


Остановите войну!
for scientists:


default search action
login - The Usenix Magazine, Volume 33
Volume 33, Number 1, February 2008
- Rik Farrow:
Musings.
- Joe Abley:
Fear and Loathingin the RoutingSystem. - Alva L. Couch:
From x=1 to (setf x 1): What Does ConfigurationManagement Mean? - Eric Langheinrich:
http: BL: Taking DNSBL Beyond SMTP. - Justin Samuel, Jeremy Plichta, Justin Cappos:
Centralized Package Management Using Stork. - Jeannie R. Albrecht, Ryan Braud, Ren Dao, Nikolay Topilski, Christopher Tuttle, Alex C. Snoeren, Amin Vahdat:
Managing Distributed Applications with Plush. - Octave Orgeron:
An Introduction to Logical Domains.
- Aditya K. Sood:
Insecurities in Designing XML Signatures.
- David N. Blank-Edelman:
Practical Perl Tools: Why I Live at the P.O. - Peter Baer Galvin:
Pete's All Things Sun (PATS): The Future of Sun. - David Josephsen:
iVoyeur: Permission to Parse. - Robert G. Ferrell:
/dev/random.
- Nick Stoughton:
Toward Attributes.
- Æleen Frisch, Brad Knowles, Sam Stover:
Book Reviews.
- Michael B. Jones, Dan Geer:
2008 USENIX Nominating Committee Report. - Ellie Young:
Summary of USENIX Board of Directors Meetings and Actions. - Anne Dickison:
New on the USENIX Web Site: The Multimedia Page.
Volume 33, Number 2, April 2008
- Rik Farrow:
Musings.
- Mark Kosters, Megan Kruse:
IPv6: It's Time to Make the Move. - Dave Piscitello:
Are Commercial Firewalls Ready for IP Version 6? - Octave Orgeron:
An Introduction to Logical Domains, Part 4. - Matthew Sacks:
Linux Kernel Resource Allocation in Virtualized Environments. - Aditya K. Sood:
Hacking 802.11 Protocol Insecurities.
- Michael D. McCool:
Achieving High Performance by Targeting Multiple Parallelism Mechanisms.
- David N. Blank-Edelman:
Practical Perl Tools: Back in Timeline. - Peter Baer Galvin:
Pete's All Things Sun (PATS): The Security Sheriff. - David Josephsen:
iVoyeur: Comply. - Heison Chak:
VoIP and IPv6. - Robert G. Ferrell:
/dev/random.
- Elizabeth Zwicky, et al.:
Book Reviews.
Volume 33, Number 3, June 2008
- Margo I. Seltzer:
The Present and Future of SAN/NAS: Interview with Dave Hitz and Brian Pawlowsky of NetApp. - Lakshmi N. Bairavasundaram, Garth R. Goodson, Bianca Schroeder, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau:
Data Corruption in the Storage Stack: A Closer Look. - Mark W. Storer, Kevin M. Greenan, Ethan L. Miller, Kaladhar Voruganti:
Pergamum: Energy-efficient Archival Storage with Disk Instead of Tape. - Weihang Jiang, Chongfeng Hu, Yuanyuan Zhou, Arkady Kanevsky:
Don't Blame Disks for Every Storage Subsystem Failure. - Michael J. Demmer, Bowei Du, Eric A. Brewer:
TierStore: A Distributed File System for Challenged Networks in Developing Regions.
- Rik Farrow:
Musings.
- Andrew Brownsword:
Driving the Evolution of Software Languages to a Concurrent Future. - Dan Tsafrir, Dilma Da Silva, David A. Wagner:
The Murky Issue of Changing Process Identity: Revising "Setuid Demystified".
- David N. Blank-Edelman:
Practical Perl Tools: A Little Place for Your Stuff. - Peter Baer Galvin:
Pete's All Things Sun (PATS): The State of ZFS. - David Josephsen:
iVoyeur: Admin, Root Thyself. - Robert G. Ferrell:
/dev/random.
- Nick Stoughton:
Update on Standards: Undue Influence?
- Elizabeth Zwicky, et al.:
Book Reviews.
Volume 33, Number 4, August 2008
- Rik Farrow:
Musings.
- Brandon Enright, Geoff Voelker, Stefan Savage, Chris Kanich, Kirill Levchenko:
Storm: When Researchers Collide. - Chris Grier, Shuo Tang, Samuel T. King:
Building a More Secure Web Browser. - Colin Dixon, Thomas E. Anderson, Arvind Krishnamurthy:
Withstanding Multimillion-node Botnets.
- Diana K. Smetters, Brinda Dalal, Les Nelson, Nathaniel Good, Ame Elliot:
Ad Hoc Guesting: When Exceptions Arethe Rule. - Rohan Murty, Jitendra Padhye, Ranveer Chandra, Alec Wolman, Brian Zill:
Designing High-Performance Enterprise Wi-FiNetworks. - Alva L. Couch:
"Standard Deviations" of the Average SystemAdministrator.
- David N. Blank-Edelman:
Practical Perl Tools: Hi-ho the Merry-o, Debugging We Will Go. - Peter Baer Galvin:
Pete's All Things Sun: Solaris SystemAnalysis 101. - David Josephsen:
iVoyeur: Hold the Pixels. - Heison Chak:
Media Resource Control Protocol. - Robert G. Ferrell:
/dev/random.
- Elizabeth Zwicky, et al.:
Book Reviews.
Volume 33, Number 5, October 2008
- Rik Farrow:
Musings.
- Wenjin Hu, Todd Deshane, Jeanna N. Matthews:
Solaris Virtualization Options. - Edward Walker:
Benchmarking Amazon EC2 for High-Performance Scientific Computing. - Alva L. Couch:
System Administration Thermodynamics. - Bob Solomon:
A 36-User Asterisk Installation. - Brad Knowles:
Building Scalable NTP Server Infrastructures. - Sandeep Sahore:
Reclaim Disk Space by Shrinking Files.
- Jason Dusek:
Concurrent Patterns: Parallels in System and Language Design.
- David N. Blank-Edelman:
Practical Perl Tools: Attachments. - Peter Baer Galvin:
Pete's All Things Sun: Solaris SystemAnalysis 102. - David Josephsen:
iVoyeur: You Should Write an NEB Module. - Robert G. Ferrell:
/dev/random.
- Nick Stoughton:
Update on Standards: The USENIX Standards Project.
- Elizabeth Zwicky, et al.:
Book Reviews.
- Rob Kolstad:
Report on USACO. - Jane-Ellen Long:
Update on SAGE.
Volume 33, Number 6, December 2008
- Rik Farrow:
Musings.
- Sam Small, Joshua Mason, Ryan MacArthur, Fabian Monrose:
Masquerade: Simulating a Thousand Victims. - Tim Yardley:
SCADA: Issues, Vulnerabilities, and FutureDirections. - Jian Zhang, Phillip A. Porras, Johannes Ullrich:
Highly Predictive Blacklisting. - Jeff Berg, Evan Teran, Sam Stover:
Investigating Argos. - Calvin Ardi, Daniel Chen:
Architecture and Threat Analysis of aCampus Wireless Network.
- David N. Blank-Edelman:
Practical Perl Tools: This Column IsPassword-Protected. - Peter Baer Galvin:
Pete's All Things Sun: The Death of Solaris. - David Josephsen:
iVoyeur: You Should Write an NEB Module, Revisited. - Robert G. Ferrell:
/dev/random.
- Nick Stoughton:
Update on Standards: Diary of a StandardsGeek, Part 2.
- Elizabeth Zwicky, et al.:
Book Reviews.
- Ellie Young:
Thanks to Our Volunteers.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.