¶Distributed systems Authentication Consistent hashing Peer-to-peer Pipelines Rendezvous hashing ¶Links Timeouts and cancellation for humans