Tuesday, July 19, 2011

Networked Ping Echo

"It is the patterns then. Detecting them covertly is worth the considerable effort to design and deploy. The patterns are much harder to hide than instances of their application.

"The echo studies demonstrated how important it is to keep secret the listening resources and fields produced by them until most of the crosstalk window had passed."

Best of Class: Cognition Identity Interface
As we migrate from social simulation to autonomous algorithmic, many of the techniques responsible for the ultimate success will inform generic application of the principles involved. Empirical data is the unprecedented resource here.

Some of the principles electrical and acoustical echo cancellation can be applied to knowledge evolution.  Text as signal is perhaps easiest to test empirically. The new image and facial recognition technologies approach the problem from a different direction.

NOTE: Some of the foregoing in this BuzzTheHill post is not fictional. Consider it a public disclosure and as such, to the degree something novel and not obvious to those skilled in the art has been addressed, the specific intent was/is to put it in the PUBLIC DOMAIN 

© 2011 Buzz Hill

No comments:

Post a Comment