The Information (98 page)

Read The Information Online

Authors: James Gleick

Tags: #Non-Fiction

BOOK: The Information
6.91Mb size Format: txt, pdf, ePub

Chappe, Claude,
5.1
,
5.2
,
5.3
,
5.4
,
5.5
,
5.6
,
5.7

Chappe, Ignace,
5.1
,
5.2
,
5.3

Chappe, Pierre

Chappe, René

Charles Albert, King of Sardinia,
4.1
,
4.2

Cherry, Colin

chess-playing machines,
8.1
,
8.2

China,
1.1
,
2.1
,
2.2
,
2.3
,
3.1

Chomsky, Noam

chromosomes,
6.1
,
7.1
,
9.1
,
9.2
,
10.1
,
10.2

Churchill, Winston,
prl.1
,
prl.2
,
7.1

circularity

in defining words,
3.1
,
3.2

Gödel’s critique of
Principia Mathematica,
6.1

in paradoxes

Clark, Josiah Latimer

Clarke, Roger T.

classification,
2.1
,
2.2
,
2.3
,
2.4
,
2.5
,
2.6
,
3.1
,
3.2

Clausius, Rudolf,
9.1
,
9.2
,
9.3

Clauson-Thue, William,
5.1
,
5.2
,
5.3

Clement, Joseph,
4.1
,
4.2

clocks, synchronization of,
1.1
,
5.1
,
5.2
,
5.3
,
5.4

cloud, information,
14.1
,
14.2

clustering

Clytemnestra

code

attempts to reduce cost of telegraphy,
5.1
,
5.2

Babbage’s interest in

cipher and compression systems for telegraphy,
5.1
,
5.2
,
5.3
,
5.4
,
5.5
,
5.6

Enigma,
7.1
,
7.2
,
7.3

genetic,
10.1
,
10.2
,
10.3
,
10.4
,
10.5
,
10.6
,
10.7
,
10.8
,
10.9
,
10.10

in Jacquard loom operations

Morse,
prl.1
,
1.1
,
1.2
,
1.3
,
1.4
,
5.1
,
5.2
,
5.3
,
5.4
,
6.1
,
11.1

as noise

for printing telegraph

Shannon’s interest in,
prl.1
,
6.1
,
7.1

telegraphy before Morse code,
5.1
,
5.2
,
5.3
,
5.4
,
5.5
,
5.6
,
5.7

see also
cryptography

coding theory,
8.1
,
8.2
,
10.1
,
12.1

cognitive science,
8.1
,
8.2
,
8.3
,
8.4

Colebrooke, Henry

collective consciousness,
epl.1
,
epl.2
,
epl.3
,
epl.4
,
epl.5

Colossus computing machine

Columbus, Christopher

combinatorial analysis,
6.1
,
10.1
,
10.2

communication

by algorithm

with alien life-form,
12.1
,
12.2
,
12.3
,
12.4
,
12.5

Babbage’s mechanical notation for describing,
4.1
,
4.2
,
5.1

constrained channels of,
2.1
,
2.2

disruptive effects of new technologies in,
15.1
,
15.2

emergence of global consciousness,
epl.1
,
epl.2
,
epl.3

evolution of electrical technologies for,
5.1
,
5.2
,
6.1
,
6.2

fundamental problem of,
prl.1
,
7.1
,
7.2
,
8.1

human evolution and,
prl.1
,
prl.2

implications of technological evolution of,
15.1
,
15.2

information overload and,
epl.1
,
epl.2

knowledge needs for,
12.1
,
12.2
,
12.3

in origins of governance

Shannon’s diagram of,
7.1
,
7.2
,
7.3

as stochastic process

symbolic logic to describe systems of

system elements,
7.1
,
7.2

in Twitter,
epl.1
,
epl.2

see also
talking drums; telegraphy; telephony; transmission of information

compact disc,
prl.1
,
8.1
,
epl.1

complexity,
12.1
,
12.2
,
12.3
,
12.4
,
12.5
,
12.6
,
12.7
,
12.8
,
12.9

compression of information;
see
data compression

“Computable Numbers, On” (Turing),
7.1
,
7.2
,
12.1

computation

in Babylonian mathematics,
2.1
,
2.2

computable and uncomputable numbers,
7.1
,
7.2
,
7.3
,
7.4
,
12.1
,
12.2
,
12.3

of differential equations,
4.1
,
4.2

in evolution of complex structures

human computers,
4.1
,
4.2
,
4.3

thermodynamics of,
13.1
,
13.2
,
13.3
,
13.4

Turing machine for,
7.1
,
7.2
,
7.3
,
7.4
,
7.5
,
7.6

see also
calculators; computers

computer(s)

analog and digital,
8.1
,
8.2

chess-playing,
8.1
,
8.2

comparison to humans,
8.1
,
8.2

cost of memory storage

cost of work of,
13.1
,
13.2

early mechanical,
prl.1
,
4.1
,
4.2
,
4.3
,
4.4
,
4.5
,
4.6
,
8.1

growth of memory and processing speed of,
14.1
,
14.2
,
14.3
,
14.4

inductive learning in

perception of thinking by,
8.1
,
8.2
,
8.3
,
8.4

public awareness of

quantum-based,
13.1
,
13.2
,
13.3
,
13.4

Shannon’s information theory in,
prl.1
,
6.1
,
7.1
,
7.2
,
8.1
,
8.2

significance of information theory in development of

spread of memes through

Turing’s conceptualization of,
8.1
,
8.2
,
8.3

universe as,
14.1
,
14.2

see also
calculators; computation; programming

Conference on Cybernetics,
8.1
,
8.2
,
8.3
,
8.4
,
8.5
,
8.6
,
8.7
,
8.8
,
8.9
,
8.10
,
8.11
,
8.12

Connolly, Sean J.

consciousness,
2.1
,
2.2
,
8.1
,
8.2
,
epl.1
,
epl.2
,
epl.3

continuous signal systems,
6.1
,
7.1

Cooke, William,
5.1
,
5.2

Cooper, Pat

Coote, Edmund

Coy, George W.

Crick, Francis,
10.1
,
10.2
,
10.3
,
10.4
,
10.5

Crow, James F.
n

cryptography

assessment of system security

Babbage’s work in,
5.1
,
5.2

early strategies,
5.1
,
5.2

Enigma system of,
7.1
,
7.2

information theory and

mathematics of,
5.1
,
5.2
,
5.3
,
7.1
,
7.2

mental skill for

pattern recognition in,
7.1
,
7.2

perfect cipher system

popular interest in,
5.1
,
5.2

quantum,
13.1
,
13.2
,
13.3
,
13.4

RSA encryption

Shannon’s work on,
prl.1
,
prl.2
,
7.1
,
7.2
,
7.3
,
7.4
,
7.5
,
7.6

Turing’s work on,
7.1
,
7.2
,
7.3
,
7.4

voice encryption,
7.1
,
7.2

writing and,
5.1
,
5.2

see also
code

Other books

The Coral Thief by Rebecca Stott
Corrected by the Colonel by Celeste Jones
Better Late Than Never by Stephanie Morris
The Lady and the Captain by Beverly Adam
Walk With Me by Annie Wald
Morgan's Law by Karly Lane
Apophis by Eliza Lentzski
A Sight for Sore Eyes by Ruth Rendell
Hot Milk by Deborah Levy