Engineering permanence in finite systems

Information Systems, Norwich University, Northfield, Vermont, USA
DOI
10.7287/peerj.preprints.2454v2
Subject Areas
Human-Computer Interaction, Adaptive and Self-Organizing Systems, Emerging Technologies, Optimization Theory and Computation, Software Engineering
Keywords
invariants, genetic algorithm, optimization, commensurability, cybernetics, category theory, quantum theory, IBM z/OS, Windows, zero-knowledge protocols
Copyright
© 2016 Bilar
Licence
This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Preprints) and either DOI or URL of the article must be cited.
Cite this article
Bilar D. 2016. Engineering permanence in finite systems. PeerJ Preprints 4:e2454v2

Abstract

The man-machine integration era (MMIE) is marked by sensor ubiquity, whose readings map human beings to finite numbers. These numbers processed by continuously changing, optimizing/learning, finite precision, closed loop, distributed systems are used to drive decisions such as insurance rates, prison sentencing, health care allocations and probation guidelines. Optimization and system parameter tuning is increasingly left to machine learning and applied AI. One challenge we face is thus: Ensuring the indelibility, the permanence, the infinite value of human beings as optimization-resistant invariants in such system environments. In this challenge paper, we propose developing safeguards, specifically working towards a 'deontological imprimatur' architecture embedding resilient representations of human beings.

Author Comment

The submission limit is now 2 pages, so I used the extra space to add explanations for hitherto terse material (eg 'deontological imprimatur'), in addition to structuring the paper slightly differently.

I submitted this to Artificial Intelligence in Computer Security workshop (AICS 2017) as a challenge/position paper http://www-personal.umich.edu/~arunesh/AICS2017/cfp.html on Nov 11, 2016