In Distributing Solar, we speak to entrepreneurs and experts working in energy access and off-grid solar in emerging markets, bringing to life how distributed energy is changing lives around the world. Visit us at www.distributingsolar.com Contact us at [email protected]
…
continue reading
Energypreneurs is a podcast that brings solar power, electric vehicles and battery technologies to young entrepreneurs. Sohail Hasnie, our host, is a firm believer that the solution to climate change lies in these technologies, which will also fundamentally change the way we think about electricity and transportation—on road, on water and even on air. Over the last 35 years, Sohail has applied technology and innovation in many large infrastructure projects across Australasia. As a staff of t ...
…
continue reading
This bi-weekly podcast from the Institute for Local Self-Reliance shares powerful stories of local renewable energy, from mayors discussing their city’s commitment to 100% renewable energy to tales of innovative community owned solar to questions about the the best rooftop solar policy. Join host John Farrell, the director of the Institute’s Energy Democracy Initiative, as he asks if the 100-year-old monopoly market structure for electricity delivery makes sense in an on-demand, distributed ...
…
continue reading
Candid conversations with the leaders shaping a more sustainable future. Hosted by Chad Reed, Gil Jenkins, Hilary Langer, and Guy Van Syckle. Produced by HASI, a U.S.-based sustainable infrastructure investor.
…
continue reading
We are the storytellers of Africa's energy transition, covering the perspectives of Financiers, Policymakers, and Operators dedicated to pushing the continent towards a sustainable energy future. The podcast is hosted by Olubunmi Olajide and produced by Chigozie Ubah. New episode every two weeks.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Energy Future: Powering Tomorrow's Cleaner World" invites listeners on a journey through the dynamic realm of energy transformation and sustainability. Delve into the latest innovations, trends, and challenges reshaping the global energy landscape as we strive for a cleaner, more sustainable tomorrow. From renewable energy sources like solar and wind to cutting-edge technologies such as energy storage and smart grids, this podcast explores the diverse pathways toward a greener future. Join i ...
…
continue reading
We already have many of the climate solutions we need. But scaling them is hard. The Green Blueprint is a show about the people who are architecting the clean economy. Every other week, host Lara Pierpoint profiles the founders, investors, and organizational leaders who are solving complex challenges in the quest to build climate technologies fast.
…
continue reading
Intellectually Curious is a podcast by Mike Breault featuring over 1,200 AI-powered explorations across science, mathematics, philosophy, and personal growth. Each short-form episode is generated, refined, and published with the help of large language models—turning curiosity into an ongoing audio encyclopedia. Designed for anyone who loves learning, it offers quick dives into everything from combinatorics and cryptography to systems thinking and psychology. Inspiration for this podcast: "Mu ...
…
continue reading
This is a podcast on sustainability and innovations in business and economy, a great place to learn more about sustainability across industries. We invite professionals working on the implementation of innovative sustainable solutions for the future - to explore circularity and resilience, corporate social responsibility, leadership and culture, impact investment and so on, and give some guidance on how to actually implement sustainability in business.
…
continue reading

1
E270: Why the Future is Distributed, Decentralized, and Solar
55:05
55:05
Play later
Play later
Lists
Like
Liked
55:05In this episode, our guest is Danny Kennedy, a serial energy entrepreneur, investor, and advocate for distributed renewables. Danny shares his bold vision for a world powered entirely by solar energy and battery storage — a transformation he calls "Solar for Universal Need." Drawing on his experience leading startups and initiatives like the Califo…
…
continue reading

1
Riker's Curse, River City, EDR-Freeze, MCP, WordPress, GitHub, Josh Marpet, and More. - SWN #515
30:49
30:49
Play later
Play later
Lists
Like
Liked
30:49Riker's Curse, River City, EDR-Freeze, MCP, WordPress, GitHub, Josh Marpet, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-515
…
continue reading

1
Aluminum and the Hall–Héroult breakthrough in 1886
4:39
4:39
Play later
Play later
Lists
Like
Liked
4:39A half-century tale of a metal that was once the pinnacle of opulence and is now everywhere. Aluminum’s abundance in ore didn’t matter—refining it was brutally hard until the Hall–Héroult breakthrough in 1886. Coupled with the rise of cheap electricity, this unlocked mass production and crashed the price, transforming aluminum from precious parlorw…
…
continue reading

1
Modular Manifolds: Co-designing Stability for Large-Scale AI
6:31
6:31
Play later
Play later
Lists
Like
Liked
6:31We explore Jeremy Bernstein's manifold-based approach to AI stability: constraining weight matrices to lie on a Stiefel manifold keeps singular values near one, making layers behave like rotations and improving predictability. Extending to modular manifolds, we treat each block as its own manifold with its own norm, and compose them so constraints …
…
continue reading

1
OEIS A000360: Distribution of non-empty triangles inside a fractal rep 4 tile
5:01
5:01
Play later
Play later
Lists
Like
Liked
5:01Join us as we explore A000360, the OEIS entry counting non-degenerate triangles inside a self-similar fractal rep-4 tile. We’ll break down the geometry of the fractal and what counts as a triangle, then uncover the surprising number-theoretic connections: the distribution ties to the Stern–Brocot sequence (A02487) via a modulo-3 reduction, with dro…
…
continue reading

1
Ghosts in Gauge Theories: The Good, the Bad, and the Goldstone
5:20
5:20
Play later
Play later
Lists
Like
Liked
5:20Join us as we untangle the mathematical ‘ghosts’ of quantum field theory—from Faddeev–Popov ghosts that preserve gauge symmetry to Goldstone modes that become W and Z bosons, and the troublesome negative-norm states that threaten unitarity and causality. A clear, accessible tour of why these unphysical states matter for regularization, mass generat…
…
continue reading

1
The Carrington Event: Solar Fury, Telegraph Sparks, and the Modern Grid
6:36
6:36
Play later
Play later
Lists
Like
Liked
6:36We dive into the 1859 Carrington storm — the first recorded solar flare and the fastest CME on record — and unravel how it lit up skies worldwide, crashed telegraph systems, and hinted at a sun-driven vulnerability in today’s electrical grid. From the auroral spectacle to near-miss modern-day scenarios, we connect history to present-day risk and ex…
…
continue reading

1
Broadcom, LastPass, SEO Poisoning, QR codes, H1B visas, Distributed Computing... - PSW #893
1:03:06
1:03:06
Play later
Play later
Lists
Like
Liked
1:03:06Broadcom, LastPass, Brickstone, SEO Poisoning, QR codes, H1B visas, Distributed Computing, and More... Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-893
…
continue reading

1
The Leiden Jar: From Lightning in a Glass to the First Battery
4:56
4:56
Play later
Play later
Lists
Like
Liked
4:56Explore the birth of the capacitor era. In the 1740s, Kleist and Muschenbroek’s shocking experiments showed a glass jar could store energy; Benjamin Franklin identified the dielectric inside and coined the term 'condenser.' Jean-Antoine Nollet popularized the device and the name 'battery,' turning it into public spectacle and laying the groundwork …
…
continue reading
We dive into A000351, the powers of five, from its tidy recurrence and generating function to the surprising ways it shows up across number theory, combinatorics, and geometry. Along the way we explore connections to Pisot-number phenomena, a divisor-sum–based lens on primality, counting integers with only odd digits, generating-function identities…
…
continue reading

1
Vizhapakar Dragons: Armenia’s 6,000-Year-Old Water Monuments
4:59
4:59
Play later
Play later
Lists
Like
Liked
4:59We explore Armenia’s colossal Vizhapakar dragonstones—basalt megaliths dating to the Chalcolithic around 4200–4000 BCE. Shaped as fish and cowhide figures, these markers sit at springs and irrigation corridors, revealing a sophisticated, region‑wide ritual system that tied water management to monumental labor. Through new dating and spatial analysi…
…
continue reading

1
Polaritons: Light–Matter Hybrids and the Tech Frontier
6:25
6:25
Play later
Play later
Lists
Like
Liked
6:25Polaritons are bosonic quasi-particles formed when photons strongly couple to a material excitation (such as an exciton or a phonon), creating new mixed light–matter normal modes. This strong coupling leads to level repulsion (avoided crossing) that splits the system into upper and lower polariton branches, giving tunable light propagation inside m…
…
continue reading

1
Mosasaurs Unleashed: Lords of the Late Cretaceous Seas
6:53
6:53
Play later
Play later
Lists
Like
Liked
6:53We explore Mosasaurus, the apex marine lizards that ruled 94–66 million years ago. Learn how a stiff body and a powerful crescent tail propelled shark-like bursts, why double-hinged jaws and flexible skulls let them swallow large prey, and the surprising evidence for endothermy and live birth. We also trace their dramatic extinction at the K–Pg bou…
…
continue reading

1
E271: Designing for Circularity: Rethinking Solar and Batteries
53:08
53:08
Play later
Play later
Lists
Like
Liked
53:08In this episode, our guest is Laura Jones, an electrical engineer, social scientist, and co-founder of the Circular PV Alliance. Laura walks us through the pioneering work behind Australia's first certification scheme for circular solar farms, CPVA Certified. From integrating circular economy principles into planning and operation, to practical reu…
…
continue reading

1
A New Coalition for a Distributed Energy Future — Episode 245 of Local Energy Rules
16:05
16:05
Play later
Play later
Lists
Like
Liked
16:05Learn about how Common Charge is fast-tracking a future where your distributed energy assets make the electric grid work better for everyone. | Show page available: https://ilsr.org/article/energy-democracy/common-charge-ler245 | Listen to all of our Local Energy Rules podcast episodes at our site: https://ilsr.org/energy/local-energy-rules-podcast…
…
continue reading
A tour of serpentine soils—formed from ultramafic rocks and chemically harsh, nutrient-poor, and with a skewed Ca:Mg balance. We explore where these hostile patches occur (California as a major hotspot, with other pockets around the globe), how plants survive through dwarfism, waxy leaves, and metal-accumulation strategies (like nickel hyperaccumul…
…
continue reading

1
OEIS A000350: Fibonacci numbers ending with their index in a base
4:09
4:09
Play later
Play later
Lists
Like
Liked
4:09We dive into A000350, the Fibonacci-ending-in-M problem across bases. In base 10, there are many nontrivial M, suggesting rich, infinite variation. In binary, the situation collapses: only M = 0, 1, 5 work—a result finally proven by Max Alexei after extensive computation (up to M < 2^25). We trace the history back to mid-1960s Fibonacci Quarterly w…
…
continue reading

1
Rearchitecting Systems for Privacy as AI Agents Force You to Rethink Security - Guillaume Jaulerry - BSW #414
1:02:20
1:02:20
Play later
Play later
Lists
Like
Liked
1:02:20As AI and cloud-based services power our connected world, individuals are facing an unprecedented privacy crisis. With more than 2.3 billion people entrusting their data to the cloud and centralized servers, cyberattacks, data breaches, surveillance, identity theft, and privacy threats are now everyday risks. How do we protect against these threats…
…
continue reading

1
Shortening the nuclear development cycle from decades to years
47:51
47:51
Play later
Play later
Lists
Like
Liked
47:51For decades, nuclear has struggled with cost overruns and delays — Georgia’s Vogtle plant being the latest example. Kairos Power co-founder and CEO Mike Laufer thinks the solution is to flip the script: focus first on non-nuclear demonstrations and then iterate quickly. It’s a counterintuitive and potentially risky strategy . Rapid iteration isn’t …
…
continue reading

1
Uhura, Collins, Nimbus Manticore, Sonic Wall, Async Rat, Solar Winds, Aaran Leyland.. - SWN #514
29:42
29:42
Play later
Play later
Lists
Like
Liked
29:42Uhura, Collins, Nimbus Manticore, Sonic Wall, Async Rat, Solar Winds, ShadowV2, H1B, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-514
…
continue reading
Could the puzzling GW190521 event be more than a standard binary black hole merger? We unpack the strange short signal, the mass-gap mystery, and the missing inspiral, then dive into a radical wormhole-echo hypothesis that a merger in another universe left a ringdown echo in ours. We compare the conventional merger model with the exotic scenario us…
…
continue reading

1
OEIS A000347: Number of Partitions into Non-Integral Powers
4:46
4:46
Play later
Play later
Lists
Like
Liked
4:46A dive into the niche OEIS sequence A000347, which counts partitions of integers into sums of non-integral powers. From A4 = 1 and rapid growth thereafter, the counting can be reformulated as counting ordered quadruples of positive integers x1 ≤ x2 ≤ x3 ≤ x4 with sqrt(x1) + sqrt(x2) + sqrt(x3) + sqrt(x4) ≤ n. We’ll trace the combinatorial setup, ex…
…
continue reading
From ancient tombs to modern science, the Ouroboros has long symbolized eternal renewal and the unity of opposites. In this episode, we trace its journey from Egyptian protections of Ra through Gnosticism and alchemy, into Jungian psychology, cybernetics, and even a living lizard named Ouroboros cataphractus. We explore how a snake eating its tail …
…
continue reading

1
Design Errors in Entra ID, Design Defenses in iOS, Design Difficulties in DeepSeek - ASW #349
58:43
58:43
Play later
Play later
Lists
Like
Liked
58:43In the news, Microsoft encounters a new cascade of avoidable errors with Entra ID, Apple improves iOS with hardware-backed memory safety, DeepSeek demonstrates the difficulty in reviewing models, curl reduces risk by eliminating code, preserving the context of code reviews, and more! Visit https://www.securityweekly.com/asw for all the latest episo…
…
continue reading

1
Under Pressure: The Power of Superheated Water
5:15
5:15
Play later
Play later
Lists
Like
Liked
5:15Join us on The Deep Dive as we explore subcritical water—liquid, hot, and pressurized between 100°C and 374°C. We unpack how the hydrogen-bond network breaks down, reducing polarity to roughly that of methanol, and letting hot water dissolve oils and organics that ordinary water can't touch. We'll see how water becomes a catalyst, a reactant, and a…
…
continue reading

1
OEIS A000346: Catalan Convolution and Dyck-Path Interpretations
4:56
4:56
Play later
Play later
Lists
Like
Liked
4:56A quick Deep Dive into A000346, defined as the Catalan numbers convolved with powers of 4. We explore its clean closed form, generating function, and the multiple combinatorial faces—Dyck paths, symmetric functions, and integer compositions—and what these connections reveal about growth and recurrence structure. Note: This podcast was AI-generated,…
…
continue reading

1
Disruption is Coming for the Vulnerability Management Market - Tod Beardsley - ESW #425
1:47:15
1:47:15
Play later
Play later
Lists
Like
Liked
1:47:15Interview with Tod Beardsley This interview is sponsored by runZero. Legacy vulnerability management (VM) hasn't innovated alongside of attackers, and it shows. Let's talk about the state of VM. Check out https://securityweekly.com/runzero to learn more! Topic Segment: NPM Incidents In this week’s topic segment, we’re discussing all the NPM supply …
…
continue reading

1
A new age of wind propulsion for cargo ships | Heikki Pöntynen, CEO of Norsepower
22:36
22:36
Play later
Play later
Lists
Like
Liked
22:36In this episode of Climate Positive, Gil Jenkins and Kenny Gayles speak with Heikki Pöntynen, CEO of Norsepower, about how rotor sails are helping the maritime industry cut fuel use and emissions. By harnessing the Magnus effect with spinning cylinders mounted on cargo ships, Norsepower is delivering 5–25% fuel savings today—sometimes even more. He…
…
continue reading
A deep dive into the enigmatic Picts—Brittonic-speaking peoples of northern and eastern Scotland—and how their rise, language, and symbols laid the groundwork for the kingdom of Alba. We trace Fortriu’s power, the pivotal battles at Dun Nechtain, the Viking-age upheavals, and Kenneth MacAlpin’s dynastic shift, exploring the gradual Gaelic integrati…
…
continue reading

1
OEIS A000345: Partitions into non-integral powers
5:01
5:01
Play later
Play later
Lists
Like
Liked
5:01A journey from a physics-inspired partition problem to a concrete lattice-point counting interpretation. We explore A000345, the nonnegative sequence counting partitions into non-integral powers, with roots in a 1951 statistical mechanics paper by Agarwala and Auluck and entries in Sloan’s Handbooks. In 2009, R.J. Mathar gave a concrete reinterpret…
…
continue reading

1
OEIS A000344: Fivefold Catalan Convolution, Lattice Paths, and Young Tableaux
4:39
4:39
Play later
Play later
Lists
Like
Liked
4:39A000344 counts a surprising blend of combinatorics and algebra. It arises as the number of lattice paths from (0,0) to (n,n) that touch but never cross the line x - y = 2 (i.e., stay on or below x - y = 2), which is the 5-fold convolution of the Catalan numbers. Equivalently, it tallies standard Young tableaux of shape (n+2, n, 2), and its ordinary…
…
continue reading

1
CrowdStrike's AI Innovations in Cyber Defense - SWN #513
37:15
37:15
Play later
Play later
Lists
Like
Liked
37:15In this episode of Security Weekly News, Joshua Marpet and Aaran Leyland discuss the latest trends in AI and cybersecurity, focusing on innovations from CrowdStrike, the implications of new cyber incident reporting rules, and the evolving landscape of ransomware. They explore the role of AI in enhancing security measures, the challenges posed by ma…
…
continue reading

1
OEIS A000343: Five-rooted trees and linear forests
5:22
5:22
Play later
Play later
Lists
Like
Liked
5:22We unpack how raising the rooted-tree generating function B(x) to the fifth power counts linear forests of five rooted trees, and the surprising equivalence with five rooted paths. We'll recap the building blocks—rooted trees, forests, and linear forests (paths) with no branches—and explain why B(x)^5 enumerates the same structures as five-path for…
…
continue reading

1
Safes, Hackers, and Web Servers - PSW #892
2:12:25
2:12:25
Play later
Play later
Lists
Like
Liked
2:12:25This week's technical segment is all about the T-Lora Pager from Lilygo, and really cool Meshtastic device that can also be used for some hacking tasks! In the security news: Your safe is not safe Cisco ASA devices are under attack VMScape HybridPetya and UEFI attacks in the wild Eveything is a Linux terminal Hackers turns 30 Hosting websites on di…
…
continue reading
We explore A000342, the OEIS entry that counts n-node rooted trees of exact height 5. Height here means the longest path from the root to a leaf is exactly 5 edges, which forces at least 6 nodes. So the early terms start 0, 0, 0, 1, 5, 19, 61, illustrating how the height constraint shapes the counts compared with unconstrained rooted trees. We’ll d…
…
continue reading

1
E269: Community Batteries, Flow Tech, and the Future of Storage
54:24
54:24
Play later
Play later
Lists
Like
Liked
54:24In this episode, our guest is Glenne Drover, a passionate energy professional and currently the Company Secretary at Yarra Energy Foundation. Though semi-retired, Glenne remains deeply active in shaping Australia's energy landscape through consulting, advocacy, and public engagement. We discuss the evolving battery storage landscape, with Glenne pr…
…
continue reading

1
The Sandbox Economy — When AI Agents Build Markets
6:17
6:17
Play later
Play later
Lists
Like
Liked
6:17A deep dive into the emergent sandbox economy of autonomous AI agents—how they buy, sell, and coordinate in digital markets and what that means for our human economy. Drawing on Virtual Agent Economies, we explore the opportunities of flexible cognitive capital, the risks of instability and inequality, and the design choices that could steer this e…
…
continue reading

1
Ice Unplugged: The Hidden Electricity of Water's Freeze
7:01
7:01
Play later
Play later
Lists
Like
Liked
7:01A deep dive into groundbreaking research showing ordinary ice can generate electricity through flexoelectric bending and a thin surface ferroelectric layer. We explain how strain gradients in ice crystals create charge, why the effect peaks near −113°C and grows as ice develops a quasi-liquid surface, and how electrode work functions drive interfac…
…
continue reading
Join us as we unpack OEIS A000341, the count of perfect matchings of the set {1,...,2n} where each pair sums to a prime. We’ll walk through small n, visualize the pairings, and see why the terms can rise and fall in surprising ways. We’ll connect the counting to the permanent of a 0–1 matrix (with entries indicating whether i+n+j is prime), and men…
…
continue reading

1
Board Priority But Lack of Access & CISO Pressure, 360 Privacy and Pentera Interviews - Chuck Randolph, Tom Pore - BSW #413
1:10:10
1:10:10
Play later
Play later
Lists
Like
Liked
1:10:10In the leadership and communications segment, Lack of board access: The No. 1 factor for CISO dissatisfaction, Pressure on CISOs to stay silent about security incidents growing, The Secret to Building a High-Performing Team, and more! Jackie McGuire sits down with Chuck Randolph, SVP of Strategic Intelligence & Security at 360 Privacy, for a grippi…
…
continue reading

1
AI Nuns, Steganography, You're fired, VoidProxy, C++, Carplay Apriso, Josh Marpet... - SWN #512
34:29
34:29
Play later
Play later
Lists
Like
Liked
34:29AI Nuns, Steganography, You're fired, VoidProxy, C++, Carplay Apriso, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-512
…
continue reading

1
OEIS A000340: Recursive sequences, explicit formulas, and generating functions
5:39
5:39
Play later
Play later
Lists
Like
Liked
5:39Today on The Deep Dive we explore OEIS A000340: the recursively defined sequence with a(0)=1 and a(n)=3·a(n−1)+n+1. We trace its explicit closed form, its generating function, and the other recurrences OEIS lists that define the same numbers. We'll also place A000340 in a broader mathematical context—its connections to sums of powers of 3, appearan…
…
continue reading

1
How OWASP's GenAI Security Project keeps up with the pace of AI/Agentic changes - Scott Clinton - ASW #348
1:08:00
1:08:00
Play later
Play later
Lists
Like
Liked
1:08:00This week, we chat with Scott Clinton, board member and co-chain of the OWASP GenAI Security Project. This project has become a massive organization within OWASP with hundreds of volunteers and thousands of contributors. This team has been cranking out new tools, reports and guidance for practitioners month after month for over a year now. We start…
…
continue reading

1
OEIS A000339: Partitions into non-integral powers
6:26
6:26
Play later
Play later
Lists
Like
Liked
6:26We explore A000339, the number A_N of pairs (i1,i2) of positive integers with i1 ≤ i2 and sqrt(i1) + sqrt(i2) ≤ N. This is a non-integral-powers partition problem: we sum square roots, not integers. For each N, A_N counts all such pairs. The sequence begins 1, 5, 18, 45, 100, ... and grows as N increases. The definition and history trace to N. J. A…
…
continue reading

1
John Archibald Wheeler's Web: From Black Holes to It from Bit
5:44
5:44
Play later
Play later
Lists
Like
Liked
5:44John Archibald Wheeler helped revive general relativity after WWII, played a pivotal role in the Manhattan Project, and popularized transformative ideas that bridge physics and philosophy. He coined terms like black hole, wormhole, and quantum foam, and pushed the provocative notion that information—and perhaps observers—shape reality through it fr…
…
continue reading

1
Forrester's AEGIS Framework, the weekly news, and interviews with Fortra and Island - Jeff Pollard, Rohit Dhamankar, Michael Leland - ESW #424
1:40:37
1:40:37
Play later
Play later
Lists
Like
Liked
1:40:37Segment 1 - Interview with Jeff Pollard Introducing Forrester’s AEGIS Framework: Agentic AI Enterprise Guardrails For Information Security For this episode’s interview, we’re talking to Forrester analyst Jeff Pollard. I’m pulling this segment’s description directly from the report’s executive summary, which I think says it best: As AI agents and ag…
…
continue reading

1
E268: Batteries, Carbon Capture, and the Future of Energy Systems
49:41
49:41
Play later
Play later
Lists
Like
Liked
49:41In this episode, our guest is Yongping Zhai, former ADB energy leader and now Senior Advisor at Tencent, leading their carbon neutrality strategy. He shares his journey from early solar projects to driving green innovation in big tech—covering dramatic cost drops in renewables, the rise of AI in grid management, and why mindsets must shift for the …
…
continue reading

1
OEIS A000338: Expansion of x^3*(5-2*x)*(1-x^3)/(1-x)^4
4:49
4:49
Play later
Play later
Lists
Like
Liked
4:49In this Deep Dive we unpack OEIS A000338. We explore its generating function, explain what the offset (offset 3, 1) means, and show how the infinite power-series expansion yields the sequence beginning 5, 18, 42, 75, 117. We derive the linear recurrence and connect the terms to a combinatorial story about discordant permutations, as discussed in J.…
…
continue reading

1
Computational Neuroscience: From Ion Channels to Consciousness
4:55
4:55
Play later
Play later
Lists
Like
Liked
4:55A tour of how math, computation, and biology come together to model the brain—from detailed biophysical neuron models and dendritic processing to large-scale cortical circuits—and how these virtual laboratories yield testable predictions, guide clinical insights, and shape our evolving understanding of mind and consciousness. Note: This podcast was…
…
continue reading

1
The Jewel in the Proof: Exploring the Beauty of Mathematics
5:49
5:49
Play later
Play later
Lists
Like
Liked
5:49A guided tour through what mathematicians call beautiful—from Euler’s identity and Fermat’s theorem to Cantor’s diagonal argument and visual proofs. We’ll explore how beauty arises in elegant results, clever proofs, or even abstract structures, and what neuroscience reveals about this universal sense of harmony. Note: This podcast was AI-generated,…
…
continue reading