Computer science, alpacas and other musings.
…
continue reading
1
34 - DNS design iterations
30:29
30:29
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
30:29
JS and Lance talk about how DNS works and how different improvements have been designed and implemented to overcome a variety of flaws that have arisen over time. Show notes: https://www.randomlytyped.com/34
…
continue reading
1
33 - Two Generals' Problem
22:06
22:06
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
22:06
Lance and JS talk about the Two Generals' Problem and try to understand its real impacts on networked systems. Show notes: https://www.randomlytyped.com/33
…
continue reading
1
32 - Lossless compression algorithms
36:47
36:47
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
36:47
Lance and JS try to make things smaller! In this episode, we explore how to compress information efficiently in a variety of different ways with different tradeoffs. Show notes: https://www.randomlytyped.com/32
…
continue reading
1
31 - Signalling System Number 7 (SS7) and phone networks
34:57
34:57
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
34:57
JS and Lance discover the inner working of the SS7 protocol used in networks by phone carriers, how it’s being abused, and why it’s something we should probably be more concerned about. Show notes: https://www.randomlytyped.com/31
…
continue reading
1
30 - How to Bring Down the Internet with Regex
27:42
27:42
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
27:42
JS and Lance chat about a couple of interesting and very public incidents of a regular expression unexpectedly causing major outages at well-known software companies. We walk through exactly how these incidents happened and discover how easy it is to write a regex with no time complexity guarantees.
…
continue reading
1
29 - Great Cannon of China
13:48
13:48
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
13:48
Lance and JS discuss censoring attacks from China targeting Github. Show notes: https://www.randomlytyped.com/29
…
continue reading
1
28 - Software Versioning Schemes
30:58
30:58
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
30:58
We’re back! JS and Lance are ready to talk about software versioning schemes. Who would have that boiling down complex software systems into a series of numbers would be so hard?
…
continue reading
Max and JS talk about dial-up modems and try to understand how they work while sharing their nostalgia. Show notes: https://www.randomlytyped.com/27
…
continue reading
1
26 - Variance in Type Systems
27:53
27:53
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
27:53
…
continue reading
1
25 - CQRS: Command-Query Responsibility Segregation
13:34
13:34
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
13:34
…
continue reading
1
24 - Protocols Over The Air, Used And Abused
17:13
17:13
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
17:13
…
continue reading
1
23 - Immutable Data Structures
24:38
24:38
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
24:38
…
continue reading
1
22 - Digital Rights Management (DRM)
24:54
24:54
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
24:54
…
continue reading
1
21 - Voting Systems & Arrow's Theorem
23:19
23:19
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
23:19
…
continue reading
1
20 - Voting Systems & The Condorcet Paradox
23:18
23:18
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
23:18
Lance and JS examine the social sciences to see what it means to have a fair voting system, and how every system we’ve come up with so far has some fatal flaws.
…
continue reading
1
19 - Gödel's incompleteness theorems
26:22
26:22
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
26:22
Some of the toughest problems in mathematics went unsolved for long periods of time, only for them to be proven hundreds of years later. Can anything and everything eventually be proven with the right level of ingenuity? Gödel's shocking proofs tells us that there are some statements which just aren't provable, even if they appear to be true.…
…
continue reading
1
18 - The Halting Problem
14:47
14:47
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
14:47
We travel back in time to the 1930s to discuss the mathematical landscape which lead to The Halting problem and how a machine constructed as a mental model for a proof defined modern computers.
…
continue reading
1
17 - Applied Cryptography and Security
33:56
33:56
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
33:56
JS and Lance discuss the real-world applications and implications of cryptography with topics like key sharing, password keeping and end-to-end encryption.
…
continue reading
1
16 - Asymmetric cryptosystems and digital signing
23:44
23:44
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
23:44
JS and Lance continue their cryptography explorations by working through an example of RSA, an asymmetric cryptosystem, while discovering its surprising relationship to the concept of digital signatures.
…
continue reading
1
15 - History of Symmetric Cryptosystems
26:49
26:49
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
26:49
JS and Lance are reunited! We go back in time to discover how the earliest cryptosystems worked and cover some ground on the basics of cryptography.
…
continue reading
JS and special guest Max discuss the slow web phenomenon and discuss what makes some technological experiences more meaningful than others.
…
continue reading
1
13 - P vs. NP, why not both?
13:41
13:41
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
13:41
We discover why the unsolved P == NP millennium problem is so difficult, and how the ramifications affect our every-day programming.
…
continue reading
We talk about Bloom filters, a probabilistic data structure for set membership queries, how they work, and what all the fuss is about.
…
continue reading
We explore Facebook's new cryptocurrency and discuss it's potential ramifications on our society and global economy.
…
continue reading
We look at the prefix scan algorithm for the sum operation, and discover how it can be parallelized in a relatively simple but unintuitive way.
…
continue reading
We discuss the origins of accessibility and how things changed as society moved into the digital age.
…
continue reading
1
8 - Distributed Systems Introduction
35:58
35:58
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
35:58
We go over the fundamentals of distributed systems and get to the bottom of buzzwords like scalability, availability and transparency.
…
continue reading
We explore the topic of software quality and discover what technical debt actually means.
…
continue reading
We discuss the projects we have been working on in our spare time and what we've learned in the process.
…
continue reading
1
5: Transactions, ACID or Just Basic?
29:12
29:12
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
29:12
In this episode, we discuss the different kinds of database transactions, how they are implemented, and what guarantees they provide.
…
continue reading
Can I take your code and sell it? We discuss the variety of available licenses and whether they make sense in our current technological landscape.
…
continue reading
In this episode, we discuss divide and conquer algorithms like merge sort, and see why it's more challenging to analyze their complexity.
…
continue reading
Are cryptocurrencies just hype? Probably, but let's still talk about how they were created, their merits and their problems.
…
continue reading
1
1: The Simple Complexity Episode
27:16
27:16
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
27:16
An overview of computational complexity theory.
…
continue reading