summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorGordon GECOS <u@adam>2023-11-10 09:29:55 -0500
committerGordon GECOS <u@adam>2023-11-10 09:29:55 -0500
commitc25d7b4748f31a20abc44d8ecd76f9ba51373368 (patch)
treee5b7b4b84815fc8b01e3341f89fc4bfd320284fe
parent19590d826055299d4856904ba657bffdd1fae676 (diff)
changes
-rw-r--r--human-communication-removals.txt37
-rw-r--r--human-communication.txt293
-rw-r--r--misc.txt265
3 files changed, 451 insertions, 144 deletions
diff --git a/human-communication-removals.txt b/human-communication-removals.txt
new file mode 100644
index 0000000..ae6c9d2
--- /dev/null
+++ b/human-communication-removals.txt
@@ -0,0 +1,37 @@
1[Because knowledge to be "real" or be "live" in the physical
2brain ("known" as opposed to merely "imaginable") it has to
3be a generator of behaviors; which means it has to be a
4physical form that has energy metabolism in order to satisfy
5its computational needs; but of course not its own cell
6membrane; but it does have its own pure-informational forms
7of membranes]
8
9
10
11
12Erlang-style message-passing; such a specialist-y thing and
13yet it's the simplest kind of structure; it must exist in a
14thousand places; there must be a hundred apt analogies;
15culture and human society together form a more robust
16version of the same structure; but it is only one thing and
17that is an algorithm, also known as a program, or a
18communication of the most powerful sort that is possible
19between human beings; and it is one precise algorithm that
20has been mathematically identified, broken down into its
21constituent axioms like a protein into its originating DNA
22code points ("up to isomorphism"... it's such a powerful
23concept...), by the Erlang literature. And the reason for
24all that is that it is the foundation of stability of
25long-running "autophagic" distributed systems; I call them
26"tissue" systems because the cells of a living tissue
27replace themselves similarly.
28
29
30
31
32Like why would you put literal death into the movie what a
33fucking downer, it doesn't help how he ended up unlike
34Michael Jackson where it works -- like Man in the Mirror
35really works now in retrospect. Robin Williams went to
36Julliard which means he was pretty well socially integrated
37doesn't it so maybe those movies sucked for a reason.
diff --git a/human-communication.txt b/human-communication.txt
index fd30b31..1fa2116 100644
--- a/human-communication.txt
+++ b/human-communication.txt
@@ -1,6 +1,4 @@
1Human Communication 1Human Communication or__ Follow the logic of the knowledge
2 or
3Follow the logic of the knowledge
4 2
5 3
6 4
@@ -8,17 +6,10 @@ Human beings can transmit to one another two fundamentally
8different types of communication: (1) data (2) programs. 6different types of communication: (1) data (2) programs.
9Programs are the same thing as proofs and the same thing as 7Programs are the same thing as proofs and the same thing as
10Russellian denotations; they have the "sense" that mere/pure 8Russellian denotations; they have the "sense" that mere/pure
11data lacks. They have the power that data does not have, 9data lacks. They have the power that data does not have, to
12to transmit knowledge rather than information. Information 10transmit knowledge rather than information. Information
13creates knowledge about transmission but cannot transmit 11can /create/ knowledge (about transmission) but does not
14knowledge, because knowledge to be "real" or "live" in the 12/transmit/ knowledge.
15physical brain ("known" as opposed to merely "imaginable";
16it has to be a generator of behaviors; which means it has to
17be a physical form that has energy metabolism in order to
18satisfy its computational needs; but of course not an
19"independent" energy metabolism nor its own cell membrane;
20but it does have its own forms of informational membranes;
21we shall address them.)
22 13
23However, it must be understood that programs are highly 14However, it must be understood that programs are highly
24sensitive to their runtime environments and for that reason 15sensitive to their runtime environments and for that reason
@@ -26,24 +17,25 @@ their robustness is an extremely difficult problem akin to
26the robustness of life in natural habitats. Human cultural 17the robustness of life in natural habitats. Human cultural
27programs are high reliability systems which means they are 18programs are high reliability systems which means they are
28chaotic systems that have phase after phase to downshift 19chaotic systems that have phase after phase to downshift
29through (articulated joints through which to roll over) 20through (articulated joints through which to roll over) as
30as they take damage and heal from it by phase-changing 21they take damage and heal from it by phase-changing back
31back up over (computational) time (rewriting mental 22up over (computational) time (rewriting mental programs
32programs to account for unhandled or mishandled conditions 23to account for unhandled or mishandled conditions while
33while keeping the programs running continuously in a 24keeping the programs running continuously in a degraded
34degraded state). Knock out multiple random chunks, portions 25state). Knock out multiple random chunks, portions of
35of program degenerate into data, and the whole still 26program degenerate into data, and the whole still runs in
36runs. Human cultural programs are far beyond what average or 27the designed way, and will even recover the lost portion
37even elite programmers can hope to construct in computer 28over time. Human cultural programs are far beyond what
38systems; they have been constructed by one-in-a-million 29average or even elite "professional" programmers can hope to
39prophets who were able to fully absorb their entire 30construct in computer systems; they have been constructed
40local culture and reprogram themselves individually 31by one-in-a-million prophets who were able to fully
41based on reverse engineering that culture to become 32absorb their entire local culture and reprogram themselves
42(themselves, as individuals) generators of self-propagating 33individually based on reverse engineering that culture to
43regenerator-generators of universal culture. Their programs 34become (themselves, as individual human beings) generators
44are constructed in such a universal way as to be rewritten 35of self-propagating generators of universal culture. Their
45generation after generation according to the local runtime 36programs are constructed in such a universal way as to be
46environment, while preserving an evolving kernel to 37rewritten generation after generation according to the local
38runtime environment, while preserving an evolving kernel to
47re-generate slightly adapted kernels again and again in new 39re-generate slightly adapted kernels again and again in new
48environments -- in such a way that the kernel picks up each 40environments -- in such a way that the kernel picks up each
49new environment's knowledge and carries it into the next 41new environment's knowledge and carries it into the next
@@ -58,13 +50,13 @@ system's antibody-generating cells. These have mechanisms
58that induce the production of novelty, localizing it to one 50that induce the production of novelty, localizing it to one
59part of the DNA strand, while circumscribing every novelty 51part of the DNA strand, while circumscribing every novelty
60with proof of provenance used to protect the system against 52with proof of provenance used to protect the system against
61foreign novelty (a single recognizable DNA strand that is 53foreign novelty. (A single recognizable DNA strand that is
62the same for every antibody; that is, its coded protein has 54the same for every antibody; that is, its coded protein has
63a strong chemical binding to a matching protein in the 55a strong chemical binding to a matching protein in the
64immunohistocompatibility complex (an FC receptor); called a 56immunohistocompatibility complex (an FC receptor); called a
65transporter, it functions like a passport -- an unforgeable 57transporter, it functions like a passport -- an unforgeable
66signature that must be presented to pass the filter 58signature that must be presented to pass the filter
67mechanism of auto-immune tolerance). The word kernel is to 59mechanism of auto-immune tolerance.) The word kernel is to
68be interpreted as in the algebraic structure: a generator is 60be interpreted as in the algebraic structure: a generator is
69preserved across a morphism. 61preserved across a morphism.
70 62
@@ -88,16 +80,19 @@ thing if you are into analogies YUCK.) That super-organism
88in turn progressively jettisoned as Humanity transitions 80in turn progressively jettisoned as Humanity transitions
89into its cultural message-passing super-organism phase 81into its cultural message-passing super-organism phase
90where all Earth life must survive in symbiotic exchange 82where all Earth life must survive in symbiotic exchange
91with, or as constituent elements of, Earth's unique human 83with, or as constituent elements of, Earth's singular
92biosocial ecomachine originating chronologically before the 84(unique) human/biosocial eco-machine; a phase of biological
93origination of any biological Earth human. (In fact Humanity 85evolution without any fundamental dependence on sampling the
94remains the mammalian substrate but human subjectivity (the 86environment through differential reproduction or survival
95"us" that "we" think "we" are even as we call ourselves 87of DNA-based life; originating chronologically before the
96human) is produced by the cultural distributed program whose 88origination of any biological Earth human. While biological
97social systems of self-preservation dominate the mammalian 89humanity remains the mammalian substrate, human subjectivity
98levers mostly just by spacialization -- I mean, it ain't 90(the "us" that "we" think "we" are as we call ourselves
99hard); but remnants of the old systems always exist and 91human) is produced by the cultural distributed program
100indeed exist as the foundations of the newer systems and 92(whose social systems of self-preservation dominate the
93mammalian levers mostly just by spacialization -- I mean, it
94ain't hard). But remnants of the old systems always exist
95and indeed exist as the foundations of the newer systems and
101abstractions are leaky and the new stuff only has to work 96abstractions are leaky and the new stuff only has to work
102just-better than the old stuff so it isn't ever all the 97just-better than the old stuff so it isn't ever all the
103way there -- you know how it goes. (There is always a 98way there -- you know how it goes. (There is always a
@@ -107,25 +102,27 @@ exist to be found; though it may be unconnectable to the
107local region.) 102local region.)
108 103
109(Computational phase spaces means how many computational 104(Computational phase spaces means how many computational
110states can it cycle through, or how much does the 105states can it cycle through, or how much does the novelty
111novelty generator repeat. Phases are "upshifted" to 106generator repeat. Phases are "upshifted" to have more
112have more states by application of processing time to 107states by application of processing time to acquired
113acquired knowledge. A construction process searching for 108knowledge. A construction process searching for more
114more efficient internal data structures results in the 109efficient internal data structures results in the discovery
115discovery of "external" or "objective" structure; the use of 110of "external" or "objective" structure in "the world";
116structure to simplify the generator makes more synapses 111the use of data structure to simplify the generator
117available to represent more structure allowing the search to 112makes more synapses available, allowing the search to
118continue without consuming synpases. A compression of 113make progress without consuming synpases. A compression
119more information into smaller computational structures. 114of more information into smaller computational structures
120The generator is the compressed structure in which human 115increases its speed and provides new logical and emotional
121thought computation takes place; a signal processor; feed 116connectivities. The generator is the compressed structure
122in facts to generate conclusions but feed in noise to 117in which human thought computation takes place; a signal
123generate imaginations; either way, what is generated will be 118processor; feed in facts to generate conclusions but feed
124filtered elsewhere according to the present state of the 119in noise to generate imaginations; either way, what is
125multiple shifting connections of the frontal lobe and 120generated will be filtered elsewhere according to the
126its external/bodily hormonal-emotional Mammalian control 121present state of the multiple shifting connections of the
127structures. The cultural super-organism will surely be to 122frontal lobe and its external/bodily hormonal-emotional
128Mammalia as Eukarya to the microbial mats.) 123Mammalian control structures. The cultural super-organism
124will surely be to Mammalia as Eukarya to the microbial
125mats.)
129 126
130Haskell monads show us how algebraic morphisms are as 127Haskell monads show us how algebraic morphisms are as
131intuitive as quasiquotation. Thank you Mr. Quine. But these 128intuitive as quasiquotation. Thank you Mr. Quine. But these
@@ -159,20 +156,18 @@ side-effects like inducing speculative investment in
159external investigative exploration. The basic framework is 156external investigative exploration. The basic framework is
160of an information-gathering future-predictor-controller; 157of an information-gathering future-predictor-controller;
161reprogramming it involves loops through to the world; 158reprogramming it involves loops through to the world;
162 159reprogramming it involves loops through to the world; these
163Erlang-style message-passing; such a specialist-y thing and 160loops through the world seem so confusing to people trying
164yet it's the simplest kind of structure; it must exist in a 161to learn Erlang that it seems like I should try to explain
165thousand places; there must be a hundred apt analogies; but 162them! But there is no time, so I will sum up: the progam's
166it is only one thing and that is an algorithm, or a program, 163self is a message but the self is virtual, the self is an
167or a communication of the most powerful sort that is 164experiment, and the self needs to be destroyed. First, make
168possible between human beings; and it is that precise 165a copy, then collide it with the world (your body will also
169algorithm that has been mathematically identified, broken 166collide) then compare its shape to the original. Collision
170down into its constituent axioms like a protein into its 167provides knowledge to decide whether to destroy the copy or
171originating DNA code points, by the Erlang literature. And 168destroy the original. What is not destroyed can be copied
172the reason for all that is that it is the foundation of 169into another node. It works because neighboring nodes pick
173stability of long-running "autophagic" distributed systems; 170up dropped messages. It wouldn't work if they competed.
174I call them "tissue" systems because the cells of a living
175tissue replace themselves similarly.
176 171
177(Knowledge can exist in a degraded, not-fully-replicable 172(Knowledge can exist in a degraded, not-fully-replicable
178form; neutered, locally contained, but potentially still 173form; neutered, locally contained, but potentially still
@@ -217,9 +212,10 @@ their upstream library vendor SolarWinds. This attack was
217relatively harmless because it was performed by a government 212relatively harmless because it was performed by a government
218that only wanted some subtle spy shit rather than an act of 213that only wanted some subtle spy shit rather than an act of
219war or terrorist maximizing destruction, I mean I guess, who 214war or terrorist maximizing destruction, I mean I guess, who
220knows what they did). Time to process. Can't get the time 215knows what they did. Luckily they didn't get into the
221of day from someone who doesn't want to spend the time 216innermost kernel of human culture.) Time to process. Can't
222thinking whether you just want the time of day. 217get the time of day from someone who doesn't spend time
218thinking whether you really just want the time of day.
223 219
224Capitalism and school might be seen operationally as denial 220Capitalism and school might be seen operationally as denial
225of service attacks on their constituent subordinates' 221of service attacks on their constituent subordinates'
@@ -239,19 +235,27 @@ By working backward from the conclusion the mathematician
239will construct a proof "from both ends" toward a middle. 235will construct a proof "from both ends" toward a middle.
240The conclusion is in sight long before the bridge is built. 236The conclusion is in sight long before the bridge is built.
241The fear response precedes the conclusion. Loss of the 237The fear response precedes the conclusion. Loss of the
242binding connection in the imaginary can produce the fear. 238binding connection in the imaginary can produce fear. The
239fear emotion can deactivate the search for the next step.
243Thus can a binding lock the phase of the bound. (With some 240Thus can a binding lock the phase of the bound. (With some
244emotions you can jump the gap; you might land on error.) 241emotions you can jump the gap; you might land on error.)
245 242
246Wasn't Foucault's point in the History of Sexuality 243Foucault said in History of Sexuality Vol. 3 that the
247vol. 3 that the cultural practice of copying prohibitions 244cultural practice of copying prohibitions disguises the
248disguises the intentional construction of positive desires? 245intentional construction of positive desires. Auto-immune
249Auto-immune tolerance isn't accomplished by copying 246tolerance isn't accomplished by copying prohibitions into
250prohibitions into new generators (pruning their search 247new generators (pruning their search trees) but by filtering
251trees) but by filtering already-existing generators of 248already-existing generators of novelty either into places
252novelty either into places where they will be allowed to 249where they will be allowed to generate further or else
253generate further or else places where they can be recycled 250places where they can be recycled as energy. However,
254as energy. 251it all takes place in a context where the generators
252are always-already "pruned" because they are raised in
253a "whitelist" type environment where the elements of
254composition are provided; and composing with elements
255not provided is made unthinkable. A "blacklist" filter
256algorithm is in principle able to be much more liberal than
257a "whitelist" one; which is to say it empowers unpredictable
258generators, who potentially shift the phase of the whole.
255 259
256The search tree of the mental generator does not need to be 260The search tree of the mental generator does not need to be
257pruned if you can exploit the mind's lack of idempotence 261pruned if you can exploit the mind's lack of idempotence
@@ -262,27 +266,36 @@ search breadth and encounter a big picture view. Maybe the
262point is, instead of thinking about which prohibitions 266point is, instead of thinking about which prohibitions
263are copied, or which generated outputs are pruned, think 267are copied, or which generated outputs are pruned, think
264about which generators get destroyed or prevented from 268about which generators get destroyed or prevented from
265running. Most places in society can't allow unpredictable 269running. Each generator is a unique program (or algorithm)
266people, which means most people in most places need to be 270that in principle can be identified mathematically ("up to
267impervious to reason. Society needs filters to find these 271isomorphism"); in practice we could at least name some
268people. Once found, they can be put into positions of power 272categories.
273
274Most places in society can't allow unpredictable people,
275which means most people in most places need to be impervious
276to reason. Society needs filters to identify these people.
277Once identified, they can be put into positions of power
269where they will behave as predicted by those who get to 278where they will behave as predicted by those who get to
270put people into places; subordinate generators will not 279put people into places; subordinate generators will not
271interfere with superordinate generators because they will be 280interfere with superordinate generators because they will be
272constructed by selection to be always trapped in some 281constructed by selection to be always trapped in some local
273local thought system. Foucault was the historian of thought 282thought system. The generator is apparently blanket-trained
274systems and that is very abstract and powerful yes like a 283to run only in specific contexts; spontaneous generation in
275true mathematician with rigor (!!) but we still care more 284the /general/ context is the unthinkable: it's logging in as
276about the people in the systems than the systems and want to 285root! Developing on the production server!
277go back to that mammal meat perspective where we might feel 286
278something. But the people aren't "in" the thought system; 287Foucault was the historian of thought systems and that is
279they're products of the thought system; they're in a 288very abstract and powerful yes like a true mathematician
280social message exchange network that is a system; and that 289with rigor (!!) but we still care more about the people in
281system propagates social network extension prohibitions not 290the systems than the systems and want to go back to that
282necessarily by explicit prohibitory rules /nor/ by any kind 291mammal meat perspective where we might feel something. But
283of /management/ of desire (though that may be attempted!), 292the people aren't "in" the thought system; they're products
284but by occupying all time where unmanaged bindings could 293of the thought system; they're in a social message exchange
285form. 294network that is a system; and that system propagates social
295network extension prohibitions not necessarily by explicit
296prohibitory rules /nor/ by any kind of /management/ of
297desire (though that may be attempted!), but by occupying all
298time where unmanaged bindings could form.
286 299
287When I was in middle school I read A Brief History of Time 300When I was in middle school I read A Brief History of Time
288and learned that Albert Einstein claimed that calculus 301and learned that Albert Einstein claimed that calculus
@@ -300,13 +313,9 @@ Only then will they be permitted a chance to compete for a
300seat at the mic where some lucky MC gets to spit something 313seat at the mic where some lucky MC gets to spit something
301new on top. You're not there yet kiddo, integrate this 314new on top. You're not there yet kiddo, integrate this
302expression. But don't integrate too far. Robin Williams 315expression. But don't integrate too far. Robin Williams
303made a movie about it, but it sucked. Like why would you 316made a movie about it, but it sucked. Robin Williams went
304put literal death into the movie what a fucking downer, it 317to Juilliard (he was deeply integrated into the social
305doesn't help how he ended up unlike Michael Jackson where it 318mainstream) so maybe those movies sucked for a reason.
306works like Man in the Mirror really works now in retrospect.
307Robin Williams went to Julliard which means he was pretty
308well socially integrated doesn't it so maybe those movies
309sucked for a reason.
310 319
311Somehow it does not matter what is the material that 320Somehow it does not matter what is the material that
312is taught; the effect is never felt. When I read 321is taught; the effect is never felt. When I read
@@ -318,9 +327,10 @@ they just need to keep the volume high and the frequency
318constant? I evaded mind control by skipping their reading 327constant? I evaded mind control by skipping their reading
319and doing my own. If the bandwidth control is sufficiently 328and doing my own. If the bandwidth control is sufficiently
320tight then you can safely be given /anything/ to skim-read 329tight then you can safely be given /anything/ to skim-read
321and semi-process without ever feeling what you are doing 330and semi-process without ever feeling anything from what you
322enough to become unpredictable. Just prove you can; thirty 331are doing enough to become unpredictable. Just prove you
323hours a week for eight years in a row; then you'll be ready. 332can; thirty hours a week for eight years in a row; then
333you'll be ready.
324 334
325The body could mutate the immunohistocompatibility complex 335The body could mutate the immunohistocompatibility complex
326selectively using genetic information derived from the 336selectively using genetic information derived from the
@@ -335,17 +345,18 @@ built already one bridge through the placenta? But the
335immune system is the specialized manager of genetic fashion, 345immune system is the specialized manager of genetic fashion,
336in the use of "fashion" synonymous with game theoretic 346in the use of "fashion" synonymous with game theoretic
337roshambo, rock paper scissors, a game of knowing some 347roshambo, rock paper scissors, a game of knowing some
338ephemeral context; disposable knowledge; maybe some kernel 348ephemeral context; disposable knowledge. Maybe some kernel
339worth saving can be extracted. 349worth saving can be extracted.
340 350
341The immune system violates the central dogma already by 351The immune system violates the central dogma already by
342storing generated antibody DNA differentially in proportion 352storing generated antibody DNA differentially in proportion
343to its binding strength to foreign proteins. The whole 353to its binding strength to foreign proteins.
344purpose of the adaptive immune system is to extract 354
345information from protein. It is a protein-sensory organ. 355The whole purpose of the adaptive immune system is to
346It derives the underivable using a horizontal knowledge 356extract information from protein. It is a protein-sensory
347connection. It breaks through // un ex pex tid lee like the 357organ. It derives the underivable using a horizontal
348Wu. Hack the genome. Get to know someone. 358knowledge transmission. It breaks through // like the Wu //
359un ex pex tid lee. Hack the genome. Get to know someone.
349 360
350(Schools follow the corporate hierarchy style proof-of-work 361(Schools follow the corporate hierarchy style proof-of-work
351knowledge distribution system of transferring knowledge 362knowledge distribution system of transferring knowledge
@@ -395,9 +406,9 @@ mathematicians or programmers or anybody but to spend time
395analyzing concrete possibilities for reconfiguration of 406analyzing concrete possibilities for reconfiguration of
396local resources, whereby the basic abstract structures and 407local resources, whereby the basic abstract structures and
397shapes will be realized in the concrete forms of their 408shapes will be realized in the concrete forms of their
398combinations. However if you were a shape builder serious 409combinations. However if you were a serious shape builder
399about building shapes then you would want to know about 410you would want to know about shapes in their most general
400shapes in their most general form as I am and do. 411form as I am and do.
401 412
402The thing is that I didn't prove that there is a morphism, 413The thing is that I didn't prove that there is a morphism,
403but I don't have to prove to know. Proving it would be a 414but I don't have to prove to know. Proving it would be a
@@ -460,14 +471,24 @@ prohibitions!)
460 471
461If I was right about the uterus then they'd talk about me. 472If I was right about the uterus then they'd talk about me.
462Someone would read this. It would be, like, big. But if I 473Someone would read this. It would be, like, big. But if I
463was right about the prophets that wouldn't change anything. 474was right about the prophets that wouldn't change anything.
464 475I feel the opposite way though.
465If someone really wanted to be a body without organs they 476
466would just put in the time. Yet probably if they ever came 477Someone who really wanted to be a body without organs would
467to learn about that then they already made the opposite time 478put in the time. Yet if they encountered the body without
468commitment. Either way someone already made the opposite 479organs concept then they probably made the opposite time
469time commitment on their behalf before they were born. A 480commitment. Either way, someone else made the opposite time
470person's foes shall be they of their own household. 481commitment on their behalf before they were born. A person's
482foes shall be they of their own household.
483
484It's like how if someone hates you because they don't know
485anything about you, it's that they don't know anything about
486you because they hate you. If you want your beliefs to be
487path independent then you commit yourself to continuously
488re-evaluating the whole. Either you commit to idempotence or
489not. Either you commit to path independence, or you commit
490to a path. It's not a prohibition; it's a time commitment.
491If you don't spend your time that way then you didn't do it.
471 492
472There is the "BITE" model of cult programming, behavior 493There is the "BITE" model of cult programming, behavior
473information thought and emotion control; institutions in 494information thought and emotion control; institutions in
diff --git a/misc.txt b/misc.txt
index 95ab8c3..2a57d0d 100644
--- a/misc.txt
+++ b/misc.txt
@@ -106,14 +106,54 @@ CAN EVADE CONTROL.
106 106
107 107
108A university is an Erlang-style message passing system for academic 108A university is an Erlang-style message passing system for academic
109knowledge accumulation's life-system to regenerate itself. 109knowledge accumulation's cultural life-system to regenerate itself.
110 110
111 111
112 112
113Key point for Deleuze is that the "counter-effectuation" is Max Ent 113Key point for Deleuze is that the "counter-effectuation" is actually
114physics rather than quantum physics woo. 114real-life really-physical Max Ent physics rather than quantum physics
115 115analogy/woo. Bayesian statistical knowledge deriving from information
116Bayesian statistical knowledge deriving from information theory. 116theory.
117
118
119Deleuze didn't understand quantum physics correctly but it turns out
120that it doesn't matter because quantum physics doesn't have anything to
121do with metaphysics. It's only that Uncertainty forces human beings
122to adopt a de-centralizing de-totalizing Copernican mental shift. But
123it doesn't even do it in the way that is most relevant to metaphysics.
124There is also the de-centralizing de-totalizing Copernican mental
125shift of INTUITIONIST MATHEMATICS.
126
127Back to physics: Deleuze understood the main point: that particles
128are merely virtual constructs while these "interaction events" are
129the actual reality available to advanced physics -- the particles are
130virtual constructs that exist only in the human 3D mental model which
131is definitely NOT the same as the physical universe -- this is one of
132those places where we see the difference -- but the physical universe in
133making individual particles places where information access is limited
134fundamentally because the boundary between one particle and another with
135which it interacts isn't so much illusory as the only real thing, while
136the non-boundary is illusory.
137
138Quantum physics DOES imply a macro universe where macro assemblies
139of particles also have limited access to information; but the actual
140universe we see has EVEN MORE limitations on access to information,
141they are much much stricter than Uncertainty, and therefore we see much
142less information embedded in physical objects than Uncertainty allows
143in its theoretical maximum. (Physics experiments can be set up so
144that information is not lost; but life in general is always balancing
145loss of information against energy expenditure.) Max Ent physics and
146Bayesian statistics are mathematical/physical approaches to calculating
147the information available at a given spacetime location. However, part
148of the nature of quantum uncertainty AND max ent physics is that, from
149WITHIN the system, the limitations apply to the observer and the limits
150are self-referential in the sense that the limitations that apply to an
151observer's disability to have information from other spacetime points
152can include the disability to know which information is available!
153I.e., the theory produces known unknowns. The fact that there are
154spacetime points in the universe where knowledge of mathematics does
155not exist or exists at a merely undergrad level, means also unknown
156unknowns.
117 157
118 158
119 159
@@ -304,3 +344,212 @@ loop. Human culture is the only chemical reaction not known to loop or
304terminate. Human culture is the only true "irrational number" of all 344terminate. Human culture is the only true "irrational number" of all
305discretely-instantiated numbers. 345discretely-instantiated numbers.
306 346
347
348
349
350
351
352
353Tue Oct 31 01:23:16 PM EDT 2023
354
355Feynman and practicing with a different box of tools
356
357Same idea as the Max Ent explanation of prophecy
358
359But also the same idea as parable of the falling seeds, reversed in
360time; the seeds unfall to the sower, and depending on seed origin
361(fertile soil, or barren) the sower becomes either someone who can farm
362or someone who knows what it means to be unable to farm. The knowledge
363passes from the earth through the seed into the farmer; the seeds
364provide the connection. The disabled would-be-farmer is disconnected
365from that knowledge even though he too has and sews seeds. His seeds,
366though sewn, fail to connect out to knowledge from the past and he may
367therefore fail to connect himself out to intentions from the future (or
368else not even form them).
369
370
371
372The 20th century was spent correlating the implications of a physical
373limit of the speed of light.
374
375The 21st century will be spent correlating the implications of
376the physical limits of the speed and size of computations.
377
378The human being as a computer system undering phase changes as the
379computer gains the ability to represent different types of state -- or
380to represent state with different performance characteristics -- through
381acquisition of data structures copied from the environment -- OR from
382internal processing and DISCOVERY of NEW data structures.
383
384These data structures are PASSED BETWEEN HUMANS who learn them
385implicitly and pick them up and play with them. But data structures
386are unsafe when EXECUTED AS REASON and for this reason human beings
387have SYSTEMS OF ACCESS CONTROL to HUMAN REASON both internal to their
388minds (e.g., concepts of valid and invalid authorities) and external as
389social environment. Society imposes economic exploitation which causes
390evolutionary adapations to "bubble up" in ways that are UNPREDICTABLE
391IN DETAIL (chaos theory) but according to evolutionary theory will tend
392to produce EFFICIENT DISTRIBUTED COMPUTATION so that it will converge
393to the computer systems we find most advanced as well as the biological
394systems of generating and filtering novelty that we find most advanced
395(except that the search space may have valleys etc).
396
397Another system of access control is RUNNING IN EMULATION this is when
398the individual learns enough about a foreign system to execute the steps
399of its reasoning without however being allowed to reach any conclusions
400that apply to the larger brain's data structures. There are two reasons
401why humans cannot rely on this mechanism primarily.
402
403First, EMULATION CAN BE JAILBROKEN; this cannot ever be as secure.
404
405Second, more importantly, RUNNING IN EMULATION IS COMPUTATIONALLY MORE
406EXPENSIVE. Even though CPUs and apparently also human beings have mechanisms
407to optimize emulation, in human beings especially, these cannot obtain
408"native" performance. Therefore, computational emulators (e.g.,
409learners of a second language) cannot "actually" perform as well as
410computational originators (e.g., learners of a first language) if they
411use the same underlying computational equipment for the same amount of
412time.
413
414But human beings do not all have the same underlying computational
415equipment; and they do not all apply the same amount of time to
416processing it. In the real world, running the other side in emulation
417is something that more intelligent, more informed, or more adult human
418beings attempt to do when interacting with less intelligent, informed,
419or adult ones. Human beings may also believe they are running the other
420side in emulation, when they are running a gross simplification; in
421fact, they are running a gross simplification even when they run the
422remote side natively, since they always still have to emulate the entire
423remote environment(!) which is where the real problems start.
424
425Non-portability of language between individuals is a major problem.
426Before the internet, locality constraints on communications caused
427portability to self-organize locally; but the internet has changed
428communication patterns so that every person experiences a kind of
429cosmopolis without totality. Every experience is a scene from a virtual
430city which is a construct only of that experience; each event and
431corresponding city co-singular; co-existing only once without object
432permanence.
433
434One problem is the human tendency to imagination, roleplay, etc.,
435causes human beings to pretend communication incompatibilities are
436not real. Human beings must surely have evolved under circumstances
437where perceived universality of linguistic forms was vastly more
438common than it is today in the adult internet-connected world, though
439perhaps less common than it is today in the world of the schoolchild
440or university student or professor.
441
442The professors may not make the same naive/incorrect excuses as children
443for failing to communicate; their perspectives will be more realistic;
444the university system as a whole is constrained in certain ways to
445succeed in transmitting information; but insofar as these transmissions
446fail, are the reasons understood from a rational information-theoretic
447perspective? Or is it a primate emotion static control program designed
448to regulate subordinate behavior emotionally, amplifying the causal
449force of the intentions of individuals positioned in social hierarchies
450such that their anger generates fear in others? Or is it a whole series
451of task-activated network programs, each one separately influenced
452by its own emotional context? Perhaps they are constrained by
453environmental demands to understand these failures operationally
454
455
456The task-activated networks seem to be the neurological place of
457mental compartmentalization; and the ADHD don't shut off the DMN when
458activating TANs. We still "see" the task when others are absorbed
459"in" the task. Of course, in order to influence the DMN, it would
460have to be activated. The TANs feed back into the DMN in ADHD, which
461allows the ADHD brain to generate totalizing connectivities by putting
462information from disparate parts of universe into the same local
463computational system; where for the non-ADHD these same components,
464though contained within one BRAIN, are not connected into the same
465integrated computational system; the TANs are prevented from feeding
466back into the DMN which allows mental compartmentalization to prevent
467information from one controlled system to produce interference in
468another controlled system when each controlled system is controlling the
469same physical human being with a different control algorithm.
470
471In other words, the DMN or the big picture understanding does not
472help with, but interferes with, TAN activity downstream of power
473in the social grid, because of the way in which this activity is
474structured to depend on human beings as removable components,
475keeping the environment highly-controlled. General intelligence is
476not useful in highly-controlled environments until they begin to
477break down. High-efficiency local computation requires discarding
478global information in order to maximize local connectivity of the
479processed information and thus processing speed. (Principle of
480cache locality.) So as optimization proceeds, the big picture is
481squeezed out of every local environment; except SOME privileged local
482environment has to be preserved in order to manage the organism's
483interaction with _environments_ themselves; this is the executive.
484The organism has a consciousness of multiple discrete environments;
485each environment controlled by some local control system; each local
486control system incorporating its own different own model of human
487emotion and behavior as necessary to sustain its specific local
488constraints
489
490Emotions are the foundational social control levers in humans. Not
491life/reproduction directly, as it would be in the case of domestic
492plants; but emotion/physical-reproduction-of-imaginary-will plays
493the same structural role, allowing animalia the meta-evolutionary
494advantage of evolving without biological death; emotional sampling with
495differential reproduction of imaginations replaces eukaryotic sampling
496with differential reproduction of offspring in the information-gathering
497social super-organisms of mammalia).
498
499In a school, a student convincing their teacher that they do not belong
500in the space to which they are assigned is NOT sufficient to liberate
501the student from the space; only a non-local authority assigning
502them to some other space can liberate the student from the local
503space. The student having the level of understanding of the system
504that would cause them to make this conclusion correctly tends to make
505the student even less able to perform in a space where they do not
506belong; if the student instead internalizes a false simplified local
507model in which the possibility of mis-spacialization is impossible by
508construction, then the student may have a better chance of passing
509through the filters imposed by the environment for reaching a more
510appropriate spacialization. If the student internalizes a more
511realistic, more complete, but externally-referencing (non-local)
512model, then compatibility issues are likely in communication with
513their teacher; if compatibility exists between the teacher and the
514student, then the compatibility issue will exist between the teacher and
515administration; or else the administration will have issues with the
516school board; or the electoral system; or else the local municipality
517itself will drain tax funding since diaspora from other schools will
518collect locally. At every possible avenue where the "exception" could
519"bubble up", there will be an incompatible interface, because the
520system attempts to impose a constraint that exceptions are handled
521non-locally. All biological systems impose this constraint because of
522how it produces a superorganism that is more intelligent and robust than
523if its individual components were individually intelligent and robust.
524Advanced decentralized computing systems also impose this constraint; it
525is a foundational principle of Erlang.
526
527Another principle important probably is that in order to learn a lot
528of things you ought to be independently generating them yourself;
529the fact that someone has generated something and transmitted it to
530someone else does does not mean that they transmitted the generator;
531transmitting the generator between people may have more to do with
532copying the environment in which the independent generation occurred;
533mathematics provides students an environment in which to independently
534re-discover the fundamental theorems; but mathematical education outside
535of universities does not seem to understand this principle even in
536schools that feed top universities. Students are fed the theorems to
537memorize and use without even being fed the raw material from which
538the theorems were originally derived. Thus they are optimizing to
539demonstrate a false affectation of mathematical education. Gresham's
540Law again. Erlang illustrates the structure of passing the generator as
541well as the data.
542
543
544Tue Oct 31 01:59:34 PM EDT 2023
545
546Rappers are only really good at styling up content that they copy from
547other places. They generate novelty only in style, they do not generate
548novel content. Novel content is generated places other than hiphop and
549then incorporated there. People who are competing in social spaces
550for the best content do not put that content in hiphop style. People
551competing in social spaces with hiphop style are not competing on
552content and do not bring dense content into the competition.
553
554
555