Skip to main content

并不是所有信息都可以解构

思考长生不老的问题,必然牵涉到信息的复制问题,而信息的复制又牵涉到信息的解构

并不是所有信息都可以解构的,也就是说并不是任何信息都可以准确读取的。学过量子
力学的人,都知道测不准原理。当你在测量一个量子态的时候,你已经破坏它了。测量
本身对测量的对象制造了不可避免的干扰。

不谈量子力学,在经典系统里,当体系复杂到一定程度的时候,也会变成不可预测的。
你能预测一年后的股市吗?全世界最强大的计算机也不能准确预测一个月后的天气。这
不是一个简单的计算能力的问题。

哥德尔不完全定理证明,任何有限的框架都不可能无矛盾的建立内涵无限的理论体系。

要长生不老,其实意味着可以无限地准确复制和转移大脑中的信息。这是不可能的。当
你复制和转移你的意识的时候,你大脑中的信息就已经因为复制和转移而被改变了。大
脑绝对是一个超级复杂的系统,这样的系统有着高度的不可预测性,某个小的参量的变
化,也许就可以引起蝴蝶效应。

长生不老?这是伪科学。一个小小的论坛,因为人际关系的复杂,都会常发生一些“黑
天鹅”事件。更不要说一个公司,一个国家,甚至整个人类了。大脑的复杂程度可以说
超过了一个国家的复杂程度。在一个国家中,人与人的关系是动态的、模糊的。今天你
是我的情人,明天也许就是我的仇人了。脑细胞之间的关系也是动态的、模糊的。这样
大量的模糊动态关系,怎么可能被准确转移复制?

你相信共产主义吗?实现长生不老之前,一定已经先实现了共产主义。

生命的本质是偶然

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...