-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- System Software - overlap with networking message authenticity, privacy, integrity network security: common attacks - replay - man in the middle - passive snooping - overlap with programming langauges memory management (including shared memory, shared memory protection) concurrency (deadlock vs starvation / busy wait vs blocking / context switch) schedulers (preemptive vs non-preemptive / priority inversion) - overlap with databases idempotent operations (allow retry) - virtual memory segmentation paging - lru replacement strategy approximations - multi-level - operlap with architecture I/O (memory mapped vs programmed / polling vs interupts) system calls vs user calls - RAID error detection and error correction (hamming codes) MTTF math - file systems buffer cache journaling network file systems - dynamic linking vs static linking - to review VM