Case File
efta-01944942DOJ Data Set 10OtherEFTA01944942
Date
Unknown
Source
DOJ Data Set 10
Reference
efta-01944942
Pages
4
Persons
0
Integrity
Extracted Text (OCR)
Text extracted via OCR from the original document. May contain errors from the scanning process.
To:
Jeffrey EpsteinDeevacation©gmail.com]
From:
Well Gershenfeld
Sent
Sun 12/8/2013 3:12:14 PM
Subject Re:
In dividing labor, I'm interested in creating the substrates for asking questions like that;
Ed/Sebastian/Judith/... will be good for the strategies.
I'll also include in the ping an optimization guru.
I know Seth's work (and Seth) well.
On Sun, Dec 8, 2013 at 10:08 AM, Jeffrey Epstein <[email protected]> wrote:
great . talk and paper. . i saw you showed seth lloyds paper , ? system assumes unlimited
resources. even though each calculation is pico scale . no competition . no evolution. analog
music and its harmonies ( second order derivatives of the fundamental ) carry more free info .
not genetic algorithms as they don't really compete. true biology involves camoflauge, as a
strategy. lets design somthing that itself tries to hide from being destroyed. turning itself off
to play dead. . change its topology to mimic something else , have the shapes battle it out for
energy efficiency including sacrificing some of the group for the benefit of the whole. ie
boundary layers creating turbulence at the right moment. second order algorithms, ( electric
field generated by the folded protein . not merely the shape key. ). even your token scalable
computer, was at heart linear, as opposed to a toplogical space that could / should morhp into
the solution.
On Sun, Dec 8, 2013 at 9:28 AM, Neil Gershenfeld •
wrote:
If you get a chance to read it, I wrote that paper as a manifesto for the project. The idea is to
make software look like hardware, rather than hide the difference and pretend they're
unrelated. Think of this as the substrate for brain-building.
Neil
On Sun, Dec 8, 2013 at 9:26 AM, Jeffrey Epstein <jeevacation( gmail.com> wrote:
I would like to hear more when you have time. computing as compared to calculating?. .
relationships as compared to equivalence?. Hillis in the early days wanted a machine that
was proud of him.
On Sun, Dec 8, 2013 at 9:22 AM, Neil Gershenfeld
wrote:
Did I send you this paper:
http://cba.mit.edu/docs/papers/11.12.Computing.pdf
and talk:
EFTA_R1_00408848
EFTA01944942
http://www-03. ibm. co mJibm/history/ibm I00/us/en/ideas/oct20I I watson.html
? My real interest in thinking about thinking is the mechanisms -- Pm increasingly convinced
that there needs to be a do-over of all of computing.
Neil
On Sun, Dcc 8, 2013 at 9:17 AM, Jeffrey Epstein [email protected]> wrote:
either is fine. what would you need to fulfill the popper definition of falsifiable. .
masquerade is a deceptive strategy. easily proven to be a false signal. . again the observer,
of the interaction. has the more difficult problem as he sees both. of determinng, which
image is real.
On Sun, Dec 8, 2013 at 8:54 AM, Neil Gershenfeld
wrote:
sure, although I was going to include him in an intro to the whole group we sketched,
could follow from that
On Sat, Dec 7, 2013 at 8:16 PM, Jeffrey Epstein <jecvacation
mail.com> wrote:
can you introduce me to noam
***********************************************************
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
Jeffrey Epstein
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by c-mail to jeevacation@gmail,com and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
EFTA_R1_00406647
EFTA01944943
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
Jeffrey Epstein
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to jeevacationOgmail.com and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
Jeffrey Epstein
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to [email protected] and
destroy this communication and all copies thereof,
including all attachments. copyright -all rights reserved
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
Jeffrey Epstein
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
communication in error, please notify us immediately by
return e-mail or by e-mail to [email protected] and
destroy this communication and all copies thereof,
EFTA R1_00406648
EFTA01944944
including all attachments. copyright -all rights reserved
EFTA R1_00406649
EFTA01944945
Technical Artifacts (5)
View in Artifacts BrowserEmail addresses, URLs, phone numbers, and other technical indicators extracted from this document.
Domain
jeevacationogmail.comEmail
[email protected]Email
[email protected]URL
http://cba.mit.edu/docs/papers/11.12.Computing.pdfURL
http://www-03Related Documents (6)
Forum Discussions
This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.
Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.