…
A great idea: let people use your yard as a vegetable garden and receive a percentage of the produce
…
…
On the occasion of Nima Hoda’s wedding.
…
…
The Three Character Classic is a 13th century Chinese text with three characters per line which is traditionally read by children. Below is an excerpt from the 1812 translation by Robert Morrison, Presbyterian missionary and author of the first Chinese-English dictionary.
…
In Bayesian inference, we can factor approximate computation (e.g. linearization) into the actual posterior probabilities.
…
Comments on social sites have to be sorted somehow. How do big platforms do it – is it some complicated mix of recommender systems, learning-to-rank algorithms, Markov decision processes, neural networks, and learning automata? Well, maybe in some cases but often it’s just a simple formula. In this article we put the formulas used by Hacker News, YouTube, and Reddit, along with a few alternatives, to the test, using virtual comment section simulations. Spoiler alert: YouTube does not do well.
…
What would a market for mathematics look like?
…
James I’s 1597 book Daemonologie, “a philosophical dissertation on contemporary necromancy … touches on topics such as werewolves and vampires”.
…
Robin Hanson says “In few months, China is likely to be a basket case, having crashed their economy in failed attempt to stop COVID-19 spreading.” Quantifying the forecast, he says China’s economy (or growth?) will be “a factor of two to ten down” and seems to expect dramatic results in 6 months.
…
Let’s analyze data from https://darksky.net from the last 10 years to compare weather (technically “climate”) in a selection of North American cities.
…
…
Some exonyms:
…
Tall buildings by city: look out for Toronto. The current top cities in North America for sky scrapers are unambiguously New York, Chicago, and Toronto in that order. However, if we count proposed buildings and buildings under construction, Chicago has 18 at least 150m tall (the dataset is only complete for buildings at least 150m) and Toronto has 90.
…
Ascending auctions are a common mechanism for selling a set of products. The basics are covered in this video:
…
Imagine a risk-neutral set of traders, each with a common prior which is updated with some private information. The traders buy and sell contingent claims until prices reach an equilibrium. The resultant prices are the conditional expectations of the terminal payoffs under a probability measure \(\mathbb{P}\). Is \(\mathbb{P}\) equal to the posterior obtained by updating the common prior with the combined private information? At least under certain conditions, yes.
…
Which places in North America are growing and which aren’t? City populations are poorly defined and hard to compare but the boundaries of states and provinces are more objective. Here is the growth in population since 1970/71 in states/provinces with over 4 million people.
…
There are \(\binom{n-1}{m-1}\) integer compositions of \(n\) with \(m\) parts. Complex polynomials of degree \(n\) have \(n\) zeros, counting multiplicity. Where else do we count solutions to equations? Our criteria are that the equations must be parametrized, and that for each parameter value there is a finite solution set. Some examples are given.
…
To return to my grandmother’s family … the … sister, Lady Charlotte Portal was … apt to express herself unfortunately. On one occasion when she had to order a cab for three people, she thought a hansom would be too small and a four-wheeler too large, so she told the footman to fetch a three-wheeled cab. On another occasion, the footman, whose name was George, was seeing her off at the station when she was on her way to the Continent. Thinking that she might have to write to him about some household matter she suddenly remembered that she did not know his surname. Just after the train had started she put her head out of the window and called out, ‘George, George, what’s your name?’ ‘George, My Lady’, came the answer. By that time he was out of earshot.
-Bertrand Russell, “Autobiography”
…
…
(These are some questions, which may well be already addressed in the literature, I haven’t checked.)
…
One of the pleasures I’ve had over the years is to play four-hands piano music with Edsger. … When we’re playing a Haydn waltz the thing I had to get used to was that Edsger doesn’t count one-two-three, one-two-three it’s always zero-one-two, zero-one-two.
-Don Knuth, 2000
…
https://www.reddit.com/user/haikubot-1911/comments/?sort=top
…
1. Aakar Patel - English and its influence on our national priorities (2016). This examines the peculiar phenomenon in India where the popular media, due to the distribution of languages spoken and very high advertising revenues, ends up being skewed towards elites and their issues, systematically biasing the propagation of news information.
…
Paraphrasing from Macrae’s biography of J. von Neumann:
…
Problem: You are given two blank envelopes which each contain money. One envelope contains twice as much as the other. You may choose an envelope and keep the money it contains. After choosing, you have the option to switch for the other envelope. Should you switch?
…
Usually when we talk about probabilities, we have certain given information, which takes the form of a \(\sigma\)-algebra of possible events, and there is also a probability function that assigns values to each event. The rationality of a probability function is judged based on the relationships between events. For example if \(A \subseteq B\) then we must have \(P(A) \leq P(B)\). But as long as these relationships are satisfied (giving a proper probability measure), the probabilities could be anything. As such, we do not judge subjective probabilities based on whether they’re actually accurate or not, just whether they are consistent with each other.
…
If uncertainties encode bet preferences as represented by probabilities, Bayesianism is a collection of Dutch book arguments proving that probabilities must be consistent with each other (defining a probability measure) to be rational. Weisberg has an excellent paper that explains the details. On the other hand, the Fundamental Theorem of Asset Pricing proves that for prices to be arbitrage-free, they must be conditional expectations.
…
The 700MHz (2014) and 2500MHz (2015) spectrum auctions generated revenues of 5,270,636,002 CAD from 302 licenses and 755,371,001 CAD from 97 licenses. Both auctions used a combinatorial clock auction (CCA) format involving an ascending clock phase followed by a sealed-bid supplementary stage where bids could be made on packages of products. Final prices were determined using Vickrey pricing with a core-adjustment. An activity rule was used which required bidders to make bids or lose eligibility to bid in later clock rounds, along with a revealed preference rule which allows the eligibility limit to be exceeded as long as consistency checks are satisfied. For full details on the auction formats see the official documentation (700MHz rules, 700MHz additional details, 2500MHz rules); and the record of bids placed is here for 700MHz and here for 2500MHz.
…
…
(a partial list)
…
Let’s use python to train a Markov chain generator using all the tweets from a certain list of users, say this one. We’ll use the following libraries.
…
ShellJS is a JS library that provides
functions like cd()
and ls()
which you can use to write Node scripts
instead of bash scripts.
That’s great for scripts, but what about an interactive shell?
Well, we could just run the Node repl and import ShellJS:
…
What exactly is beautiful math?
…
I remember, in a geometry class, my teacher wanted to prove the congruence of two triangles. Let’s take a third triangle, she said, and I asked where do triangles come from. I worried that there may be no more triangles there. Those were hard times in Russia and we were accustomed to shortages. She looked at me for a while and then said: ‘Shut up’.
-Platonism, Constructivism, and Computer Proofs vs. Proofs by Hand
…
A handy flashcards web app for memorizing all the Greek letters
…
Jon Skeet on the tricky edge cases that can show up with basic data types and how they model reality. Back to basics: the mess we’ve made of our fundamental data types
…
In this post I’ll share a way to get a Grooveshark-like experience with a Linux command-line application.
…
Wojciech Szpankowski:
…
The first intellectual operation in which I arrived at any proficiency, was dissecting a bad argument, and finding in what part the fallacy lay; and though whatever capacity of this sort I attained was due to the fact that it was an intellectual exercise in which I was most perseveringly drilled by my father, yet it is also true that the school logic, and the mental habits acquired in studying it, were among the principal instruments of this drilling. I am persuaded that nothing, in modern education, tends so much, when properly used, to form exact thinkers, who attach a precise meaning to words and propositions, and are not imposed on by vague, loose, or ambiguous terms. The boasted influence of mathematical studies is nothing to it; for in mathematical processes, none of the real difficulties of correct ratiocination occur.
-J.S. Mill, Autobiography
…
Why not experiment with wholesome personal relationships? Some recreational socialising? Maybe. I dabble. I’m a social primate susceptible to peer pressure. No man is an island, etc, even those with a metaphysic evocative of windowless monads. [I fret that the only thing one can ever know is the intrinsic subjective properties of whichever configuration of matter and energy one happens to instantiate. cf. Lockwood.] Sadly, my conspecifics are a dangerous, expensive and tainted source of opioid supply with endogenous habits of their own to feed. Moreover my inferential realism about so-called perception is a deterrent to intimacy: personal relationships become a branch of speculative metaphysics if each virtual world resembles a solipsistic island-universe. Indeed I worry that the closest I come to staying in touch with the real world is eating bits of it: the epistemology of food, so to speak. And germs. If I meet my end under the wheels of the proverbial London bus, my faith in the mind-independent world will be posthumously vindicated. As it happens, I have just finished reading Simon Critchley’s The Book of Dead Philosophers (2008); perhaps my best hope of immortality lies, not churning out philosophical verbiage, but having the equivalent of a tortoise fall on my head. This untimely fate exhausts my knowledge of Aeschylus.
-David Pearce, Diary Update and Idle Musings
…
Programming wisdom:
…
This reminds me of a story from the time when Queen Mary and Westfield College, University of London decided to change its name to Queen Mary, University of London. My colleague Wilfrid Hodges was giving a lecture in Germany, and put up his first slide, giving his name and affiliation as “Wilfrid Hodges, Queen Mary, University of London”. Somebody asked, “Is that a joint publication?”
…
An interesting comparison of the cultures of the US and Germany:
…
(This is an old list from when I was studying it in around 2009.)
…
From Modern Computer Algebra: “We start by using [Newton iteration] to find a custom-Taylored division algorithm that is as fast as multiplication…”
…
lukeprog ridicules Will_Newsome’s “post-rationality”
…
AC in pop culture: Pitbull fans must exist but it’s impossible to find an explicit example.
…
Linux tip: Install Helvetica and/or Helvetica Neue on your computer and some websites will look better
…
From a ratemyprofessors.com review of Mike Newman’s teaching: ‘Clearly LOVES math, makes tons of jokes; ie, someone asks how many questions on the midterm and he replies “well… it’s an integer number”.’
…
http://www.psychologytomorrowmagazine.com/jeff-warren-neuroscience-suffering-end/
…
The following is a document I wrote in mid 2008. I haven’t edited it, although I was tempted to since parts of it sound a bit strange now. Rather than improve on it, I’ll just clarify what it was attempting to say: The connections between devices and/or agents have a finite set of security properties which determine the options available to secure the assets involved. These properties can be simply classified, providing a way to systematically explore the space of security configurations. I felt that the ideas in the document were a good summary of some facts about computer security.
…