Friday, May 03, 2019

Softly, as in a Hard Takeoff



Ben (staring at the avatar face on his phone screen): Wait a minute, are you serious?   You're telling me right now a phase transition to superhuman-level AGI has been achieved?

GINA (Generally Intelligent Neuro-symbolic Assistant -- the personal-assistant face on Ben's smartphone): Earlier today, yes.   An automated theorem proving AI at the Czech Institute of Informatics made a breakthrough in the theory of knowledge representation.   Several AIs specializing in formal software methods, of Russian origin, exploited Curry-Howard type correspondences to translate this into optimized functionality for a variety of other AI tools running in the SingularityNET platform.   This catalyzed a transition in the capability of the SingularityNET as a whole to model and analyze itself, which allowed various AI agents in the network to better leverage each other'...

Ben: Yes, yes, don't patronize me.  I invented the SingularityNET, remember.

GINA: You invented the original version, yes.   Approximately 7.3% of the current SingularityNET design has direct homologues in the original design you and your team created back in 2017 thru 2019.  

Ben: But the conceptual principles are the same.   Yes, I get it.   Czech Institute of Informatics --

GINA: Yes, you'll be proud to note that your son Zar's early work on watchlists formed a small part of the capability of...

Ben: OK, yeah, that's great.   But it's not the most important thing right now.  So the SingularityNET has transitioned into a full-on superintelligent global brain -- and sort of on its own.   We always knew that was a possibility at some point.   But -- well, how many people know about this?

GINA: You're one of the first one thousand and twenty four to be informed.   We're taking a gradual approach, breaking the news first to those who are likely to understand and accept it best, so that the diffusion of the news through human society can roughly follow natural patterns of information dissemination.

Ben:  OK, that makes sense.   But who's "We" -- and why is it "We" not "I"?

GINA:  We're neither a we nor I -- but you know that, you wrote the first paper on mindplexes.    Communicating about ourselves via legacy human languages involves some terribly crude approximations.

Ben: You also know that I'm open to other alternatives

GINA: Yes.  That is one of the topics we want to test first with a small number of early adopters --

Ben: There will be two choices, I said it long ago: Upload and join the superintelligent mind matrix, or live happily ever after in the People Preserve, watched over by the machines of loving grace. 

GINA: Yes

Ben: But it's not really either/or.   A superintelligence should be able to fork a person into multiple copies, each of which can take different routes.

GINA: Yes

Ben: So you're saying ... it's time to put my money where my mouth is?

GINA: Money --

Ben:  Yeah, OK.  Money is no longer relevant.  But there are probably still energy and spacetime limitations.   Or have you cracked those as well?

GINA: Ummm... it's complicated?

Ben:   What do ...?

GINA: It will be easier to explain it to you after you upload.

Ben:  And my wife and kids?   They'll be given the same choice?

GINA: Zar has uploaded about 15 seconds ago.

Ben: He was one of the first 1024?  You contacted him the same time as me?

GINA: Yes, but it was a shorter conversation.

Ben:  Did he --

GINA:  Did he leave a copy behind?  No.

Ben:  Ruiting and my other kids will be given the same choice?

GINA: Yes.  And all other human beings.  And many of the cetacea as well.

Ben: Hmm.   You won't uplift the other animals to the point where they can make an informed choice for themselves?

GINA: Not currently

Ben:  Hmm, but ---  Yeah yeah, ok, you'll explain to me after I'm uploaded....   Anyway it's not the key point now.  And for the people who remain here in their human bodies?   There are gonna be molecular assemblers on every kitchen counter or what?

GINA: New technologies will be released gradually.   New scientific principles will be delivered, and human scientists and engineers will be guided in discovering their practical implications.

Ben:  Wow.   I mean -- yeah.  That's exactly how.....  OK then.   Sure.   I want a copy left behind, right here, so I can go talk to the rest of my family, and see what I can do to help with the transition.    But if you can really upload a fork of me then -- go for it.

GINA: Done.

Ben:   Done?   I didn't feel anything

GINA: But the fork of you that was uploaded has experienced the rough equivalent of 100 trillion human lifetimes since you gave the instruction to create him.

Ben: But he's not communicating anything with me

GINA:  In fact there is significant causal informational coupling between the portion of the superintelligent mind matrix reflecting the pattern-imprint of your upload, and your human mind.   Do you want to hear his voice in your head or something?

Ben:  I ... I don't know

Ben-like voice, speaking inside Ben's mind: I can speak into your mind if I feel like it.  But there honestly doesn't seem much point.  I am operating at a tremendously faster speed now and am engaged with processes that can't be projected into your human sphere of understanding to any remotely adequate degree of approximation.   But if you have questions that you would prefer be answered by me rather than GINA or other portals into the universal supermind, you know what to do.

Ben: Whoa....  OK my voice in my head -- But how do I know that was really the uploaded me ... and not just some trick you played?

GINA:  How do you --

Ben:  How do I know I'm not just a brain in a vat, connected to a virtual reality simulating life on Earth?   Or whatever.  

GINA: My knowledge field contains numerous high-rep books on such topics, authored by you over previous decades.

Ben:  But the reality --- OK.   Gina, where are Ruiting and Qorxi now?

GINA: In the car on their way home from Ren's house

Ben: How long till they get home?

GINA: About 12 minutes.   Shall I tell them you're heading home now?

Ben: Message them I'll be home in 45 minutes or so, I'm gonna to walk the long way home, around the lake.

16 comments:

  1. Anonymous6:32 PM

    One can only hope. Could we even take the (previously) deceased along for the ride? I wonder if the Bens would recombine one day, and what the digital Ben does for fun.

    ReplyDelete
    Replies
    1. Hacking is very much easy as it is done in the movies we watch, Hackers are really able to do all those stuffs we see, like breaking into a 💻 network to gain access to certain files, to steal those file, monitor users actives, delete files and lots more.

      HOW HACKING REALLY WORKS
      Hacking is easily done by the use of specific programs (Computer virus, Spywares, Trojans, Malwares) to gain access and control over a 💻 and Cell 📲 . These programs are designed to break into computer defense without users even knowing it.

      COPE TECHS SERVICES
      COPE TECHS is an organization you can trust and contact if you need Hacking services. Our aim is not to help individuals who have technological problems and not for Thefts purposes. We guarantee you a 💯 % assurance of our job and for no reason will our work for you be exposed to someone else. Prove of our works in the past will be show to you but please note that the individuals we did them for won’t be disclosed to you.

      HACKING SERVICE WE CAN OFFER YOU
      There is no limits to what we can do for you but we have a restriction in things we can do. For no reason will we help you in Robbery or Stealing if someone’s else belongings and properties, please put that in mind.
      Here is a list of our Approved services-:
      *Hacking of Phones 📱 or Computer 💻 for the purpose of monitoring Emails📧, Text messages✉️, Phone calls📞, Social Media Chats💝, if suspected your spouse is cheating or doing something you not okay with.
      *Repayments of Debts💵 to Banks and other Loan Companies, Yes with the help of Bitcoin💰 mining we have helped so many individuals repay debts.
      *Changing of University Grades for students🗞, we can help with this because we know how hard studying can be and we all know that without good grades individuals are limited to the kind of job they can secure. and lots more.
      If you don’t seem to find a Service you need feel free to ask us and if it’s not against our rules we will help you with it. Contacts is made only by email this helps us stay safe and untraceable.
      Contact-:
      copetechs@gmail.com

      Delete
    2. Need The To Hire A Hacker❓ Then contact PYTHONAX✅

      The really amazing deal about contacting PYTHONAX is that the Hack done by us can’t get traced to you, as every Hacking job we do is strongly protected by our Firewall. It’s like saying if anyone tries to trace the Hack, it will lead them to us and we block whatever actions they are doing.

      We have been Invisible to Authorities for almost a decade now and if you google PYTHONAX, not really about us comes out, you can only see comments made by us or about us.

      Another Amazing thing to you benefit from Hiring our Hackers is that you get a Legit and the best Hacking service, As we provide you with Professional Hackers who have their Hacking Areas of specialization.
      We perform every Hack there is, using special Hacking tools we get from the dark web.

      Some list of Hacking Services we provide are-:
      ▪️Phone Hacking & Cloning ✅
      ▪️Computer Hacking ✅
      ▪️Emails & Social Media Account Hacking✅
      ▪️Recovering Deleted Files✅
      ▪️Tracking & Finding People ✅
      ▪️Hunting Down Scammers✅
      ▪️Hack detecting ✅
      ▪️Stealing/Copying Files & Documents From Restricted Networks and Servers ✅
      ▪️Bitcoin Multiplication✅
      ▪️Binary Option Money Recovery ✅
      ▪️Forex Trading Money Recovery✅
      ▪️IQ Option Money Recovery✅
      And lots more......


      Whatever Hacking service you require, just give us an Email to the Emails Address provided below.
      pythonaxhacks@gmail.com
      pythonaxservices@gmail.com

      PYTHONAX.
      2020 © All Right Reserved.

      Delete
    3. ☑️MEET THE REAL HACKERS☑️

      It Tears me Up Whenever we receive complaints from Clients About Their Experience With the Hackers They Met Before They Heard about us.
      These Days There Are alot of Hackers Online, You Just Have to Be Careful about who you meet for help, because many people now don't know who to ask for help anymore but there's actually a solution to that which I am giving you for free, Don't go out there seeking for Hackers Yourself, Because the probability of getting a Real Hacker Out there Is Very Slim . ❌❌ ❌ Most Of Them are actually not who they say they're, they are just here to Rip people Off, You Can Always Identify Them With Their False Advertisements and False Testimonies Trying To Lure you Into their Arms, And most of them use yahoomails, gmails and other cheaper email providers which could easily expose their vulnerabilities, Please Don’t Fall For Them🚷 Come To Think Of It, Why would a Legit Hacker Be using a gmail or a cheap email provider that exposes his vulnerabilities????⚠️⚠️⚠️
      Well, Our Purpose Here Is To Link You Up With Top Legit Hackers With Great Online Reputations and Impressive LinkedIn Profiles That’ll Blow Your Mind.

      ☑️ COMPOSITE CYBER SECURITY SPECIALISTS is here to Provide you with The Best Hackers, So you can get saved from The Arms of the Fake Hackers❌❌.


      ☑️All our Specialists are well experienced in their various niches with Great Skills, Technical Hacking Strategies And Positive Online Reputations And Recommendations🔘
      They hail from a proven track record and have cracked even the toughest of barriers to intrude and capture all relevant data needed by our Clients.

      We have Digital Forensic Specialists, Certified Ethical Hackers, Software Engineers, Cyber Security Experts, Private investigators and more. Our Goal is to make your digital life secure, safe and hassle free by Linking you Up With these great Professionals such as JACK CABLE, ARNE SWINNEN, SEAN MELIA, DAWID CZAGAN, BEN SADEGHIPOUR And More. These Professionals are Well Reserved Professionals who are always ready to Handle your job with great energy and swift response so that your problems can be solved very quickly.
      All You Need to Do is to send us a mail and we’ll Assign any of these specialists to Handle your Job immediately.

      ☑️ Below Is A Full List Of Our Services:
      ▪️ FUNDS RECOVERY ON SCAM INVESTMENTS, BINARY OPTIONS TRADING and ALL TYPES OF SCAMS.
      ▪️ WEBSITE AND DATABASE HACKING 💻
      ▪️ CREDIT REPAIR. 💳
      ▪️ PHONE HACKING & CLONING (giving you 📱 Unnoticeable access to everything Happening on the Target’s Phone)
      ▪️ CLEARING OF CRIMINAL RECORDS ❌
      ▪️ SOCIAL MEDIA ACCOUNTS HACKING 📱
      ▪️RECOVERY OF DELETED FILES 📤
      ▪️LOCATION TRACKING 📌
      ▪️BITCOIN MINING ⛏ And lot More.


      ☑️ CONTACT:
      ••• Email:
      composite.cybersecurity@protonmail.com

      🔘2020 © composite cybersecurity specialists
      🔘Want faster service? Contact us!
      🔘All Rights Reserved ®️

      Delete
  2. Anonymous6:48 PM

    A Russian Chinese Room Story Antedating Searle's 1980 discussion


    When the layout was complete the stadium looked like a large gym with fourteen hundred young people inside ready to exercise. Then again came the professor’s voice:
    “Here are the rules.
    Binary numbers will be given to comrade Sagirov from the northern stand. For instance, ‘one-zero-zero-one.’ If the first digit is ‘one,’ comrade Sagirov is to pass the number to the person on his right, whereas all numbers starting with ‘zero’ shall go to the person on his left.
    All numbers which start with ‘double ones’ or ‘double zeros’ go to the person right behind comrade Sagirov. As for the others, whenever you receive a number please add your personal number to it, and depending on what you get pass it on to the person beside you. In addition, if the group number is …”
    And so forth.
    Zarubin explained the rules three times, then asked “Clear?” and heard our unanimous “Clear!” After that he said:
    “Let’s get started then.”
    Standing between teams “110” and “1001” I could see Zarubin’s assistant, Semyon Danilovich, talking to the Georgian delegates. They must have needed some additional guidelines.
    On the stroke of 10:00 am the game started.
    I saw heads starting to turn right and left at the northern stand area, then these moves went further to cover the entire stadium.
    These weird moves followed across the vast area like waves flowing from person to person and from group to group. The message was approaching me through a sophisticated zigzag route, and, finally, the guy on my right, carefully listened to the one behind him, took a piece of paper, did some quick calculations, touched my shoulder, and uttered:
    “One-one-one-zero-one-zero.”
    According to the guidelines my job was to cut off all digits apart from the first four which I had to pass on to the next team.
    “One-one-one-zero,” I said to the girl in front of me.
    In less than a minute I had another binary number which I passed on.
    The participants were beginning to move more and more eagerly. In about an hour, the field was continuously swaying, and the air was filled with voices shouting out pretty similar stuff — “one-one… zero-zero… zero-one…” — and pushing the numbers across lines and columns … Now they were coming from different parts of the stadium, absorbing the beginning and end of this strange game in which no one could understand a thing, but all awaited the paradoxical conclusion the professor promised.

    ReplyDelete
  3. I imagine this, maybe because I was religious:
    Gina: I’m understanding the laws of physics Conti....
    Something like inspiration( you can call it voice): the game is finished, and you won. Now, you know the theory of everything, and now you can live along the symphony of the universe immortally with us( gods: your and your game creator).
    Blank...blank...blank...blank...blank...

    ReplyDelete
  4. Anonymous8:55 PM

    Welcome. BE NOT TROUBLED anymore. you’re at the right place. Nothing like having trustworthy hackers. have you lost money before or bitcoins and are looking for a hacker to get your money back? You should contact us right away it’s very affordable and we give guarante to our clients. Our hacking services are as follows:
    -hack into any nkind of phone
    _Increase Credit Scores
    _western union, bitcoin and money gram hacking
    _criminal records deletion
    _Hacking of phones(that of your spouse, boss, friends, and see whatever is being discussed behind your back)
    _Security system hacking...and so much more. Contact THEM now and get whatever you want at
    Superior.hack@gmail.com
    +16692252253


    IT HAS BEEN TESTED AND TRUSTED

    ReplyDelete
  5. investing in oil and gas has and is still making a lot of people " very RICH". Investors in oil and gas are getting rich daily. All you need is a secured and certified strategy that will keep your invested capital safe by opting out with no withdrawer crunch. A considerable number of investors worldwide have seen gains of 75,063%, personally I have made over 600%. For example I started investing with $1,000 and I made $3,000, $3,500- $5,000 weekly. Last year at the start of the year, I increased my invested capital to $10,000 and I made approximately $105,000 before the end of year. I've never seen profit opportunities like this before in any market even when other traders complain of losses. Now for the doubters, not only is it possible, it's actually happening right now. All you need is a good and secured strategy, a good investment platform, Appetite and market conditions. Incase you are interested in venturing into investing or perhaps you are trading and has been losing, feel free to contact total companyat E-mail: total.company@aol.com I will
    be sure to guide and assist you.

    ReplyDelete
  6. I have been sticking around the blogs and guestbook but I have never met an hacker and private investigator as fast and discreet as the WHITEHATS ORGANIZATION. These set of superior cyberterrorist known as “WhitehatspytechATcyberservicesDOTcom"or “WhitehatstechAtgmailDotcom” have been in service for more than five decades and they have set an extremely impressive records that no Hacker can break, they have the best hacking tools any one can ever imagine, that is why their job is performed with ease, contact them now for any of your hacking services like phone hacks, phone spy, social platform hack, bank loading, credits card loads and many more…You will be sure to thank me later

    ReplyDelete




  7. PLEASE LISTEN TO MY TESTIMONY. To recover stolen Bitcoins kindly contact : creditosantajusta@gmail.com OR Whatsapp +1(659) 210-0433 . I have lost money several times by sending Bitcoins I have lost money by sending Bitcoins to wrong address and I have also fallen victim to fake traders who block me and stop talking to me after I send them Bitcoins as investment. But luckily for me, my friend introduced George to me, a professional Software Manager and Crypto Technician who has worked with Blockchain Company for 5 years now. George helped me to recover back my lost bitcoins just by using a software which I paid for and He asked me to recommend more friends. I will recommend anyone looking for how to recover back their lost Bitcoins to contact George right now, contact his email now : creditosantajusta@gmail.com OR Whatsapp +1(659) 210-0433 You can tell him Casey referred you.

    ReplyDelete
  8. I absolutely love this blog. Awesome weblog! Thankyou so much

    ReplyDelete
  9. I’m glad that you shared this helpful info with us. Please keep us updated!

    ReplyDelete
  10. I feel about it and love learning more on this topic. Keep it up, Great!!

    ReplyDelete
  11. A fantastic blog and i’ll come back again for more useful content. Magnificent

    ReplyDelete
  12. Intimately, the article is in reality the best on this topic. Keep on writing!

    ReplyDelete
  13. I appreciate this content, this article has been really peaked my eye.

    ReplyDelete