ࡱ> fhgM O%bjbj== "LWWbl,,,@vvv8d@?h:   !!!A?C?C?C?C?C?C?$*A JCxg?,!!!!!g?% |?%%%!8 , A?%!A?%%?.U;,E= . p-@6 v"q<"E=?0?<C+#nCE=%@@Digital Immortality Gordon Bell and Jim Gray 1 October 2000 Technical Report MSR-TR-2000-101 Microsoft Research Microsoft Corporation 301 Howard Street, #830 San Francisco, CA, 94105 Digital Immortality Gordon Bell and Jim Gray Microsoft Research {GBell, Gray} @ Microsoft.com Digital immortality, like ordinary immortality, is a continuum from enduring fame at one end to endless experience and learning at the other, stopping just short of endless life. Preserving and transmitting your ideas is one-way immortality: allowing communication with the future. Endless experience and leaning is two-way immortality: allowing you, or at least part of you, to communicate with the future in the sense that artifact continues to learn and evolve. Current technology can extend corporal life for a few decades. Both one-way and two-way immortality require part of a person to be converted to information (Cyberized), and stored in a more durable media. We believe that two-way immortality where ones experiences are digitally preserved, and which then take on a life of their own will be possible within the this century. We are exploring points along the one-way two-way spectrum in our Cyber All Project [1,2]. Hamarabi, Aristotle, Shakespeare, Mozart, Rembrandt, and Euler are immortal or at least their ideas are. They each recorded their ideas in enduring form that could be passed on to the future. These great ideas, images, music, writing, architecture, and even algorithms will survive as long as people do. Of course these people are dead, but their ideas are effectively immortal. Paper and then the printing press made it easier and less expensive to record, preserve, and disseminate ideas. Voice recorders, cameras, and camcorders now make it easy to record events and sometimes, even experiences. Moores Law is bringing recording costs down to the point where you can record everything you see and hear. Digital technologies offer new kinds of information we can convey to the future. They allow almost anyone to create his or her own immortality for any sized community: either a familys future generations or an intellectual community. Web sites e.g.  HYPERLINK "http://www.123456789.net" www.123456789.net,  HYPERLINK "http://www.legacy.com" www.legacy.com,  HYPERLINK "http://www.forevernetwork.com" www.forevernetwork.com and  HYPERLINK "http://www.memorymountain.com" www.memorymountain.com offer (for a fee) to store letters, essays, photos, videos and stories forever in order to pass them on to future generations. These are the digital equivalents of tombs, crypts, and libraries. Future technologies will surely enhance our ability to convey ideas and experiences creating a one-way relationship with future generations (should they care to listen or look.) Even today it is becoming reasonable to record everything we read and hear. For example, retaining every conversation a person has ever heard requires less than a terabyte (for adequate quality). Gordon Bell is engaged in building a personal archive along the lines envisioned by Bush [4]and Gates [5] as a memory aid and research tool. The Cyber All Project is a store for documents, photos, music, audio, and video recordings. Bells archive is currently about 12 gigabytes, including the store for 4 books, 20 encoded video lectures, 150 music CDs, several thousand documents, and an archive of email messages. It has and has an accumulation rate of two gigabytes per year. This rate will increase as speech and video are added but it is still a fairly modest expense. Indeed, the real cost of an archive is in the data capture, data organization, and data presentation. That is where our research efforts are directed. Table 1 gives the requirements for storing various media for a lifetime at modest fidelity. Within 5-10 years, personal stores of a terabyte will cost of a few hundred dollars hence a person will can be immortal in terms of the media theyve encountered. For famous people, one will be able to access their entire life. Table 1. Estimated lifetime storage requirementsData-typesRate (Bytes/hour)Per day / per 3 yearLifetime amountread text, few pictures200 KB2 10 MB / GB60-300 GBEmail, papers, written text0.5 MB / GB15 GBphotos w/voice @100KB200 K2 MB / GB60 GBphotos @200 KBTen images/day2 MB / GB150 GBspoken text @120wpm43 K0.5 MB / GB15 GBspoken text @8Kbps3.6M40 MB / GB1.2 TBmusic or high quality sound60 M60 MB / GB5.0 TBvideo-lite 50Kb/s POTS22 M0.25 GB/TB25 TBvideo 200Kb/s VHS-lite90 M1 GB/TB100 TBDVD video 4.3Mb/s1.8 G20 GB/TB1 PB There are many unresolved technical and social issues associated with the Cyber All Project. How should the information be preserved, given changes in media, platforms, and programs[3]? How should it be organized and presented (will it take a lifetime to see anothers lifetime)? Who should be able to see what, and when? What are the legal and ethical rights and responsibilities concerning information that involves other people? Again, we are exploring some of these issues but mostly we are focusing on the basic tasks of acquisition, preservation, and recall. Beyond this one-way immortality, we begin to see hints that at least some aspects of a person could be expressed as a program that interacts with future generations. It is interesting that, given and archive of a persons spoken output; it is possible to make a compelling avatar of that person. This avatar can live forever in a virtual world and respond to queries about that persons past life. For example, like many great people, Albert Einstein has several posthumous web sites. But in addition, computer science researchers at CMU [8] authored an avatar of Einstein that responds to questions from viewers. In fact the avatar is an actor hired to read quotes from Einsteins writings. Many who have seen this demonstration understand that in the future it will be easier and easier to author such avatars (without needing actors). The real question is whether such a program could ever learn enough to stay current is a speculation and a clear challenge. Having an immortal, interactive program begins to look a bit like two-way immortality -- being able to live and communicate forever. We believe with Ray Kurzweil [6], Hans Morovec [7], and others, that it is likely there will be more and more faithful avatars over the next century. By 2040, Morovec predicts that robots will be as smart as humans. Successive generations of question-answering avatars will gradually become indistinguishable from the actual persons we know and love in 2001, enabling that person to appear to live forever. References Bell, C. G. The Cyber All Project: A Personal Store for Everything, Microsoft Research Technical Report MSR-2000-75, July 2000. Bell, C.G.  HYPERLINK "http://research.microsoft.com/~gbell" http://research.microsoft.com/~gbell co-authored books, papers, talks, videotaped lectures, trip albums, CyberMuseum items, etc. Bell, G. Dear Appy, How Committed are you? Signed Lost and Forgotten Data, ACM Ubiquity, 21 February 2000, Issue 1.  HYPERLINK "http://www.acm.org/ubiquity/views/g_bell_1.html" http://www.acm.org/ubiquity/views/g_bell_1.html Bush, V. As We May Think, Atlantic Monthly, July 1945.   PRIVATE href="#" MACROBUTTON HtmlResAnchor http://www.isg.sfu.ca/~duchier/misc/vbush/vbush.shtml Gates, B. The Road Ahead. Penguin Books, 1996. Kurzweil, Ray. The Age of Spiritual Machines: When Computers Exceed Human Intelligence, Viking, 1999. Morovec, Hans. Robot: Mere Machine to Transcendent Mind, Oxford University Press, 1999. Stevens, Scott. The CMU Oz Project creating a virtual Einstein.  HYPERLINK "http://www.cs.cmu.edu/afs/cs.cmu.edu/project/oz/web/papers/bibliography.html" http://www.cs.cmu.edu/afs/cs.cmu.edu/project/oz/web/papers/bibliography.html  : This work has been submitted for publication to the Communications of the ACM. Copyright may be transferred without further notice and the publisher may then post the accepted version. A version of this article appears at  HYPERLINK "http://research.microsoft.com/pubs/" http://research.microsoft.com/pubs/  : This work has been submitted for publication. Copyright may be transferred without further notice and the publisher may then post the accepted version.  PAGE 1 /`afs_t   6 7 8 N O T U źśźś|y0JZjU jU#jCJOJQJU^JaJ0JZCJOJQJ^JaJ#jCJOJQJU^JaJCJOJQJ^JaJjCJOJQJU^JaJ6]aJ B*CJph333 B*ph333j0J\B*Uph333CJ OJQJ\^JaJ //0?@Qabcdex !"M _a$a$$a$$a$`$a$ab#=%L%N%U .su FG "FHIJnoD E ̵̲~ugujYOJQJU^J0JZOJQJ^JjPOJQJU^JCJOJQJ^JjOJQJU^JB*OJQJ^Jph333 OJQJ^JCJ6B*CJ]aJ ph<B*CJaJ phB*CJaJ ph5<B*CJ\aJ ph5B*CJ\aJ ph0JZ jUjoU&_/0;NdtuWj$$IfTl\ H< T4 la1$$IfTl<4 la $$Ifa$ uj$$IfTl\ H< T4 la $$Ifa$$If   $$Ifa$$Ifj$$IfTl\ H< T4 la  (29 $$Ifa$$Ifj$$IfTl\ H< T4 la9:NS_e $$Ifa$$Ifj$$IfTl\ H< T4 laefy~ $$Ifa$$Ifj$$IfTl\ H< T4 la $$Ifa$$Ifj$$IfTl\ H< T4 la $$Ifa$$Ifj$$IfTl\ H< T4 la  $$Ifa$$Ifj$$IfTl\ H< T4 la17@EF}  }{vvv_ & F` $$Ifa$$Ifj$$IfTl\ H< T4 la 6!7!Q!!!!"""###_#`#b#c#$ $E$F$w$x$y$$$$$$;%?%@%F%G%H%I%O%æ|unkncn0J^mHnHu0J^ j0J^U 0JZCJaJjCJUCJ jCJU5\ j0J\U0JZOJQJ^JaJj*OJQJU^JaJjOJQJU^JaJOJQJ^JaJjOJQJU^J>*B*OJQJ^Jph OJQJ^JOJQJ^JjOJQJU^J% !!"u"a#b#$<%=%J%K%L%M%N%O%#$_ & F 1h/ =!"#$%DyK www.123456789.netyK 4http://www.123456789.net/DyK www.legacy.comyK .http://www.legacy.com/DyK www.forevernetwork.comyK >http://www.forevernetwork.com/DyK www.memorymountain.comyK >http://www.memorymountain.com/ DyK %http://research.microsoft.com/~gbellyK Jhttp://research.microsoft.com/~gbellDyK yK `http://www.acm.org/ubiquity/views/g_bell_1.htmlDyK Mhttp://www.cs.cmu.edu/afs/cs.cmu.edu/project/oz/web/papers/bibliography.htmlyK http://www.cs.cmu.edu/afs/cs.cmu.edu/project/oz/web/papers/bibliography.htmlDyK yK Hhttp://research.microsoft.com/pubs/b i8@8 NormalCJ_HaJmH sH tH R@R Heading 1$<@&5CJ KH OJQJ\^JaJ T@T Heading 2$<@& 56CJOJQJ\]^JaJN@N Heading 3$<@&5CJOJQJ\^JaJL@L Heading 4$@&5B*OJQJ\^JaJ phF@F Heading 5 <@&56CJ\]aJ@@@ Heading 6 <@&5CJ\aJ2@2 Heading 7 <@&8@8 Heading 8 <@&6]F @F Heading 9 <@&CJOJQJ^JaJ<A@< Default Paragraph Font<T@< Block Textx]^N>@N Title$<@&a$5CJ KHOJQJ\^JaJ *B@* Body Textx@C@"@ Body Text Indenthx^h6Q@26 Body Text 3xCJaJ>J@B> Subtitle$<@&a$ OJQJ^JLN@!RL Body Text First Indent 2 `4P@b4 Body Text 2 dxHM@rH Body Text First Indent `JR@J Body Text Indent 2hdx^hLS@L Body Text Indent 3hx^hCJaJ8"@8 Caption xx5CJ\aJ*?@* Closing ^4@4 Comment TextCJaJL@ DateJY@J Document Map-D M OJQJ^J4[@4 E-mail Signature4+@4 Endnote Text CJaJ`$@` Envelope Address!!@ &+D/^@ OJQJ^JF%@"F Envelope Return"CJOJQJ^JaJ, @2, Footer # !6@B6 Footnote Text$CJaJ,@R, Header % !2`@b2 HTML Address&6]Je@rJ HTML Preformatted'CJOJQJ^JaJ2 @2 Index 1(^`2 @2 Index 2)^`2 @2 Index 3*^`2 @2 Index 4+^`2@2 Index 5,^`2@2 Index 6-^`2@2 Index 7.^`2@2 Index 8/^`2@2 Index 90p^p`@!@@ Index Heading15OJQJ\^J,/@", List2h^h`02@20 List 23^`03@B0 List 348^8`04@R0 List 45^`05@b0 List 56^`20@r2 List Bullet 7 & F66@6 List Bullet 2 8 & F67@6 List Bullet 3 9 & F68@6 List Bullet 4 : & F69@6 List Bullet 5 ; & F:D@: List Continue<hx^h>E@> List Continue 2=x^>F@> List Continue 3>8x^8>G@> List Continue 4?x^>H@> List Continue 5@x^21@2 List Number A & F6:@"6 List Number 2 B & F6;@26 List Number 3 C & F6<@B6 List Number 4 D & F 6=@R6 List Number 5 E & F d-@bd Macro Text"F  ` @ OJQJ^J_HmH sH tH I@r Message HeadergG8$d%d&d'd-DM NOPQ^8` OJQJ^J,^@, Normal (Web)H6@6 Normal Indent I^,O@, Note HeadingJ<Z@< Plain TextKCJOJQJ^JaJ(K@( SalutationL.@@. Signature M^L,@L Table of AuthoritiesN^`D#@D Table of FiguresO ^` @.@@ TOA HeadingPx5OJQJ\^J@ TOC 1Q&@& TOC 2 R^&@& TOC 3 S^&@& TOC 4 T^&@& TOC 5 U^&@& TOC 6 V^&@& TOC 7 W^&@& TOC 8 X^&@& TOC 9 Y^.U@. Hyperlink >*B*ph>V@> FollowedHyperlink >*B* ph8&@8 Footnote ReferenceH*:'@: Comment ReferenceCJaJ&)@& Page Number<O< Ref_7$8$^CJOJQJ^J*O* Author`$a$aJ<O< Style1a@& CJOJQJ\^JaJO!<O!O!L/0?@Qabcdex !"M_ /0;Ndtu  (29:NS_efy~ 17@EF} uab 7v#4[WI2f<8aMJUondz^`.^`.88^8`.^`. ^`OJQJo( ^`OJQJo( 88^8`OJQJo( ^`OJQJo(hh^h`. hh^h`OJQJo(h hh^h`OJQJo(h 88^8`OJQJo(oh ^`OJQJo(h   ^ `OJQJo(h   ^ `OJQJo(oh xx^x`OJQJo(h HH^H`OJQJo(h ^`OJQJo(oh ^`OJQJo(hhh^h`.h88^8`.hL^`L.h  ^ `.h  ^ `.hxLx^x`L.hHH^H`.h^`.hL^`L.h hh^h`OJQJo(h 88^8`OJQJo(oh ^`OJQJo(h   ^ `OJQJo(h   ^ `OJQJo(oh xx^x`OJQJo(h HH^H`OJQJo(h ^`OJQJo(oh ^`OJQJo(h hh^h`OJQJo(h 88^8`OJQJo(oh ^`OJQJo(h   ^ `OJQJo(h   ^ `OJQJo(oh xx^x`OJQJo(h HH^H`OJQJo(h ^`OJQJo(oh ^`OJQJo(~}|8aJUonv#I                                     /0;Ndtu  (29:NS_efy~ 17@EF b P!@DY8O!@UnknownG Times New Roman5Symbol3&  Arial?5  Courier New5& z!Tahoma;Wingdings"qhLJFUJF I 7P 4!20d 2QCapturing Everything gordon bellJim GrayOh+'0  , H T ` lxCapturing Everything9apt gordon bellordord Normal.dot Jim Grayt6m Microsoft Word 9.0g@0@hfy@H-@-՜.+,D՜.+,L hp  Microsoft Corp.7  Capturing Everything Title` 8@ _PID_HLINKSA0Mhttp://www.cs.cmu.edu/afs/cs.cmu.edu/project/oz/web/papers/bibliography.htmlON0http://www.acm.org/ubiquity/views/g_bell_1.html %http://research.microsoft.com/~gbell#2 http://www.memorymountain.com//5http://www.forevernetwork.com/#-http://www.legacy.com/http://www.123456789.net/u`$http://research.microsoft.com/pubs/  !"#$%&()*+,-.0123456789:;<=>?@ABCDEFGHIJKLMNOPRSTUVWXZ[\]^_`cRoot Entry F-eData '1Table/CWordDocument"LSummaryInformation(QDocumentSummaryInformation8YCompObjjObjectPool--  FMicrosoft Word Document MSWordDocWord.Document.89qRoot Entry F !6m@Data '1Table/CWordDocument"L  !"#$%&()*+,-.0123456789:;<=>?@ABCDEFGHIJKLMNOPRSTUVWXljki 0 _PID_HLINKS_AdHocReviewCycleID_EmailSubject _AuthorEmail_AuthorEmailDisplayNameA0Mhttp://www.cs.cmu.edu/afs/cs.cmu.edu/project/oz/web/papers/bibliography.htmlON0http://www.acm.org/ubiquity/views/g_bell_1.html %http://research.microsoft.com/~gbell#2 http://www.memorymountain.com//5http://www.forevernetwork.com/#-http://www.legacy.com/http://www.123456789.net/u`$http://research.microsoft.com/pubs/;fkTRsgray@microsoft.com Jim GraySummaryInformation(QDocumentSummaryInformation8CompObjjObjectPool--  FMicrosoft Word Document MSWordDocWord.Document.89q՜.+,D՜.+,L hp  Microsoft Corp.7  Capturing Everything TitleL@