On why to use "trivulet" instead of "trit" to describe computing with the fundamental ternary logic element

In the ongoing labor to develop an internally-coherent way of perceiving ternary logic -- and its most famous derivative, binary logic -- I have come to an understanding of how ternary logic is the proper logic of the continuum; not of particles, division, or separation. Particles, division, and  […]

Continue reading

Upon realizing the Riemann Sphere theory I'm working on is gaining traction independently of me

In a brand new article published yesterday on Medium, Kasper Müller writes about The Riemann Sphere: A world where you can divide by zero in a manner which weaves in some insights that have been the endpoints of several private thought experiments. So as I'm reading the article, not only do I  […]

Continue reading

Somewheres about 10,000 hours into solving the Riemann Hypothesis, one encounters Dante's lion, wolf, and leopard

Map of Mathematics

Introduction I'm not good at basic math. I struggle with many things which any decent mathematician aces early. For example, a few elements of calculus still remain over my head, although I have climbed the slopes of that mountain several times. Linear algebra is only just starting to make sense to  […]

Continue reading

Upon realizing I independently discovered _another_ new theory in mathematics

A few months ago, I found that one of the more beautiful ideas I had been developing alone for several years had already been discovered by other mathematicians, who had published rigorous papers on the idea. While my own insights were not yet rigorous, they were developed well enough that I quickly  […]

Continue reading

A few OSINT (Open Source Intelligence) tools to quickly check your network vulnerabilities

External Network Asset Discovery and Vulnerability Scans This is a list of OSINT (Open Source Intelligence) tools which will quickly give you an awareness of your cybersecurity risk profile. I put this list together when someone said they were quoted $40,000 for security analysis, and wondered if  […]

Continue reading

Upon realizing I independently discovered a new theory in mathematics

Wheel Theory illustration from Wikipedia

(Note: The two spherical illustrations from this weblog post are taken from a post which I wrote last year; compare with this illustration for Wheel Theory from Wikipedia) It's true that the original discovery by others goes back to 1999, and the first serious paper on this new branch of mathematics  […]

Continue reading

A certain kind of psychological phenomenon that involves thought distortions around authority and legitimacy

I found a fascinating article on a weblog from 2016, and eventually wrote a comment on the post. However, it's been six years, and the author has moved on to other weblogs, so my comment sits in her moderation queue, where it may sit forever. So I'm posting it here. The weblog post in question is  […]

Continue reading

The Ancient Secret of the Fountain of Youth is The Eye of Revelation

I recently stumbled on a gem of a book called The Ancient Secret of the Fountain of Youth. As I skimmed through it, I found it to be a rather unique book, and wanted to know more about how it came to be. Chances are you found this weblog post because you're researching it like I was. Its origins  […]

Continue reading

Page top