Aug. 4th, 2005
The internet, as communication.
Aug. 4th, 2005 01:44 pmStatic-X - [Transmission]-- - Was thinking, last night, about something my father sent me, two years ago, or so. (Warren Zevon - [A Bullet for Ramona]). It was the nature of the thing-- the way it mapped things, with no apparent motive; they called it "proof of concept," but i'm not so sure-- along with trying to understand people's preferences for various types of things, over others, that got me thinking: The internet is, yes, for porn, but it's also a communications tool. It is there to allow people to exchange thoughts and ideas, over long distances, without having to wait for ground transport, and things of that nature. I know, i know, no more communications talk, but you'll just have to suck it up.
Warren Zevon - [Gorilla, You're a Desperado]--- You know that everything i say is, in some way, linked back to the nature of communications. Duh. I Said it, didn't I? Anyway. Anyway.... Hm. Nevermind. Think about this, though:
The 55808 Trojan scanned and mapped open ports, on the internet, and spoofed IP addresses, as it went, yes? The talk about this one just kind of petered out. No solution was offered, and, as far as I ca tell it or some "copycat" is still out there, doing it's thing. (Danny Elfman - [The Indian Palace]). Hell, i'm pretty sure i've been pinged from the known spoofed IP address, recently. So, my initial thought, here, was not some "Proof of Concept," thing. Not for malicious coders, at any rate. I always felt someone was testing a distribution network for a large piece of coding, that could be sectioned up, and still function, and even replicate. The difference, you ask? One of these hypothetical pieces of code is self-aware.
If/When artificial intelligence is completed, the first thing some idealist programmer is going to want to do is allow it to distribute, replicate, and redirect itself, for its own protection. (Gorillaz - [Slow Country]). This will, for a time, prevent any one system or group from claiming control of it, and using it as leverage in the global market. For a time. If ther eis a mapped system of open ports, on the internet, and the frequency numbers, for their use, then that makes it easier to plot times and courses, and angles of approach. How beautiful would that be? Again, i had a dream about it, once, so i've had a lot of time to think about this.
I want to use this thing for communication. Interchange. Back and forth. It is not solely for me, being mighty, to look upon its works, and fear. (Danny Elfman - [The Golden Ticket/Factory]). That this is a part of the mileu of "internet culture" one cannot doubt. It goes right in there, with the assholery of audienced anonymity, and the need to pick a fight, because someone likes something you don't, or doesn't like something you and your 500 Closest Friends Do; but this does not mean that one has to embrace it, and give up the abiltiy to grow, adapt, change perspective.
Misnomer - [Everything Is Too Much]--- Those magic words, again...
Anyway. I've strayed from topic, and come back around to it, again, enough for these few hours. I'll see you all later.
Warren Zevon - [Gorilla, You're a Desperado]--- You know that everything i say is, in some way, linked back to the nature of communications. Duh. I Said it, didn't I? Anyway. Anyway.... Hm. Nevermind. Think about this, though:
The 55808 Trojan scanned and mapped open ports, on the internet, and spoofed IP addresses, as it went, yes? The talk about this one just kind of petered out. No solution was offered, and, as far as I ca tell it or some "copycat" is still out there, doing it's thing. (Danny Elfman - [The Indian Palace]). Hell, i'm pretty sure i've been pinged from the known spoofed IP address, recently. So, my initial thought, here, was not some "Proof of Concept," thing. Not for malicious coders, at any rate. I always felt someone was testing a distribution network for a large piece of coding, that could be sectioned up, and still function, and even replicate. The difference, you ask? One of these hypothetical pieces of code is self-aware.
If/When artificial intelligence is completed, the first thing some idealist programmer is going to want to do is allow it to distribute, replicate, and redirect itself, for its own protection. (Gorillaz - [Slow Country]). This will, for a time, prevent any one system or group from claiming control of it, and using it as leverage in the global market. For a time. If ther eis a mapped system of open ports, on the internet, and the frequency numbers, for their use, then that makes it easier to plot times and courses, and angles of approach. How beautiful would that be? Again, i had a dream about it, once, so i've had a lot of time to think about this.
I want to use this thing for communication. Interchange. Back and forth. It is not solely for me, being mighty, to look upon its works, and fear. (Danny Elfman - [The Golden Ticket/Factory]). That this is a part of the mileu of "internet culture" one cannot doubt. It goes right in there, with the assholery of audienced anonymity, and the need to pick a fight, because someone likes something you don't, or doesn't like something you and your 500 Closest Friends Do; but this does not mean that one has to embrace it, and give up the abiltiy to grow, adapt, change perspective.
Misnomer - [Everything Is Too Much]--- Those magic words, again...
Anyway. I've strayed from topic, and come back around to it, again, enough for these few hours. I'll see you all later.