Distributed systems
Authentication
Consistent hashing
Peer-to-peer
Pipelines
Rendezvous hashing
Links
Timeouts and cancellation for humans