| Date | Topics Covered | PDF | PPTX | Reading | 
   
    |  1/20 | 1.
	Intro: What's an O/S? | pdf | pptx | Chapter 1 | 
   
    |  1/22 | 2.
	The O/S runs the hardware.  A quick hardware review | pdf | pptx | (From CS3610) | 
   
    |  1/27 | 3.
	O/S structure, process abstraction | pdf | pptx | Chapter 2, 3 | 
   
    |  1/29 | 4.
	Threads, concurrency | pdf | pptx | Chapter 4, 6.2, | 
   
    |  2/03 | 5.
	Synchronization primitives and issues | pdf | pptx | 6.3-6 | 
   
    |  2/05 | 6.
	Monitor-style synchronization | pdf | pptx | 6.7 | 
   
    |  2/10 | 7. A monitor example.  Then: CPU
	Scheduling | pdf | pptx | Chapter 5 | 
   
    |  2/12 | 8.
	Deadlocks (part I) | pdf | pptx | 7.1-7.4 | 
   
    |  2/17 | 9.
	Deadlocks (part II) | pdf | pptx | 7.5 | 
   
    |  2/19 | 10. Memory management (part I: Segmentation, paging) | pdf | pptx | Chapter 8, 9.1-5 | 
   
    |  2/24 | 11. Memory management (part II: Working Sets) | pdf | pptx | Chapter 9 | 
   
    |  2/26 | 
	Prelim 1: In class, covers material from 1/20-2/17. |  |  |  | 
   
    |  3/3 | 12.
	Putting it all together: How DLLs work | pdf | pptx | Chapter 8.1.5 | 
   
    |  3/5 | 13.
	File Systems: Basic ideas | pdf | pptx | Chapter 10 | 
   
    |  3/10 | 14.
	File systems: Disk representation | pdf | pptx | Chapter 11 | 
   
    |  3/12 | 15.
	File systems: NFS and GFS | pdf | pptx | Chapter 17 | 
   
    |  3/17 | 
	 No class: spring break |  |  |  | 
   
    |  3/19 | 
	 No class: spring break |  |  |  | 
   
    |  3/24 | 16.
	Internet Architecture: IP, DNS, Firewalls, NATs. 
	End to end principle | pdf | pptx | Chapter 16 | 
   
    |  3/26 | 
	17. Internet Architecture: TCP, UDP.  
	 | pdf | pptx | Chapter 16 | 
   
    |  3/31 | 18.
    Service oriented architectures, web services, Javascript, issues.... | pdf | pptx | Wikipedia | 
   
    | 4/2 | Prelim II: In class, cumulative through 3/26 (inclusive) |  |  |  | 
   
    | 4/7 | 19.
    Public (Asymmetric) Key Cryptography.  Symmetric Key Cryptography | pdf | pptx | Chapter 15 | 
   
    | 4/9 | 20.
    Pfishing, Spoofing, In-Flight Page Editing, other tricks | pdf | pptx | Chapter 15.  Wikipedia | 
   
    | 4/14 | 21.
    Virtual machines.  Paravirtualization. | pdf | pptx | Chapter 2.8.  Paper: Xen and the Art of Virtualization | 
   
    | 4/16 | 22.
    The trend towards consolidation.  Ecological concerns and 
	considerations | pdf | pptx | Energy Efficiency Materials | 
   
    | 4/21 | 23.
    Dangers of IT Monocultures.  Synthetic diversity. | pdf | pptx | The Monoculture risk put into context.  (Schneider and Birman; IEEE 
	Security and Privacy; 2009). | 
   
    | 4/23 | 24. Virtualization as a defensive technique: Honeyfarms, Vigilante | pdf | pptx | Scalability, Fidelity, 
	and Containment in the Potemkin Virtual Honeyfarm (Savage et. al, SOSP 
	2005). 
 Vigilante: 
	End-to-End Containment of Internet Worms.  (Costa et. al; SOSP 
	2005)
 | 
   
    | 4/28 | 25.
    Component Architectures: Jini and .NET | pdf | pptx | Chapter 22 | 
   
    | 4/30 | 26.
    Live Objects | pdf | ppt | http://liveobjects.cs.cornell.edu |