operating systems bitcoin processes rust bitcoin mining ssl cryptocurrency secure computation thomas jefferson shell mutual exclusion bitcoin transactions tor linux scheduling dijkstra teaching bash wahoowa silk road preemptive multitasking learning grading colossus object-oriented programming bitcoin script protocols bletchley park multics blockchain privacy university of virginia bandwidth cryptography mapreduce grace hopper asymmetric cryptography file systems trust memory management multiprogramming scheduling web servers peter norvig sage traceroute linus torvalds stack smashing process programming languages virtual memory servo system calls public-key protocols advice for new faculty kernel internet history security setuid single sign-on privacy-preserving applications elliptic curve cryptography access control pointers multi-party computation tasks priority inversion lottery scheduling stride scheduling symmetric encryption healthcare.gov winston churchill garbage collection foxp2 synchronization predicting the future authentication konrad zuse leibniz zfs randomness abstractions alan turing energy android microsoft recursive definitions asymptotic operators superfish endless golden ages proof-of-work script entropy turing machines tor hidden services john mccarthy networking internet merkle tree signatures latency hash tables distributed hashing kernel backdoors trusting trust semaphore dining philosopher storing passwords danny lewin list procedures race conditions deadlocks multi-threading resource contention computing machines concurrency cryptosystems perfect cipher cryptanalysis transistors claude shannon logic shockley digital logic grammar language mac os x fan john backus evaluation rules backus-naur form benchmarking web benchmarks certificates exponential growth tls scheme making procedures lambda lists scheme pairs fixedpoint rsa public key cryptosystems scheme lists cdr cons server overload packets car prng cipher modes david letterman python python tuples liberal arts inheritance public-key cryptography p=np plagarism detection python dictionaries interpreters meta-linguistic programming axiomatic systems russell's paradox halting problem universal turing machines multiparty computation udacity lambda calculus moocs dean kamen open education cs101 universal languages genetic dating computer science first come first served round-robin truth tables modeling computers threads linked list git loops golden ratio malloc double-free vulnerabilities free smart pointers measuring cost fibonacci big-o analyzing algorithms set! state environments stateful evaluation rules imperative programming reverse engineering encapsulation objects in python world wide web transactions merkle's puzzles merkle trees cost of computation computation mining pools lenovo certificate authority morgan spurlock mining 2140 selfish mining spend to public address dogecoin litecoin scrypt doge permacoin erasure code bloom filters namecoin future income inequality neil degrasse tyson minix values professor time management academia research currency finite fields group theory dual-ec choosing ecc parameters nsa backdoor cryptographic hasing david chaum chaum digicash distributed consensus hashcash hash collisions professors paradise pay-to-hash bitcoin confirmations poisson process blockcypher anonymity untracability unlinkability cryptocurrenty cryptocurrencies scaling bitcoin digital cash alternate cryptocurrencies chaum's digital cash graph isomorphism satoshi nakamoto satoshi speakerdeck speaker deck merged mining spv sidechains dread pirate roberts mt. gox reserve banking reserve proof of reserve bitcoin exchange yao circuits garbled circuits money jefferson wheel cipher diffie-helman hard problems paranoia bitcoin blockchain xcode ghost energy consumption economics of mining mining cost linkedin dram mercury delay lines skype tim berners-lee www moore's law gps alan kay norman borlaug green revolution \ winston churchill fernando corbato browsers chrome gash privileged instructions memory isolation page tables page faults arm processor segmentation faults apache security biometrics trick-or-treating hair dryer attacks haloween fork spawn switch task libc unix syscalls interrupts paging market segmentation linux kernel protecting the stack vulnerabilities sram gin raid ssd disk drives storage persistence log-structured file system merkle hash tree flash file systems file permissions heartbeat bug heartbeat bug heartbeat ssl bug test and set locking lamport ipc l4 l3 design microkernel exokernel luddies golden catastrophes isaac asimov rust tasks buffer overflow morris worm ownership reference counting rust pointers 2029 rwarc sharing data arcs apple ssl bug goto fail rust concurrency mechanisms linux scheduler timer coalescing ipv4 kernel-level programming kernel development ironkernel memory unix system 5 file system malthus
See more