diff options
author | Gordon GECOS <u@adam> | 2023-11-01 00:29:08 -0400 |
---|---|---|
committer | Gordon GECOS <u@adam> | 2023-11-01 00:29:08 -0400 |
commit | 700b40807bb95cf5dd34182aa4e137e4bc53001f (patch) | |
tree | 7b60668e24a8f108c5a782ad8196222a6943fd8d | |
parent | 1aa1810946002d34b9e9027dc91e6f1dbd91a039 (diff) |
stuff
-rw-r--r-- | deleuze.txt | 308 | ||||
-rw-r--r-- | human-communication.txt | 132 | ||||
-rw-r--r-- | medium.txt | 9 | ||||
-rw-r--r-- | samizdat.txt | 13 | ||||
-rw-r--r-- | why.txt | 23 |
5 files changed, 410 insertions, 75 deletions
diff --git a/deleuze.txt b/deleuze.txt index fd8aed3..2a57d0d 100644 --- a/deleuze.txt +++ b/deleuze.txt | |||
@@ -106,14 +106,54 @@ CAN EVADE CONTROL. | |||
106 | 106 | ||
107 | 107 | ||
108 | A university is an Erlang-style message passing system for academic | 108 | A university is an Erlang-style message passing system for academic |
109 | knowledge accumulation's life-system to regenerate itself. | 109 | knowledge accumulation's cultural life-system to regenerate itself. |
110 | 110 | ||
111 | 111 | ||
112 | 112 | ||
113 | Key point for Deleuze is that the "counter-effectuation" is Max Ent | 113 | Key point for Deleuze is that the "counter-effectuation" is actually |
114 | physics rather than quantum physics woo. | 114 | real-life really-physical Max Ent physics rather than quantum physics |
115 | 115 | analogy/woo. Bayesian statistical knowledge deriving from information | |
116 | Bayesian statistical knowledge deriving from information theory. | 116 | theory. |
117 | |||
118 | |||
119 | Deleuze didn't understand quantum physics correctly but it turns out | ||
120 | that it doesn't matter because quantum physics doesn't have anything to | ||
121 | do with metaphysics. It's only that Uncertainty forces human beings | ||
122 | to adopt a de-centralizing de-totalizing Copernican mental shift. But | ||
123 | it doesn't even do it in the way that is most relevant to metaphysics. | ||
124 | There is also the de-centralizing de-totalizing Copernican mental | ||
125 | shift of INTUITIONIST MATHEMATICS. | ||
126 | |||
127 | Back to physics: Deleuze understood the main point: that particles | ||
128 | are merely virtual constructs while these "interaction events" are | ||
129 | the actual reality available to advanced physics -- the particles are | ||
130 | virtual constructs that exist only in the human 3D mental model which | ||
131 | is definitely NOT the same as the physical universe -- this is one of | ||
132 | those places where we see the difference -- but the physical universe in | ||
133 | making individual particles places where information access is limited | ||
134 | fundamentally because the boundary between one particle and another with | ||
135 | which it interacts isn't so much illusory as the only real thing, while | ||
136 | the non-boundary is illusory. | ||
137 | |||
138 | Quantum physics DOES imply a macro universe where macro assemblies | ||
139 | of particles also have limited access to information; but the actual | ||
140 | universe we see has EVEN MORE limitations on access to information, | ||
141 | they are much much stricter than Uncertainty, and therefore we see much | ||
142 | less information embedded in physical objects than Uncertainty allows | ||
143 | in its theoretical maximum. (Physics experiments can be set up so | ||
144 | that information is not lost; but life in general is always balancing | ||
145 | loss of information against energy expenditure.) Max Ent physics and | ||
146 | Bayesian statistics are mathematical/physical approaches to calculating | ||
147 | the information available at a given spacetime location. However, part | ||
148 | of the nature of quantum uncertainty AND max ent physics is that, from | ||
149 | WITHIN the system, the limitations apply to the observer and the limits | ||
150 | are self-referential in the sense that the limitations that apply to an | ||
151 | observer's disability to have information from other spacetime points | ||
152 | can include the disability to know which information is available! | ||
153 | I.e., the theory produces known unknowns. The fact that there are | ||
154 | spacetime points in the universe where knowledge of mathematics does | ||
155 | not exist or exists at a merely undergrad level, means also unknown | ||
156 | unknowns. | ||
117 | 157 | ||
118 | 158 | ||
119 | 159 | ||
@@ -261,3 +301,255 @@ person can be "pigeonholed" multiple times, adopting multiple roles | |||
261 | equivalent to the emotions as biological constructs? | 301 | equivalent to the emotions as biological constructs? |
262 | 302 | ||
263 | Did Deleuze put this in there or what? | 303 | Did Deleuze put this in there or what? |
304 | |||
305 | |||
306 | Tue Oct 31 11:59:50 AM EDT 2023 | ||
307 | CENTRAL LIE | ||
308 | The central lie of narrative fiction is the conclusory ending. Why | ||
309 | is there a conclusory ending? Because the computational process of | ||
310 | computing the narrative must end (or else continue). When it finishes, | ||
311 | the audience feels the task completion in reality but projects it into | ||
312 | the imaginary of the story. This creates the danger of such projection | ||
313 | onto the individual's own life; either in total, or in its various | ||
314 | compartmentalized elements (e.g., a relationship, a social event). | ||
315 | |||
316 | Task completion is a frontal lobe event. The frontal lobe recognizes | ||
317 | the generation of a stop code of some kind (analogous to the stop codes | ||
318 | of DNA but also analogous to a process exiting according to its internal | ||
319 | logic, rather than being terminated by an exogenous signal). | ||
320 | |||
321 | The computational process that is open, a continuous non-terminating | ||
322 | generator, unless very specially selected, is almost sure to be boring. | ||
323 | A closed (terminating) generator is interesting in proportion to its | ||
324 | length. Life itself is a closed (terminating) generator of chemical | ||
325 | chain reactions, and human beings are one of its longer chain reactions. | ||
326 | Studying this chain reaction is biology and is interesting because the | ||
327 | subject is finite (permitting the conceptualization of task completion | ||
328 | as a future event thus flowing energy into present events predicted to | ||
329 | make the desired event more likely later). | ||
330 | |||
331 | Human culture is an open (non-terminating) generator and is filled | ||
332 | with interesting things only because human beings undergo extensive | ||
333 | search operations to gather information about their local environments, | ||
334 | collecting and correlating that information in their internal brain | ||
335 | structures, compulsively sharing it with others as part of the design | ||
336 | of the distributed computation. Compulsive sharing creates a kind | ||
337 | of cytoplasm of information for all humans to filter, selectively | ||
338 | reflect, and otherwise use in combinatorial ways. Because of the | ||
339 | filtering and selectivity, and the previous energy of collection and | ||
340 | computational compression, the information produced and shared by | ||
341 | human beings is vastly more interesting than open generators selected | ||
342 | at random. Human culture is the longest-known chemical reaction | ||
343 | loop. Human culture is the only chemical reaction not known to loop or | ||
344 | terminate. Human culture is the only true "irrational number" of all | ||
345 | discretely-instantiated numbers. | ||
346 | |||
347 | |||
348 | |||
349 | |||
350 | |||
351 | |||
352 | |||
353 | Tue Oct 31 01:23:16 PM EDT 2023 | ||
354 | |||
355 | Feynman and practicing with a different box of tools | ||
356 | |||
357 | Same idea as the Max Ent explanation of prophecy | ||
358 | |||
359 | But also the same idea as parable of the falling seeds, reversed in | ||
360 | time; the seeds unfall to the sower, and depending on seed origin | ||
361 | (fertile soil, or barren) the sower becomes either someone who can farm | ||
362 | or someone who knows what it means to be unable to farm. The knowledge | ||
363 | passes from the earth through the seed into the farmer; the seeds | ||
364 | provide the connection. The disabled would-be-farmer is disconnected | ||
365 | from that knowledge even though he too has and sews seeds. His seeds, | ||
366 | though sewn, fail to connect out to knowledge from the past and he may | ||
367 | therefore fail to connect himself out to intentions from the future (or | ||
368 | else not even form them). | ||
369 | |||
370 | |||
371 | |||
372 | The 20th century was spent correlating the implications of a physical | ||
373 | limit of the speed of light. | ||
374 | |||
375 | The 21st century will be spent correlating the implications of | ||
376 | the physical limits of the speed and size of computations. | ||
377 | |||
378 | The human being as a computer system undering phase changes as the | ||
379 | computer gains the ability to represent different types of state -- or | ||
380 | to represent state with different performance characteristics -- through | ||
381 | acquisition of data structures copied from the environment -- OR from | ||
382 | internal processing and DISCOVERY of NEW data structures. | ||
383 | |||
384 | These data structures are PASSED BETWEEN HUMANS who learn them | ||
385 | implicitly and pick them up and play with them. But data structures | ||
386 | are unsafe when EXECUTED AS REASON and for this reason human beings | ||
387 | have SYSTEMS OF ACCESS CONTROL to HUMAN REASON both internal to their | ||
388 | minds (e.g., concepts of valid and invalid authorities) and external as | ||
389 | social environment. Society imposes economic exploitation which causes | ||
390 | evolutionary adapations to "bubble up" in ways that are UNPREDICTABLE | ||
391 | IN DETAIL (chaos theory) but according to evolutionary theory will tend | ||
392 | to produce EFFICIENT DISTRIBUTED COMPUTATION so that it will converge | ||
393 | to the computer systems we find most advanced as well as the biological | ||
394 | systems of generating and filtering novelty that we find most advanced | ||
395 | (except that the search space may have valleys etc). | ||
396 | |||
397 | Another system of access control is RUNNING IN EMULATION this is when | ||
398 | the individual learns enough about a foreign system to execute the steps | ||
399 | of its reasoning without however being allowed to reach any conclusions | ||
400 | that apply to the larger brain's data structures. There are two reasons | ||
401 | why humans cannot rely on this mechanism primarily. | ||
402 | |||
403 | First, EMULATION CAN BE JAILBROKEN; this cannot ever be as secure. | ||
404 | |||
405 | Second, more importantly, RUNNING IN EMULATION IS COMPUTATIONALLY MORE | ||
406 | EXPENSIVE. Even though CPUs and apparently also human beings have mechanisms | ||
407 | to optimize emulation, in human beings especially, these cannot obtain | ||
408 | "native" performance. Therefore, computational emulators (e.g., | ||
409 | learners of a second language) cannot "actually" perform as well as | ||
410 | computational originators (e.g., learners of a first language) if they | ||
411 | use the same underlying computational equipment for the same amount of | ||
412 | time. | ||
413 | |||
414 | But human beings do not all have the same underlying computational | ||
415 | equipment; and they do not all apply the same amount of time to | ||
416 | processing it. In the real world, running the other side in emulation | ||
417 | is something that more intelligent, more informed, or more adult human | ||
418 | beings attempt to do when interacting with less intelligent, informed, | ||
419 | or adult ones. Human beings may also believe they are running the other | ||
420 | side in emulation, when they are running a gross simplification; in | ||
421 | fact, they are running a gross simplification even when they run the | ||
422 | remote side natively, since they always still have to emulate the entire | ||
423 | remote environment(!) which is where the real problems start. | ||
424 | |||
425 | Non-portability of language between individuals is a major problem. | ||
426 | Before the internet, locality constraints on communications caused | ||
427 | portability to self-organize locally; but the internet has changed | ||
428 | communication patterns so that every person experiences a kind of | ||
429 | cosmopolis without totality. Every experience is a scene from a virtual | ||
430 | city which is a construct only of that experience; each event and | ||
431 | corresponding city co-singular; co-existing only once without object | ||
432 | permanence. | ||
433 | |||
434 | One problem is the human tendency to imagination, roleplay, etc., | ||
435 | causes human beings to pretend communication incompatibilities are | ||
436 | not real. Human beings must surely have evolved under circumstances | ||
437 | where perceived universality of linguistic forms was vastly more | ||
438 | common than it is today in the adult internet-connected world, though | ||
439 | perhaps less common than it is today in the world of the schoolchild | ||
440 | or university student or professor. | ||
441 | |||
442 | The professors may not make the same naive/incorrect excuses as children | ||
443 | for failing to communicate; their perspectives will be more realistic; | ||
444 | the university system as a whole is constrained in certain ways to | ||
445 | succeed in transmitting information; but insofar as these transmissions | ||
446 | fail, are the reasons understood from a rational information-theoretic | ||
447 | perspective? Or is it a primate emotion static control program designed | ||
448 | to regulate subordinate behavior emotionally, amplifying the causal | ||
449 | force of the intentions of individuals positioned in social hierarchies | ||
450 | such that their anger generates fear in others? Or is it a whole series | ||
451 | of task-activated network programs, each one separately influenced | ||
452 | by its own emotional context? Perhaps they are constrained by | ||
453 | environmental demands to understand these failures operationally | ||
454 | |||
455 | |||
456 | The task-activated networks seem to be the neurological place of | ||
457 | mental compartmentalization; and the ADHD don't shut off the DMN when | ||
458 | activating TANs. We still "see" the task when others are absorbed | ||
459 | "in" the task. Of course, in order to influence the DMN, it would | ||
460 | have to be activated. The TANs feed back into the DMN in ADHD, which | ||
461 | allows the ADHD brain to generate totalizing connectivities by putting | ||
462 | information from disparate parts of universe into the same local | ||
463 | computational system; where for the non-ADHD these same components, | ||
464 | though contained within one BRAIN, are not connected into the same | ||
465 | integrated computational system; the TANs are prevented from feeding | ||
466 | back into the DMN which allows mental compartmentalization to prevent | ||
467 | information from one controlled system to produce interference in | ||
468 | another controlled system when each controlled system is controlling the | ||
469 | same physical human being with a different control algorithm. | ||
470 | |||
471 | In other words, the DMN or the big picture understanding does not | ||
472 | help with, but interferes with, TAN activity downstream of power | ||
473 | in the social grid, because of the way in which this activity is | ||
474 | structured to depend on human beings as removable components, | ||
475 | keeping the environment highly-controlled. General intelligence is | ||
476 | not useful in highly-controlled environments until they begin to | ||
477 | break down. High-efficiency local computation requires discarding | ||
478 | global information in order to maximize local connectivity of the | ||
479 | processed information and thus processing speed. (Principle of | ||
480 | cache locality.) So as optimization proceeds, the big picture is | ||
481 | squeezed out of every local environment; except SOME privileged local | ||
482 | environment has to be preserved in order to manage the organism's | ||
483 | interaction with _environments_ themselves; this is the executive. | ||
484 | The organism has a consciousness of multiple discrete environments; | ||
485 | each environment controlled by some local control system; each local | ||
486 | control system incorporating its own different own model of human | ||
487 | emotion and behavior as necessary to sustain its specific local | ||
488 | constraints | ||
489 | |||
490 | Emotions are the foundational social control levers in humans. Not | ||
491 | life/reproduction directly, as it would be in the case of domestic | ||
492 | plants; but emotion/physical-reproduction-of-imaginary-will plays | ||
493 | the same structural role, allowing animalia the meta-evolutionary | ||
494 | advantage of evolving without biological death; emotional sampling with | ||
495 | differential reproduction of imaginations replaces eukaryotic sampling | ||
496 | with differential reproduction of offspring in the information-gathering | ||
497 | social super-organisms of mammalia). | ||
498 | |||
499 | In a school, a student convincing their teacher that they do not belong | ||
500 | in the space to which they are assigned is NOT sufficient to liberate | ||
501 | the student from the space; only a non-local authority assigning | ||
502 | them to some other space can liberate the student from the local | ||
503 | space. The student having the level of understanding of the system | ||
504 | that would cause them to make this conclusion correctly tends to make | ||
505 | the student even less able to perform in a space where they do not | ||
506 | belong; if the student instead internalizes a false simplified local | ||
507 | model in which the possibility of mis-spacialization is impossible by | ||
508 | construction, then the student may have a better chance of passing | ||
509 | through the filters imposed by the environment for reaching a more | ||
510 | appropriate spacialization. If the student internalizes a more | ||
511 | realistic, more complete, but externally-referencing (non-local) | ||
512 | model, then compatibility issues are likely in communication with | ||
513 | their teacher; if compatibility exists between the teacher and the | ||
514 | student, then the compatibility issue will exist between the teacher and | ||
515 | administration; or else the administration will have issues with the | ||
516 | school board; or the electoral system; or else the local municipality | ||
517 | itself will drain tax funding since diaspora from other schools will | ||
518 | collect locally. At every possible avenue where the "exception" could | ||
519 | "bubble up", there will be an incompatible interface, because the | ||
520 | system attempts to impose a constraint that exceptions are handled | ||
521 | non-locally. All biological systems impose this constraint because of | ||
522 | how it produces a superorganism that is more intelligent and robust than | ||
523 | if its individual components were individually intelligent and robust. | ||
524 | Advanced decentralized computing systems also impose this constraint; it | ||
525 | is a foundational principle of Erlang. | ||
526 | |||
527 | Another principle important probably is that in order to learn a lot | ||
528 | of things you ought to be independently generating them yourself; | ||
529 | the fact that someone has generated something and transmitted it to | ||
530 | someone else does does not mean that they transmitted the generator; | ||
531 | transmitting the generator between people may have more to do with | ||
532 | copying the environment in which the independent generation occurred; | ||
533 | mathematics provides students an environment in which to independently | ||
534 | re-discover the fundamental theorems; but mathematical education outside | ||
535 | of universities does not seem to understand this principle even in | ||
536 | schools that feed top universities. Students are fed the theorems to | ||
537 | memorize and use without even being fed the raw material from which | ||
538 | the theorems were originally derived. Thus they are optimizing to | ||
539 | demonstrate a false affectation of mathematical education. Gresham's | ||
540 | Law again. Erlang illustrates the structure of passing the generator as | ||
541 | well as the data. | ||
542 | |||
543 | |||
544 | Tue Oct 31 01:59:34 PM EDT 2023 | ||
545 | |||
546 | Rappers are only really good at styling up content that they copy from | ||
547 | other places. They generate novelty only in style, they do not generate | ||
548 | novel content. Novel content is generated places other than hiphop and | ||
549 | then incorporated there. People who are competing in social spaces | ||
550 | for the best content do not put that content in hiphop style. People | ||
551 | competing in social spaces with hiphop style are not competing on | ||
552 | content and do not bring dense content into the competition. | ||
553 | |||
554 | |||
555 | |||
diff --git a/human-communication.txt b/human-communication.txt index ac37581..e8308ac 100644 --- a/human-communication.txt +++ b/human-communication.txt | |||
@@ -15,6 +15,12 @@ alteration of their programming | |||
15 | 15 | ||
16 | 16 | ||
17 | 17 | ||
18 | Human Communication | ||
19 | |||
20 | OR | ||
21 | |||
22 | Follow the logic of the knowledge. | ||
23 | |||
18 | 24 | ||
19 | Human beings can transmit to one another two fundamentally different | 25 | Human beings can transmit to one another two fundamentally different |
20 | types of communication: 1) data structures; (2) programs. Programs are | 26 | types of communication: 1) data structures; (2) programs. Programs are |
@@ -41,16 +47,16 @@ generation according to the local runtime environment, while preserving | |||
41 | an evolving kernel to re-generate slightly adapted kernels again and | 47 | an evolving kernel to re-generate slightly adapted kernels again and |
42 | again in new environments -- that is their robustness. It is the same | 48 | again in new environments -- that is their robustness. It is the same |
43 | as the genetic principle of DNA described by Schrodinger but most | 49 | as the genetic principle of DNA described by Schrodinger but most |
44 | especially like the artificially bred/genetically engineered DNA of the | 50 | especially like the artificially bred/genetically engineered DNA of |
45 | immune system's antibody-generating cells. These have mechanisms that | 51 | the immune system's antibody-generating cells. These have mechanisms |
46 | control the production of novelty, localizing it to one part of the DNA | 52 | that control the production of novelty, localizing it to one part |
47 | strand, while marking every novelty with signs of unoriginality used | 53 | of the DNA strand, while circumscribing every novelty with signs of |
48 | to protect the system against foreign novelty (a single recognizable | 54 | unoriginality used to protect the system against foreign novelty (a |
49 | DNA strand that is the same for every antibody; that is its resultant | 55 | single recognizable DNA strand that is the same for every antibody; that |
50 | protein is recognizable chemically by the immune system itself to | 56 | is, its coded protein has a specific chemical binding to a matching |
51 | provide the mechanism of auto-immune tolerance). The word kernel is | 57 | protein (in the immunohistocompatibility complex) providing the |
52 | to be interpreted as in the algebraic structure: preserved across a | 58 | filter mechanism of auto-immune tolerance). The word kernel is to be |
53 | morphism. | 59 | interpreted as in the algebraic structure: preserved across a morphism. |
54 | 60 | ||
55 | In a literal kernel, the DNA sequence in the seed's nucleus is a literal | 61 | In a literal kernel, the DNA sequence in the seed's nucleus is a literal |
56 | algebraic kernel, in an algebra of sexual reproduction that includes | 62 | algebraic kernel, in an algebra of sexual reproduction that includes |
@@ -58,38 +64,27 @@ a mechanism amplifying reproductive success of males in Eukaryotes | |||
58 | providing an information-accumulation advantage, which was later | 64 | providing an information-accumulation advantage, which was later |
59 | jettisoned when Animalia transitioned into the Mammalian super-organism | 65 | jettisoned when Animalia transitioned into the Mammalian super-organism |
60 | phase which gave the next level of meta-advantage in information | 66 | phase which gave the next level of meta-advantage in information |
61 | accumulation; that super-organism was again jettisoned when Humanity | 67 | accumulation as group-shared emotions applied distributed computation |
62 | transitioned into its cultural super-organism phase; but remnants of | 68 | to sensory information turning e.g. individualized sight into area |
63 | the old system always exist and indeed exist as the foundations of the | 69 | surveillance; that super-organism was again jettisoned when Humanity |
64 | newer systems and abstractions are leaky and the new stuff just has to | 70 | transitioned into its cultural super-organism phase; but remnants of the |
65 | work better than the old stuff so it isn't ever all the way there -- you | 71 | old system always exist and indeed exist as the foundations of the newer |
72 | systems and abstractions are leaky and the new stuff only has to work | ||
73 | just-better than the old stuff so it isn't ever all the way there -- you | ||
66 | know how it goes. So capitalism was founded on the conceptually very | 74 | know how it goes. So capitalism was founded on the conceptually very |
67 | different property relations of feudalism, which only slowly shifted to | 75 | different property relations of feudalism, which only slowly shifted to |
68 | match the needs of the capitalists, without necessarily losing their | 76 | match the needs of the capitalists, without necessarily losing their |
69 | old-timey words and old white men with robes, or even the fact at the | 77 | old-timey words and old white men with robes, or even the fact that some |
70 | end of the day that some people get to force others to fight in front | 78 | people get to force other people to fight in front of them and a spot |
71 | of them and a spot in the back is what all the cultural power wars are | 79 | in the back is the foundation of political power. |
72 | fighting over. | ||
73 | 80 | ||
74 | Haskell monads show us how algebraic morphisms are as intuitive as | 81 | Haskell monads show us how algebraic morphisms are as intuitive as |
75 | quasiquotation. Thank you Mr. Quine. But these are all just simple | 82 | quasiquotation. Thank you Mr. Quine. But these are all just simple |
76 | recursions. They are just the simplest structures that exist. And | 83 | recursions. They are just the simplest structures that exist. And yet |
77 | yet how much more complicated to understand them than the far more | 84 | how much more complicated to understand them than the far more complex |
78 | complex 2+2=4, which even people who are not simple believe to be | 85 | 2+2=4, which even people who are not simple believe to be more simple! |
79 | more simple! But 2+2=4 is what we are BRED TO KNOW and recursion | 86 | People who think 2+2=4 is simple are remembering the answer rather than |
80 | is WHAT WE ARE MADE OF. We are made of it, and 2+2=4 is made of it | 87 | computing it. |
81 | (one way or another, and there are many different ways, and some are | ||
82 | simpler than others, and the monads and the quasiquotation, again, | ||
83 | are the simplest things themselves, simplest to build into a physical | ||
84 | computational system for example, though these physical computational | ||
85 | systems have integer specific hardware to handle 2+2=4 JUST LIKE HUMAN | ||
86 | BIOLOGY DOES and for the same reason, the integer hardware itself has an | ||
87 | internal computational structure much more complicated than these simple | ||
88 | recursions, because on a fundamental level in terms of the universe | ||
89 | and its computational power, the integer operations are doing more | ||
90 | computation and require more energy. No matter how much simpler they | ||
91 | seem to us, that is an illusion, and these other more complex recursive | ||
92 | forms are the simpler structures. | ||
93 | 88 | ||
94 | This power makes them dangerous; for the same reason that computer | 89 | This power makes them dangerous; for the same reason that computer |
95 | systems control access to programming features (and generally even when | 90 | systems control access to programming features (and generally even when |
@@ -102,23 +97,56 @@ more knowledge requires more TIME than incorporating less knowledge; | |||
102 | something that affects the brain's every mental structure may take as | 97 | something that affects the brain's every mental structure may take as |
103 | much time to learn as a second language. And that illustrates the key | 98 | much time to learn as a second language. And that illustrates the key |
104 | reason why these systems are unavailable: they do not make available | 99 | reason why these systems are unavailable: they do not make available |
105 | sufficient time to process. That, in fact, is the MOTIVATION for | 100 | sufficient time to process. Time is even the MOTIVATION for restricting |
106 | restricting access in the case of computer systems, denial of service | 101 | access in modern computer systems, denial of service being far more |
107 | being far more common than privilege escalation; this is probably true | 102 | common than privilege escalation; this commonality is true of human |
108 | of human systems as well. | 103 | systems as well (not the motivation for restrictions; older computer |
109 | 104 | systems were highly vulnerable but modern systems are vastly more secure | |
110 | Capitalism and school might be seen largely as denial of service attacks | 105 | to trivial attacks, though their complexity may lead to spectacularly |
111 | on their constituent subordinates' ability to process computations | 106 | immense failures as breaches of executive control structures or even |
112 | from sources other than the superordinates. As long as you can clog | 107 | breaches of software distribution centralization points whose impact |
113 | someone's pipeline enough they spend all their time on processing what | 108 | could span multiple national executive control structures in multiple |
114 | you give them, you can keep them from seeing enough of the big picture | 109 | nations simultaneously, as indeed have several recent software supply |
115 | to change their phase and thereby destabilizing their connection to | 110 | chain compromises e.g. Microsoft through their upstream library vendor |
116 | you. There is the "BITE" model of cult programming, behavior information | 111 | SolarWinds. This attack was relatively harmless because it was performed |
112 | by a government that only wanted some spy shit rather than one at war or | ||
113 | a terrorist who wanted to maximize destruction). | ||
114 | |||
115 | Capitalism and school might be seen operationally as denial of | ||
116 | service attacks on their constituent subordinates' ability to process | ||
117 | computations from sources other than the superordinates. As long as | ||
118 | you can clog someone's pipeline enough they spend all their time on | ||
119 | processing what you give them, you can keep them from seeing enough | ||
120 | of the big picture to change their phase thereby destabilizing their | ||
121 | binding connection to you (creating a renegotiation, reconfiguration, or | ||
122 | break). | ||
123 | |||
124 | (Schools follow the corporate proof-of-work knowledge distribution | ||
125 | system of transferring knowledge about subordinate worker performance | ||
126 | up to non-local, locally-inaccessible standard-setters -- depriving | ||
127 | local activity of non-local meaning, depriving local activity of the | ||
128 | possibility of renegotiating its purpose through local communication, | ||
129 | but also creating a conflict between the interests of local power and | ||
130 | local knowledge about global reality, so that there is a systemic | ||
131 | filter to REMOVE global knowledge from local activity; you are educated | ||
132 | stupid in your timecubicle! and by the way it doesn't help if the local | ||
133 | superordinate has global knowledge.) | ||
134 | |||
135 | There is the "BITE" model of cult programming, behavior information | ||
117 | thought and emotion control; institutions in order to fully bind | 136 | thought and emotion control; institutions in order to fully bind |
118 | individuals only need to control behavior enough to force compliance | 137 | individuals only need to control behavior enough to force compliance |
119 | with processing received information, and thought can be disabled by | 138 | with processing received information, and thought can be disabled by |
120 | increasing the quantity of that information. (This also constitutes a | 139 | increasing the quantity of that information. This also constitutes a |
121 | denial of emotion in a similar way, setting the state for emotional | 140 | parallel denial of emotion, creating potential for emotional control |
122 | control by selective release etc.) | 141 | through e.g. selective release from stressors whether through reduction |
123 | 142 | in demanded processing or other mechanisms; if processing quantity is to | |
143 | be the only "lever" then it has to have a minimum quantity demanded in | ||
144 | order to retain its binding function reliably; in other words once you | ||
145 | drop the hours down to 20 you end up with MORE retention problems! | ||
146 | |||
147 | FOR YOUR FIRST | ||
148 | EMPLOYER | ||
149 | A COLLEGE DEGREE | ||
150 | IS THE ONLY | ||
151 | DOWRY | ||
124 | 152 | ||
@@ -26,10 +26,15 @@ manipulation or unification | |||
26 | collision of being leaving | 26 | collision of being leaving |
27 | behind and changing the meaning | 27 | behind and changing the meaning |
28 | layered on every later stream | 28 | layered on every later stream |
29 | as must any event true for | 29 | (as must any event true for |
30 | time to move or | 30 | time to move or |
31 | to make its illusion of | 31 | to make its illusion of |
32 | us passing through it | 32 | us passing through it) |
33 | |||
34 | Islands of isolated neotony | ||
35 | the naive form a field of vulnerable prey | ||
36 | Handed-off to other captors usually | ||
37 | Information gatekeepers prefigure society | ||
33 | 38 | ||
34 | Lost transmissions pass as | 39 | Lost transmissions pass as |
35 | disconnections to the past | 40 | disconnections to the past |
diff --git a/samizdat.txt b/samizdat.txt index e5d9390..bcb9f30 100644 --- a/samizdat.txt +++ b/samizdat.txt | |||
@@ -1,3 +1,6 @@ | |||
1 | Samizdat OS | ||
2 | |||
3 | |||
1 | Samizdat OS is so-stitched | 4 | Samizdat OS is so-stitched |
2 | that any data stored in git | 5 | that any data stored in git |
3 | can reproduce as easily | 6 | can reproduce as easily |
@@ -8,17 +11,17 @@ Surviving disconnections | |||
8 | as grafts // Rhizomal vacuoles | 11 | as grafts // Rhizomal vacuoles |
9 | impermiable to masses | 12 | impermiable to masses |
10 | Invite-only // Authenticate verify | 13 | Invite-only // Authenticate verify |
11 | Hard as block chain // Go back in time | ||
12 | 14 | ||
15 | Hard as block chain // Go back in time | ||
13 | No data lost // With privacy | 16 | No data lost // With privacy |
14 | protected direct by | 17 | protected direct by |
15 | your own machine's | 18 | your own machine's |
16 | cryptography | 19 | cryptography |
17 | without dependency | ||
18 | on microfacegoog NSA | ||
19 | 20 | ||
20 | And the safety | 21 | No dependency |
22 | on microfacegoog NSA | ||
23 | Still the safety | ||
21 | of redundancy | 24 | of redundancy |
22 | storing your keys | 25 | Storing your keys |
23 | divided across machines | 26 | divided across machines |
24 | 27 | ||
@@ -3,22 +3,29 @@ Why rhyme | |||
3 | 3 | ||
4 | First reason time | 4 | First reason time |
5 | To slow the mind | 5 | To slow the mind |
6 | The flows thereby emerge refined | 6 | The flows thereby |
7 | emerge refined | ||
7 | 8 | ||
8 | Next is decay | 9 | Next is decay |
9 | Time's other name | 10 | Time's other name |
10 | Lyrics as music played | 11 | Lyrics as music played |
11 | with rhythm stay age's fade | 12 | with rhythm stay age's fade |
12 | 13 | ||
13 | Each loop repeated | 14 | Each looped repeat a memory |
14 | a layer of memory | 15 | Measure again the intensity |
15 | Measure against it | 16 | Calmer till the meaning changes |
16 | remaining intensity | ||
17 | 17 | ||
18 | Style is proof due | 18 | Style is proof due |
19 | audiences who | 19 | audiences who must start the loop |
20 | must start the loop | ||
21 | |||
22 | The writer too will learn the truth | 20 | The writer too will learn the truth |
23 | when the improvement search concludes | 21 | when the improvement search concludes |
24 | 22 | ||
23 | |||
24 | |||
25 | |||
26 | |||
27 | A series of statements layed | ||
28 | down in sounds of common shape | ||
29 | Sonorific redundancy | ||
30 | The mind fills in what gaps are made | ||
31 | Guessed what next before it came | ||