“Jung, Tolkien and the Hermeneutics of Vision” Dr. Lance S. Owens 23 October 2015 California Institute of Integral Studies The Philosophy, Cosmology and Consciousness Forum Transcribed from youtube.com/v/GxVaxOco7kg and adapted for the web [PUNCTUATION, GRAMMAR, AND QUALITY PASSES STILL WIP] by James Edington in 2023 Opening Remarks (A shout out to my introduction speaker tonight, Becca; the stuff she has done on Jung, The Red Book, and Tolkien is …
Late Fee Reimbursement with Discover Bank BillPay
Not sponsored/affiliate in any way, just came out of a stressful situation better than expected so thought I'd share this positive outcome/experience with using a bank's "automatic billpay" for anyone in my position or similar…
Getting SCALE-MAMBA working
a wandering pile of shell script fragments to get the most robust—and most technically bankrupt—secure multiparty computing library working
[DRAFT] "Direction" of time?
if entropy is inherently connected to causality, and causality is inherently connected to the "direction" of time, what's that imply? TODO: read Judea Pearl
Blanket anti-hacking laws
I am not a lawyer, much less a cyber lawyer, but I was recently wondering “are there any laws—especially federal ones—that cover just plain old Hacking per se?” Say someone breaks into your blog, maybe they look at your drafts, maybe they deface the front page… is that, in and of itself, a crime no matter where in the United States your attacker is? The answer is—Yes! 18 USC …
[DRAFT] "PROTON_USE_WINED3D" explained
Explaining why the Steam launch option “PROTON_USE_WINED3D=1 %command%
” sometimes fixes things, and whether YOU are cargo-culting or genuinely need it
Transcript: Vanessa Vokey Livestream Jan '22
Archiving because I saw some online trolls trying to take down the video with a brigade of false reports; content not endorsed.
This post covers some highly sensitive material that will not be palatable to normal readers of my blog. Unless you are exceedingly bored and have popcorn prepared, or have (or care to have) a horse in the great "radfems vs transgenders" twitter race, you will not gain anything by reading this document.
a small insight on cryptography
Abstractly speaking, a hash function and a symmetric cipher are "the same thing". But, concretely, there is a symmetry between Stream cipher: map a fixed-length random input to a variable-length random output Hash function: map a variable-length random input to a fixed-length random output
Basic "while" loop in Elixir
"that's not how you're supposed to use functional programming languages" — how 'bout I do anyway?
Most efficient random integer generator by random bits consumed
Discovered in 2013 by then-UPMC-student Jérémie Lumbroso, and independently re-discovered by an Apple programmer last Fall (with much ado on Twitter and Hacker News), the basic idea is as follows: Take your (infinite) random bitstream as the binary digits of random $r\in\left[0,1\right)$…