Explores Privacy Pass, a method to bypass internet challenges anonymously, discussing key concepts and addressing performance and scalability concerns.
Introduces the digital invoice processing system at EPFL, highlighting its benefits, collaboration efforts, purchase order creation, and invoice handling procedures.
Explores the impact of locality on system design, discussing strategies to optimize efficiency and performance through data layout, lock design, and data movement minimization.
Explores censorship resistance strategies, including mimicry, tunneling, and covert channels, to ensure internet accessibility in the face of censorship.
Provides an overview of MicroC/OS-II, a real-time kernel with multitasking capabilities and deterministic functions, covering topics such as task management, kernel, and intertask communication.
Provides an overview of cloud remote procedure calls and their role in software architecture, covering key concepts, protocols, and practical applications.