


default search action
login - The Usenix Magazine, Volume 45
Volume 45, Number 1, Spring 2020
- Rik Farrow:
Musings.
- Abutalib Aghayev, Sage A. Weil, Michael Kuchnik, Mark Nelson, Greg Ganger, George Amvrosiadis:
File Systems Unfit as Distributed Storage Back Ends: Lessons from 10 Years of Ceph Evolution. - Anish Athalye, Adam Belay, M. Frans Kaashoek, Robert Morris, Nickolai Zeldovich:
Notary: A Device for Secure Transaction Approval. - Jessica Cussins Newman, Rajvardhan Oak:
Artificial Intelligence: Ethics in Practice. - Nisha Talagala, Joel Young:
The Emerging Practice of Operational ML: USENIX OpML Conference.
- Luis Mineiro:
Are We All on the Same Page? Let's Fix That. - Todd Palino:
Getting Things Done. - Jaime Woo, Emil Stolarsky:
It's an SLO World: What Theme Parks Can Teach Us about User-First Reliability.
- Rik Farrow:
Interview with Mary Ann Horton.
- Laura Nolan:
Constraints and Controls: The Sociotechnical Model of Site Reliability Engineering. - Peter Norton:
Python and Memory. - Dave Josephsen:
iVoyeur - eBPF Tools: What's in a Name? - Chris "Mac" McEniry:
Simplifying Repetitive Command Line Flags with viper. - Dan Geer:
For Good Measure: Cyberjobsecurity. - Robert G. Ferrell:
/dev/random: Artificial Ethics.
- Mark Lamourine, Rik Farrow:
Book Reviews.
- Liz Markel:
The Year of Engagement.
Volume 45, Number 2, Summer 2020
- Rik Farrow:
Musings.
- Stathis Maneas, Kaveh Mahdaviani, Tim Emami, Bianca Schroeder:
A Study of SSD Reliability in Large Scale Enterprise Storage Deployments. - Jeff LeFevre, Carlos Maltzahn:
SkyhookDM: Data Processing in Ceph with Programmable Storage.
- Rik Farrow:
Interview with Natalie Silvanovich.
- Richard L. Sites:
Anomalies in Linux Processor Use. - Marianne Bellotti:
Revisiting Conway's Law.
- Alex Hidalgo:
Decision-Making Using Service Level Objectives. - Steven Ross, Todd Underwood:
ML for Operations: Pitfalls, Dead Ends, and Hope.
- Laura Nolan:
Site Reliability Engineering and the Crisis/Complacency Cycle. - Dave Josephsen:
iVoyeur: eBPF Tools. - Dan Geer, George P. Sieniawski:
Who Will Pay the Piper for Open Source Software Maintenance? Can We Increase Reliability as We Increase Reliance? - Robert G. Ferrell:
/dev/random: Rewind Your Mind.
- Mark Lamourine:
Book Reviews.
- Erez Zadok, Ada Gavrilovska:
Running Virtual PC (vPC) Meetings.
Volume 45, Number 3, Fall 2020
- Rik Farrow:
Musings.
- Jian Yang, Juno Kim, Morteza Hoseinzadeh, Joseph Izraelevitz, Steven Swanson:
An Empirical Guide to the Behavior and Use of Scalable Persistent Memory. - Yang Zhan, Alex Conway, Nirjhar Mukherjee, Ian Groombridge, Martin Farach-Colton, Rob Johnson, Yizheng Jiao, Michael A. Bender, William Jannen, Donald E. Porter, Jun Yuan:
How to Not Copy Files. - Rik Farrow:
Interview with Dick Sites. - Weixi Zhu, Alan L. Cox, Scott Rixner:
Understanding Transparent Superpage Management.
- Rik Farrow:
Interview with Ion Stoica.
- Georg J. P. Link:
Open Source Project Health.
- Alexandru Uta, Kristian Laursen, Alexandru Iosup, Paul Melis, Damian Podareanu, Valeriu Codreanu:
Beneath the SURFace: An MRI-like View into the Life of a 21st-Century Datacenter. - Antonio Gómez-Iglesias, Evan Peregrine, Agata Gruza, Neelima Krishnan, Pawan Kumar Gupta:
Practical Mitigation Guidance for Hardware Vulnerabilities. - Anatoly Mikhaylov:
Using OpenTrace to Troubleshoot DB Performance.
- Laura Nolan:
SRE and Justice. - Cory Lueninghoener:
Systems Notebook: Socially Distant Projects. - Dave Josephsen:
iVoyeur: BPF - Part Three. - Terence Kelly:
Programming Workbench: Hand-Over-Hand Locking for Highly Concurrent Collections. - Simson L. Garfinkel:
SIGINFO: Everything Is a Punch Card. - Dan Geer:
For Good Measure: Security Measurement in the Present Tense. - Robert G. Ferrell:
/dev/random: WFH.
- Mark Lamourine, Rik Farrow:
Book Reviews.
Volume 45, Number 4, Winter 2020
- Rik Farrow:
Musings.
- Michael Mattioli:
Video Conferencing Must Evolve.
- Daniel Votipka, Kelsey R. Fulton, James Parker, Matthew Hou, Michelle L. Mazurek, Michael Hicks:
Build It, Break It, Fix It Contests: Motivated Developers Still Make Security Mistakes. - Tal Garfinkel, Shravan Narayan, Craig Disselkoen, Hovav Shacham, Deian Stefan:
The Road to Less Trusted Code: Lowering the Barrier to In-Process Sandboxing. - Zhen Huang, David Lie, Gang Tan, Trent Jaeger:
Using Safety Properties to Generate Vulnerability Patches. - Rik Farrow:
Interview with Sergey Bratus.
- Mohammad Shahrad, Rodrigo Fonseca, Iñigo Goiri, Gohar Irfan Chaudhry, Ricardo Bianchini:
Open Characterization and Optimization of the Serverless Workload at a Large Cloud Provider Source Project Health. - Deepti Raghavan, Sadjad Fouladi, Philip Alexander Levis, Matei Zaharia:
Posh: A Data-Aware Shell. - Rik Farrow:
Interview with Margo Seltzer.
- Luis Quesada Torres, Doug Colish:
SRE Best Practices for Capacity Management. - Adam McKaig:
The Case for CS Knowledge in SRE.
- Laura Nolan:
Book Review: Implementing Service Level Objectivesby Alex Hidalgo. - Cory Lueninghoener:
Systems Notebook: What's in That Container? - Dave Josephsen:
iVoyeur: BPF and Histograms. - Simson L. Garfinkel:
SIGINFO: The Tricky Cryptographic Hash Function. - Terence Kelly:
Programming Workbench: Compressed Sparse Row Format for Representing Graphs. - Dan Geer, Bentz Tozer, John Speed Meyers:
For Good Measure: Counting Broken Links: A Quant's View of Software Supply Chain Security. - Robert G. Ferrell:
/dev/random: Discontent Creator.
- Mark Lamourine, Rik Farrow:
Book Reviews.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.