Theorem: If the entirety of our past exists within memory, then it will be available to us upon the last moment of life. It follows that awareness will be free to expand throughout time and space.
1. The Similarities Between a Computer and the Human Mind
1.1. Computer and Human Memory: A Comparative Exploration
Memory is a fundamental aspect of both human cognition and computer functionality. In both systems, memory serves as the repository for information. Despite their distinct origins - biological and electronic - computer and human memory share similarities in structure, operation, and purpose. This essay explores these parallels, shedding light on how each system functions.
Storage and Retrieval
The processes of storing and retrieving information are essential to memory in both humans and computers. Humans encode information through sensory input, consolidating it into patterns of neural connections. In contrast, computers store data in binary format, encoding information as sequences of 0s and 1s. Data retrieval is exact and depends on referencing specific memory addresses.
Capacity and Efficiency
The capacity of human memory is vast and not fully quantified. The brain stores an enormous amount of information. This efficiency allows humans to focus on important details while discarding irrelevant ones. Computers, on the other hand, have a fixed and measurable memory capacity, such as 16GB RAM or 1TB storage. Computers are highly efficient in managing large amounts of data.
Parallel Processing
Both human and computer memory enable multitasking. The human brain processes multiple streams of information simultaneously, such as integrating sensory inputs, emotions, and logical reasoning. This ability allows humans to adapt to complex and dynamic environments. Computers achieve parallel processing through advanced hardware and software, enabling them to run multiple programs or processes concurrently. This mimics human multitasking.
Conclusion
In essence, human and computer memory are both remarkable systems designed to store, manage, and retrieve information. Each system has unique strengths that reflect its design and purpose. By understanding these similarities, we can appreciate the complexity of human cognition. Together, these systems form the foundation of innovation, enabling advancements that bridge the gap between biological intelligence and artificial systems.
1.2. Can Computer Knowledge Help to Understand the Human Mind?
Yes, an understanding of computers can indeed help in understanding the human mind. Computers and the human mind share many conceptual similarities, particularly in terms of processing, storage, and retrieval of information. By examining how computers work, researchers and thinkers have developed frameworks and analogies that enhance our understanding of cognitive processes. Below are several ways in which computer science contributes to the understanding of the human mind.
For example:
Input: Sensory information is analogous to data entered into a computer.
Processing: Cognitive processes like attention and problem-solving mirror how a computer processes data using algorithms.
Storage: Human memory parallels computer memory (RAM and hard drives).
Output: Decisions and actions are akin to the computer's display or execution of a command.
This model has shaped fields like cognitive psychology, helping scientists study how humans encode, store, and retrieve information. The study of computers has significantly advanced our understanding of the human mind by providing models, tools, and metaphors to explore cognition, memory, learning, and decision-making. The ongoing interplay between these fields continues to enrich both, highlighting the power of interdisciplinary exploration in unraveling the mysteries of the mind.
1.3. Memory Does Not Forget, Whether Human or Computer
As we embark upon the journey of life, memories accompany us. For without the recollection of past deeds and places traversed, we would find ourselves in great peril. Generally, however, we may think our memory is flawed. Contemplate the trials of the school exam. Do we consistently recollect the answers to all questions posed? Alas, at times, affirmative; and at times, negative. Thus, we conclude our memory is far from perfect.
In stark contrast, consider the domain of computer memory. Those of us well-versed in computers know that once information is entered into the computer's memory, it steadfastly remains there. Occasionally, we may misconstrue the malfunctioning of our computer programs to alterations wrought by the machine. Yet, invariably, upon closer scrutiny, we find the reason for such incongruity lies with us, not the computer. The computer itself is devoid of flaws. Its execution is immaculate. Once we find the flaw and fix it, the program works perfectly henceforth.
The same holds true for human memory. For example, we may see an acquaintance yet not remember their name. We know at one time we did know their name. Now we can't remember it. We assume that our inability to remember the name is due to a failing of memory. This brings to light the fundamental difference between our ability to remember and our ability to store information. While we may not be able to recall the name (remembering), it still remains in our memory.
In summary, we equate what we can remember with what is in our memory in total. The two are not equal. What we can remember is but a tiny subset of what is in our memory. Part of the reasoning comes from the assumption that nothing takes place outside of the present. We believe that our memory's only purpose is to serve us here in the present. When you understand afterlife, you realize that what takes place in the present is not all there is. Information that is not available to us in the present is still in our memory. When will we access it? We will access it at the end of life. Memory - whether in humanity, the hearts of creatures, or the circuits of machines is complete, total and perfect. Memory's sacred duty is the absorption and preservation of data. This data, once captured, defies the ravages of time. It is steadfast, unyielding, and sustained by the flow of electricity. All memories of all moments exist in memory.
In our present existence, the vicissitudes of life may veil our memories, rendering them momentarily inaccessible. Yet, do not let these veils deceive us into the misconception that the underlying memories do not exist. Yes, the information remains intact, resplendent within memory, awaiting the opportune moment to unveil itself once more. Though shrouded from immediate recall, memory endures, steadfast in its existence. Thus, in thinking of memory, let us not be misled by the nature of forgetting. Instead, find solace in the assurance that the reservoir of memory perseveres, transcending temporal limitations. Memory plays a fundamental role in afterlife. When we arrive at the last moment of life, all our memories are there. To understand afterlife, we must understand memory. Memory is so fundamental to understanding afterlife that I have dedicated the following section to building memory from a few basic logic gates. This way we know exactly how memory works. While memory may be built differently with nerves within the human mind, it functions exactly that same way.
2. Constructing a Memory Matrix Using Logic Gates
2.1. What Memory Looks Like Inside a Computer
2.2. Foundations of Memory - The NOT Gate
2.3. Foundations of Memory - The NOT Gate
Memory can be created from simple, elemental building blocks. Whether it be made of wires or nerves, fully functioning memory can be built using only the following three elements.
A. The NOT Gate
The NOT gate reverses the input state as shown:
The NOT gate above has an electromagnet above the switch. Since the switch is open, there is no magnetic pull on the metal switch the switch sits in the closed position as shown on the left. Current is allowed to pass through the switch lighting the bulb on the other side.
Closing input (shown as switch one on the right) energizes the electro-magnet by applying current to it. The current goes into the coil wrapped around the electro-magnet and pulls the switch into the open position. This breaks the circuit (shown as two) and the light goes out.
The NOT Gate is represented by the symbol in the inset. The NOT Gate functions as follows:
1. When the input is turned ON, the output is turned OFF.
2. When the input is turned OFF, the output is turned ON.
B. The AND Gate
The AND gates and together two inputs as shown:
The AND Gate will allow current to pass and light the bulb when current is applied to both inputs. The AND Gate is easy to remember because it will light the bulb when current is applied to Input 1 AND Input 2.
The AND Gate is represented by the symbol in the inset. The AND Gate operates as follows:
1. When both inputs are ON, the output is ON.
2. When either of the inputs are OFF, the output is OFF
C. The NOR Gate
We are showing NOR in the example below so you can see exactly how it operates.
On the left no current is applied to either Input 1 or 2. With no current applied current passes through the NOR Gate and lights the bulb. On the right current is applied to Input 2, the lower electromagnet. This opens the lower switch. Current is allowed to pass through the first gate, however it is stopped by the second gate. The current applied to either input will stop current from going through this device.
The NOR Gate is slightly harder to understand than the other gates. This is because it turns ON when there is no input and OFF when there is input.
The NOR Gate operates as follows:
1. When both inputs are OFF, the output is ON.
2. When either input is ON, the output is OFF.
3. When both inputs are ON, the output is OFF.
2. Bringing Memory to Life with a Flip Flop
A Flip Flop is two NOR gates wired together as shown below. When NOR gates are arranged this way an amazing thing happens. The simple electrical device gains the ability to change states via electrical impulses. It is like a switch that can be turned on or off by electricity. Once a flip flop is set to a state, say off, it will remain in the off state until it is sent another electrical impulse. That makes the flip-flop a perfect device for storing data. Once set, it will stay in either the ON or OFF state indefinitely.
A flip-flop is two NOR Gates combined in an arrangement as shown below. The output of one gate is connected to the input of the other gate and vice versa:
Figure 1 shows the flip flop in state one, where the top output is OFF. Consider this system at rest. With no current applied to either input on the bottom NOR Gate, the output is turned ON. This cuts off the current to the upper NOR Gate. The flip-flop will remain in this state indefinitely barring outside influence.
Figure 2 shows the current being applied to the lower input of the bottom NOR gate.
Figure 3 shows the output of the lower NOR gate turning OFF due to the current applied to one of its inputs.
Figure 4 shows the output of the upper NOR gate has turned ON due to no current applied to either input. Consequently current is applied to the lower NOR gate. This locks in the state by keeping it turned OFF.
Now the flip-flop is set to a second state where the upper NOR gate output is ON. It will stay that way and is at rest.
The flip-flop is an amazing piece of hardware. This simple arrangement of two NOR gates allows this device to store information. For example, if you have 16 flip flops you can store a 16-digit binary number. Merely set the digit 1 to state one and 0 to state two. When you set a number into the 16 flip-flops, that number will remain there indefinitely.
The flip-flop forms the foundation for memory. Given enough flip-flops we can store unlimited data. It is hard to imagine how nerves could get together to arrange themselves in this manner to give rise to memory in living things. Perhaps memory in humans is based on a completely different hardware structure. However, a flip-flop is a foolproof way to store information in hardware - be it transistors or nerves.
3. Storing Data in a Bit
A BIT is short for binary digit. It is the smallest piece of computer memory. It is capable of storing a single binary number, either zero or one. A computer bit is a flip-flop wrapped in a few basic circuits. The flip flop is the hardware mechanism that stores the data. The illustration below shows how a bit is set with data input and a clock:
Figure 1 shows the bit at rest in OFF status. NOR Gate B is ON because there is no current on either input.
Figure 2 shows the input line turning ON.
Figure 3 shows the clock line turning ON. Note that both inputs on the lower AND gate are turned ON. Since both leads are ON, current passes through the AND gate into the lower NOR gate B. Input on either lead of NOR Gate B turns it OFF.
Figure 4 shows NOR Gate A turning ON because there is no current on either input. This lights the bulb and the bit is considered set or in the ON state.
Note: A computer clock is merely a device that turns ON and OFF it regular intervals. The ON/OFF cycles of the clock synchronize the movement of data in memory. The clock is connected to the input of the bit with AND Gates. For current to reach the bit the clock line must be turned ON. When the clock line is OFF nothing takes place because no current can reach the bit. The clock effectively slices time into discrete sections. When the clock is ON things happen. Switches can be set. When the clock is OFF nothing happens. Dividing time into segments of action/no action keeps data movement in memory sharp.
III. Interconnecting Memory Locations into a Matrix
1. Components of a Memory Address Bus
Computer memory locations are wired together into continuous memory by an address bus. An address bus is the wiring that gives each specific memory location its unique address. The address bus allows the computer to access one specific memory mailbox from among millions of available mailboxes.
Two basic elements that make up an address bus as shown here:
1. The first element is the Gate shown left. When power is applied to the input the electromagnet switch is closed and current is allowed to pass. Conversely, when current is no current is applied the electromagnet opens and the current cannot pass. We show this gate is a square.
2. The second element is the NOT Gate. When power is applied to the input of the electromagnet the switch is opened and the current is stopped. Conversely, when no current is applied to the electromagnet the switch closes and current is allowed to pass. We show the NOT Gate as a triangle.
A memory address bus, no matter how large, is made up of just these two elements. The square element opens with the current. The triangle element closes with the current. Creating an address bus is a matter of arranging these two building blocks into a matrix.
2. Memory Address Bus Diagram
The illustration below shows a section of an eight-line memory address bus. The squares and triangles are arranged like binary numbers in a sequence. A square represents a one and a triangle represents zero. Each row of gates represents a unique binary number manifested in hardware.
The top row is eight blue squares. This can be thought of as the memory address 11111111. The second row is 11111110. The third row is 11111101 and so on. The elements are arranged in an array so each row defines a unique number or memory address as shown:
We are going to enter a binary number in the address register as shown on the lower left of the diagram above. The number we enter is 11111010. We enter it by opening or closing switches. In this case, we close the first five switches, open the sixth, close the seventh, and open the eighth.
The result is turning ON lines 1 to 5, and 7 and turning OFF lines 6 and 8.
On the right you can see how our memory matrix reacts to current on the address lines:
1. All squares turn ON when the current is applied.
2. All triangles turn ON when no current is applied.
Gates turned ON are shown in orange.
As you can see only one memory address matches the binary number entered on the bus. That is memory location 11111010. It is the only combination of squares and triangles that light up allowing current to pass from left to right. The memory bus applies current to that one memory address only.
The arrangement of gates is how computers store and access data to and from unique memory addresses.
3. Diagram of a Complete Memory Bit
This illustration below shows a full implementation of a computer bit. It shows the addition of an address line and a read/write line:
This is a computer bit. Here is how it works:
To Write Data (shown left):
1. Turn the address line ON
2. Turn the read/write line ON
3. Turn the clock line ON
4. Enter your information on the data line (ON for one, OFF for zero)
The illustration on the left shows the address line ON, read/write line ON, and data line ON. These AND together. The input state (ON or OFF) gets through to the second AND gate where it is ANDED with the clock line. When the clock line is ON the data sets into the bit.
To Read Data (shown right):
1. Turn the address line ON
2. Turn the read/write line OFF
3. Turn the clock ON
The address line, state of the bit, read/write line, and clock line are all ON. They AND together. This places the state of the bit (either ON or OFF) on the output line.
4. Complete Memory Matrix
Memory bits are the same bit hardware repeated thousands of times arranged into a matrix. The illustration below shows 16 bits arranged into a four-by-four memory matrix. Each bit is identical. The illustration shows how bits are connected via the address bus, data, read/write, clock, and output lines.
Reading data is a matter of turning ON or OFF the various lines. For example, the read/write line tells the computer whether you are reading data from a bit or writing data to it.
This 16-bit memory shown above is accurate. Memory in a computer is like this but there are more bits.
IV. The CPU: Core of Computing
1. Overview Of A Computer Processor
A computer processor consists of a small number of memory registers and a program counter.
The illustration below shows the exterior of a processor. The processor has 16 address lines (shown in red) and 16 data lines (shown in blue). It also has a read/write line (shown in green) and a clock line. This processor is intended to work with 16-bit memory as shown on the left. 16-bit memory has 16 address lines and 16 data lines. We wire our processor on the right to the memory on the left. Now we have a computer.
Our small 16-bit computer contains 65,000 memory locations. That is 2 to the 16th power. That is how many memory locations 16 address lines will support. Each memory location has 16 bits of data. The total number of bits our processor can support is 65,000 multiplied by 16 or 1,040,000 bits. With memory connected to the processor, it can access any bit within its memory. Our processor's 16-bit wide architecture allows us to place a memory address in a data register and reach any location in memory.
2. Retrieving Data from Memory
Reading data from a memory location, into the processor, is done in three steps:
1. Load a memory address of the data location to be read into data register A.
2. Execute the read memory instruction.
3. The contents of the memory location currently in register gets copied into register B.
The information is read into the processor immediately as shown here:
3. Storing Data into Memory
Writing data from the processor to memory is a three-step process:
1. Move the memory address of the location to be read into data register A.
2. Move the data to be written into data register B.
3. Execute the Write Data instruction.
Writing data happens immediately. The data will overwrite whatever is in the affected memory location.
V. Comparing Human Thinking to Computer Processing
1. Human Thought as a Running Computer Program
A computer thinks by loading computer instructions into the processor and executing them. Once the processor has finished executing one instruction, it loads the next instruction and executes it. Each instruction is loaded into the processor on each cycle of the clock. The computer operates like a machine by executing one instruction at a time as the clock line turns ON and OFF. The clock keeps everything in order.
This illustration shows a simplified processor, with four data registers and a program counter. When the program counter increments, it moves the next program instruction into the processor and then executes that current instruction.
Every processor has an instruction set. The instructions set is a collection of instructions that the processor can execute. Each instruction does one specific thing such as adding two numbers together. The instruction set is limited to instructions like adding, moving, or manipulating data. Each processor instruction does very little but in combination the instructions form a powerful programming language.
The processor executes each instruction one at a time as follows:
1. The program counter increments one.
2. A new instruction is loaded into the processor with the next beat of the clock.
3. The instruction is executed.
4. The processor acts upon the data in its registers as dictated by the instruction.
5. Go to step one.
While a computer is capable of fantastic things, during any one moment it is only doing one very specific thing. It only executes one instruction at a time. Each computer instruction involves movement or manipulation of data. The processing takes place within the processor's registers. The processor moves data from memory into its registers. However, the manipulation and control of data take place within the processor. The computer moves data from memory to the processor, operates on it, and moves it back to memory.
Data manipulation within the processor is analogous to awareness in humans. The computer is aware of what is happening to the data inside its processor. The processor is surrounded by memory. However, data operations take place inside the processor. The difference between at-large memory and data register memory inside the processor is that data registers are operated on and are under the direct control of the processor. It is the execution of instructions that manipulate data within the processor that characterizes awareness. The computer is aware of the movement and manipulation of data within its processor.
2. Executing a Program as a Train of Thought
As a programmer you must learn to read your program. Imagine you have completed programming for the day. Then you come back the next day. You open your program and read it. You read your program by putting yourself in the perspective of the processor. In other words, you start at the top of the program looking at the first line, and then mentally execute it. Then you go to the next line, exactly like the processor would do. Then you mentally execute that line. Then you go to the third line, and so on. If you are a good programmer and if your program is well written, you can follow the logic (the processor's path) from the first line to the last line, mentally interpreting each line as you go. If you can do that, you know what the program will do next.
Shown below is a sample computer program. Open your program and look at the first line. That is your initial point of focus. Like the processor, take in one line and mentally execute it to find out what it will do. The entire program may be thousands of lines long, but your focus at this moment is on the first line. You read a program by moving that point of focus down the page one line at a time. The red lines show how the processor moves from line to line through a computer program.
At times during the program you may enter a loop as shown above. During this time your point of focus starts at the first line of the loop. You mentally execute each line of the loop and then jump back to the top of the loop, as the processor would do. In the example above the program is reading email addresses from a database and printing the results to a table on the screen. Your point of focus may jump around physically in the program. Program execution jumps several lines after encountering an if statement. However, the logic - the processor path through the program - remains the same. You mentally execute one instruction at a time from the first line of the program to the last.
Awareness operates like the focus within this program. Like the red line moving through the program, our awareness moves within the environment. Awareness acts like program execution within this program. Awareness, like program execution, is located in one place at a time.
At no time when reading a computer program do you mentally execute two instructions at once. Program execution happens sequentially. You look at one instruction and figure it out. Then you look at the next instruction and figure that out. This is also how awareness works. You focus on one thing and acknowledge it. Then you focus on the next thing and acknowledge that. As the processor interprets each instruction of a program sequentially - awareness acknowledges each thing sequentially. Awareness within the environment works like a focus within a program. That is why thinking is called a line of thought. That is why awareness is called a point of view.
3. Viewing Reality as Surrounding Memory
Memory absorbs the environment as we move through life. The environment is made up of visual, sound, and other sensory stimuli, as well as any thought going on. The present moment is like the memory space of a computer. The environment is absorbed into memory. As each moment happens, it passes into memory. Essentially memory stores reality. Reality gets filed away in memory as we experience it. Here is a representation of the human mind and the computer model:
The Human Mind and The Computer Model are similar. Both are based on memory. Both have a processor that acts as the center of their universe. Both include everything that is going on at the moment.
4. How a Computer Could Store Reality
Awareness is like a processor running a program. The environment is like random access memory surrounding the processor. Memory is like random access memory (RAM) containing everything going on inside the computer at that moment.
Random access memory (RAM) contains everything; the operating system, data input, and running applications. Likewise, our memory in the present contains everything; the physical world, any thought going on, and any input being absorbed. Here is a diagram of our random access memory at the present moment:
Computers have an internal clock. The internal clock sets a cadence for the computer by turning the clock line off and on. Inside a computer, time is not continuous. Time is made up of beats or pulses. Instructions of a computer program are executed when the clock line is ON.
The illustration above shows how the entire memory map of a computer could be read into memory each time the clock line turns ON. The entire memory map is copied onto memory on each beat of the clock. A system like this could save all realities from the beginning to the present. A system like this would save its memory space continuously as it unfolds.
VI. Attaining Flawless Memory through Hardware Independence
1. How Memory Stores Three-Dimensional Space
Perfect memory stores three-dimensional space perfectly. We have seen how reality gets absorbed into the visual cortex. As we move through life, we are constantly absorbing perfect copies of our current environment into memory. Using memory, we absorb each three-dimensional space as we experience it. It happens in the background. We are unaware that this is happening. That is how we experience the surrounding environment as shown below:
Think of your memory as reaching out to absorb the present. The present - the outside world - is within memory. We live within memory always, even in the present.
The present environment appears real to us. The rest of memory is just as real too in the same way. Moments get absorbed into memory as we move through life. Awareness stays in the present moment. Just because awareness is not currently located in memories of the past does not mean that the memories of the past are not complete, vivid, and pristine in every way. The memories of the past are just as real and complete as the present moment. We simply cannot realize past moments fully right now because our awareness is no longer in that moment. It is in the present.
If we could theoretically move awareness from the present to a moment of the past, we would experience that past moment exactly like we experience the present moment. That moment of the past still exists. It has not gone anywhere. We just cannot recreate it at this time. That does not mean that we never will. It is enough to say that all those past moments exist, waiting to be fully realized.
2. Can Memory Store Moments Forever?
If your mind is going to capture and retain all moments throughout your lifetime, you are going to need perfect memory. Is it possible for human memory to achieve this level of perfection? For this to be possible we need a memory device that can hold every moment you have ever experienced throughout your lifetime. These moments are complete realities including any thought going on at the time. We need to store them completely without dropping even one bit. We are talking about a perfect, bit-for-bit recording of your entire lifetime.
This is a lofty ideal. It does not seem possible. Everyone knows that cells do live indefinitely. There is a turnover of the memory hardware within the brain. It does not seem realistic that the brain can make it through 120 years of life without ever dropping a bit. It would seem that the underlying hardware would eventually fail and lose the data that was stored in that hardware.
3. Memory Perfecting Technique Called XOR
Human memory is not a fragile system. It does not come crashing down when a single brain cell fails. There are ways to lose brain cells without losing the data stored in them. The computer industry has techniques where a memory device can fail completely and not lose data. Sophisticated computer memory can repair itself by swapping in fresh hardware when old hardware fails. It can recreate lost data and keep running perfectly. This is not the only way to maintain digital memory integrity, however, it is a way to do it.
The basis of this memory protection scheme is based on the XOR Gate. When it comes to computer memory, the XOR Gate has magical properties. The XOR Gate is a logic device with two inputs and one output that works as follows:
1. If either input is ON and the other input OFF the output is ON.
2. If both inputs are ON output is OFF.
3. If both inputs are OFF output is OFF.
The diagram above shows an XOR Gate built from four NAND Gates. The logic table for the NAND Gate is shown on the lower left. Like an XOR Gate, a NAND Gate has two inputs and one output. If both inputs are ON current the output is OFF. If either or both inputs are OFF the output is ON.
Condition 1 (upper left) shows input 1 ON. NAND Gate A has one input ON so it turns ON. NAND Gate B has two inputs ON so it turns OFF. NAND Gate C has one input ON so it turns ON. NAND Gate D has one input ON so it turns ON.
Condition 2 (upper right) shows both inputs ON. NAND Gate A has both inputs ON so it turns OFF. NAND Gate B has one input ON so it turns ON. NAND Gate C has one input ON so it turns ON. NAND Gate D has both inputs ON so it turns OFF.
Condition 3 (lower left) shows input 2 ON. Like condition 1 this turns the Gate ON.
Condition 4 (lower right) shows both inputs OFF. NAND Gate A has both inputs OFF so it turns ON. NAND Gate B has one input ON so it turns ON. NAND Gate C has one input ON so it turns ON. NAND Gate D has both inputs ON so it turns OFF.
The logic table for the XOR Gate is shown on the right.
4. Hardware-Independent Memory with XOR
We can achieve memory hardware independence by XOR'ing data across multiple memory devices. The multiple-drive XOR scenario works like this:
1. A block of data (Data A) is written to Drive One.
2. Another block of data (Data B) is written to Drive Two.
3. The two pieces of data are XOR'ed together and the result is written to Drive Three.
Shown on the left is Data A which includes six bits of data: 001100. This is written to Drive One. Data B also contains six bits: 111000. That data is written to Drive Two. Then Data A and Data B are XOR'ed together and the result is written to Drive Three: 110100.
The XOR'ed data does not necessarily have to be written to Drive Three. It can be written to any drive as shown in the second row:
1. Data C (001010) is written to Drive One.
2. Data D (110011) is written to Drive Three.
3. XOR (Data C and Data D) is written to Drive Two.
You can see how the data values are XOR'ed together on the left.
5. Recovery Without Data Loss After Failure
So what happens when a drive fails? That situation is shown here:
The illustration above shows Drive Two failing. The drive has failed without warning. All the data on Drive Two has been lost.
However we can recover the data on Drive Two using the data on the two existing drives as follows:
1. Take the data on Drive One (Data A) and the data on Drive Three (XOR Data A and B) and XOR them together. The result is the data that was lost on Drive Two.
2. Similarly, take the data found on Drive One (Data C) and the data on Drive Three (Data D) and XOR them together. The result is the data that was lost on Drive Two.
It does not matter what drive we lose. We can recover its lost data by XOR'ing the data on the remaining drives. In this case below we lose Drive Three:
To recover the lost data we do the same thing. Simply take the data on the existing drives, XOR it together., and the result is the missing data. No matter what drive we lose we can recover the lost data. We cannot, however, lose two drives.
6. Attaining Hardware Independence Through Replacement
Fully redundant memory requires replacement hardware. The illustration below shows how memory hardware can fail without losing memory:
Shown above are three drives in an XOR array. Then Drive Two fails. Here is how the computer handles the situation:
1. The computer detects that Drive Two has failed.
2. Drive Two is automatically removed. It is swapped out electronically.
3. Drive Two's backup is automatically installed in the array. It is swapped in electronically.
4. Drive Two's data is rebuilt by XOR'ing the data on Drives One and Three.
5. The result is written to the new Drive Two.
Memory is fully restored. New memory hardware is in place. This can be done logically. It requires no moving parts. Using an XOR system we can keep memory intact. Redundant memory hardware creates a robust system. Memory is not fragile. It can handle any mishap except for catastrophic failure of more than one drive. Here are a few things to consider:
1. An XOR memory array can take a severe hit to the hardware and not lose data. Memory repairs itself without moving parts.
2. XOR memory can recover data lost without warning. A Drive can suddenly go down and the system can recover. It essentially heals itself. Lost memory can be fully rebuilt from existing memory.
3. An XOR array works with any size data word and any number of drives greater than three. This means that we can protect a huge amount of data with very little additional hardware.
4. We humans spend one-third of our lives sleeping. XOR'ing data is the type of activity that takes place during sleep. Using an XOR array (or some variation of it) we can replace lost brain cells while keeping memory intact. An XOR system is capable of maintaining perfect memory throughout our lifetime by continuously replacing damaged hardware.
7. Dreams: The Mind's Data Administrator
To those of us making a living as computer system administrators, our biggest fear is losing our client's data. A good system administrator will take steps to ensure that no data gets lost. It is not enough to merely monitor the situation. You have to build backup data integrity measures into your network to be safe.
On my local computer I use a technique called Time Machine. Time Machine works in the background. It makes copies of everything I do. Using Time Machine, my computer can be rebuilt should the primary drive fail. On my network, I use a technique called Rsync. Rsync makes a copy of all files on another physical computer nightly.
Additionally, to safeguard memory, you need to introduce new hardware into the network from time to time. A new computer will last about five to ten years. It is a lot of work to build a new server, transfer everything onto it, and configure it so it all works correctly. However, if you expect perfect data over decades, moving and copying data is necessary.
Is it possible to maintain perfect data over a 100-year lifespan? The answer is yes, provided you use memory safeguard techniques similar to those above. This is where dreams come in. The human mind is a data-absorbing engine. It takes in each moment's environment as it happens and files it away in memory intact. For this to happen over a lifetime, without ever dropping a bit, you would expect to see nightly data maintenance. Dreams are that necessary data maintenance taking place. If the mind were allowed to take in each moment, file it in memory and leave it, without data maintenance, eventually it would fail. Instead, the mind takes in each moment during the day and then performs data maintenance during the night to keep the memory intact.
Dreams are to the mind what the system administrator is to the network. Dreams do the necessary tasks, basically moving and organizing data, to keep memory perfect at all times.
8. Can a Single Bit Drop in Memory Cause End of Life?
Most people would say physical trauma, such as sickness, causes the end of life. I would say that physical trauma is an effect but not the main cause. I believe that life will continue as long as memory and information remain intact. The storing of each environment, over years and years, remains in memory, bit-for-bit, as it happened. As long as the memories of past realities are perfect, life will continue.
When something occurs in memory so the checksum indicates memory is not intact (a single dropped bit), life stops at that moment. It is memory dropping a bit that causes the end of life. This happens immediately. When the first bit of a lifetime is dropped, life stops and the grand transition takes place. It has to be that way. A dropped bit must cause the end of life because this ensures every moment, from concept to the present, is present and in attendance at the last moment of life.
VII. Memory As A Complete Four-Dimensional Realm
1. The Relationship Between Data Lines and Memory Capacity
Most tend to think that doubling the number of data lines in a computer magically doubles their power. They proudly proclaim, "Hey, my new 64-bit machine is twice as powerful as the 32-bit beauty I used to own." But hold on a sec, that's not quite how memory works.
When you add those data lines, you are doubling computer power with each line. So, a 64-bit machine has taken a huge leap of power, doubling a total of 32 consecutive times! That's right, 32 times!
Computer power is all about that memory space, that vast arena where your computer can roam and crunch those numbers. As the memory space expands, your machine gains more room to flex its computational muscles. It is not simply a doubling of raw power. Oh no, it is monumental memory expansion!
Here is what that progression of data lines and exponential expansion of memory looks like:
2 data lines yield 4 memory locations
3 lines yield 8 locations
4 lines yield 16 locations
5 lines yield 32 locations
6 lines yield 64 locations
7 lines yield 128 locations
8 lines yield 256 locations
Each additional data line doubles addressable memory. As lines are added, addressable memory skyrockets at an accelerating pace. Memory growth is exponential as shown here:
This equation is read as follows: Memory capacity is equal to two to the power of the number of data lines.
2. The Impressive Capacity of 64-Bit Memory
Let's dive into the mind-boggling memory capacity of a 64-bit computer. It's like stepping into a sci-fi dream come true! Just imagine this 64-bit machine, with its CPU registers, address lines, and memory locations all strutting a cool 64-bit wide. It's like an orchestra of bits, playing in perfect harmony!
Now, here's where the magic happens - with 64 data lines running throughout its memory, connecting every little piece of hardware like a puzzle. It's like a symphony, with each instrument playing its part flawlessly.
Hold on because we're about to reach the stratosphere of memory addresses! Brace yourself for this mind-numbing fact - a 64-bit processor can soar up to 2 to the 64th power, that's 18446744073709551616 unique memory addresses! Whoa, that's more than 18 quintillion! I can't even fathom that number.
With a 64-bit memory address, this processor can directly access 2 to the 64th power of addressable memory locations, each holding 64 bits of data. It's like a treasure trove of information, waiting to be unlocked and realized! Having that much raw memory capacity at your fingertips, it's like embarking on a thrilling journey into a universe of limitless addressable memory!
See that equation above? That is the size of memory we're talking about for a processor 64-bit wide. Don't let that number scare you - 18,446,744,073,709,551,616. It's one heck of a LARGE number, no doubt about it.
Here's the kicker - you only need 64 data lines to handle all that memory! That is like a perfectly efficient setup. Given the physical size of our brain, it is large enough to handle that 64-bit processor with all that memory. Imagine the possibilities! We could store realities, one after another, in that gargantuan memory space, and still have room for more!
Let your imagination run wild. With this capacity of memory at our fingertips, we can store a whole bunch of realities before we even start to think about running out of memory.
3. Understanding the Data-Word to Memory Relationship
A data word is the size of the registers in a processor in bits. The size of a data word equals the number of data lines in the computer. In a 64-bit computer, a data word is 64-bit long. The data word is also the size of each memory location. In a 64-bit computer, each memory location contains 64 bits of information. This equation expresses the relationship between the data word (register width inside the processor) and surrounding memory.
Thought, in a human, is analogous to data movement in a processor. A computer will load data into the registers of the processor and then act on that data. It may be moving a 64-bit data word into a register, a 64-bit memory address into another register, and then moving that data from the processor register to that memory location on a single cycle.
During that cycle the computer acts on those registers inside the processor. In a sense, the computer is aware of the data it is acting upon. The relationship between the data being acted upon versus all other data in the computer is expressed above.
4. Comparing Memory and Processor to Memory and Awareness
The memory/processor relationship in computers provides an accurate model for the memory/awareness model in humans. Computers, at any one moment, focus on an infinitesimally small amount of data. Yet it is surrounded by a large environment of memory. The computer focus is takes place on a single clock cycle.
Humans focus on a single moment too. It is called the present. The computer model assists us in seeing this relationship between awareness and memory. Without the computer model, we would overestimate the information we are aware of at any one time. We also underestimate the information making up the surrounding environment.
The true relationship between awareness (information we focus on) and the surrounding environment (memory) is the same as a computer. That relationship looks like this:
A 64-bit computer yields astronomically large memory using a data word that is infinitesimally small in comparison. A 64-bit computer is used for illustration purposes. I have no idea of the size of the data word in the human mind, or even if it is binary. However, the relationship between the data under direct processor control and its surrounding memory holds for both computers and humans.
5. Is it Possible to Store a Lifetime In Memory?
Let us delve into the intricacies of human memory. In the fabric of our being, memory absorbs each surrounding environment as it unfurls its tapestry before us.
Oh, the marvels of human memory. Memory reaches back and grasps the threads of all moments throughout our lifetime. A grand archive it becomes, storing experiences and knowledge, layer upon layer, woven intricately within the depths of our memory.
Now, let us turn our gaze towards the question that beckons our inquiry: How much memory is required to store the entirety of this life-long repository? The sheer magnitude of such a task would confound even the most brilliant minds of our age. To unravel this enigma, we must fathom the vastness of human experience and the limitless horizons of time. The encounters with loved ones, the triumphs and tribulations, the sights and sounds that color our days - all have their place in this boundless expanse of our memory.
Yet, to quantify this immense reservoir is a task that we can only approximate, for it resides within the ethereal realm of our consciousness. It transcends numbers and calculations. The measure of human memory dwells in the immeasurable realms of the soul. That said, let us embrace the wonder of human memory where the echoes of our existence reverberate through time. Using simple mathematics, let's attempt to unlock the mysteries of our memory and marvel at the miracles it holds.
First, let's calculate the number of seconds in 100 years. That is pretty much the upper limit for life duration, give or take. It turns out there are 3,155,673,600 seconds in 100 years.
Next, let's calculate the number of memory locations in 64-bit memory. There are 18,446,744,100,000,000,000 memory locations in 64-bit memory.
Now we are going to divide the total memory locations by the number of seconds in 100 years. There are 5,704,011,970 memory locations available to store each second of life, given a lifespan of over a 100 years.
Since this is 64-bit memory, each memory location can store 64 bits of data, or 8 bytes.
That means there are 45,632,095,760 bytes of new memory available to absorb each second of life.
One gigabyte is equal to 1,000,000,000 bytes.
That means there are 45.6320958 Gigabytes of memory available to record each second of life, over a 100 year lifespan.
Now let's look at the three-dimensional model we used in the evidence/virtual reality section. The model includes the house, the yard, all interior rooms, and furnishings. It is a fully detailed environment as shown here:
• This three-dimensional environment model requires 833.6 MB of memory space, or .8336 Gigabytes.
In conclusion, you could store 50 models like this for every second of life for 100 years and still have memory left over. So yes, if you look at it this way, 64-bit memory is large enough to store a lifetime in its entirety. It seems to be eminently doable.
6. Proving Afterlife Exists Using Information
In the wondrous tapestry of human existence, all environments encountered during a lifetime do reside in the sanctum of memory, intimately interwoven with our being. An indelible compendium of experiences, perfect in every way, accompanies us perpetually. As life's journey nears its end, a repository of memories stands with us, an archive amassed over time. Within this treasury, a ceaseless recollection of environments is enshrined, a testament to the human voyage through the ages.
Memory can be thought of as a physical time/space continuum. It will unveil itself as an ethereal universe, adorned with the myriad tapestries of human interaction. People, emotions, and reflections of profound thoughts - the very essence of love, compassion, and all that adorns humanity - exist within this vast celestial domain.
Such a sight unfolds before our eyes: a boundless expanse, extending beyond the temporal horizons, bearing witness to the perpetual dance of existence. Within this luminous tableau lies an accumulation of realities, waiting in eager anticipation to be perceived and understood. A storehouse of potentialities, unrestricted and immeasurable, stands poised for realization - a manifestation of the universe.
As we approach our conclusion, we find ourselves in the presence of an unparalleled opportunity. To seize these untapped treasures of cognition, to unravel the veil of the unknown, is a privilege bestowed upon us. The ingenuity of the human spirit, fortified by the acquisition of knowledge and wisdom, is poised to embark upon an epoch-making expansion, charting new trajectories across the landscape of understanding.
Let us, then, with minds both inquisitive and sagacious, embrace the vast realm of memory. In its boundless depths lie the profound secrets of creation and the unfathomable mysteries of existence. May our pursuit of knowledge be unwavering, and our passion for discovery be unyielding, for through this intellectual voyage, we align ourselves with the very essence of the cosmos - a cosmic dance that transcends the ephemeral confines of time and space, resonating eternally with the symphony of universal truth.
During life's tenure, conscious awareness finds its abode in the present moment - the rightmost corner of this diagram above. However, upon transgressing into the realm of the afterlife, a profound transformation unfolds. Conscious awareness, like a boundless ethereal tempest, expands unbounded in all dimensions - embracing length, width, depth, and time. It transcends its former confinement from a mere point at the right side and manifests ubiquitously. It permeates the vast expanse of memory, embracing all epochs and every corner of the cosmos.
No longer tethered to the confines of the present, awareness is free to traverse the corridors of time with unrestricted freedom. It roams the annals of history, delving into the epochs of the past and unveiling the secrets of bygone eras. Furthermore, the shackles of a singular perspective are cast aside as awareness assumes an omnipresent nature, permeating the expanse of space itself. No region of the cosmos remains out of reach, as awareness understands the farthest reaches of existence.
This metamorphosis is nothing short of astounding - the creation of time and space without bounds. Awareness becomes everything and assumes the size of memory. In its embrace, all information, all experiences, and all knowledge are realized. The very essence of the afterlife unfolds like a celestial orchestra, resonating with the grand symphony of memory.
During life, our awareness is akin to that of a central processor, limited in its scope to comprehension of data in its registers. But at life's culmination, it transcends its former limitations, becoming aware of the vast reservoir of memory. This expansion can be visualized as a cosmic expanse - an event horizon akin to the genesis of the universe - the grand Big Bang that engenders the birth of enlightenment. This expansion, in its sheer magnitude, is prodigious beyond measure.
Consider, for example, the analogy of a 64-bit computer. In the afterlife, awareness grows exponentially, unveiling an inconceivable 18,446,744,073,709,551,616 (2 to the 64th power) times more information than resides inside the processor's registers. Such a staggering order of magnitude offers a glimpse into the enormity of the metamorphosis - the ineffable vastness that accompanies the expansion of awareness throughout the dimensions of time and space in the afterlife.
In this pursuit of understanding, we find ourselves in the footsteps of cosmic revelation. As awareness expands unbounded, we unearth the mysteries that lay concealed within the infinite tapestry of existence. We witness the ever-unfolding grandeur of creation. In the afterlife, consciousness transforms into a ubiquitous witness to the wonders that abound within the infinite cosmos of memory.