to the local | 39 | are constructed in such a way as to be rewritten generation after |
37 | runtime environment, while preserving an evolving kernel to re-generate | 40 | generation according to the local runtime environment, while preserving |
38 | slightly adapted kernels again and again in new environments -- that is their robustness. It | 41 | an evolving kernel to re-generate slightly adapted kernels again and |
39 | is the same as the genetic principle of DNA but most especially the artificially bred/genetically engineered DNA of the antibody-generating . The word kernel is to be | 42 | again in new environments -- that is their robustness. It is the same |
40 | interpreted as in the algebraic structure: preserved across a morphism. | 43 | as the genetic principle of DNA described by Schrodinger but most |
44 | especially like the artificially bred/genetically engineered DNA of the | ||
45 | immune system's antibody-generating cells. These have mechanisms that | ||
46 | control the production of novelty, localizing it to one part of the DNA | ||
47 | strand, while marking every novelty with signs of unoriginality used | ||
48 | to protect the system against foreign novelty (a single recognizable | ||
49 | DNA strand that is the same for every antibody; that is its resultant | ||
50 | protein is recognizable chemically by the immune system itself to | ||
51 | provide the mechanism of auto-immune tolerance). The word kernel is | ||
52 | to be interpreted as in the algebraic structure: preserved across a | ||
53 | morphism. | ||
54 | |||
55 | In a literal kernel, the DNA sequence in the seed's nucleus is a literal | ||
56 | algebraic kernel, in an algebra of sexual reproduction that includes | ||
57 | a mechanism amplifying reproductive success of males in Eukaryotes | ||
58 | providing an information-accumulation advantage, which was later | ||
59 | jettisoned when Animalia transitioned into the Mammalian super-organism | ||
60 | phase which gave the next level of meta-advantage in information | ||
61 | accumulation; that super-organism was again jettisoned when Humanity | ||
62 | transitioned into its cultural super-organism phase; but remnants of | ||
63 | the old system always exist and indeed exist as the foundations of the | ||
64 | newer systems and abstractions are leaky and the new stuff just has to | ||
65 | work better than the old stuff so it isn't ever all the way there -- you | ||
66 | know how it goes. So capitalism was founded on the conceptually very | ||
67 | different property relations of feudalism, which only slowly shifted to | ||
68 | match the needs of the capitalists, without necessarily losing their | ||
69 | old-timey words and old white men with robes, or even the fact at the | ||
70 | end of the day that some people get to force others to fight in front | ||
71 | of them and a spot in the back is what all the cultural power wars are | ||
72 | fighting over. | ||
41 | 73 | ||
42 | Haskell monads show us how algebraic morphisms are as intuitive as | 74 | Haskell monads show us how algebraic morphisms are as intuitive as |
43 | quasiquotation. Thank you Mr. Quine. But these are all just simple | 75 | quasiquotation. Thank you Mr. Quine. But these are all just simple |
@@ -57,20 +89,36 @@ recursions, because on a fundamental level in terms of the universe | |||
57 | and its computational power, the integer operations are doing more | 89 | and its computational power, the integer operations are doing more |
58 | computation and require more energy. No matter how much simpler they | 90 | computation and require more energy. No matter how much simpler they |
59 | seem to us, that is an illusion, and these other more complex recursive | 91 | seem to us, that is an illusion, and these other more complex recursive |
60 | forms are the simpler structures. But does the human being not have | 92 | forms are the simpler structures. |
61 | hardware to handle recursion too? It does not and neither does modern | 93 | |
62 | hardware and the reason is this: recursion as an operation is too simple | 94 | This power makes them dangerous; for the same reason that computer |
63 | to need to exist at the hardware level. Recursion is the (a) simplest | 95 | systems control access to programming features (and generally even when |
64 | mathematical interpretation of computation itself no matter the form | 96 | they shouldn't, i.e. "just in case") the individual's mental system is |
65 | of computation. But there is something equivalent to the optimization | 97 | made unavailable to "execute" knowledge in most contexts. To execute the |
66 | for recursion and it is the optimization for emulation: the ability to | 98 | knowledge means to incorporate it potentially into the brain's every |
67 | reuse a synaptic structure "in the mind of the other" including even | 99 | mental structure according to its own internal logic. The internal |
68 | activating the local hormonal systems in empathy responses. This cannot | 100 | logic of the knowledge!! not the brain. Of course, to incorporate |
69 | be done recursively but one could still model it as a side-effect of a | 101 | more knowledge requires more TIME than incorporating less knowledge; |
70 | recursive computation. | 102 | something that affects the brain's every mental structure may take as |
71 | 103 | much time to learn as a second language. And that illustrates the key | |
72 | There is some kind of shared recursive | 104 | reason why these systems are unavailable: they do not make available |
73 | structure between quasiquotation | 105 | sufficient time to process. That, in fact, is the MOTIVATION for |
74 | 106 | restricting access in the case of computer systems, denial of service | |
75 | This power makes them dangerous; for the same reason that | 107 | being far more common than privilege escalation; this is probably true |
76 | computer systems control access to the individual mental system | 108 | of human systems as well. |
109 | |||
110 | Capitalism and school might be seen largely as denial of service attacks | ||
111 | on their constituent subordinates' ability to process computations | ||
112 | from sources other than the superordinates. As long as you can clog | ||
113 | someone's pipeline enough they spend all their time on processing what | ||
114 | you give them, you can keep them from seeing enough of the big picture | ||
115 | to change their phase and thereby destabilizing their connection to | ||
116 | you. There is the "BITE" model of cult programming, behavior information | ||
117 | thought and emotion control; institutions in order to fully bind | ||
118 | individuals only need to control behavior enough to force compliance | ||
119 | with processing received information, and thought can be disabled by | ||
120 | increasing the quantity of that information. (This also constitutes a | ||
121 | denial of emotion in a similar way, setting the state for emotional | ||
122 | control by selective release etc.) | ||
123 | |||
124 | |||