wiby  
Settings



Geometry to Algebra and Back Again

https://jackrusher.com/pwl-2023/

the integers for set theoretical reasons, but we're working in the order they're discovered by each culture. Once we have the rationals, we have a protocol like this. We first see

Gergo Erdi -- Érdi Gergő -- ERDI Gergo -- Cactus

http://unsafeperform.io/

code relevant to some theoretical subjects I happen to get interested in in the field of functional programming, and then push them to my GitHub repos or write about them in my bl

Notable Critiques

https://www.accelerationwatch.com/critiques.html

rationality. But it is theoretically possible to compute the maximum probability that a rational model is also a correct model. For some arbitrary brain or machine, the actual pro

Home Page For Umesh Vazirani

http://people.eecs.berkeley.edu/~vazirani/

Fourier Transforms & Theoretical Computer Science, Spring 1999 Quantum Computing, Fall 2004 Qubits, Quantum Mechanics and Computers, Spring 2005 CS70: Discrete Mathematics for Com

Christian Anarcho-Capitalism -- KEVIN CRAIG - "Liberty Under God" Beginning in Missouri's 7th Congressional District

https://KevinCraig.us/anarcho-capitalism.htm

Not only a premier theoretical linguist and a long-time, articulate critic of the US government’s foreign policy, Chomsky is also among the leading social anarchist thinkers writi
Kevin Craig is a Christian Anarchist campaigning for *Liberty Under God* in the race for U.S. Congress in Missouri's 7th District.

Becoming physically immune to brute-force attacks - Seirdy

https://seirdy.one/posts/2021/01/12/password-strength/

with the highest theoretical energy efficiency is limited only by the mass-energy of the entire observable universe ? Let’s call this absolute unit of an energy-efficient computer
Using thermal physics, cosmology, and computer science to calculate password vulnerability to the biggest possible brute-force attack.


Find more...