Theorem: If All Memory Is Addressable At The End Of Life, Then Afterlife Is All Time And Space And Everything It Contains.

Variables/Terms: Addressable, Memory, Bit, Processor, Memory Location, Reality, Computer Memory, Space, Present, Moment, and Time.

Addressable - able to be addressed. Addressable means directly accessible. By Merriam Webster [1]

Memory (1) - Memory is the faculty by which the mind stores and remembers information. Synonyms are: ability to remember, powers of recall, recall, powers of retention, retention, and mind.
Memory (2) - Memory is something remembered from the past; a recollection. Synonyms are: recollection, remembrance, reminiscence, evocation, reminder, souvenir, echo, impression.
Memory (3) - Memory is the part of a computer in which data or program instructions can be stored for retrieval. Synonyms are: memory bank, store, cache, disk, RAM, ROM. By Bing.com [2]

Bit (short for binary digit) - Noun - computers : a unit of computer information equivalent to the result of a choice between two alternatives (such as yes or no, on or off). The physical representation of a bit by an electrical pulse, a magnetized spot, or a hole whose presence or absence indicates data. By merriam-webster.com [3]

I. Computer Memory Versus Human Memory

1. What Are The Differences Between Human And Computer Memory?

The traditional and first definition of the word memory (above) is that memory is the faculty by which the mind stores and remembers information. Contrast this with the third definition that memory is the part of a computer in which data and program instructions can be stored for retrieval. There is very little difference between these definitions. Memory is described as the ability to store and retrieve information in both cases.

Definition two above deals with remembering. Whereas definitions one and three deal with storage of data, definition two deals with retrieval of data. It talks about something remembered from the past, or a recollection. While still defined as memory, recollection deals only with retrieval and can be misleading.

In both computers and people, the ability to take store data is the same. Computers take in information and store it into memory. Humans take in information, through sense and thought, and store it too. What can be misleading in humans is our ability to remember stored information. Human data retrieval is not perfect. We are constantly forgetting much of what we experience. Our ability to remember the past is limited. However, this does not mean that memory is lost. Our limited ability to recall information does not mean the information is not there. Do not assume human memory is limited based on recall.

The ability to store and retrieve data is perfect in computers as well as humans. The following section shows how memory is built in computers. It is built from electro-magnets. These pull switches closed by magnetic attraction when current is applied. This is intended to build a fundamental understand of memory from the ground up. I am not saying the human memory is built exactly like computer memory. What I am saying is memory is memory. It takes in and stores data from the environment and keeps it there indefinitely. With computers and people, there are no dropped bits. A dropped bit causes the system to quit functioning.

2. Elemental Memory Building Blocks - Logic Gates

A. The NOT Gate

The NOT Gate functions as follows:

1. When the input is turned ON, the output is turned OFF.
2. When the input is turned OFF, the output is turned ON.

The NOT gate reverses the input state as shown:

memory not gate

The NOT gate above has an electromagnet above the switch. Since the switch is open, there is no magnetic pull on the metal switch the switch sits in the closed position as shown on the left. Current is allowed to pass through the switch lighting the bulb on the other side.

Closing input (shown as switch one on the right) energizes the electro-magnet by applying current to it. The current goes into the coil wrapped around the electro-magnet and pulls the switch into the open position. This breaks the circuit (shown as two) and the light goes out.

The NOT Gate is represented by the symbol in the inset.

B. The AND Gate

The AND Gate operates as follows:

1. When both inputs are ON, the output is ON.
2. When either of the inputs are OFF, the output is OFF

The AND gates ands together two inputs as shown:

memory and gate

The AND Gate will allow current to pass and light the bulb when current is applied to both inputs. The AND Gate is easy to remember because it will light the bulb when current is applied to Input 1 AND Input 2.

The AND Gate is represented by the symbol in the inset.

C. The NOR Gate

The NOR Gate operates as follows:

1. When both inputs are OFF, the output is ON.
2. When either input in ON, the output is OFF.
3. When both inputs are ON, the output is OFF.

We are showing NOR in the example below so you can see exactly how it operates.

memory nor gate

On the left no current is applied to either Input 1 or 2. With no current applied current passes through the NOR Gate and lights the bulb. On the right current is applied to Input 2, the lower electro-magnet. This opens the lower switch. Current is allowed to pass through the first gate, however it is stopped by the second gate. Current applied to either input will stop current from going through this device.

The NOR Gate is slightly harder to understand than the other gates. This is because it turns ON when there is no input and OFF when there is input.

3. Memory Comes To Life With A Flip Flop

A Flip Flop is two NOR gates wired together as show below. When NOR gates are arranged this way an amazing thing happens. The simple device gains the ability to store data. Once a flip flop is set to a state, it will remain in that state until it is reset. That makes the flip-flop perfect for storing data. Once set, it will stay in either the ON or OFF state indefinitely.

A flip-flop is two NOR Gates combined as shown below in an arrangement below. The output of one gate is connected to the input of the other gate and vice versa:

memory nor gates in flip flop

Figure 1 shows the flip flop in state one, where the top output is OFF. Consider this system at rest. With no current applied to either input on the bottom NOR Gate, the output is turned ON. This cuts off current to the upper NOR Gate. The flip flop will remain in this state indefinitely barring outside influence.

Figure 2 shows current to the lower input of the bottom NOR gate.

Figure 3 shows output of the lower NOR gate turning OFF due to current applied to one of its inputs.

Figure 4 shows the output of the upper NOR gate turned ON due to no current applied to either input. Consequently current is applied to the lower NOR gate keeping it turned OFF.

Now the flip-flop is set to a second state where the upper NOR gate output is ON. It will stay that way and is at rest.

The flip-flop is an amazing piece of hardware. This simple arrangement of two NOR gates allows this device to store information. For example, if you have 16 flip flops you can store a 16 digit binary number. Merely set the digit 1 to state one and 0 to state two. When you set a number into the 16 flip flops that number will remain there indefinitely.

The flip flop forms the foundation for memory. Given enough flip flops we can store unlimited data. It is hard to imagine how nerves could get together to arrange themselves in this manner to give rise to memory in living things. Perhaps memory in humans is based on a completely different hardware structure however this is one way to store information into hardware - be it transistors or nerves.

4. Setting A Bit

A BIT is short for binary digit. It is the smallest piece of computer memory. It is capable of storing a single binary number, either zero or one. A computer bit is basically a flip flop wrapped in a few basic circuits. The flip flop is the hardware mechanism that stores the data. The illustration below shows how a bit is set with data input and a clock:

memory setting a bit

Figure 1 shows the bit at rest in OFF status. NOR Gate B is ON because there is no current on either input.

Figure 2 shows the input line turning ON.

Figure 3 shows the clock line turning ON. Note that both inputs on the lower AND gate are turned ON. Since both leads are ON, current passes through the AND gate into the lower NOR gate B. Input on either lead of NOR Gate B turns it OFF.

Figure 4 shows NOR Gate A turning ON because there is no current on either input. This lights the bulb and the bit is considered set or in the ON state.

Note: A computer clock is merely a device that turns ON and OFF it regular intervals. The ON/OFF cycles of the clock synchronize the movement of data in memory. The clock is connected to the input of the bit with AND Gates. For current to reach the bit the clock line must be turned ON. When the clock line is OFF nothing takes place because no current can reach the bit. The clock effectively slices time into discrete sections. When the clock is ON things happen. Switches can be set. When the clock is OFF nothing happens. Dividing time into segments of action/no action keeps data movement in memory sharp.

II. Wiring Memory Locations Together Into Continuous Memory

1. Memory Address Bus Building Blocks

Computer memory locations are wired together into continuous memory by an address bus. An address bus is the wiring that gives each specific memory location its own unique address. The address bus allows the computer to access one specific memory "mailbox" from among millions of available mailboxes.

There are two basic elements that make up an address bus as shown here:

Elemental memory components

1. The first element is the Gate shown left. When power is applied to the input the electromagnet switch is closes and current is allowed to pass. Conversely, when current is no current is applied the electromagnet opens and current cannot pass. We show this gate is a square.

2. The second element is the NOT Gate. When power is applied to the input the electromagnet the switch is opened and current is stopped. Conversely, when no current is applied to the electromagnet the switch closes and current is allowed to pass. We show the NOT Gate as a triangle.

A memory address bus, no matter how large, is made up from just these two elements. The square opens with current. The triangle closes with current. Creating an address bus is a matter of arranging these two building blocks into a matrix.

2. Memory Address Bus

The illustration below shows a section of an eight line memory address bus. The squares and triangles are arranged like binary numbers in a sequence. A square represents a one and a triangle represents zero. Each row of gates represents a unique binary number manifested in hardware.

The top row row is eight blue squares. This can be thought of as the memory address 11111111. The second row is 11111110. The third row is 11111101 and so on. The elements are arranged in a array so each row defines a unique number or memory address as shown:

eight bit memory bus

We are going to enter a binary number in the address register as shown on the lower left of the diagram above. The number we enter is 11111010. We enter it by opening or closing switches. In this case we close the first five switches, open the sixth, close the seventh, and open the eight.

The result is turning ON lines 1 to 5, and 7 and turning OFF lines 6 and 8.

On the right you can see how our memory matrix reacts to current on address lines:

1. All squares turn ON when current is applied.
2. All triangles turn ON when no current is applied.

Gates turned ON are shown in orange.

As you can see only one memory address matches the binary number entered on the bus. That is memory location 11111010. It is the only combination of squares and triangles that are lit allowing current to get all the way from left to right. The memory bus applies current to that one memory address only.

The arrangement of gates is how computers store and access data to and from unique memory addresses.

3. Full Memory Bit

This illustration below shows a full implementation of a computer bit. It shows the addition of an address line and a read/write line:

memory bit diagram

This is a computer bit. Here is how it works:

To Write Data (shown left):

1. Turn the address line ON
2. Turn the read/write line ON
3. Turn the clock line ON
4. Enter your information on the data line (ON for one, OFF for zero)

The illustration on the left shows the address line ON, read/write line ON, and data line ON. These AND together. The input state (ON or OFF) gets through to the second AND gate where it is ANDED with the clock line. When the clock line is ON the data sets into the bit.

reading data from a memory bit

To Read Data (shown right):

1. Turn the address line ON
2. Turn the read/write line OFF
3. Turn the clock ON

The address line, state of the bit, read/write line, and clock line are all ON. They AND together. This places the state of the bit (either ON or OFF) on the output line.

4. Memory Matrix

Memory bits are the same bit repeated thousands of times arranged into a matrix. The illustration below shows 16 bits arranged into a four by four memory matrix. Each bit is identical. The illustration shows how bits are connected via the address bus, data, read/write, clock, and output lines.

diagram memory matrix

Reading data is a matter of turning ON or OFF the various lines. For example the read/write line tells the computer whether you are reading data from a bit or writing data to it.

This 16-bit memory shown above is accurate. Memory in a computer is like this but there are more bits.

III. Central Processor Unit (CPU)

1. Overview Of A Processor

A computer processor consists of a small number of memory registers and a program counter.

The illustration below shows the exterior of a processor. The processor has 16 address lines (shown in red) and 16 data lines (shown in blue). It also has a read/write line (shown in green) and a clock line. This processor is intended to work with 16-bit memory as shown on the left. 16-bit memory has 16 address lines and 16 data lines. We wire our processor on the right to the memory on the left. Now we have a computer.

central processing unit

Our small 16-bit computer contains 65,000 memory locations. That is 2 to the 16th power. That is how many memory locations 16 address lines will support. Each memory location has 16 bits of data. The total number of bits our processor can support is 65,000 times 16 or 1,040,000 bits. With memory connected to the processor it can access any bit within its memory. Our processor's 16-bit wide architecture allows us to place a memory address in a data register and reach any location in memory.

2. Reading Data From Memory

Reading data from a memory location, into the processor, is done in three steps:

1. Load a memory address, of the data location to be read, into data register A.

2. Execute the "read memory" instruction.

3. The contents of the data at the memory address in register A, gets copied into register B.

The information is read into the processor immediately as shown here:

reading data from memory

3. Writing Data To Memory

Writing data from the processor to memory is a three step process too:

1. Move the memory address of the location to be read to, into data register A.

2. Move the data to be written into data register B.

3. Execute the "Write Data" instruction.

Writing data happens at immediately. The data will overwrite whatever is in the affected memory location.

writing data to memory

IV. Comparing Human Thought To Computer Processing

1. Thought As A Continuously Running Computer Program

A computer thinks by loading computer instructions into the processor and executing them. Once the processor has finished executing one instruction, it loads the next instruction and executes it. Each instruction is loaded into the processor on each cycle of the clock. The computer operates like a machine by executing one instruction at a time as the clock line turns ON and OFF. The clock keeps everything in order.

computer processor as thought

This illustration shows a simplified processor, with four data registers and a program counter. When the program counter increments, it moves the next program instruction into the the processor, then executes that current instruction.

Every processor has an instruction set. The instructions set is made up of the instructions that the processor can execute. Each instruction does one specific thing such as adding two numbers together. The instruction set is limited to instructions like adding, moving, or manipulating data. Each processor instruction does very little but in combination the instructions form a powerful programming language.

The processor executes each instruction one at a time as follows:

1. The computer program moves up.
2. A new instruction is loaded into the processor with each beat of the clock.
3. The instruction is executed.
4. The processor acts upon the data in its registers as dictated by the instruction.
5. Go to step one.

While a computer is capable of fantastic things, during any one moment it is doing very little. It only executes one instruction at a time. Each computer instruction involves movement or manipulation of very little data. The processing takes place within the processor's registers. The processor moves data from memory into its registers. However the manipulation and control of data takes place within the processor. The computer moves data from memory to the processor, operates on it, and moves it back to memory.

The data manipulations within the processor is awareness. The computer is aware of what is happening to the data inside its processor. The processor is surrounded by memory. However, data operations take place inside the processor. The difference between at large memory and data register memory inside the processor is that data registers are operated on and are under the direct control of the processor. It is the execution of instructions that manipulate data within in the processor that characterize awareness. The computer is aware of the movement and manipulation of data within its processor.

2. Program Execution As A Line Of Thought

As a programmer you must learn to read your program. Imagine you have completed programming for the day. Then you come back the next day. You open your program and read it. You read your program by putting yourself in the perspective of the processor. In other words, you start at the top of the program, with the first line, and mentally execute it. Then you go to the next line, exactly like the processor would do. Then you mentally execute that line. Then you go to the third line, and so on. If you are a good programmer and if your program is well written, you can follow the logic (the processor's path) from the first line to the last line, mentally interpreting each line as you go. If you can do that you know exactly what the program does.

Shown below is a sample computer program. Open your program and look at the first line. That is your initial point of focus. Like the processor, take in one line and mentally execute it to find out what it will do. The entire program may be thousands of lines long, but your focus at this moment is on the first line. You read a program by moving that point of focus down the page one line at a time. The red lines show how the processor moves from line to line through a computer program.

omputer program as line of thought

At times during the program you may enter a loop as shown above. During this time your point of focus starts at the first line of the loop. You mentally execute each line of the loop and then jump back to the top of the loop, as the processor would do. In the example above the program is reading email addresses from a database and printing the results to a table on the screen. Your point of focus may jump around physically in the program. Program execution jumps several lines after encountering an if statement. However the logic - the processor path through the program - remains the same. You mentally execute one instruction at a time from the first line of the program to the last.

Awareness operates like the focus within this program. Like the red line moving through the program, our awareness moves within the environment. Awareness acts like program execution within this program. Awareness, like program execution, is only at one place at a time.

At no time when reading a computer program do you mentally execute two instructions at once. Program execution happens sequentially. You look at one instruction and figure it out. Then you look at the next instruction and figure that out. This is how the awareness works. You focus on one thing and acknowledge it. Then you focus on the next thing and acknowledge that. As the processor interprets each instruction of a program sequentially, awareness acknowledges one thing sequentially. Awareness within the environment works like focus within a program. That is why thinking is called a line of thought. That is why awareness is called a point of view. 

3. Reality As Random Access Memory

Memory absorbs the environment as we move through life. The environment is made up of visual, sound, and other sensory stimuli, as well as any thought going on. The present moment is like the memory space of a computer. The environment is absorbed into memory. As each moment passes into memory as it happens. Essentially memory stores reality. Reality gets filed away in memory as we experience it. Here is a representation of the human mind and the computer model:

human mind as computer model

The Human Mind and The Computer Model are similar. Both are based on memory. Both have a processor that acts as the center of the universe. Both include everything that is going on at the moment.

4. How A Computer Could Saves Reality

Awareness is like a processor running a program. The environment is like random access memory surrounding the processor. Memory is like random access memory (RAM) containing everything going on inside the computer at that moment.

Random access memory (RAM) contains everything; the operating system, data input, and running applications. Likewise our memory in the present contains everything; the physical world, any thought going on, and any input being absorbed. Here is a diagram of our random access memory in the moment:

Diagram 5: Digital Memory Map

Computers have an internal clock or clock line. The internal clock sets a cadence for the computer by turning off and on. Inside a computer time is not continuous. Time is made up of beats or pulses. Instructions of a computer program are executed only when the clock line is ON.

The illustration above shows how the entire memory map of a computer could be read into long term memory each time the clock line turns ON. The entire memory map is being read onto long term memory on each beat of the clock. A system like this could save all realities from the beginning of time to the present. A system like this would save every memory space as it unfolds.

V. Achieving Perfect Memory Using Hardware Independence

1. Memory Provides a Mechanism To Store Three Dimensional Space

Perfect memory stores three dimensional space perfectly. We have seen how reality gets absorbed into the visual cortex. As we move through life we are absorbing bit-for-bit copies of the current environment into the visual cortex. Using memory we absorb each three dimensional space as we experience it. It happens in the background. We are totally unaware that this is happending. That is how we experience the surrounding environment as shown below:

Think of your as memory reaching out to absorb the present. The present - the outside world - is within memory. We live within memory always, even the present.

The present environment appears real to us. The rest of memory is real too in exactly the same way. Moments get absorbed into memory as we move through life. Awareness stays in the present moment. Just because awareness is not currently located within memories of the past does not mean that the memories of the past are not complete in every way. The memories of the past are just as real and complete as the present moment. We simply cannot realize past moments fully right now because our awareness is no longer in that moment. It is in the present.

If we could move awareness into a moment of the past we would experience that moment exactly like we experienced it the first time. That moment exists. It has not gone anywhere. We just cannot play it back at this time. That does not mean, however, that we will not realize past moments fully in afterlife.

2. Can Memory Store Moments Indefinitely?

If your mind is to going to capture and retain all moments throughout your lifetime we are going to need perfect memory. Is it possible for human memory to achieve this level of perfection? For this to be possible we need a memory device that can hold every moment you have ever experienced throughout your lifetime. These moments are complete realities including any thought going on at the time. We need to store them completely without ever dropping a bit. We are talking about a bit-for-bit recording of your entire lifetime.

This is a lofty ideal. It does not seem possible. Everyone knows that cells do live indefinitely. There is turnover of the memory hardware within the brain. It does not seem realistic that the brain can make it through 125 years in life without ever dropping a bit. It would seem that the underlying hardware would eventually fail and lose the data that was stored in that hardware.

3. Memory Perfecting Technique Called XOR

Human memory is not a fragile system. It does not come crashing down when a single brain cell fails. There are ways to lose brain cells without losing the data stored in them. The computer industry has techniques where a memory device can fail completely and not lose data. Computer memory repairs itself by swapping in fresh memory when old memory fails. It can recreate lost data and keep running perfectly. This is not the only way to maintain digital memory, however it is a way to do it.

The basis of this memory protection scheme is based on the XOR Gate. When it comes to memory the XOR Gate has magical properties. The XOR Gate is a logic device with two inputs and one output that works as follows:

1. If either input is ON and the other input OFF the output is ON.
2. If both inputs are ON output is OFF.
3. If both inputs are OFF output is OFF.

The diagram above shows an XOR Gate build from four NAND Gates. The logic table for the NAND Gate is shown on the lower left. Like an XOR Gate, a NAND Gate has two inputs and one output. If both inputs are ON current the output is OFF. If either or both inputs are OFF the output is ON.

Condition 1 (upper left) shows input 1 ON. NAND Gate A has one input one so it turns ON. NAND Gate B has two inputs ON so it turns OFF. NAND Gate C has one input ON so it turns ON. NAND Gate D has one input ON so it turns ON.

Condition 2 (upper right) shows both inputs ON. NAND Gate A has both inputs ON so it turns OFF. NAND Gate B has one input ON so it turns ON. NAND Gate C has one input ON so it turns ON. NAND Gate D has both inputs ON so it turns OFF.

Condition 3 (lower left) shows input 2 ON. Like condition 1 this turns the Gate ON.

Condition 4 (lower right) shows both inputs OFF. NAND Gate A has both inputs OFF so it turns ON. NAND Gate B has one input ON so it turns ON. NAND Gate C has one input ON so it turns ON. NAND Gate D has both inputs ON so it turns OFF.

The logic table for the XOR Gate is shown on the right.

4. Memory Hardware Independence Using XOR

We can achieve memory hardware independence by XOR'ing data across multiple memory devices. The multiple-drive XOR scenario works like this:

1. A block of data (Data A) is written to Drive One.
2. Another block of data (Data B) is written to Drive Two.
3. The two pieces of data are XOR'ed together and the result is written to Drive Three.

Shown on the left is Data A that includes six bits of data: 001100. This is written to Drive One. Data B also contains six bits: 111000. That data is written to Drive Two. Then Data A and Data B are XOR'ed together and the result is written to Drive Three: 110100.

The XOR'ed data does not necessarily have to be written to Drive Three. It can be written to any drive as shown in the second row:

1. Data C (001010) is written to Drive One.
2. Data D (110011) is written to Drive Three.
3. XOR (Data C and Data D) is written to Drive Two.

You can see how the data values are XOR'ed together on the left.

5. Recovering From Failure Without Data Loss

So what happens when a drive fails? That situation is shown here:

The illustration above shows Drive Two failing. The drive has failed without warning. All the data on Drive two has been lost.

However we can recover the data on Drive Two using the data on the two existing drives as follows:

1. Take the data on Drive One (Data A) and the data on Drive Three (XOR Data A and B) and XOR them together. The result is the data that was lost on Drive Two.

2. Similarly take the data found on Drive One (Data C) and the data on Drive Three (Data D) and XOR them together. The result is the data that was lost on Drive Two.

It does not matter what drive we lose. We can recover its lost data by XOR'ing the data on the remaining drives. In this case below we lose Drive Three:

To recover the lost data we do the same thing. Simply take the data on the existing drives, XOR it together., and the result is the missing data. No matter what drive we lose we can recover the lost data. We cannot however, lose two drives.

6. Hardware Independence By Replacement

Fully redundant memory requires replacement hardware. The illustration below shows how memory hardware can fail without losing memory:

Shown above are three drives in an XOR array. Then Drive Two fails. Here is how the computer handles the situation:

1. The computer detects that Drive Two has failed.
2. Drive Two is automatically removed. It is swapped out electronically.
3. Drive Two's backup is automatically installed in the array. It is swapped in electronically.
4. Drive Two's data is rebuilt by XOR'ing the data on Drives One and Three.
5. The result is written to the new Drive Two.

Memory is fully restored. New memory hardware is in place. This can be done logically. It requires no moving parts. Using a XOR system like this we can keep memory intact. Redundant memory hardware creates a robust system. Memory is not fragile. It can handle any mishap except for catastrophic failure of more than one drive. Here are a few things to consider:

1. An XOR memory array can take a severe hit to the hardware and not lose data. Memory repairs itself without moving parts.

2. XOR memory can recover data lost without warning. A Drive can suddenly go down and the system can recover. It essentially heals itself. Lost memory can be fully rebuilt from existing memory.

3. An XOR array works with any size data word and any number of drives greater than three. This means that we can protect a huge amount of data with very little additional hardware.

4. Humans spend one third of their life sleeping. XOR'ing data is the type of activity that takes place during sleep. Using an XOR array (or some variation of it) we are able to replace lost brain cells without affecting memory. A XOR system is capable of maintaining perfect memory throughout our lifetime by continuously replacing damaged hardware.

7. Dreams - The Mind's System Administrator

To those of us making a living as computer system administrators, our biggest fear is losing our client's data. A good system administrator will take steps to insure that no data is lost. It is not enough to merely monitor the situation. You have to build data integrity measures into your network.

On my local computer I use a technique called Time Machine. Time Machine works in the background. It makes copies of everything I do. Using Time Machine, the machine can be rebuilt should the primary drive fail. On my network I use a technique called Rsync. Rsync makes a copy of all files on another physical computer nightly.

Additionally, to safe guard memory, you need to introduce new hardware into the network from time to time. A new computer will last about five to ten years. It is a lot of work to build a new server, transfer everything onto it, and configure it so it all works correctly. However, if you expect perfect data over decades moving and copying data is absolutely necessary.

Is it possible to have perfect data over a 100 year life span? The answer is yes, providing you use memory safe guard techniques similar to those above. This is where dreams come in. The human mind is a data-absorbing machine. It takes in each moment's environment as it happens and files it away in memory. For this to happen over a lifetime, without ever dropping a bit, you would expect to see nightly maintenance. Dreams are necessary data maintenance taking place. If the mind were to take in each moment, file it in memory, and leave it, it would eventually fail. Instead the mind takes in each moment during the day, then performs data integrity maintenance during the night to keep memory intact.

Dreams are to the mind what the system administrator is to the network. Dreams do the necessary tasks, basically moving and organizing data, to see to it that memory remains perfect.

8. What Causes The End Of Life? Could It Be Memory Dropping A Bit?

Most people would say physical trama, such as sickness causes the end of life. I would say that physical trauma is an affect but not the main cause. I believe that life will continue as long as memory and information remain intact. The storing of each environment, over years and years, remains in memory, bit-for-bit, as it happened. As long as memory equals past realities, life will continue. When something occurs in memory so the checksum indicates memory is not intact (a failure - dropped bit), life stops in time at that moment. It is memory dropping a bit that causes the end of life. This happens immediately. When the first bit of a lifetime is dropped, life stops and the grand transition takes place.

VI. Memory And The Afterlife

1. What Is Addressable Memory?

Addressable memory is memory that is directly reachable in one clock cycle by the central processor. To be accessible, the processor needs to be able to load the entire memory address in its data register. The address must fit physically in the register. The processor data registers need to be wide enough, in bits, to reach every memory location in the memory space.

For example if you have memory addresses that are 16 bits long and you have a processor data register that is only 8 bits wide you cannot enter a memory address in the register. This means the processor can only reach a memory address that is 8 bits wide on a single clock cycle. Addressable memory space means that the processor can load the entire memory address in a data register to reach that address (read from it or write to it) in a single cycle of the clock. To access all of 16 bit memory, the processor's data registers must be 16 bits wide.

Humans absorb reality into memory. As the memories of past moments get absorbed into memory, it requires a lot of memory space to hold them all. For your time-space continuum to fit entirely within your memory it will take a lot of memory space. The processor data registers need to be wide in bits to be able to reach all this memory. The calculation of addressable memory shows that memory doubles with each additional address line.

Here is what that geometric progression of addressable memory looks like:

2 data lines yield 4 memory locations
3 lines yield 8 locations
4 lines yield 16 locations
5 lines yield 32 locations
6 lines yield 64 locations
7 lines yield 128 locations
8 lines yield 256 locations

Each additional data line doubles addressable memory. As lines are added, addressable memory skyrockets at an accelerating pace. Memory growth is exponential as shown here:

This equation is read as follows:

Memory is equal to two to the number of data lines power.

Every memory location can be directly accessed in a single cycle of the clock.

2. 64-Bit Memory

A 64-bit computer has CPU registers, address lines, and memory locations that are 64 bits wide. It has 64 data lines throughout its architecture. A 64-bit processor can reach 2 to the 64th power or 18446744073709551616 unique memory addresses. This number is in excess of 18 quintillion. Hence, a processor with 64-bit memory addresses can directly access 2 to the 64th power of addressable memory locations each holding 64 bits of data as shown here:

The equation above shows the size of memory available to a processor that has 64 bit memory. The number 18,446,744,073,709,551,616 is an LARGE number. However the amount of data lines required is just 64. The physical size of the brain is large enough to accommodate a 64-bit processor with all addressable memory. If you began storing realities into a memory this size you could hold a lot of them before you ran out of memory.

3. Data-word / Memory Relationship In A 64-Bit Computer

Most people believe that when the number of data lines doubles the power of the computer doubles. They say, great, my 64-bit computer is twice as powerful as my 32-bit computer. That isn't how it works. The addressable memory doubles with each additional data line. A 64-bit computer has doubled 32 consecutive times.

A data word is the size of the registers in a processor in bits. It equals the number of data lines in the computer. In a 64-bit computer, a data word is 64 bits long. The data word is also the size of each memory location. In a 64-bit computer, each memory location contains 64 bits of information. This equation expresses the relationship between the data word (processor register width) and surrounding memory.

Thought, in a human, is analogous to data movement in a processor. A computer will load data into the registers of the processor and then act on that data. It may be moving a 64-bit data word into a register, a 64-bit memory address into another register, then moving that data from the processor register to that memory location on a single cycle.

During that cycle the computer acts on those registers. In a sense, the computer is awareness of the data it is acting upon at that moment. The relationship between the data being acted upon versus all other data in the computer is expressed above.

4. Memory/Processor As Memory/Awareness

The memory/processor relationship in computer provides an accurate model for the memory/awareness model in humans. Computers, at any one moment, focus on an infinitesimally small amount of data. Yet it is surrounded by a large environment. The computer focus is on a single clock cycle.

Humans focus on a single moment too. It is called the present. The computer model assists us in seeing this relationship between awareness and memory. Without the computer model we would have a tendency to over estimate the information we are aware of at any one time. We also under estimate the information making up the surrounding environment.

The true relationship between awareness (information we focus on) and the surrounding environment (memory) is the same as a computer. That relationship looks like this:

A 64-bit computer yields memory that is astronomically large and a data word that is infinitesimally small in comparison. A 64-bit computer is used for illustration purposes. I have no idea of the size of the data word in the human mind, or even if its binary. However the relationship between the data under direct computer control and its surrounding memory holds true for both computers and humans.

5. The Mind As Space/Time Made Possible By Memory

Memory in humans absorbs each surrounding environment as it unfolds. In humans, memory requirements are much larger than computers. In humans, we not only absorb and file away the present environment, we absorb and file away all moments throughout our lifetime.

In computers, this would be like saving all random access memory on each cycle of the clock for over 100 years. It may seem like an insurmountable task to store this much data but it's not. Adding just one data line doubles memory. As data lines are added, the amount of addressable memory goes up exponentially. You don't need to add that many data lines to absorb and store a lifetime of environments.

Even a 64-bit computer is formidable in its memory store capacity. A 64-bit memory contains 2 to the 64th power memory locations which is roughly 18,000,000,000,000,000,000 locations. Each location holds 64 bits of data. So a 64-bit computer can hold and directly access 144,000,000,000,000,000,000 bytes of data.

Assume our data input requirement to capture reality as it unfolds is 1,000,000,000 bytes per second (1000 megabytes/second). At that data rate we could store 1,440,000,000,000 seconds. Assuming there are 100,000 seconds in a day we could store 14,400,000 days. There are 100,000 days in a lifetime, or 200 years.

The diagram above shows the memory requirements to capture every moment, intact, from the time awareness starts, to the time it stops. I am not a mathematician, but according to what I'm seeing a 64-bit computer is more than capable of storing a lifetime. It appears that a 64-bit computer could do the job.

6. Conclusion - How Information Proves Afterlife

All environments thoughout a lifetime exist in memory as we experienced them. They are with us always. At the end of life, we have a memory repository full of envirionments having been collected over a lifetime. Memory is a time/space continuum; a universe filled with people, experiences, thoughts, love, compassion, ect. It looks like this. At this point we are setup with the huge, unlimited, store of realities just waiting to be realized.

During life, conscious awareness resides in the present, at the right side of the diagram. In afterlife, conscious awareness expands in all dimensions - length, width, depth, and time. It is no longer a point at the right side. It is everywhere. Awareness goes everywhere in memory. It is no longer restricted to the present. It can go anywhere in time. It is no longer restricted to a point of view. It can go anywhere in space. Awareness becomes time and space without bound. It is everything. It is memory.

During life we are aware of information in our central processor. At the end of life we are aware of information in memory. Visually it can be imagined as awareness expanding throughout memory, similar to the big bang origin of the universe. How much does awareness expand? Given a 64-bit computer for example, we will become aware of 18,446,744,073,709,551,616 times more information in afterlife than during life. This order of magnitude give us an idea of what happens when awareness expands throughout time/space in afterlife.

This concludes proof of afterlife by information.


Conclusion To Proof Of Afterlife By Information