Warning: mysqli::__construct(): (HY000/1203): User howardkn already has more than 'max_user_connections' active connections in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\includes\artfuncs.php on line 21
Failed to connect to MySQL: (1203) User howardkn already has more than 'max_user_connections' active connections
Warning: mysqli::query(): Couldn't fetch mysqli in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\index.php on line 66
Article <v4df07$1te0b$1@dont-email.me>
Deutsch   English   Français   Italiano  
<v4df07$1te0b$1@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!weretis.net!feeder8.news.weretis.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: olcott <polcott333@gmail.com>
Newsgroups: comp.theory,sci.logic
Subject: Re: D correctly simulated by H proved for THREE YEARS --- rewritten
Date: Wed, 12 Jun 2024 19:37:27 -0500
Organization: A noiseless patient Spider
Lines: 42
Message-ID: <v4df07$1te0b$1@dont-email.me>
References: <v45tec$4q15$1@dont-email.me> <v46na7$3ifov$4@i2pn2.org>
 <v48be9$rgsh$1@dont-email.me> <v48gh6$3kcoe$4@i2pn2.org>
 <v48jv2$se9c$1@dont-email.me> <v49dge$3kcoe$5@i2pn2.org>
 <v4a0hs$157ic$3@dont-email.me> <v4ak5o$3kcoe$6@i2pn2.org>
 <v4am8r$19edk$1@dont-email.me> <v4b17k$3nf9n$2@i2pn2.org>
 <v4b48k$1f89t$4@dont-email.me> <v4c12t$3oop0$4@i2pn2.org>
 <v4ck2c$1o4b4$2@dont-email.me> <v4d9gt$3qbnc$2@i2pn2.org>
 <v4daoq$1sioe$2@dont-email.me> <v4dbun$3qbnc$4@i2pn2.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Thu, 13 Jun 2024 02:37:28 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="72fba8c553b5e17b65491f92678bf7b8";
	logging-data="2013195"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX183K33Z6Xibx9zr1g9fwdsu"
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:Ftnxr1hiqX/rDSv0FVcbDIWQwwQ=
In-Reply-To: <v4dbun$3qbnc$4@i2pn2.org>
Content-Language: en-US
Bytes: 3155

On 6/12/2024 6:45 PM, Richard Damon wrote:
> On 6/12/24 7:25 PM, olcott wrote:
>> On 6/12/2024 6:03 PM, Richard Damon wrote:
>>> On 6/12/24 12:57 PM, olcott wrote:
>>>> On 6/12/2024 6:33 AM, Richard Damon wrote:
>>>>>
>>>>> As I pointed out, there ARE finite-string transformations that do 
>>>>> it, that is a UTM.
>>>>>
>>>>
>>>> On 5/29/2021 2:26 PM, olcott wrote:
>>>> https://groups.google.com/g/comp.theory/c/dTvIY5NX6b4/m/cHR2ZPgPBAAJ
>>>>
>>>> Unless you show every single step of D correctly simulated
>>>> by H that reaches the simulated "ret" of D all you have
>>>> is bluster utterly bereft of any supporting reasoning.
>>>
>>> Why, because the claim isn't about the simulate by H, but the 
>>> behavior of the difectly executed D(D), or its simulation by a UTM.
>>>
>>
>> H(D,D) must compute the mapping from its finite string input
>> transforming the finite string of its input into the behavior
>> that it specifies using finite string transformation rules.
> 
> Yes, it only CAN do what it can compute, but what it MUST do is answer 
> the question posed to it, which might be impossible. And that Question 
> is about the behavior of the direct execution of the machine represented 
> by its input.
> 

*H is not even being asked that question*
H is being asked about the behavior that its finite string
inputs maps to via a set of finite string transformation rules.

H is not answering the question that is in your head.
H is answering the question that it is being asked.

-- 
Copyright 2024 Olcott "Talent hits a target no one else can hit; Genius
hits a target no one else can see." Arthur Schopenhauer