background preloader

Notes Essays—Peter Thiel’s CS183: Startup—Stanford, Spring 2012

Notes Essays—Peter Thiel’s CS183: Startup—Stanford, Spring 2012

https://blakemasters.com/peter-thiels-cs183-startup

Power Searching with Google Thanks for visiting! For a short time, the course materials for Power Searching with Google will remain accessible below. Then they will be made permanently available at the Google Search Education site. The ‘Facebook Class’ Built Apps, and Fortunes Photo STANFORD, Calif. ALL right, class, here’s your homework assignment: Devise an app. Get people to use it. Repeat.

Computer and Network Security by Avi Kak Note for instructors using these slides/notes: It is not uncommon for the instructors who use these notes/slides to want to know how exactly I use them in class since there is much more information on a typical slide than you will usually find in a powerpoint presentation. Here is the answer: When I teach the theoretical portions of this course, I actually work out the formulas on the chalkboard and, when I do so, I follow the derivations presented in these lecture notes. On the other hand, when I teach the systems portion of the course, I spend quite a bit of time demonstrating the issues on my Linux laptop, again in the manner described in these lecture notes. These lecture notes are intended as much for showing in class in the form of slides as they are for focused reading by the students on their own. When used as slides, these serve as backdrop to the explanations provided on the chalkboard or through demonstrations on a computer.

The Command Line In 2004 In July 2004 I found myself sitting alone in the dark, on the enclosed deck of a ferry boat oozing between fog-shrouded islands of the Alaskan coast. The scenery was haunting, but after the first three hours, I decided to occupy myself by finally reading Neal Stephenson's essay about the command-line. Halfway through it I began crossing things out, and scribbling comments in the margin. The essay was five years old, and in dire need of a fresh perspective. Months later, I learned that Stephenson himself was dissatisfied with the essay. The Cathedral and the Bazaar Copyright © 2000 Eric S. Raymond Copyright Permission is granted to copy, distribute and/or modify this document under the terms of the Open Publication License, version 2.0. $Date: 2002/08/02 09:02:14 $

The death of CPU scaling: From one core to many — and why we’re still stuck It’s been nearly eight years since Intel canceled Tejas and announced its plans for a new multi-core architecture. The press wasted little time in declaring conventional CPU scaling dead — and while the media has a tendency to bury products, trends, and occasionally people well before their expiration date, this is one declaration that’s stood the test of time. To understand the magnitude of what happened in 2004 it may help to consult the following chart. It shows transistor counts, clock speeds, power consumption, and instruction-level parallelism (ILP). The doubling of transistor counts every two years is known as Moore’s law, but over time, assumptions about performance and power consumption were also made and shown to advance along similar lines. Moore got all the credit, but he wasn’t the only visionary at work.

Taco Bell Programming Every item on the menu at Taco Bell is just a different configuration of roughly eight ingredients. With this simple periodic table of meat and produce, the company pulled down $1.9 billion last year. The more I write code and design systems, the more I understand that many times, you can achieve the desired functionality simply with clever reconfigurations of the basic Unix tool set. After all, functionality is an asset, but code is a liability. This is the opposite of a trend of nonsense called DevOps, where system administrators start writing unit tests and other things to help the developers warm up to them - Taco Bell Programming is about developers knowing enough about Ops (and Unix in general) so that they don't overthink things, and arrive at simple, scalable solutions.

Illegal prime An illegal prime is a prime number that represents information which it is forbidden to possess or distribute. One of the first illegal primes was discovered in 2001. When interpreted in a particular way, it describes a computer program that bypasses the digital rights management scheme used on DVDs. Fresh Stats Comparing Traditional IT and DevOps Oriented Productivity This is a guest post by Krishnan Badrinarayanan (@bkrishz), ZeroTurnaround The word “DevOps” has been thrown around quite a lot lately. Job boards are awash with requisitions for “DevOps Engineers” with varying descriptions. What is DevOps, really?

The Chef, the Puppet, and the Sexy IT Admin Chef cooks up IT automation in the data center Web giants like Google and Amazon have long used software that automatically configures the vast collection of machines driving their online services. But these tools were never available to the outside world. In 2005, Luke Kanies set out to provide Google-like IT automation for the rest of us, founding an open source project he called Puppet. “Google does [things] differently, and in many cases, they do it better.

Related: