operating systems bitcoin processes bitcoin mining rust ssl cryptocurrency thomas jefferson shell secure computation tor bitcoin transactions mutual exclusion dijkstra scheduling teaching linux silk road bitcoin script blockchain cryptography file systems asymmetric cryptography trust memory management colossus grading learning preemptive multitasking bash wahoowa bletchley park multics privacy university of virginia mapreduce bandwidth protocols object-oriented programming grace hopper tor hidden services merkle tree script superfish proof-of-work signatures elliptic curve cryptography advice for new faculty synchronization energy multi-party computation predicting the future zfs stack smashing process virtual memory system calls kernel single sign-on access control setuid security internet history public-key protocols traceroute scheduling web servers randomness authentication healthcare.gov symmetric encryption stride scheduling lottery scheduling priority inversion tasks pointers garbage collection servo winston churchill foxp2 konrad zuse leibniz abstractions alan turing android microsoft multiprogramming peter norvig sage linus torvalds programming languages privacy-preserving applications latency internet networking endless golden ages entropy john mccarthy asymptotic operators turing machines recursive definitions linkedin speaker deck speakerdeck satoshi satoshi nakamoto graph isomorphism chaum's digital cash alternate cryptocurrencies digital cash scaling bitcoin cryptocurrencies cryptocurrenty unlinkability untracability anonymity blockcypher poisson process bitcoin confirmations pay-to-hash paradise professors hash collisions mining cost economics of mining energy consumption xcode ghost bitcoin blockchain paranoia hard problems diffie-helman jefferson wheel cipher money garbled circuits yao circuits bitcoin exchange proof of reserve reserve reserve banking mt. gox dread pirate roberts sidechains spv merged mining namecoin bloom filters erasure code permacoin doge scrypt litecoin dogecoin spend to public address selfish mining 2140 mining morgan spurlock certificate authority lenovo mining pools computation cost of computation merkle trees merkle's puzzles transactions hashcash distributed consensus digicash chaum david chaum cryptographic hasing nsa backdoor choosing ecc parameters dual-ec group theory finite fields currency research academia time management professor values minix neil degrasse tyson income inequality future malthus isaac asimov golden catastrophes luddies exokernel microkernel design l3 l4 ipc lamport locking test and set heartbeat ssl bug heartbeat bug heartbeat bug file permissions flash file systems merkle hash tree log-structured file system persistence storage unix system 5 file system memory ironkernel kernel development kernel-level programming ipv4 timer coalescing linux scheduler rust concurrency mechanisms goto fail apple ssl bug arcs sharing data rwarc 2029 rust pointers reference counting ownership morris worm buffer overflow rust tasks segmentation faults arm processor page faults page tables memory isolation privileged instructions gash chrome browsers fernando corbato \ winston churchill green revolution norman borlaug alan kay gps moore's law www tim berners-lee skype mercury delay lines dram disk drives ssd raid gin sram vulnerabilities protecting the stack linux kernel market segmentation paging interrupts unix syscalls libc switch task spawn fork haloween hair dryer attacks trick-or-treating biometrics apache security mac os x fan benchmarking web benchmarks certificates tls rsa public key cryptosystems server overload packets prng cipher modes storing passwords kernel backdoors trusting trust semaphore dining philosopher race conditions deadlocks multi-threading resource contention concurrency cryptosystems perfect cipher cryptanalysis claude shannon first come first served round-robin threads linked list git malloc double-free vulnerabilities free smart pointers david letterman multiparty computation udacity moocs open education cs101 genetic dating computer science world wide web universal languages dean kamen lambda calculus universal turing machines halting problem russell's paradox axiomatic systems meta-linguistic programming interpreters python dictionaries plagarism detection p=np public-key cryptography inheritance liberal arts python tuples python objects in python encapsulation reverse engineering imperative programming stateful evaluation rules environments state set! analyzing algorithms big-o fibonacci measuring cost golden ratio loops modeling computers truth tables digital logic shockley logic transistors computing machines list procedures distributed hashing hash tables danny lewin car cons cdr scheme lists fixedpoint scheme pairs lists lambda making procedures scheme exponential growth backus-naur form evaluation rules john backus language grammar
See more