default search action
login - The Usenix Magazine, Volume 37
Volume 37, Number 1, February 2012
- Rik Farrow:
Musings.
- Josef Bacik:
Btrfs: The Swiss Army Knife of Storage. - Robert J. Chansler Jr.:
Data Availability and Durability with the Hadoop Distributed File System. - Christopher R. Hertel:
Server Message Block in the Age of Microsoft Glasnost. - Alex McDonald:
NFSv4.
- Stuart Kendrick:
Tasting Client/Network/Server Pie. - Rik Farrow:
Netflix Heads into the Clouds: Interview with Adrian Cockcroft.
- David N. Blank-Edelman:
Practical Perl Tools: CSV and the Spreadsheet Go A-Wanderin'. - Dave Josephsen:
iVoyeur: Changing the Game, Part 2. - David M. Beazley:
Three Years of Python 3. - Robert G. Ferrell:
/dev/random. - Elizabeth Zwicky, Sam Stover:
Book Reviews.
- Michael Armbrust, Yingyi Bu, Aaron J. Elmore, Rik Farrow, Eugenia Gabrielova, Hatem Mahmoud, Andy Pavlo, Stephen Revilak, Pinar Tözün:
14th International Workshop on High Performance Transaction Systems (HPTS).
Volume 37, Number 2, April 2012
- Rik Farrow:
Musings.
- Nikos Hardavellas:
The Rise and Fall of Dark Silicon.
- Paul Ebersman:
IPv6: It's Not Your Dad's Internet Protocol. - Simson L. Garfinkel:
Programming Unicode. - Tobias Oetiker:
How Perl Added Unicode Support 10 Years Ago Without You Noticing It. - Doug Hughes:
Data Integrity: Finding Truth in a World of Guesses and Lies.
- David N. Blank-Edelman:
Practical Perl Tools: Warning! Warning! Danger, Will Robinson! - David M. Beazley:
"R" is for Replacement. - Dave Josephsen:
iVoyeur: Changing the Game, Part 3. - Peter Baer Galvin:
Should You Care About Solaris 11? - Robert G. Ferrell:
/dev/random : Dark Rhetoric.
- Elizabeth Zwicky, Mark Lamourine, Trey Darley, Brandon Ching:
Book Reviews.
- Ming Chow, Rik Farrow, David Klann, Erinn Looney-Triggs, Cory Lueninghoener, Scott Murphy, Timothy Nelson, Thang Nguyen, Carolyn Rowland, Josh Simon, Deborah Wazir, Michael Wei:
Reports from USENIX LISA '11: 25th Large Installation System Administration Conference. - Kirstie Hawkey, Nicole Forsgren Velasquez, Tamara Babaian:
Report from the 5th ACM Symposium on Computer Human Interaction for Management of IT.
Volume 37, Number 3, June 2012
- Rik Farrow:
Musings.
- Harsha V. Madhyastha, John McCullough, George Porter, Rishi Kapoor, Stefan Savage, Alex C. Snoeren, Amin Vahdat:
scc: Informed Provisioning of Storage for Cluster Applications. - David Slik:
An Introduction to CDMI. - Yanpei Chen, Rean Griffith, David Zats, Anthony D. Joseph, Randy H. Katz:
Understanding TCP Incast and Its Implications for Big Data Workloads.
- Robert Escriva, Bernard Wong, Emin Gün Sirer:
An Introduction to HyperDex and the Brave New World of High Performance, Scalable, Consistent, Fault-tolerant Data Stores.
- Rik Farrow:
Nathan Milford on Cassandra: An Interview. - Doug Hughes, Nathan Olla:
When Disasters Collide: A Many-Fanged Tale of Woe, Coincidence, Patience, and Stress.
- David N. Blank-Edelman:
Practical Perl Tools: Rainy Days and Undocumented APIs Always Get Me Down. - David M. Beazley:
Becoming a Master Collector. - Dave Josephsen:
iVoyeur: Changing the Game, Part 4. - Robert G. Ferrell:
/dev/random.
- Mark Lamourine, Brandon Ching, Peter H. Salus, Jeff Berg, Evan Teran, Rik Farrow:
Book Reviews.
- Dulcardo Arteaga, Rik Farrow, Daniel Fryer, Doowon Kim, Michelle L. Mazurek, Dutch T. Meyer, Swapnil Patil, Yiqi Xu:
USENIX Notes.
Volume 37, Number 4, August 2012
- Rik Farrow:
Musings. - Table of Contents.
- Keith Winstein, Hari Balakrishnan:
Mosh: A State-of-the-Art Good Old-Fashioned Mobile Shell. - Mohammad Mannan, Paul C. van Oorschot:
Passwords for Both Mobile and Desktop Computers: ObPwd for Firefox and Android. - Richard Forno:
Looking Within to Improve American Cybersecurity. - Daniel E. Geer Jr.:
The Future of Security: Criticality, Rejectionists, Risk Tolerance. - Mohammad Mannan, Paul C. van Oorschot:
Passwords for Both Mobile and Desktop Computers Appendix. - Daniel E. Geer Jr.:
The Future of Security Nominal Delivery Draft, Rocky Mountain Information Security Conference, 18 May 2012. - Franziska Roesner, Christopher Rovillos, Tadayoshi Kohno, David Wetherall:
ShareMeNot: Balancing Privacy and Functionality of Third-Party Social Widgets.
- Matei Zaharia, Mosharaf Chowdhury, Tathagata Das, Ankur Dave, Justin Ma, James Murphy McCauley, Michael J. Franklin, Scott Shenker, Ion Stoica:
Fast and Interactive Analytics over Hadoop Data with Spark.
- Doug Hughes:
When Disasters Collide: A Many-Fanged Tale of Woe, Coincidence, Patience, and Stress, Continued.
- David N. Blank-Edelman:
Practical Perl Tools: Taking the XPath Less Traveled. - David M. Beazley:
Import That! - Dave Josephsen:
iVoyeur: The Gift of Fire. - Robert G. Ferrell:
/dev/random : Apps for Saps.
- Casey Henderson, Anne Dickison:
Notes.
- Advait Abhay Dixit, Rik Farrow, Andrew D. Ferguson, Katrina LaCurts, Marcelo Martins, Karthik Nagaraj, Kevin Ngo, Will Scott, Manuel Egele, Engin Kirda:
NSDI '12 and LEET '12.
- Elizabeth Zwicky, Peter Gutmann, Sam Stover, Mark Lamourine:
Book Reviews.
Volume 37, Number 5, October 2012
- Rik Farrow:
Musings.
- David M. Beazley:
Secrets of the Multiprocessing Module. - Robert G. Ferrell:
/dev/random. - Dave Josephsen:
iVoyeur: Crosstalk. - David N. Blank-Edelman:
Practical Perl Tools: Mind Those Stables, I Mean Files.
- Amandeep Khurana:
Introduction to HBase Schema Design. - Rob C. Knauerhase, Romain Cledat, Justin Teller:
For Extreme Parallelism, Your OS Is Sooooo Last-Millennium. - Kamau Wanguhgu:
VXLAN: Extending Networking to Fit the Cloud.
- Elizabeth Zwicky, Mark Lamourine:
Book Reviews.
- Table of Contents.
- Rik Farrow:
Jacob Farmer on Managing Research Data: An Interview. - Stuart Kendrick:
What Takes Us Down? - Charles Polisher:
The Summer of Popping Power Supplies.
Volume 37, Number 6, December 2012
- Rik Farrow:
Musings.
- Vasileios P. Kemerlis, Georgios Portokalidis, Elias Athanasopoulos, Angelos D. Keromytis:
kGuard: Lightweight Kernel Protection. - Manos Antonakakis, Roberto Perdisci, Nikolaos Vasiloglou, Wenke Lee:
Detecting and Tracking the Rise of DGA-Based Malware. - João Marcelo Ceron, Klaus Steding-Jessen, Cristine Hoepers:
Anatomy of SIP Attacks. - Shashi Shekhar, Michael Dietz, Dan S. Wallach:
AdSplit: Separating Smartphone Advertising from Applications. - Philipp Winter, Jedidiah R. Crandall:
The Great Firewall of China: How It Blocks Tor and Why It Is Hard to Pinpoint.
- Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazurek, Timothy Passaro, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman, Julio C. López:
Helping Users Create Better Passwords.
- Jiyong Jang, Maverick Woo, David Brumley:
ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions.
- David N. Blank-Edelman:
Practical Perl Tools: "Mala trom pee chock makacheesa.". - David M. Beazley:
Data Processing with Pandas. - Dave Josephsen:
iVoyeur: Nagios XI. - Robert G. Ferrell:
/dev/random.
- Elizabeth Zwicky, Rik Farrow:
Notes.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.