Skip to main content

听了几个TED讲演,我对长生不死越来越有信心了


第一个长着一尺长胡子的大神,分析了人类医学的进步和各种其他技术成熟的速率,得
出结论说,在接下来的某个时间段,一个immortal的人可能只比一个150岁的人晚出身
10年。。。而且,这是必然发生的。。。

我觉得比较玄乎,于是听了一个医生的,关于再造人体器官。从简单的肌肉,血管,到
复杂的腔体器官(比如膀胱,比如心脏,比如肾),都已经有相应的技术来制造。血管
容易些,只有两层不同的细胞,先把不同的细胞培养成片状,然后卷起来,外面再包一
层。最后放进培养液,边培养,边用机器拉伸,给这个器官做运动。几周下来就能用。
心脏什么的复杂些,但原理一样。他甚至显示了用3维打印机打出来的心脏组织,几个
小时之后,这些细胞就开始收缩跳动。。。

可我觉得,肉身不灭还是有些难度,起码有成本上的门槛,不能针对所有人。于是,我
有听了个演讲,说的是人死之后怎么让元神不死。简单的说,现在人人都有social
network。相比老一辈挂掉的,新的死人有多得多的数据来描述他们的生命,事迹。于
是,有人开始提供针对肉身灭亡以后各种social network的服务。这玩意儿不能细想,
一想,就发现有下面三重可能性:
1. 肉身虽灭,事迹还在:别人还可以访问你的各种archive。 这是最浅显的一层。
2. 肉身虽灭,精神永存:可以通过生前对自我的定义来制造一个虚拟的精神体。这个
精神体会依据生前的信条和行为准则来respond各种留言,消息,新闻。
3. 肉身虽灭,元神继续修炼:可以想象,如果生前的描述足够多,模型足够复杂,完
全可以在肉身毁灭之前制作一个有相同性格,信仰和学习能力的精神体,也就是元神,
在死后继续修炼。
如果1,2,3都能发生,就一定会发生一个元神访问另一个元神的facebook, 一个元神
twit另一个元神。。。

所以,诸君一定要努力活下去,等待那一天的到来~~~~

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...