default search action
login - The Usenix Magazine, Volume 36
Volume 36, Number 1, February 2011
- Rik Farrow:
Musings.
- Dutch T. Meyer, Jake Wires, Norman C. Hutchinson, Andrew Warfield:
Namespace Management in Virtual Desktops.
- Rob Sherwood:
Safely Using Your Production Network as a Testbed. - David Barrera, Glenn Wurster, Paul C. van Oorschot:
Back to the Future: Revisiting IPv6 Privacy Extensions.
- Mona Attariyan, Jason Flinn:
Automating Configuration Troubleshooting with ConfAid. - Joshua Fiske:
Making System Administration Easier by Letting the Machines Do the Hard Work, Or, Becoming an Agile Sysadmin. - Ole Tange:
GNU Parallel: The Command-Line Power Tool.
- David N. Blank-Edelman:
Practical Perl Tools: Hither and Yon. - Peter Baer Galvin:
Pete's All Things Sun: Comparing Solaris to RedHat Enterprise and AIX - Virtualization Features. - Dave Josephsen:
iVoyeur: More Ganglia on the Brain. - Robert G. Ferrell:
/dev/random.
- Elizabeth Zwicky, Rik Farrow, Sam Stover:
Book Reviews.
- Anne Dickison:
Have You Seen the Latest USENIX Short Topics in Sysadmin Books?
Volume 36, Number 2, April 2011
- Rik Farrow:
Musings.
- Derek Gordon Murray, Steven Hand:
Skywriting on CIEL: Programming the Data Center.
- Cory Lueninghoener:
Getting Started with Configuration Management. - James Donn, Tim Hartmann:
Centralized Logging in a Decentralized World. - Rik Farrow:
Backup Strategies for Molecular Dynamics: An Interview with Doug Hughes. - Ole Tange:
GNU SQL: A Command Line Tool for Accessing Different Databases Using DBURLs.
- David N. Blank-Edelman:
Practical Perl Tools: H-T...TP - That's What It Means to Me. - Peter Baer Galvin:
Pete's All Things Sun: Solaris 11 Express. - Dave Josephsen:
iVoyeur: All Together Now. - Robert G. Ferrell:
/dev/random (Parenthetically Speaking).
- Elizabeth Zwicky, Sam Stover, Evan Teran, Rik Farrow:
Book Reviews.
Volume 36, Number 3, June 2011
- Rik Farrow:
Musings.
- Konstantin V. Shvachko:
Apache Hadoop: The Scalability Update. - Jeff Darcy:
Building a Cloud File System.
- Steven R. Hetzler:
System Impacts of Storage Trends: Hard Errors and Testability.
- Stuart Kendrick:
Testing the Transport Side of Highly Available Hosts.
- David N. Blank-Edelman:
Practical Perl Tools: Give as Good as You Get, My Tiny Dancer. - Dave Josephsen:
iVoyeur: A Handful of Gems. - Robert G. Ferrell:
/dev/random.
- Elizabeth Zwicky, Evan Teran, Ryan MacArthur:
Book Reviews.
Volume 36, Number 4, August 2011
- Rik Farrow:
Musings.
- Rik Farrow:
Interview with Stefan Savage: On the Spam Payment Trail. - Ned Moran:
Understanding Advanced Persistent Threats: A Case Study. - Raphael Mudge:
Network Attack Collaboration: Sharing the Shell. - Peter Gutmann:
Do Users Verify SSH Keys?
- Benjamin Hindman, Andy Konwinski, Matei Zaharia, Ali Ghodsi, Anthony D. Joseph, Randy H. Katz, Scott Shenker, Ion Stoica:
Mesos: Flexible Resource Sharing for the Cloud.
- Thomas A. Limoncelli, Doug Hughes:
LISA '11: Theme - "DevOps: New Challenges, Proven Values".
- David N. Blank-Edelman:
Practical Perl Tools: Got My Mojolicious Working. - Peter Baer Galvin:
Galvin's All Things Enterprise: The State of the Cloud. - Dave Josephsen:
iVoyeur: Crom. - Robert G. Ferrell:
/dev/random.
- Elizabeth Zwicky, Rik Farrow:
Book Reviews.
Volume 36, Number 5, October 2011
- Rik Farrow:
Musings.
- Greg Burd:
NoSQL. - Paul Vixie:
Other Uses for Secure DNS. - Don Revelle:
Hypervisors and Virtual Machines: Implementation Insights on the x86 Architecture.
- Andrew Newton, Dave Piscitello, Benedetto Fiorelli, Steve Sheng:
A RESTful Web Service for Internet Name and Address Directory Services.
- David N. Blank-Edelman:
Practical Perl Tools: Do I Look Better in Profile? - Peter Baer Galvin:
Galvin's All Things Enterprise: The State of the Cloud, Part 2. - Dave Josephsen:
iVoyeur: Cloud Gazing. - Robert G. Ferrell:
/dev/random: Virtualization: A Dark Proverb.
- Elizabeth Zwicky, Trey Darley, Sam Stover, Peter Baer Galvin:
Book Reviews.
Volume 36, Number 6, December 2011
- Rik Farrow:
Musings.
- Edward J. Schwartz:
The Danger of Unrandomized Code. - Sergey Bratus, Michael E. Locasto, Meredith L. Patterson, Len Sassaman, Anna Shubina:
Exploit Programming: From Buffer Overflows to "Weird Machines" and Theory of Computation. - Len Sassaman, Meredith L. Patterson, Sergey Bratus, Anna Shubina:
The Halting Problems of Network Stack Insecurity.
- Adam Langley:
Beyond the Basics of HTTPS Serving. - Jan Schaumann:
Of Headless User Accounts and Restricted Shells. - Patrick Debois:
DevOps from a Sysadmin Perspective.
- David N. Blank-Edelman:
Practical Perl Tools: From the Editor. - Dave Josephsen:
iVoyeur: Changing the Game. - Robert G. Ferrell:
/dev/random.
- Elizabeth Zwicky, Sam Stover:
Book Reviews.
- Alva L. Couch:
2012 Election for the USENIX Board of Directors. - Brian Dean:
USENIX Remembers Dennis Ritchie (1941-2011).
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.