Archives
- 26 Jan Non-oblivious Algorithms
- 26 Jan Oblivious Algorithms
- 25 Jan Distributed Networking
- 24 Jan Work-stealing
- 23 Jan Performance Modelling
- 22 Jan Network Architecture Topologies
- 21 Jan Designing Locks
- 20 Jan Locks
- 19 Jan Memory Models
- 18 Jan Cache coherence
- 18 Jan Caches
- 17 Jan MPI
- 16 Jan CUDA
- 15 Jan Intro to Parallel Architectures
- 13 Jan Congestion Control
- 12 Jan QUIC
- 11 Jan Transport Protocols
- 10 Jan Network Security
- 09 Jan Inference
- 08 Jan Network Measurements
- 07 Jan Network Synthesis
- 06 Jan Network Verification
- 05 Jan Fast convergence - MPLS
- 04 Jan Prefix filtering and aggregation
- 03 Jan Hierarchical routing
- 02 Jan ATCN Exam Questions
- 01 Jan DPHPC Exam Questions
- 23 Oct RETbleed
- 22 Oct Meltdown: Reading Kernel Memory from User Space - Paper Summary
- 21 Oct Spectre Attacks: Exploiting Speculative Execution - Paper Summary
- 10 Oct Transient Execution Attacks and Defences
- 03 Oct Breaking ASLR
- 26 Sep CPU Caches
- 05 Dec Virtual Private Networks
- 29 Nov SSL/TLS Public-Key Infrastructure
- 22 Nov SCION
- 15 Nov IPv6
- 06 Nov Firewalls
- 29 Oct DNS Security
- 22 Oct DDoS
- 15 Oct Botnets and IoT
- 08 Oct BGP Security
- 01 Oct Anonymous Communication Systems
- 30 Sep TLS
- 27 Sep Crypto refresher