Computer science, alpacas and other musings.
…
continue reading
JS and Lance talk about how DNS works and how different improvements have been designed and implemented to overcome a variety of flaws that have arisen over time. Show notes: https://www.randomlytyped.com/34
…
continue reading
Lance and JS talk about the Two Generals' Problem and try to understand its real impacts on networked systems. Show notes: https://www.randomlytyped.com/33
…
continue reading
1
32 - Lossless compression algorithms
36:47
36:47
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
36:47
Lance and JS try to make things smaller! In this episode, we explore how to compress information efficiently in a variety of different ways with different tradeoffs. Show notes: https://www.randomlytyped.com/32
…
continue reading
1
31 - Signalling System Number 7 (SS7) and phone networks
34:57
34:57
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
34:57
JS and Lance discover the inner working of the SS7 protocol used in networks by phone carriers, how it’s being abused, and why it’s something we should probably be more concerned about. Show notes: https://www.randomlytyped.com/31
…
continue reading
1
30 - How to Bring Down the Internet with Regex
27:42
27:42
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
27:42
JS and Lance chat about a couple of interesting and very public incidents of a regular expression unexpectedly causing major outages at well-known software companies. We walk through exactly how these incidents happened and discover how easy it is to write a regex with no time complexity guarantees.
…
continue reading
Lance and JS discuss censoring attacks from China targeting Github. Show notes: https://www.randomlytyped.com/29
…
continue reading
We’re back! JS and Lance are ready to talk about software versioning schemes. Who would have that boiling down complex software systems into a series of numbers would be so hard?
…
continue reading
Max and JS talk about dial-up modems and try to understand how they work while sharing their nostalgia. Show notes: https://www.randomlytyped.com/27
…
continue reading
…
continue reading
1
25 - CQRS: Command-Query Responsibility Segregation
13:34
13:34
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
13:34
…
continue reading
1
24 - Protocols Over The Air, Used And Abused
17:13
17:13
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
17:13
…
continue reading
…
continue reading
1
22 - Digital Rights Management (DRM)
24:54
24:54
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
24:54
…
continue reading
1
21 - Voting Systems & Arrow's Theorem
23:19
23:19
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
23:19
…
continue reading
1
20 - Voting Systems & The Condorcet Paradox
23:18
23:18
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
23:18
Lance and JS examine the social sciences to see what it means to have a fair voting system, and how every system we’ve come up with so far has some fatal flaws.
…
continue reading
1
19 - Gödel's incompleteness theorems
26:22
26:22
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
26:22
Some of the toughest problems in mathematics went unsolved for long periods of time, only for them to be proven hundreds of years later. Can anything and everything eventually be proven with the right level of ingenuity? Gödel's shocking proofs tells us that there are some statements which just aren't provable, even if they appear to be true.…
…
continue reading
We travel back in time to the 1930s to discuss the mathematical landscape which lead to The Halting problem and how a machine constructed as a mental model for a proof defined modern computers.
…
continue reading
1
17 - Applied Cryptography and Security
33:56
33:56
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
33:56
JS and Lance discuss the real-world applications and implications of cryptography with topics like key sharing, password keeping and end-to-end encryption.
…
continue reading
1
16 - Asymmetric cryptosystems and digital signing
23:44
23:44
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
23:44
JS and Lance continue their cryptography explorations by working through an example of RSA, an asymmetric cryptosystem, while discovering its surprising relationship to the concept of digital signatures.
…
continue reading
1
15 - History of Symmetric Cryptosystems
26:49
26:49
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
26:49
JS and Lance are reunited! We go back in time to discover how the earliest cryptosystems worked and cover some ground on the basics of cryptography.
…
continue reading
JS and special guest Max discuss the slow web phenomenon and discuss what makes some technological experiences more meaningful than others.
…
continue reading
We discover why the unsolved P == NP millennium problem is so difficult, and how the ramifications affect our every-day programming.
…
continue reading
We talk about Bloom filters, a probabilistic data structure for set membership queries, how they work, and what all the fuss is about.
…
continue reading
We explore Facebook's new cryptocurrency and discuss it's potential ramifications on our society and global economy.
…
continue reading
We look at the prefix scan algorithm for the sum operation, and discover how it can be parallelized in a relatively simple but unintuitive way.
…
continue reading
We discuss the origins of accessibility and how things changed as society moved into the digital age.
…
continue reading
1
8 - Distributed Systems Introduction
35:58
35:58
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
35:58
We go over the fundamentals of distributed systems and get to the bottom of buzzwords like scalability, availability and transparency.
…
continue reading
We explore the topic of software quality and discover what technical debt actually means.
…
continue reading
We discuss the projects we have been working on in our spare time and what we've learned in the process.
…
continue reading
1
5: Transactions, ACID or Just Basic?
29:12
29:12
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
29:12
In this episode, we discuss the different kinds of database transactions, how they are implemented, and what guarantees they provide.
…
continue reading
Can I take your code and sell it? We discuss the variety of available licenses and whether they make sense in our current technological landscape.
…
continue reading
In this episode, we discuss divide and conquer algorithms like merge sort, and see why it's more challenging to analyze their complexity.
…
continue reading
Are cryptocurrencies just hype? Probably, but let's still talk about how they were created, their merits and their problems.
…
continue reading
An overview of computational complexity theory.
…
continue reading