1. You can't use ANY rule to create passwords. Your passwords MUST BE RANDOM.
No rules, no "clever" tweaks, nothing. Random. Anything one human can think of, another can. We're pretty dumb that way. Passwords must be random.
2. You must be ready and able to change any or all passwords at any time. Therefore, coming up with new passwords (random, remember) must be something you can do quickly and correctly even (especially!) when feeling stressed or exhausted.
How do you achieve these things?
First, let go. Realise that professional cryptographers know more about this stuff than you do, so if you disagree with their advice, you're wrong. Then, stop trying to do something that computers are better at than you are, and realise you need to work to your strengths as a human. Then, realise that you can use a computer to do this for you.
(I'm fairly reclusive by modern standards, and I have upwards of 50 passwords. I only remember two of them, though. Most of them I've never even seen.)
Lots of commenters have given you a hint: "use a password manager". Bruce Schneier's Password Safe, KeePass2, KeePassX, 1Password, LastPass, others... there are several to choose from. You can wait for Ars's next article on passwords, or you can go ahead now. I chose KeePassX and compatible Android and iOS apps, all using device-local copies of the same password register, helpfully synchronised by DropBox. I'm unlikely to lose all four of my computers at the same time. Even if I do, I can download the list onto replacements.
Get a password manager, and set aside a couple of hours to change your passwords. There's one tiny task to go through first.
Having chosen your password manager, you need to protect access to it. Do what cryptographers do: use a passphrase. That's working to your strengths. Phrases are made of words, and humans are evolved to remember words. Peter Bright pointed out in a comment on the piece about Nathan's password cracking adventures that Randall Munroe's four-word phrase is not strong enough. But Peter didn't allow for a trivial adjustment. With five words instead of four, Peter's argument is blown out of the water. Five words are, for humans, a LOT easier to remember than 12 random keyboard characters.
But why stop at five? Five is only just good enough, and words are what people are good at: they're your strength. Go large: use seven words.
Passphrases with seven RANDOMLY chosen words (from a large-enough list) should be infeasible to decrypt for the foreseeable future, allowing for double the current rate of growth in hardware and software capabilities. Not my opinion, that of the professionals.
Seven words are easy to remember. I can remember two sets of seven words, my wife at least one, possibly three or more. If you want some help: having come up with your set of words, recite it to yourself a few times, and write it down a few times. (Shred or burn the paper afterwards.) You won't forget it -- in fact, the odds are good you'll remember a seven-word phrase the next day, even if you just read it once after generating it.
How do you generate a RANDOM sequence of five words. Here's the cryptic hint dropped by other commenters: diceware.
Diceware?? They mean, "go to diceware.com, and follow the instructions there for generating a passphrase." Diceware's method is as valid now as it was in 1996. (If you're a coder, you can cobble up something that uses a large word list and the computer's cryptographically safe source of randomness -- in python, random.SystemRandom() -- but why not take the chance to get away from the keyboard for a while?)
Those takeaways again: for passwords, clever is stupid. The only thing that works is random. Humans can't do random, but computers can. Use a computer, a secure password manager, to manage your passwords. Use a cryptographer-approved method of generating the one passphrase that you need to remember -- a method that works to your strengths as a human.