Distributed systems

Authentication
Consistent hashing
Peer-to-peer
Pipelines
Rendezvous hashing

Links

Timeouts and cancellation for humans