Cake-cutting | Fair division protocols

Fink protocol

The Fink protocol (also known as Successive Pairs or Lone Chooser) is a protocol for proportional division of a cake. Its main advantage is that it can work in an online fashion, without knowing the number of partners in advance. When a new partner joins the party, the existing division is adjusted to give a fair share to the newcomer, with minimal effect on existing partners. Its main disadvantage is that, instead of giving each partner a single connected piece, it gives each partner a large number of "crumbs". (Wikipedia).

Video thumbnail

the Internet (part 2)

An intro to the core protocols of the Internet, including IPv4, TCP, UDP, and HTTP. Part of a larger series teaching programming. See codeschool.org

From playlist The Internet

Video thumbnail

What Is IPSec Protocols? | IPSec Protocol Explained | Computer Networks Tutorial | Simplilearn

In this video on 'What Is IPSec Protocol?', we will examine the introductory knowledge regarding the processes, features, and working of the IPsec protocol. Along with the various steps involved in establishing a secure network channel for data transmission. Topics covered in this video o

From playlist Networking

Video thumbnail

Cryptography 101

Cryptography is a complex and confusing subject. In this talk you will learn about the core components of cryptography used in software development: securing data with encryption, ensuring data integrity with hashes and digital signatures, and protecting passwords with key derivation funct

From playlist Blockchain

Video thumbnail

IP Security: Part 2

Fundamental concepts of IPSec are discussed. Authentication Header is explained. Encapsulating Security Payload (ESP) and Internet Key Exchange (IKE) are analyzed.

From playlist Network Security

Video thumbnail

Embedded Recipes 2017 - Long-Term Maintenance for Embedded Systems for 10+ Years - Marc Kleine-Budde

The technical side of how to build embedded Linux systems solved by now: Take the kernel, a build system, add some patches, integrate your application and you’re done! In reality though, most of the embedded systems we build are connected to the Internet and run most of the same software

From playlist Embedded Recipes 2017

Video thumbnail

Kernel Recipes 2014 - What’s new in nftables?

Nftables is a new packet filtering framework which aims at replacing iptables. It has been developed by the Netfilter team who wanted after 10 years of development to get rid of iptables. After a successful introduction in the 3.13 kernel and more than one year in vanilla kernel, nftables

From playlist Kernel Recipes 2014

Video thumbnail

Cryptography (part 1 of 3)

An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org

From playlist Cryptography

Video thumbnail

An Uncrackable Code? (Quantum Cryptography) - A Quantum Scientist Explains #QuantumMinutes

Note: at 8:55 it be should ½ x ½ = ¼ of course, not + What is Quantum Cryptography? Today's host, Dr. Lukas Knips, is a quantum researcher in the group of Prof. Harald Weinfurter at the Ludwig-Maximilians-Universität (LMU) München in Germany. His research focusses on free-space Quantum Ke

From playlist Summer of Math Exposition Youtube Videos

Video thumbnail

IP Security: Part 1

Fundamental concepts of IPSec are discussed. Authentication Header is explained. ESP & IKE are analyzed.

From playlist Network Security

Video thumbnail

Interview with MapR's Jack Norris - Strata + Hadoop 2015

From Strata + Hadoop World 2015, an interview with the CMO of MapR Technologies. Watch more from Strata + Hadoop NYC 2015: https://goo.gl/UunGPH Visit our curated data topic page: http://oreilly.com/go/data Visit the Strata + Hadoop World website: http://strataconf.com/ Don't miss an uplo

From playlist Strata Conference + Hadoop World 2015 (New York City)

Video thumbnail

Jesse Fink: Failure and enthusiasm in philanthropy

In this clip Jesse Fink talks with Maxim Thorne and Yale students about the roles of failure and enthusiasm in philanthropy. Jesse and his wife, Betsy, both studied environmental science in college and after helping launch successful ventures such as Priceline.com, returned to their passio

From playlist Philanthropy In Action

Video thumbnail

Jesse Fink: What's your view of rewarding talent in the philanthropy sector?

In this clip Jesse Fink talks with Maxim Thorne and Yale students about the importance of competitively compensating talented people to attract them to philanthropic work. Jesse and his wife, Betsy, both studied environmental science in college and after helping launch successful ventures

From playlist Philanthropy In Action

Video thumbnail

Jesse Fink: How do you balance policy, politics and philanthropy?

In this clip Jesse Fink talks with Maxim Thorne and Yale students about balancing policy, politics and philanthropy. Jesse and his wife, Betsy, both studied environmental science in college and after helping launch successful ventures such as Priceline.com, returned to their passion for th

From playlist Philanthropy In Action

Video thumbnail

Jesse Fink: Should you give away your wealth during your lifetime?

In this clip Jesse Fink talks with Maxim Thorne and Yale students about weighing the decision to give away wealth during one's lifetime against leaving a legacy of a foundation. Jesse and his wife, Betsy, both studied environmental science in college and after helping launch successful ven

From playlist Philanthropy In Action

Video thumbnail

Jesse Fink: How did you become a philanthropist?

In this clip Jesse Fink talks with Maxim Thorne and Yale students about he and his wife, Betsy, became philanthropists. Jesse and Betsy both studied environmental science in college and after helping launch successful ventures such as Priceline.com, returned to their passion for the enviro

From playlist Philanthropy In Action

Video thumbnail

Jesse Fink: Can a particular type of Philanthropy save the environment?

In this clip Jesse Fink talks with Maxim Thorne and Yale students about the ways in which certain types of philanthropy can play a role in protecting the environment. Jesse and his wife, Betsy, both studied environmental science in college and after helping launch successful ventures such

From playlist Philanthropy In Action

Video thumbnail

Black Hat USA 2010: Attacking Kerberos Deployments 4/4

Speakers: Scott Stender, Brad Hill & Rachel Engel The Kerberos protocol is provides single sign-on authentication services for users and machines. Its availability on nearly every popular computing platform - Windows, Mac, and UNIX variants - makes it the primary choice for enterprise aut

From playlist BH USA 2010 - OS WARS

Related pages

Fair cake-cutting | Proportional division | Divide and choose