The Information (105 page)

Read The Information Online

Authors: James Gleick

Tags: #Non-Fiction

Poincaré, Henri,
9.1
,
12.1

polarization states,
13.1
,
13.2

Pope, Alexander

Porsche

Preece, William

Preskill, John,
13.1
,
13.2

Prime Computer

prime numbers,
12.1
,
12.2
,
13.1

Primrose, Frank

Prince

Princeton University,
6.1
,
6.2
,
6.3

Principia Mathematica
(Russell, Whitehead),
6.1
,
6.2
,
6.3
,
6.4
,
6.5
,
6.6
,
6.7

Principles of Psychology
(James)

Printing Press as an Agent of Change, The
(Einstein)

printing technology,
prl.1
,
3.1
,
4.1
,
4.2
,
15.1
,
15.2
,
15.3

probability

calculations for control of redundancy in messages,
7.1
,
7.2

in measurement of information,
7.1
,
7.2
,
7.3
,
8.1
,
12.1

as problem for quantum computing,
13.1
,
13.2

qualities of randomness and

statistical analysis of language,
7.1
,
7.2
,
7.3
,
7.4

in stochastic processes

in thermodynamics,
9.1
,
9.2
,
9.3
,
9.4

Turing’s ban unit of,
7.1
,
7.2

Problems of Information Transmission,
12.1
,
12.2

programming

to generate random numbers,
12.1
,
12.2

Lovelace’s operations for Analytical Engine as,
4.1
,
4.2

of Turing machine states,
7.1
,
7.2
,
7.3
,
8.1
,
12.1
,
12.2

proteins,
10.1
,
10.2
,
10.3
,
10.4
,
10.5
,
10.6
,
10.7

pseudorandom numbers

psyche

Psycho-Acoustic Laboratory

psychology,
8.1
,
8.2
,
8.3
,
8.4
,
8.5
,
8.6
,
8.7
,
8.8
,
8.9

Pulgram, Ernst

quadratic equations

quantum information science

computing based on,
13.1
,
13.2
,
13.3
,
13.4

conceptual basis,
13.1
,
13.2
,
13.3
,
13.4

entanglement in,
prl.1
,
13.1
,
13.2
,
13.3
,
13.4

first encoded message based on,
13.1
,
13.2
,
13.3

future applications of

measurement units in,
13.1
,
13.2

problem of black holes in,
13.1
,
13.2
,
13.3

scope of,
prl.1
,
prl.2

Shannon’s contribution to,
13.1
,
13.2

superposition principle in

quantum physics

of black holes

complementarity concept in

conflicting theories in,
13.1
,
13.2

entanglement

incompleteness theorem and,
12.1
,
12.2

see also
quantum information science

Quastler, Henry

qubits,
prl.1
,
13.1
,
13.2
,
13.3
,
13.4
,
13.5

queuing theory

Quittner, Joshua

Ramanaujan, Srinivasa

randomness

Chaitin’s insight

coded data disguised by

complexity perceived as,
12.1
,
12.2

computability and,
12.1
,
12.2
,
12.3

computer programs to generate,
12.1
,
12.2

data compression and,
12.1
,
12.2

definition of

frequency of, among numbers

information-carrying capacity of

interesting numbers and,
12.1
,
12.2

mathematical proof of,
12.1
,
12.2

in quantum cryptography

recognition of,
12.1
,
12.2
,
12.3

statistical normality in

tables of random numbers,
7.1
,
12.1
,
12.2

Ratio Club,
8.1
,
8.2

Rattray, Robert Sutherland,
1.1
,
1.2

Ratzenberger, Caspar,
14.1
,
14.2

Rayleigh, Lord

“recoding” of information,
8.1
,
8.2

recordings,
2.1
,
5.1
,
5.2
,
12.1
,
12.2
,
12.3
,
14.1
,
14.2

recursive procedures

in algorithmic proof of randomness,
12.1
,
12.2

in Lovelace’s operations for Analytical Engine

paradoxes based on,
6.1
,
6.2

in Turing machine operations,
7.1
,
7.2

in use of alphabetical ordering systems

redundancy

control of, for communication,
7.1
,
7.2

in English language,
1.1
,
1.2
,
7.1
,
7.2
,
8.1
,
8.2
,
8.3

in genetic code

information content and

in language of talking drums,
1.1
,
1.2

mathematical modeling of

in oral literature

predictability and,
7.1
,
7.2
,
8.1
,
12.1

to prevent telegraph errors

quantifying, in measurement of information,
7.1
,
7.2

in quantifying message value

role of, in language,
1.1
,
1.2
,
7.1

significance of, in cryptanalysis

Regiomontanus

relays, electrical,
5.1
,
6.1
,
6.2
,
6.3
,
6.4
,
6.5
,
7.1
,
8.1
,
8.2
,
8.3

“Reliable Circuits Using Less Reliable Relays” (Shannon)

Reuss, Christoph

Revere, Paul,
1.1
,
7.1

rhyme

rhythm

ribosomes

RNA,
10.1
,
10.2
,
10.3
,
11.1
,
13.1
,
13.2

RNA Tie Club,
10.1
,
10.2

Roget, Peter

Romme, Gilbert

Roosevelt, Franklin D.,
prl.1
,
prl.2
,
7.1

Rosen, Nathan

Ross, Alex

RSA encryption

Russell, Bertrand,
5.1
,
5.2
,
6.1
,
6.2
,
6.3
,
6.4
,
6.5
,
7.1
,
8.1
,
8.2
,
12.1

Russell’s paradox,
6.1
,
6.2
,
12.1

Safire, William,
3.1
,
11.1

Sagan, Carl

sampling,
6.1
,
6.2
,
7.1
,
7.2
,
12.1

Sapir, Edward

Savage, Leonard,
8.1
,
8.2

Schilling, Pavel

Schrödinger, Erwin,
9.1
,
10.1
,
10.2
,
13.1

science

as algorithmic process,
12.1
,
12.2

data compression in laws of

evolution of language for development of,
3.1
,
3.2
,
3.3

limits to knowledge in,
12.1
,
12.2

in Soviet Union

see also specific discipline

science fiction,
epl.1
,
epl.2

Scientific American,
5.1
,
6.1
,
7.1
,
8.1
,
8.2
,
11.1
,
12.1

Scott, E. Erskine

search engines,
15.1
,
epl.1
,
epl.2
,
epl.3

second law of thermodynamics,
8.1
,
9.1
,
9.2
,
9.3
,
9.4
,
9.5

Secret Corresponding Vocabulary, The
(Smith)

self-awareness,
prl.1
,
2.1
,
2.2
,
2.3
,
2.4

Selfish Gene, The
(Dawkins),
10.1
,
11.1
,
11.2

selfish genes,
10.1
,
10.2
,
10.3
,
10.4
,
11.1

self-organizing systems

self-referencing,
6.1
,
6.2
,
6.3
,
7.1
,
7.2

self-replication

as ability of living organisms

of chain letters,
11.1
,
11.2
,
11.3

crystal capacity for

disease analogy,
11.1
,
11.2

DNA

machine,
8.1
,
8.2

as mission of genes,
10.1
,
10.2
,
10.3
,
10.4
,
10.5
,
10.6
,
10.7

through imitation

see also
meme(s)

semiconductor

sensory processing

server farms,
11.1
,
14.1

set theory,
6.1
,
6.2

Shaffner, Taliaferro

Shakespeare, William,
3.1
,
3.2

Shannon, Betty Moore,
7.1
,
7.2

Shannon, Catherine Wolf

Shannon, Claude,
8.1
,
8.2
,
8.3
,
8.4
,
8.5
,
8.6
,
13.1

ballistics research of,
6.1
,
6.2

at Bell Labs,
prl.1
,
prl.2
,
6.1
,
7.1
,
7.2
,
7.3
,
7.4
,
7.5

in Conference on Cybernetics,
8.1
,
8.2
,
8.3
,
8.4
,
8.5
,
8.6
,
8.7
,
8.8

cryptography work of,
prl.1
,
prl.2
,
6.1
,
6.2
,
6.3
,
7.1
,
7.2
,
7.3
,
7.4
,
7.5
,
7.6
,
7.7

data compression studies of,
prl.1
,
prl.2
,
12.1
,
12.2
,
12.3

early life and education,
6.1
,
6.2
,
6.3
,
6.4

early studies in symbolic logic,
6.1
,
6.2
,
6.3
,
6.4
,
6.5

information storage studies of,
7.1
,
7.2

Kolmogorov and,
12.1
,
12.2

master’s thesis of,
6.1
,
6.2
,
6.3

maze-navigating machine of,
8.1
,
8.2
,
8.3
,
8.4
,
8.5

on meaning in messages,
prl.1
,
7.1

measurement of information by,
prl.1
,
6.1
,
6.2
,
9.1
,
9.2
,
14.1

at MIT,
prl.1
,
6.1
,
6.2
,
6.3
,
6.4
,
6.5
,
6.6
,
6.7
,
6.8
,
8.1
,
12.1

at Princeton,
6.1
,
6.2

quantum information science and,
13.1
,
13.2

statistical analysis of language by,
7.1
,
7.2
,
7.3
,
7.4

study of redundancy in language by,
1.1
,
1.2
,
7.1
,
7.2

theory of information,
prl.1
,
prl.2
,
prl.3
,
7.1
,
7.2
,
7.3
,
7.4
,
7.5
,
7.6
,
7.7
,
7.8
,
7.9
,
7.10
,
7.11
,
7.12
,
7.13
,
8.1
,
8.2
,
8.3

on thinking machines,
8.1
,
8.2

Turing machine analysis by

Wiener and,
8.1
,
8.2
,
8.3
,
8.4
,
8.5
,
8.6
,
9.1
,
9.2

work with Differential Analyzer,
6.1
,
6.2
,
6.3

Shannon, Mabel Catherine Wolf

Shannon, Norma Levor,
6.1
,
6.2
,
6.3

Shannon entropy,
7.1
,
7.2
,
10.1
,
10.2

Shannon-Fano coding

Shannon limit

Shaw, George Bernard

Shockley, William

Shor, Peter,
13.1
,
13.2

signal distortion;
see
noise

signals and signaling

Babbage’s occulting light for

brain function as

fire beacons

historical evolution of,
1.1
,
1.2

lighthouses

nature of telephone communication,
6.1
,
6.2
,
6.3
,
6.4
,
6.5
,
6.6

in neurological disorders

power of writing,
2.1
,
2.2

in telegraphy before electricity,
5.1
,
5.2
,
5.3
,
5.4
,
5.5
,
5.6

in telegraphy before Morse code,
5.1
,
5.2
,
5.3
,
5.4
,
5.5

for telephone switching,
6.1
,
6.2

see also
Morse code

signal-to-noise ratio,
8.1
,
8.2
,
15.1

Simpson, John,
3.1
,
3.2
,
3.3
,
3.4
,
3.5

Other books

Lisa Shearin - Raine Benares 01 by Magic Lost, Trouble Found
Glass Heart by Amy Garvey
Indefensible by Pamela Callow
Secrets & Surrender 3 by L.G. Castillo
Magus (Advent Mage Cycle) by Raconteur, Honor