Skip to main content

David Ross Cheriton

David Ross Cheriton (born March 29, 1951) is a Canadian-born computer science professor at Stanford University who has investments in technology companies. With an estimated net worth of US$1.7 billion (as of March 2013), Cheriton was ranked by Forbes as the 20th wealthiest Canadian and 882nd in the world.[1]

Education

Born in Vancouver, Cheriton attended public schools in the Highlands neighborhood of Edmonton, Alberta, Canada.[2] He briefly attended the University of Alberta where he had applied for both mathematics and music. Having being rejected by the music program, Cheriton went on to study mathematics and received his bachelor's degree from the University of British Columbia in 1973.[3] Cheriton received his Masters and PhD degrees in computer science from the University of Waterloo in 1974 and 1978, respectively. He spent three years as an Assistant Professor at his alma mater, the University of British Columbia, before moving to Stanford in 1981.

Research

Cheriton founded and led the Distributed Systems Group at Stanford University, which developed the V operating system.

Industry

Cheriton co-founded Granite Systems with Andy Bechtolsheim, a company developing gigabit ethernet products; Granite was acquired by Cisco Systems in 1996.[4]
In August 1998, Stanford students Sergey Brin and Larry Page met with Bechtolsheim on Cheriton's front porch. Bechtolsheim wrote the first cheque to fund their company, Google, at the meeting, and Cheriton matched his $100,000 investment.[5]
In 2001 Cheriton and Bechtolsheim founded another start up company, Palo Alto based Kealia. Kealia designed Magnum, a high capacity InfiniBand switch; Galaxy, a range of blade servers based on AMD's Opteron microprocessor; and Thumper, an enterprise grade network attached storage system.[4] Kealia was bought by Sun Microsystems in 2004, with Thumper becoming the Sun Fire X4500.[4][6]
Later, David Cheriton co-founded (again with Bechtolsheim) and was chief scientist of Arastra (now Arista Networks), a maker of 10 Gigabit Ethernet switches.[7][8]
Cheriton is an investor in and advisory board member for frontline data warehouse company Aster Data Systems,[9] an early investor in in-video advertising company Zunavision,[10] and he founded OptumSoft.[11]

Lifestyle

Although the Google investment alone would be worth over US$1 billion, Cheriton has a reputation for a frugal lifestyle, avoiding expensive cars or large houses. He was once included in a list of "cheapskate billionaires".[12] On November 18, 2005, the University of Waterloo announced that Cheriton had donated $25 million to support graduate studies and research in its School of Computer Science. In recognition of his contribution, the school was renamed the "David R. Cheriton School of Computer Science."
On January 18, 2010, Cheriton donated $2 million to the University of British Columbia, which will go to fund the Carl Wieman Science Education Initiative (CWSEI).

Personal life

In 1980, Cheriton married Iris Fraser; they divorced in 1994. They have four children.[13] [14]
http://gengwg.blogspot.com/

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...