


default search action
login - The Usenix Magazine, Volume 36
Volume 36, Number 1, February 2011
- Rik Farrow:

Musings.
- Dutch T. Meyer, Jake Wires, Norman C. Hutchinson, Andrew Warfield:

Namespace Management in Virtual Desktops.
- Rob Sherwood:

Safely Using Your Production Network as a Testbed. - David Barrera, Glenn Wurster, Paul C. van Oorschot:

Back to the Future: Revisiting IPv6 Privacy Extensions.
- Mona Attariyan, Jason Flinn:

Automating Configuration Troubleshooting with ConfAid. - Joshua Fiske:

Making System Administration Easier by Letting the Machines Do the Hard Work, Or, Becoming an Agile Sysadmin. - Ole Tange:

GNU Parallel: The Command-Line Power Tool.
- David N. Blank-Edelman:

Practical Perl Tools: Hither and Yon. - Peter Baer Galvin:

Pete's All Things Sun: Comparing Solaris to RedHat Enterprise and AIX - Virtualization Features. - Dave Josephsen:

iVoyeur: More Ganglia on the Brain. - Robert G. Ferrell:

/dev/random.
- Elizabeth Zwicky, Rik Farrow, Sam Stover:

Book Reviews.
- Anne Dickison:

Have You Seen the Latest USENIX Short Topics in Sysadmin Books?
Volume 36, Number 2, April 2011
- Rik Farrow:

Musings.
- Derek Gordon Murray, Steven Hand:

Skywriting on CIEL: Programming the Data Center.
- Cory Lueninghoener:

Getting Started with Configuration Management. - James Donn, Tim Hartmann:

Centralized Logging in a Decentralized World. - Rik Farrow:

Backup Strategies for Molecular Dynamics: An Interview with Doug Hughes. - Ole Tange:

GNU SQL: A Command Line Tool for Accessing Different Databases Using DBURLs.
- David N. Blank-Edelman:

Practical Perl Tools: H-T...TP - That's What It Means to Me. - Peter Baer Galvin:

Pete's All Things Sun: Solaris 11 Express. - Dave Josephsen:

iVoyeur: All Together Now. - Robert G. Ferrell:

/dev/random (Parenthetically Speaking).
- Elizabeth Zwicky, Sam Stover, Evan Teran, Rik Farrow:

Book Reviews.
Volume 36, Number 3, June 2011
- Rik Farrow:

Musings.
- Konstantin V. Shvachko:

Apache Hadoop: The Scalability Update. - Jeff Darcy:

Building a Cloud File System.
- Steven R. Hetzler:

System Impacts of Storage Trends: Hard Errors and Testability.
- Stuart Kendrick:

Testing the Transport Side of Highly Available Hosts.
- David N. Blank-Edelman:

Practical Perl Tools: Give as Good as You Get, My Tiny Dancer. - Dave Josephsen:

iVoyeur: A Handful of Gems. - Robert G. Ferrell:

/dev/random.
- Elizabeth Zwicky, Evan Teran, Ryan MacArthur:

Book Reviews.
Volume 36, Number 4, August 2011
- Rik Farrow:

Musings.
- Rik Farrow:

Interview with Stefan Savage: On the Spam Payment Trail. - Ned Moran:

Understanding Advanced Persistent Threats: A Case Study. - Raphael Mudge:

Network Attack Collaboration: Sharing the Shell. - Peter Gutmann:

Do Users Verify SSH Keys?
- Benjamin Hindman, Andy Konwinski, Matei Zaharia, Ali Ghodsi, Anthony D. Joseph, Randy H. Katz, Scott Shenker, Ion Stoica:

Mesos: Flexible Resource Sharing for the Cloud.
- Thomas A. Limoncelli, Doug Hughes:

LISA '11: Theme - "DevOps: New Challenges, Proven Values".
- David N. Blank-Edelman:

Practical Perl Tools: Got My Mojolicious Working. - Peter Baer Galvin:

Galvin's All Things Enterprise: The State of the Cloud. - Dave Josephsen:

iVoyeur: Crom. - Robert G. Ferrell:

/dev/random.
- Elizabeth Zwicky, Rik Farrow:

Book Reviews.
Volume 36, Number 5, October 2011
- Rik Farrow:

Musings.
- Greg Burd:

NoSQL. - Paul Vixie:

Other Uses for Secure DNS. - Don Revelle:

Hypervisors and Virtual Machines: Implementation Insights on the x86 Architecture.
- Andrew Newton, Dave Piscitello, Benedetto Fiorelli, Steve Sheng:

A RESTful Web Service for Internet Name and Address Directory Services.
- David N. Blank-Edelman:

Practical Perl Tools: Do I Look Better in Profile? - Peter Baer Galvin:

Galvin's All Things Enterprise: The State of the Cloud, Part 2. - Dave Josephsen:

iVoyeur: Cloud Gazing. - Robert G. Ferrell:

/dev/random: Virtualization: A Dark Proverb.
- Elizabeth Zwicky, Trey Darley, Sam Stover, Peter Baer Galvin:

Book Reviews.
Volume 36, Number 6, December 2011
- Rik Farrow:

Musings.
- Edward J. Schwartz:

The Danger of Unrandomized Code. - Sergey Bratus, Michael E. Locasto, Meredith L. Patterson, Len Sassaman, Anna Shubina:

Exploit Programming: From Buffer Overflows to "Weird Machines" and Theory of Computation. - Len Sassaman, Meredith L. Patterson, Sergey Bratus, Anna Shubina:

The Halting Problems of Network Stack Insecurity.
- Adam Langley:

Beyond the Basics of HTTPS Serving. - Jan Schaumann:

Of Headless User Accounts and Restricted Shells. - Patrick Debois:

DevOps from a Sysadmin Perspective.
- David N. Blank-Edelman:

Practical Perl Tools: From the Editor. - Dave Josephsen:

iVoyeur: Changing the Game. - Robert G. Ferrell:

/dev/random.
- Elizabeth Zwicky, Sam Stover:

Book Reviews.
- Alva L. Couch:

2012 Election for the USENIX Board of Directors. - Brian Dean:

USENIX Remembers Dennis Ritchie (1941-2011).

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














