Forum Message

Topic: Re:Re:Re:Possibilities for application of The Emprint Method
Posted by: John Schertzer
Date/Time: 03/02/2004 16:29:31

nj,
To my understanding the main difference in how John Grinder's method of modeling works compared to David Gordon's method, is that John strongly suggests taking everything in implicitly by mimicking with micro muscle, at second pos, while in a know-nothing state.  In the end, both produce coded (chunked down) information from which they create patterns to install the behavior, etc. (think about all the games and exercises you played with learning how to match, track patterns, et al, in practitioner training).

WITW advocates absorbing the patterns unfiltered, while D Gordon advocates using the filters of NLP to catalog strategies, equivalences, cause-effect beliefs, etc..  I wonder however if John would have absorbed all the patterns he did from M Erickson, if he hadn't had highly refined language skills filtering unconsciously from the outset.  It would be an impossible question to answer, I presume.  One thing David G says that makes sense is that in going deeply into 2nd position you might pick up things you don't want to pick up.  I have had this experience while modeling WITW style -- or real NLP modeling.  And both Richard Bandler and Stephen Gilligan are diabetic, supposedly, as was Milton E, both having gone deeply into 2nd pos with him.  Coincidence?

That said, there are probably ways to protect yourself, as John Grinder says, and that must have something to do with setting things up with your unconscious ahead of time.

Another great approach to cognitive modeling is taught by Jonathan Altfeld, at www.altfeld.com, called Knowledge Engineering.  It's based on his work in expert systems (a form of artificial intelligence which involves tracking the patterns of experts and coding them into a special AI shell).  It's definitely worth taking a look at, even if to just help with the coding process after the implicit stage of WITW modeling.

best,
JS


Entire Thread

TopicDate PostedPosted By
Possibilities for application of The Emprint Method31/01/2004 04:32:04nj
     Re:Imprinting and NLP31/01/2004 13:49:28ny
     Re:Possibilities for application of The Emprint Method01/02/2004 22:45:28Michael Carroll
          Re:Re:Possibilities for application of The Emprint Method02/02/2004 08:17:06nj
          Re:Re:Possibilities for application of The Emprint Method03/02/2004 07:33:02nj
               Re:Re:Re:Possibilities for application of The Emprint Method03/02/2004 16:29:31John Schertzer
                    Re:Re:Re:Re:Possibilities for application of The Emprint Method03/02/2004 17:54:53nj
                         Re:Re:Re:Re:Re:Possibilities for application of The Emprint Method03/02/2004 18:37:53nj
                              Re:Re:Re:Re:Re:Re:Possibilities for application of The Emprint Method03/02/2004 19:03:01John Schertzer
                                   Re: Knowledge Engineering and JG/CBSC's 5-phase NLP Modeling process03/02/2004 20:43:10Pete West
                                        Re:Re: Knowledge Engineering and JG/CBSC's 5-phase NLP Modeling process03/02/2004 21:16:24nj
                                        Re:Re: Knowledge Engineering and JG/CBSC's 5-phase NLP Modeling process03/02/2004 21:29:24John Schertzer
                                             Re:Re:Re: Knowledge Engineering and JG/CBSC's 5-phase NLP Modeling process04/02/2004 02:12:23Pete West
                                   Re:Re:Re:Re:Re:Re:Re:Possibilities for application of The Emprint Method03/02/2004 21:20:13nj
                                        Re:Re:Re:Re:Re:Re:Re:Re:Possibilities for application of The Emprint Method03/02/2004 21:46:09John Schertzer
                                             Re:Re:Re:Re:Re:Re:Re:Re:Re:Possibilities for application of The Emprint Method03/02/2004 21:59:08nj
                                                  Re:Re:Re:Re:Re:Re:Re:Re:Re:Re:Possibilities for application of The Emprint Method04/02/2004 13:58:35John Schertzer
                                                       Re:Re:Re:Re:Re:Re:Re:Re:Re:Re:Re:Possibilities for application of The Emprint Method04/02/2004 20:40:22nj
                                                            Re:Re:Re:Re:Re:Re:Re:Re:Re:Re:Re:Re:Possibilities for application of The Emprint Method05/02/2004 13:53:57John Schertzer
                                                            Re:Re:Re:Re:Re:Re:Re:Re:Re:Re:Re:Re:Possibilities for application of The Emprint Method06/02/2004 10:04:18nj
                                                                 Re:Re:Re:Re:Re:Re:Re:Re:Re:Re:Re:Re:Re:Possibilities for application of The Emprint Method06/02/2004 14:36:23John Schertzer
                         Re:Re:Re:Re:Re:Possibilities for application of The Emprint Method03/02/2004 18:49:57John Schertzer
               Re:Re:Re:Possibilities for application of The Emprint Method04/02/2004 16:02:50zhizhichen
                    Re:Re:Re:Re:Possibilities for application of The Emprint Method04/02/2004 17:14:32Anon
                         Re:Re:Re:Re:Re:Possibilities for application of The Emprint Method04/02/2004 19:59:44zhizhichen
                    Re:Re:Re:Re:Possibilities for application of The Emprint Method04/02/2004 20:11:12nj

Forum Home