Banner
Why I've been away and why I'm back.

Why I've been away and why I'm back.I'm 79yo now.  I receive a state pension which falls short...

Understanding The Voynich Manuscript #4

Understanding The Voynich Manuscript #4 If not Latin, then what? Please see the links at...

Understanding the Voynich Manuscript #3

Understanding the Voynich Manuscript #3 Plants and the moon. For thousands of years, people...

Understanding the Voynich Manuscript #2

Understanding the Voynich Manuscript #2 An i for an i ? Not nymphs: women! There are...

User picture.
picture for Hank Campbellpicture for Hontas Farmerpicture for Tommaso Dorigopicture for Fred Phillipspicture for Robert H Olleypicture for Helen Barratt
Patrick LockerbyRSS Feed of this column.

Retired engineer, 79 years young. Computer builder and programmer. Linguist specialising in technical translation. Interested in every human endeavour except the scrooge theory of accountancy.... Read More »

Blogroll
Part 1, which begins our examination of the question 'what is time?' can be viewed here.
Part 2 Some travels through time can be viewed  here.
Part 3 discussing language, sequence and order, can be viewed  here.
Part 4 a brief discussion of clocks, Steno, Foucault and Allais, can be viewed here.
The Shortest Path Problem in a Dynamic Network.

A method is needed by which efficient new network routes can rapidly be
calculated to route traffic away from problem paths and nodes. A
possible method is proposed.  I propose to call it the Wentrok heuristic.

What Is The Quickest Route From Newtork To Wentrok?
This is the second of a two part blog on commutative encryption.
Part one was Using Encryption to Block Spam.
The Rock And The Hard Place Of Homer

The well-known expression: 'between a rock and a hard place' almost certainly has its earliest origins in Homer's Odyssey. In that saga, Ulysses has to take his ship between Scylla and Charybdis, two rock-monsters which are a bow-shot apart. It is impossible to avoid both monsters - a course must be steered which leads to the least loss of life.

Unravelling Homer's Yarn
Using Encryption to Block Spam

Tackling the problem of spam is a problem in communication. If spam is noise as against wanted communications, then the spam problem is a signal to noise filtering problem. Unwanted emails, especially broadcast spam emails, consume about 80% of currently available bandwidth.  We need to filter out the 80% noise so as to increase the efficiency of the web in distributing the 20% of traffic that is the wanted signal.
Part 1, which begins our examination of the question 'what is time?' can be viewed here.
Part 2 Some travels through time can be viewed  here.
Part 3 discussing language, sequence and order, can be viewed  here.
Part 4 a brief discussion of clocks, Steno, Foucault and Allais, can be viewed here.

Note: this blog on time is speculative, not established fact.