


default search action
login - The Usenix Magazine, Volume 45
Volume 45, Number 1, Spring 2020
- Rik Farrow:

Musings.
- Abutalib Aghayev, Sage A. Weil, Michael Kuchnik, Mark Nelson, Greg Ganger, George Amvrosiadis:

File Systems Unfit as Distributed Storage Back Ends: Lessons from 10 Years of Ceph Evolution. - Anish Athalye, Adam Belay, M. Frans Kaashoek, Robert Morris, Nickolai Zeldovich:

Notary: A Device for Secure Transaction Approval. - Jessica Cussins Newman, Rajvardhan Oak:

Artificial Intelligence: Ethics in Practice. - Nisha Talagala, Joel Young:

The Emerging Practice of Operational ML: USENIX OpML Conference.
- Luis Mineiro:

Are We All on the Same Page? Let's Fix That. - Todd Palino:

Getting Things Done. - Jaime Woo, Emil Stolarsky:

It's an SLO World: What Theme Parks Can Teach Us about User-First Reliability.
- Rik Farrow:

Interview with Mary Ann Horton.
- Laura Nolan:

Constraints and Controls: The Sociotechnical Model of Site Reliability Engineering. - Peter Norton:

Python and Memory. - Dave Josephsen:

iVoyeur - eBPF Tools: What's in a Name? - Chris "Mac" McEniry:

Simplifying Repetitive Command Line Flags with viper. - Dan Geer:

For Good Measure: Cyberjobsecurity. - Robert G. Ferrell:

/dev/random: Artificial Ethics.
- Mark Lamourine, Rik Farrow:

Book Reviews.
- Liz Markel:

The Year of Engagement.
Volume 45, Number 2, Summer 2020
- Rik Farrow:

Musings.
- Stathis Maneas, Kaveh Mahdaviani, Tim Emami, Bianca Schroeder:

A Study of SSD Reliability in Large Scale Enterprise Storage Deployments. - Jeff LeFevre, Carlos Maltzahn:

SkyhookDM: Data Processing in Ceph with Programmable Storage.
- Rik Farrow:

Interview with Natalie Silvanovich.
- Richard L. Sites:

Anomalies in Linux Processor Use. - Marianne Bellotti:

Revisiting Conway's Law.
- Alex Hidalgo:

Decision-Making Using Service Level Objectives. - Steven Ross, Todd Underwood:

ML for Operations: Pitfalls, Dead Ends, and Hope.
- Laura Nolan:

Site Reliability Engineering and the Crisis/Complacency Cycle. - Dave Josephsen:

iVoyeur: eBPF Tools. - Dan Geer, George P. Sieniawski:

Who Will Pay the Piper for Open Source Software Maintenance? Can We Increase Reliability as We Increase Reliance? - Robert G. Ferrell:

/dev/random: Rewind Your Mind.
- Mark Lamourine:

Book Reviews.
- Erez Zadok, Ada Gavrilovska:

Running Virtual PC (vPC) Meetings.
Volume 45, Number 3, Fall 2020
- Rik Farrow:

Musings.
- Jian Yang, Juno Kim, Morteza Hoseinzadeh, Joseph Izraelevitz, Steven Swanson:

An Empirical Guide to the Behavior and Use of Scalable Persistent Memory. - Yang Zhan, Alex Conway, Nirjhar Mukherjee, Ian Groombridge, Martin Farach-Colton, Rob Johnson, Yizheng Jiao, Michael A. Bender, William Jannen, Donald E. Porter, Jun Yuan:

How to Not Copy Files. - Rik Farrow:

Interview with Dick Sites. - Weixi Zhu, Alan L. Cox, Scott Rixner:

Understanding Transparent Superpage Management.
- Rik Farrow:

Interview with Ion Stoica.
- Georg J. P. Link:

Open Source Project Health.
- Alexandru Uta, Kristian Laursen, Alexandru Iosup, Paul Melis, Damian Podareanu, Valeriu Codreanu:

Beneath the SURFace: An MRI-like View into the Life of a 21st-Century Datacenter. - Antonio Gómez-Iglesias, Evan Peregrine, Agata Gruza, Neelima Krishnan, Pawan Kumar Gupta:

Practical Mitigation Guidance for Hardware Vulnerabilities. - Anatoly Mikhaylov:

Using OpenTrace to Troubleshoot DB Performance.
- Laura Nolan:

SRE and Justice. - Cory Lueninghoener:

Systems Notebook: Socially Distant Projects. - Dave Josephsen:

iVoyeur: BPF - Part Three. - Terence Kelly:

Programming Workbench: Hand-Over-Hand Locking for Highly Concurrent Collections. - Simson L. Garfinkel:

SIGINFO: Everything Is a Punch Card. - Dan Geer:

For Good Measure: Security Measurement in the Present Tense. - Robert G. Ferrell:

/dev/random: WFH.
- Mark Lamourine, Rik Farrow:

Book Reviews.
Volume 45, Number 4, Winter 2020
- Rik Farrow:

Musings.
- Michael Mattioli:

Video Conferencing Must Evolve.
- Daniel Votipka, Kelsey R. Fulton, James Parker, Matthew Hou, Michelle L. Mazurek, Michael Hicks:

Build It, Break It, Fix It Contests: Motivated Developers Still Make Security Mistakes. - Tal Garfinkel, Shravan Narayan, Craig Disselkoen, Hovav Shacham, Deian Stefan:

The Road to Less Trusted Code: Lowering the Barrier to In-Process Sandboxing. - Zhen Huang, David Lie, Gang Tan, Trent Jaeger:

Using Safety Properties to Generate Vulnerability Patches. - Rik Farrow:

Interview with Sergey Bratus.
- Mohammad Shahrad, Rodrigo Fonseca, Iñigo Goiri, Gohar Irfan Chaudhry, Ricardo Bianchini:

Open Characterization and Optimization of the Serverless Workload at a Large Cloud Provider Source Project Health. - Deepti Raghavan, Sadjad Fouladi, Philip Alexander Levis, Matei Zaharia:

Posh: A Data-Aware Shell. - Rik Farrow:

Interview with Margo Seltzer.
- Luis Quesada Torres, Doug Colish:

SRE Best Practices for Capacity Management. - Adam McKaig:

The Case for CS Knowledge in SRE.
- Laura Nolan:

Book Review: Implementing Service Level Objectivesby Alex Hidalgo. - Cory Lueninghoener:

Systems Notebook: What's in That Container? - Dave Josephsen:

iVoyeur: BPF and Histograms. - Simson L. Garfinkel:

SIGINFO: The Tricky Cryptographic Hash Function. - Terence Kelly:

Programming Workbench: Compressed Sparse Row Format for Representing Graphs. - Dan Geer, Bentz Tozer, John Speed Meyers:

For Good Measure: Counting Broken Links: A Quant's View of Software Supply Chain Security. - Robert G. Ferrell:

/dev/random: Discontent Creator.
- Mark Lamourine, Rik Farrow:

Book Reviews.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














