From: Jeffrey Epstein <jeevacation@gmail.com>
To: Neil Gershenfeld >
Subject: Re:
Date: Sun, 08 Dec 2013 15:08:15 +0000
great . talk and paper. . i saw you showed seth lloyds paper , ? system assumes unlimited resources. even
though each calculation is pico scale . no competition . no evolution. analog music and its harmonies ( second
order derivatives of the fundamental ) carry more free info . not genetic algorithms as they don't really
compete. true biology involves camoflauge, as a strategy. lets design somthing that itself tries to hide from
being destroyed. turning itself off to play dead.. change its topology to mimic something else , have the shapes
battle it out for energy efficiency including sacrificing some of the group for the benefit of the whole. ie
boundary layers creating turbulence at the right moment. second order algorithms, ( electric field generated by
the folded protein . not merely the shape key. ). even your token scalable computer, was at heart linear, as
opposed to a toplogical space that could / should morhp into the solution.
On Sun, Dec 8, 2013 at 9:28 AM, Neil Gershenfeld < wrote:
If you get a chance to read it, I wrote that paper as a manifesto for the project. The idea is to make software
look like hardware, rather than hide the difference and pretend they're unrelated. Think of this as the substrate
for brain-building.
Neil
On Sun, Dec 8, 2013 at 9:26 AM, Jeffrey Epstein <jeevacation@gmail.com> wrote:
I would like to hear more when you have time. computing as compared to calculating?.. relationships as
compared to equivalence?. Hillis in the early days wanted a machine that was proud of him.
On Sun, Dec 8, 2013 at 9:22 AM, Neil Gershenfeld < wrote:
Did I send you this paper:
http://cba.mit.edu/docs/papers/11.12.Computing.pdf
and talk:
http://www-03.ibm.corn/ibm/history/ibm100/us/en/ideas/oct2011watson.html
? My real interest in thinking about thinking is the mechanisms -- I'm increasingly convinced that there
needs to be a do-over of all of computing.
Neil
On Sun, Dec 8, 2013 at 9:17 AM, Jeffrey Epstein <jeevacation@gmail.com> wrote:
either is fine. what would you need to fulfill the popper definition of falsifiable. . masquerade is a
deceptive strategy. easily proven to be a false signal. . again the observer, of the interaction. has the
more difficult problem as he sees both. of determinng, which image is real.
On Sun, Dec 8, 2013 at 8:54 AM, Neil Gershenfeld < wrote:
sure, although I was going to include him in an intro to the whole group we sketched, could follow
from that
EFTA00978211
On Sat, Dec 7, 2013 at 8:16 PM, Jeffrey Epstein <jeevacation@gmail.com> wrote:
can you introduce me to noam
•**********************************************************
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
Jeffrey Epstein
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to jeevacation@gmail.com, and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
■**********************************************************
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
Jeffrey Epstein
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to jeevacation@gmail.com, and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
***********************************************************
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
Jeffrey Epstein
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to jeevacation@gmail.com, and
EFTA00978212
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
Jeffrey Epstein
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to jeevacation@gmail.com, and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
EFTA00978213