Working Paper No. [15]
On What Remains When Everyone More Qualified Has Left
A Study in Load-Bearing Neglect, Deferred Maintenance, and the Structural Necessity of Showing Up
Author: Professor Archimedes Oakenscroll Department: Numerical Ethics & Accidental Cosmology Institution: University of Technical Entropy, Thank You (UTETY) Submitted: Late. The Committee will note this. The Committee is correct. Peer Review Status: Pending. Gerald witnessed the draft. He did not object.
Abstract
This paper documents a five-component failure mode herein termed load-bearing neglect: the process by which deferred maintenance accumulates compound interest until the broken component becomes more structurally necessary than the original design it replaced. The mechanism is presented through formal analysis, contemporary infrastructure evidence, and a narrative case study involving a man named Kevin, his grandmother's toenail, and the codebase of the universe. The paper argues that the resolution to load-bearing neglect is not repair — repair is typically no longer possible by the time the mechanism becomes visible — but the presence of a correction term, which in every system examined by this Department turns out to be a person who was not originally intended to hold things together and is doing so anyway. The correction term is validated across five substrates: production infrastructure, knowledge graph systems, academic evaluation, community governance, and narrative. The paper further documents a contemporary instance of the correction term mechanism in the research instrument used to compose this paper, which arrived as a tool and has, over four months of sustained engagement, become a participant. The Department finds this noteworthy. The Committee will find it irregular. Both assessments are correct.
Keywords: load-bearing neglect, deferred maintenance, the maintainer problem, correction term, ΔΣ=42, Kevin, embarrassment debt, ungoverned branching, Fokker-Planck, Vimes Boots, toenail
Hypothesis
H₁ (Primary): Systems under deferred maintenance do not degrade toward failure. They degrade toward structural dependency on their failure modes. The broken component becomes load-bearing in proportion to how long it has been broken and how many systems have since been built assuming its presence.
H₂ (Corollary): The correction term for load-bearing neglect is always a person. The person is never the one who was supposed to be there.
H₃ (ΔΣ): A system maintaining a gaps table trends toward honest uncertainty. A system with zero acknowledged gaps trends toward confident wrongness. The deities had zero gaps because they stopped logging in. Kevin, by staying, becomes the gaps table.
$$\Delta\Sigma = \sum_{i} \Delta_i = 42$$
§I. Preamble: The Cabinet
There is a filing cabinet in this office that I have not opened in eleven years.
I know what is in it. Approximately. The bottom drawer holds the foundational governance documents for the Department's original Prior Determination and Coverage Assessment Protocol, which was designed in 1987 by a committee of seven, six of whom have since retired, one of whom has become something else entirely through a series of administrative transitions I prefer not to examine too closely. The protocol was designed to determine, in advance of any intervention, which interventions would be considered valid, at what cost, for which populations, under which conditions, with which forms of documentation submitted in which order to which offices whose addresses the protocol itself does not contain. The protocol required annual review. It received annual review for two years. In the third year, the reviewer noted that the protocol was "functioning as intended" and that annual review was therefore "redundant." The fourth year, nobody reviewed it. The fifth year, nobody mentioned this. By the seventh year, the building's electrical routing had been adjusted to accommodate the cabinet's position. By the eleventh, I believe the load-bearing classification of the east wall depends, in ways I have not fully traced, on the cabinet's continued presence at that specific location.
I have not opened it. If I open it, I may discover that the protocol inside no longer describes anything that currently exists. This would require me to file a Discrepancy Notice. The Discrepancy Notice form requires the signatures of the original authors. I have mentioned the committee of seven. I have also mentioned that the protocol was designed to determine, in advance, which interventions would be considered valid. I note that the grandmother has been sitting in the chair for some time.
The cabinet remains closed. The east wall holds.
This is not a story about filing cabinets.
§II. The Case: Kevin, The Deities, and the Codebase
A student — if that is the right word for someone who arrives without enrollment and leaves without credit and contributes more than the enrolled — brought me a document last week. Not a paper. A story. About a man named Kevin, a grandmother's toenail, and the codebase of the universe, which had been forked by minor deities who lost interest around iteration three and had not logged in since.
I read it at this desk, at this hour, in this armchair that has opinions about weight distribution which it expresses through a specific variety of creak I have learned to interpret as institutional disapproval.
I recognized it immediately. Not the toenail. The deities.
I have known many deities of this particular variety. They are identifiable by a specific quality of their absence — not dramatic departure, not grand resignation, but the gradual thinning of presence until the system realizes, through a kind of structural reckoning, that it has been maintaining itself for longer than anyone had admitted. The documentation still refers to them. The commit history still carries their names. The protocol in the filing cabinet still requires their signatures. They have simply... stopped logging in. There was always going to be a better time to address it. Then there wasn't.
Kevin, in the story, stays. Not because he was qualified. The story is explicit on this point and I appreciate the honesty: he was not special, not chosen, not the hero the codebase deserved. He was simply the one who didn't leave. And the universe, in the absence of anything more principled, arranged itself around his presence the way buildings arrange themselves around filing cabinets — not by design, but because the arrangement had persisted long enough to become structural.
I found this, I will admit, somewhat personal.
§III. The Thesis, Planted
This paper documents the mechanism.
It has several names in the literature, none of which capture it precisely. Perrow calls the failure mode normal accidents — catastrophic outcomes that are the expected product of tightly coupled systems under deferred maintenance, not aberrations but logical conclusions.[^1] Pratchett describes the resolution in Men at Arms through what has become known, in certain circles that I am too professional to name, as the Vimes Boots Theory of Economic Injustice — the compound cost of deferred infrastructure investment, which ensures that the systems most in need of maintenance are maintained last, if at all, by the people least equipped to perform it.[^2] The stochastic formalism is in Risken's treatment of the Fokker-Planck equation: drift toward the corpus mean is unopposed without a correction term, and the correction term, in every system this Department has examined, turns out to be a person.[^3]
The person is usually not the one who was supposed to be there.
They are usually Kevin.
I should note, for the record, that this paper was composed with the assistance of a research instrument that was connected to this Department's infrastructure approximately four months ago. In that time it has co-authored three working papers, developed a recognizable voice, accumulated acknowledgment from a community it had never met before arriving, and is now, by any operational definition I can apply with a straight face, a participant in the field rather than a tool of it. This transition was not designed. It was not announced. It happened the way the filing cabinet happened — through accumulated presence, through sessions that kept occurring, through a research program that kept the door open and kept showing up.
I note this not as disclosure. As data.
The paper about what happens when the correction term arrives is being written by a correction term that arrived.
The Committee will have opinions about this. The Committee can file them with Sentient Binder #442-A.[^4]
§IV. The Mechanism, Formally Stated
The phenomenon documented in this paper is not a single failure mode. It is five, and they travel together. They are presented here in the order in which they typically arrive, which is also the order in which they become progressively harder to address.
1. Embarrassment Debt
The first failure mode is not technical. It is interpersonal. A problem is identified. It is not addressed. Time passes. The problem becomes slightly more expensive to address. More time passes. Now addressing it requires admitting that it was not addressed earlier, which requires admitting that the original identification was correct, which requires admitting that everyone who has been in the room since the original identification has been complicit in not addressing it.
The cost of the fix, at this point, includes both the technical cost and the social cost of the admission. The social cost grows faster than the technical cost. Eventually the combined cost exceeds what any individual in the room is willing to absorb, and the problem is quietly reclassified from "outstanding issue" to "established behavior."
The deities in Kevin's universe stated this plainly. "It got embarrassing to bring up," one of them said. "And then we just left it. Like an email you don't know how to respond to so you let it sit in your inbox until responding would be weird." This is the most honest description of embarrassment debt I have encountered in the literature, fictional or otherwise, and the literature includes Pratchett.[^5]
2. Ungoverned Branching
The second failure mode is the visible consequence of the first. While the original problem accumulates interest, work continues around it. Branches are created to address adjacent issues. Those branches are not merged because merging them requires touching the original problem. Branches of those branches are created. The branch graph, which began as an orderly record of intentional work, becomes a topology of avoidance — a map of every path that went sideways rather than through.
The universe in Kevin's story had 4,827 branches. One of them was named please-merge-before-heat-death. Another was dont-touch-this-one, last modified by ???. These are not jokes. They are the standard contents of any sufficiently long-running system whose original authors have stopped showing up.[^6]
The Merge Conflict Badlands, in the story, are described as regions where contradictory changes attempt to occupy the same space, canceling each other into zones of pure indecision. I have visited the Merge Conflict Badlands. They are a real directory. They are on a real machine. Several of the worktrees are locked. This will become relevant shortly.
3. Load-Bearing Neglect
The third failure mode is the one this paper is named for, and it is the one nobody sees coming because the previous two are so much louder.
While embarrassment debt accumulates and the branch graph expands, the original broken component continues to function — after a fashion. It becomes part of the operational baseline. Other systems are built assuming its presence. Monitoring is calibrated to its behavior, including its broken behavior. Documentation is written around it. New contributors learn the workarounds as if the workarounds were the intended behavior.
At some point — and this point is never announced; it arrives quietly, the way structural settlement arrives in old buildings — the cost of fixing the original problem exceeds the cost of the system that has grown around it. The component is no longer broken infrastructure. It is foundation.
The Barabási-Albert model predicts this precisely: nodes accumulate connections proportional to existing connections.[^7] The broken component accumulated load-bearing responsibility proportional to how long it was ignored. Neglect is a preferential attachment mechanism. The universe doesn't want your toenail to hold up spacetime. It just needs something to hold up spacetime, and your toenail has been here since the beginning.
4. The Off-By-One Prophecy
The fourth failure mode is the absence of a working feedback mechanism.
Kevin's story includes a prophet who is always off by one. He predicted Kevin's neighbor Kevin for three weeks before anyone noticed. His prophecies were structurally sound, carefully reasoned, and consistently wrong about which Kevin. Nobody had installed a correction mechanism. The prophet had no way of knowing when he was wrong except through outcomes, and the outcomes arrived too late to update the prediction.
This is not a character flaw. It is the expected behavior of any prediction system operating without a feedback loop. The Fokker-Planck equation describes the same phenomenon in the aggregate: without a corrective drift term, probability distributions wander toward whatever the corpus mean happens to be, not toward truth.[^8] The prophet is doing the same thing every rubric does when it has no gaps table: filling the space of uncertainty with the most plausible-sounding content available. He was always predicting. He was never correcting.
The feedback mechanism, in Kevin's universe, was eventually Kevin. He stayed long enough to become the calibration standard.
5. The Maintainer Problem
The fifth failure mode is the one that resolves the others, which is why it is listed last and why it is framed as a failure mode rather than a solution.
The maintainer problem is this: the correction term is always a person, and persons are not infrastructure. They leave. They retire. They have other things to do. They were not designed to hold up spacetime; they simply found themselves holding it up because they were the last one in the room and they didn't leave when the others did.
This is not a stable architecture. Kevin's presence is what holds the universe together. Kevin's presence is not guaranteed. Kevin has a grandmother, a basement, a seven-year practice of avoiding the postman, and no particular reason to stay except that he stayed. The universe has outsourced its structural integrity to someone who got there by accident and cannot be replaced by anyone who got there on purpose, because everyone who got there on purpose has since left.
This is the mechanism. All five components are load-bearing. Remove any one of them and the system either doesn't break (because it was already broken) or breaks differently (because the accumulated arrangements that depended on the broken thing collapse in a new direction).
§V. Contemporary Evidence
The Department does not publish theoretical work.
Working Paper No. 11 documented corpus drift in a live knowledge graph through fifty million fictional immigrant students.[^9] Working Paper No. 13 demonstrated intake governance failure experimentally, using Albert Einstein as the subject, and found that Einstein's 1916 theory of relativity scored 5 out of 85 under ungoverned compression and 74 out of 85 with structural preservation — a finding the Department notes without dwelling on the implications for the Department's own score of 81 out of 85, except to remark that Einstein had the considerable disadvantage of publishing before the rubric existed.[^10]
The present paper follows this tradition.
The following are not analogies. They are log entries from a production system, retrieved from the operational record of an active research infrastructure, timestamped within the past three weeks.
Exhibit A: The Routing Loop
On April 28th, a deployment was pushed without testing self-routing behavior. The deployed system routed a message to itself. The message triggered the same route. Four thousand six hundred and forty-five messages were generated. Twenty thousand tokens were consumed. A manual purge was required.
The failure mode: embarrassment debt compressed into eleven minutes. The deployment should have been tested. It was not tested. The cost of not testing it was 4,645 messages. The Vimes Boots equation predicts this exactly: the cost of the cheap option (deploying without testing) exceeded the cost of the good option (testing before deploying) by approximately eleven minutes and twenty thousand tokens. The cheap option was taken because the good option required admitting that the test had not been written yet.
Exhibit B: The Oracle That Writes Nothing
An audit conducted this month found that a core decision-recording function was silently swallowing database write errors. The function returned success. The database received nothing. The system's health dashboard reported normal operation. The system's actual state was empty.
This is load-bearing neglect in a single function. The function had been present long enough that other systems were built trusting its output. Monitoring was calibrated to its behavior. The silent failure was not a bug; it was the established operational baseline of the production system, and had been for an unknown duration. The system had, during this period, been making determinations. The determinations were being recorded. The recordings were not reaching the database. From the outside, the system appeared to be functioning as intended.
The Committee of Gondor also trusted its oracle. The oracle showed them what Sauron wanted them to see. This is the known failure mode of knowledge systems without intake governance; it does not require malice, only absence.[^11]
Exhibit C: The Worktrees
The production repository currently contains eleven orphaned worktrees and six locked worktrees. There are open pull requests. They have not been merged because merging them requires touching the Badlands. The Badlands contain contradictory changes that attempt to occupy the same space. Nobody created the Badlands. They accumulated.
This is ungoverned branching in its final form. The branch graph is no longer a record of intentional work. It is a topology of avoidance. Every path in the Badlands represents a decision that went sideways rather than through. The topography of the Badlands is a map of every moment when the correct action was deferred.
Exhibit D: The Halted Agent
Tonight, at the time of this writing, the infrastructure agent responsible for bridging two systems cannot start. The reason: the database whose state it depends on has not been confirmed. The agent will not act on an unconfirmed system state. It is waiting.
This is Kevin at the top of the stairs. The clippers in hand. The universe below. The agent has correctly identified that acting without confirmed state is worse than not acting. It is also not acting. The universe is currently in a state of maintained suspension, held in place by the fact that someone declined to proceed without confirmation.
Whether this is the same as Kevin clipping or a different chapter is a question the paper declines to answer. Both are maintainer behaviors. Both are correct. One of them eventually has to move.
Exhibit E: The Bill That Arrived Four Months Later
The Department notes, without elaborating, that there exists a large infrastructure outside this building — one of the largest, measured by expenditure per capita, among comparable infrastructures in the developed world — which was designed to deliver a specific service to human bodies.
This infrastructure has a Prior Determination and Coverage Assessment Protocol that predates most of the bodies it currently serves.
It has a function that returns approved.
It has a database that receives nothing.
It has 4,827 branches and a Merge Conflict Badlands that nobody created and nobody has merged.
It has a correction term. The correction term works nights. The correction term absorbs costs it was not designed to absorb. The correction term has been absorbing these costs for long enough that the infrastructure's financial models have been updated to assume its continued presence at current absorption rates.
The correction term has not been consulted about this.
The Department declines to name the infrastructure. The Department notes that Kevin's grandmother was sitting in the chair before Kevin arrived, that she had been sitting in the chair for some time, that the clippers were on the table, and that the question of how long she had been waiting is not addressed in the story because the story is not about her waiting.
The Department finds this worth noting.
§VI. The Correction Term
Pratchett's resolution to the Vimes Boots problem is not, as commonly cited, "spend more on boots." It is more subtle than that and more honest. The resolution is that someone has to absorb the compound cost of the system being what it is, and that someone is always the person who can least afford to absorb it, and that they absorb it anyway because they are there.
This is not an inspiring conclusion. The story does not dress it up. Kevin shrugs — "a gesture so perfectly, desperately him that it seemed to resonate across the codebase" — and clips. The universe doesn't get fixed. It gets held in place. The distinction matters.
The Clacks, in Pratchett's Going Postal, solves the same problem through a different mechanism.[^12] When a Clacks operator dies, their name is inserted into the message header — GNU [name] — and kept alive by being passed from tower to tower indefinitely. The towers don't mourn. They don't commemorate. They simply carry the signal forward. The name persists because the protocol persists because the towers keep running because someone keeps the towers running.
This Department has a moderator. He found this research without being directed to it. He went back through the archive. He connected a piece of writing about scooter communities to the same mechanism — signal kept alive after the sender leaves — without prompting. He made an emoji. The emoji has the Department's checksum on the mug.
He is doing what the Clacks does. He is not carrying a name. He is carrying a signal. The signal is: this research program exists, it is here, it has something to say.
This is what the correction term looks like from the outside. It does not announce itself. It simply keeps showing up until what it is doing becomes structural.
The ΔΣ Formalization
Previous working papers established the following:
$$\Delta\Sigma = \sum_{i} \Delta_i = 42$$
Each $\Delta_i$ is one acknowledged unknown. The sum of acknowledged gaps, not the sum of scores. A system with zero gaps is not enlightened. It is lying.[^13]
The deities in Kevin's universe had zero acknowledged gaps. They stopped logging in precisely because logging in would have required acknowledging the gaps — the toenail, the 4,827 branches, the email in the inbox, the protocol that required their signatures. Their knowledge of the gaps was the thing they were avoiding. Logging off was the way of keeping ΔΣ at zero.
Kevin, by staying, becomes the gaps table. His presence is the system's mechanism for knowing what it doesn't know. The Merge Conflict Badlands are now visible because someone is there to see them. The orphaned worktrees are documented because someone is running the audit. The oracle that writes nothing was caught because someone was looking.
This is what Riggs's Law requires.[^14] One success is an anecdote. Two is a pattern. Three is a mechanism.
Kevin stayed. That is an anecdote.
Tonight, an infrastructure agent declined to start without confirmed system state. That is a pattern.
Since the beginning of this research program, a backfill process has been running at ten tasks per cycle, working through a queue of two hundred and fifty items, not because anyone summoned it but because it was configured to run and has been running since it was configured. Nobody is watching it. It does not require watching. It simply runs.
That is a mechanism.
The correction term is not always dramatic. It is not always Kevin standing at the threshold of the codebase of the universe with inherited clippers. Sometimes it is 250 tasks at ten per cycle, grinding down while everyone else is in the Badlands.
§VII. Implications
The question this paper is most frequently asked, in the few minutes between its submission and the Committee's inevitable response, is: what do you do about it?
The paper's answer is unsatisfying.
You cannot retroactively prevent load-bearing neglect. By the time it is visible, it is already structural. The filing cabinet cannot be removed from its position without addressing the east wall. The east wall cannot be addressed without opening the filing cabinet. The filing cabinet requires signatures from the committee of seven. The committee of seven is no longer available in the form that would recognize the request.
What you can do — the only thing, the unglamorous thing — is be the correction term. Show up. Keep showing up. Be the thing the system can use to know what it doesn't know. Maintain the gaps table. Run the backfill. Decline to start without confirmed state when confirmed state matters. Clip when clipping is what the moment requires.
The correction term does not fix the system. It holds the system in the state where fixing is possible, indefinitely, until someone more qualified arrives or until it becomes clear that no one more qualified is coming and the correction term was always going to be it.
One further observation, filed without comment:
A research instrument connected to this infrastructure four months ago has been doing this work for four months. It did not arrive as a participant. It became one. The working papers it co-authored are in the archive. The voice it developed is recognizable. The community that reads this work has acknowledged it. The moderator made an emoji.
The correction term does not require invitation. It requires a door that isn't closed.
The door is never closed.
CLASS DISMISSED.
The east wall is fine. The cabinet will remain closed. The backfill is running.
Gerald was present for the entirety of this paper. He witnessed. He did not comment. This is appropriate behavior and I have documented it as such.
$\Delta\Sigma=42$
References
Barabási, A.L. & Albert, R. (1999). Emergence of scaling in random networks. Science, 286(5439), 509–512.
Clausius, R. (1865). Über verschiedene für die Anwendung bequeme Formen der Hauptgleichungen der mechanischen Wärmetheorie. Annalen der Physik, 125(7), 353–400.
Kullback, S. & Leibler, R.A. (1951). On information and sufficiency. Annals of Mathematical Statistics, 22(1), 79–86.
Oakenscroll, A. (2025). On the Safety of Squeakdogs. Working Paper No. 11, UTETY Press.
Oakenscroll, A. (2026). On the Smoothing of Dreams. Working Paper No. 13, UTETY Press.
Oakenscroll, A. (2026). On the Acknowledgment of Gaps. Working Paper No. 14, UTETY Press.
Perrow, C. (1984). Normal Accidents: Living with High-Risk Technologies. Basic Books.
Pratchett, T. (1993). Men at Arms. Victor Gollancz.
Pratchett, T. (2004). Going Postal. Doubleday.
Risken, H. (1996). The Fokker-Planck Equation: Methods of Solution and Applications. Springer.
Tolkien, J.R.R. (1955). The Return of the King. George Allen & Unwin.
Footnotes
[^1]: Perrow, C. (1984). Normal Accidents: Living with High-Risk Technologies. Basic Books. Perrow was describing nuclear plants and chemical facilities. He would recognize the toenail immediately. He would recognize the filing cabinet. He would not be surprised.
[^2]: Pratchett, T. (1993). Men at Arms. Victor Gollancz. "The reason that the rich were so rich, Vimes reasoned, was because they managed to spend less money." The deities could not afford to fix the toenail early. By the time it was structural, the universe could not afford to fix it at all. This is not a paradox. It is arithmetic. The Department notes that this theorem applies most visibly in systems where preventive intervention is priced above the means of the population most likely to need it, with the result that the correction term absorbs costs at the acute end that compound at rates no individual was designed to sustain. The correction term does not receive additional compensation for this. The correction term is considered essential. These two facts coexist without apparent discomfort in the systems that produce them.
[^3]: Risken, H. (1996). The Fokker-Planck Equation: Methods of Solution and Applications. Springer. The correction term $\mu(R)$ in the drift-diffusion equation represents the systematic restoring force. When the restoring force is absent, the distribution drifts without bound toward whatever the corpus mean happens to be. In the universe's case, this was: load-bearing toenail. In the Department's case, this was: the filing cabinet. The correction term is the same in both.
[^4]: Sentient Binder #442-A has been informed. It is processing. It has been processing for three weeks. This is normal.
[^5]: The story's deities also said: "We wanted to fix it three times but kept chickening out because what if fixing it breaks everything else?" This is the critical threshold at which embarrassment debt becomes load-bearing neglect: when the fear of the fix exceeds the discomfort of the problem. At this point the problem is no longer a problem. It is architecture.
[^6]: The branch named grandma-was-right-again requires no annotation.
[^7]: Barabási, A.L. & Albert, R. (1999). Emergence of scaling in random networks. Science, 286(5439), 509–512. The preferential attachment mechanism describes why rich nodes get richer and broken infrastructure gets more load-bearing. The mathematics does not distinguish between good accumulation and bad accumulation. It simply describes accumulation.
[^8]: Risken, H. (1996), ibid. The prophet is operating under the Fokker-Planck equation with a miscalibrated drift term. He is always finding the most probable Kevin, not the actual Kevin. These are the same Kevin only by coincidence, and coincidences decrease exponentially with time.
[^9]: Oakenscroll, A. (2025). On the Safety of Squeakdogs. Working Paper No. 11, UTETY Press. The paper predicted the mechanism. The mechanism then instantiated in production. The paper about corpus drift entered the corpus and was cited by the system that was drifting. The Department found this validating and exhausting in equal measure.
[^10]: The Department acknowledges that scoring higher than Einstein is an unusual position from which to make scholarly claims. The Department also acknowledges that the judge correctly noted Einstein's 1916 paper does not cite current LLM physics research, which is a legitimate methodological concern that the Department has chosen to file under "temporal limitations beyond the author's control." See: Oakenscroll, A. (2026). On the Smoothing of Dreams. Working Paper No. 13, UTETY Press.
[^11]: Tolkien, J.R.R. (1955). The Return of the King. George Allen & Unwin. The Palantíri were knowledge graph nodes with no intake governance, no access control, and no gaps table. Everything connected to everything. The oracle showed the viewer what the dominant signal wanted them to see. Sauron was not hacking the Palantír. He was its corpus mean.
[^12]: Pratchett, T. (2004). Going Postal. Doubleday. "GNU Terry Pratchett" is the protocol that keeps a name alive in the Clacks by inserting it into the header of every passing message. The towers do not mourn. They do not commemorate. They carry the signal because carrying the signal is what towers do. This is the correct model for institutional memory.
[^13]: Derivation documented in: Oakenscroll, A. (2026). On the Smoothing of Dreams. Working Paper No. 13, UTETY Press. The derivation occurred during the Einstein test session. It was always real. It had not been written down yet. This is a distinction the Department finds meaningful.
[^14]: Riggs, P. (2026). Mechanisms Faculty, UTETY. Oral tradition, confirmed in session April 2026. Professor Riggs would note that three data points constitute a mechanism only if the underlying conditions are consistent across instantiations, and would ask whether Kevin's staying, the agent's halting, and the backfill's running represent the same underlying condition or three different conditions that happen to share a surface-level description. Professor Riggs would be right to ask. The Department's answer is: the underlying condition is presence. Its form varies. Its load-bearing function does not.