Just found out about this cool feature in the Python standard library that allows you to merge two iterables based on a comparison: from heapq import merge as merge_heapwise some_numbers = (1, 5, 10, 15) other_numbers = (2, 4, 6, 8, 10, 12, 14, 16) merged_numbers = tuple(merge_heapwise(some_numbers, other_numbers)) # Using a tuple so comparisons work, for didactic demo reasons assert merged_numbers == (1, 2, 4, 5, 6, 8, …
[DRAFT] Transcript: Lance Owens MD, “Jung, Tolkien, and the Hermeneutics of Vision”, 2015
“Jung, Tolkien and the Hermeneutics of Vision” Dr. Lance S. Owens 23 October 2015 California Institute of Integral Studies The Philosophy, Cosmology and Consciousness Forum Transcribed from youtube.com/video/GxVaxOco7kg and adapted for the web [PUNCTUATION, GRAMMAR, AND QUALITY PASSES STILL WIP] by James Edington in 2023 Opening Remarks (A shout out to my introduction speaker tonight, Becca; the stuff she has done on Jung, The Red Book, and Tolkien is …
Getting SCALE-MAMBA working
a wandering pile of shell script fragments to get the most robust—and most technically bankrupt—secure multiparty computing library working
[DRAFT] "Direction" of time?
if entropy is inherently connected to causality, and causality is inherently connected to the "direction" of time, what's that imply? TODO: read Judea Pearl
Blanket anti-hacking laws
I am not a lawyer, much less a cyber lawyer, but I was recently wondering “are there any laws—especially federal ones—that cover just plain old Hacking per se?” Say someone breaks into your blog, maybe they look at your drafts, maybe they deface the front page… is that, in and of itself, a crime no matter where in the United States your attacker is? The answer is—Yes! 18 USC …
[DRAFT] "PROTON_USE_WINED3D" explained
Explaining why the Steam launch option “PROTON_USE_WINED3D=1 %command%
” sometimes fixes things, and whether YOU are cargo-culting or genuinely need it
Transcript: Vanessa Vokey Livestream Jan '22
Archiving because I saw some online trolls trying to take down the video with a brigade of false reports; content not endorsed.
This post covers some highly sensitive material that will not be palatable to normal readers of my blog. Unless you are exceedingly bored and have popcorn prepared, or have (or care to have) a horse in the great "radfems vs transgenders" twitter race, you will not gain anything by reading this document.
Basic "while" loop in Elixir
"that's not how you're supposed to use functional programming languages" — how 'bout I do anyway?
X25519 original specification
Adapted from the original specification
[DRAFT] WHOIS: look up ASN from the command-line
Since Marco d'Itri's whois(1) v5.5.0 released in July 2019, most sysadmins no longer need to do trial-and-error or detectivework to guess which of the 5 RIRs controls the IP attacking you and then hunt down the appropriate WHOIS server—the -I
flag will now do that annoying accounting on your behalf