default search action
login - The Usenix Magazine, Volume 35
Volume 35, Number 1, February 2010
- Rik Farrow:
Musings. - Sean Kamath:
Whither LISA?
- Alva L. Couch:
Configuration Management Phenomenology. - Jarle Bjørgeengen:
Puppet and Cfengine Compared: Time and Resource Consumption.
- Erez Zadok, Vasily Tarasov, Priya Sehgal:
The Case for Specialized File Systems, or, Fighting File System Obesity. - Jochen L. Leidner, Gary Berosik:
Building and Installing a Hadoop/Mapreduce Cluster from Commodity Components: A Case Study.
- Angelos D. Keromytis:
A Look at VoIP Vulnerabilities.
- David R. Choffnes, Fabián E. Bustamante:
Taming the Torrent. - Dave Piscitello:
SSR: Securing the Internet's Identifier Systems.
- Rudi van Drunen:
Peculiarities of Radio Devices.
- David N. Blank-Edelman:
Practical Perl Tools: You Never Forget Your First Date (Object). - Peter Baer Galvin:
Pete's All Things Sun: Crossbow. - Dave Josephsen:
iVoyeur: Breaking Up Is Hard to Do. - Robert G. Ferrell:
/dev/random: Project Management - APrimer.
- Elizabeth Zwicky, et al.:
Book Reviews.
- Rémy Evard:
Nominating Committee Report, 2010 Election for the USENIX Board of Directors. - Ellie Young:
Thanks to Our Volunteers. - Mark Burgess:
"The Cloud Minders".
Volume 35, Number 2, April 2010
- Rik Farrow:
Musings.
- Konstantin V. Shvachko:
HDFS Scalability: The Limits to Growth. - Rik Farrow:
The Barrelfish Multikernel: An Interview with Timothy Roscoe.
- Mark Burgess, Carolyn Rowland:
The Business Value of System Administration. - Alva L. Couch:
From Tasks to Assurances: Redefining System Administration.
- William K. Josephson, Lars Ailo Bongo, David Flynn, Kai Li:
DFS: A File System for Virtualized Flash Storage. - Jake Wires, Andrew Warfield:
Beyond Blocks and Files.
- Elizabeth Zwicky:
Brute Force and Ignorance.
- David N. Blank-Edelman:
Practical Perl Tools: Let Me Help You Get Regular. - Peter Baer Galvin:
Pete's All Things Sun: Open Source and Free Deduplication. - Dave Josephsen:
iVoyeur: A Question of Scale. - Robert G. Ferrell:
/dev/random: Less Successful Network Protocols.
- Elizabeth Zwicky, Brandon Ching:
Book Reviews.
- Lou Katz, Peter H. Salus:
In Memoriam: Lewis A. Law, 1932-2010. - Anne Dickison:
Calling All Bloggers.
Volume 35, Number 3, June 2010
- Rik Farrow:
Musings.
- Andrew S. Tanenbaum, Raja Appuswamy, Herbert Bos, Lorenzo Cavallaro, Cristiano Giuffrida, Tomás Hrubý, Jorrit N. Herder, Erik van der Kouwe, David C. van Moolenbroek:
MINIX 3: Status Report and Current Research.
- Jim Sangwine:
3D Web Contenders.
- Alva L. Couch:
Programming with Technological Ritual and Alchemy. - Andrew Seely:
Building a Virtual DNS Appliance Using Solaris 10, BIND, and VMware. - Matt Simmons:
LISA: Beginning the Journey.
- Rudi van Drunen:
Small Embedded Systems.
- David N. Blank-Edelman:
Practical Perl Tools: Making Stuff Up. - Peter Baer Galvin:
Pete's All Things Sun: Exadata V2 Architecture and Why It Matters. - Dave Josephsen:
iVoyeur: Pockets-o-Packets, Part 1. - Robert G. Ferrell:
/dev/random: Five Common Misconceptions About Information Security.
- Brandon Ching, Sam Stover:
Book Reviews.
Volume 35, Number 4, August 2010
- Rik Farrow:
Musings.
- Ron Dilley:
Making Sense of Logs. - Stephen Checkoway, Hovav Shacham, Eric Rescorla:
Don't Take LaTeX Files from Strangers. - Bo Li, Elena Reshetova, Tuomas Aura:
Symbian OS Platform Security Model.
- Carlos Maltzahn, Esteban Molina-Estolano, Amandeep Khurana, Alex J. Nelson, Scott A. Brandt, Sage A. Weil:
Ceph as a Scalable Alternative to the Hadoop Distributed File System.
- Michael Piatek, Arvind Krishnamurthy:
Improving the Performance and Robustness of P2P Live Streaming with Contracts.
- David N. Blank-Edelman:
Practical Perl Tools: Random Acts of Kindness. - Peter Baer Galvin:
Pete's All Things Sun: The Status of Sun Products. - Dave Josephsen:
iVoyeur: Pockets-o-Packets, Part 2. - Robert G. Ferrell:
/dev/random: A Debatably Helpful Guide to IT Disaster Planning.
- Elizabeth Zwicky, Brandon Ching, Sam Stover:
Book Reviews.
Volume 35, Number 5, October 2010
- Rik Farrow:
Musings.
- Jan Schaumann:
Teaching System Administration in the Cloud. - Thomas A. Limoncelli:
Sample command-line tool invocation. - Troy McKee:
Migrating from Hosted Exchange.
- Matt Ryanczak:
IPv6 Transit: What You Need to Know.
- Brian Kirouac:
Secure Email for Mobile Devices.
- David N. Blank-Edelman:
Practical Perl Tools: Perhaps Size Really Does Matter. - Peter Baer Galvin:
Pete's All Things Sun: The "Problem" with NAS. - Dave Josephsen:
iVoyeur: Pockets-o-Packets, Part 3. - Robert G. Ferrell:
/dev/random: Airport Security and Other Myths.
- Elizabeth Zwicky, Brandon Ching, Sam Stover:
Book Reviews.
- Rob Kolstad:
USA Wins World High School Programming Championships - Snaps Extended China Winning Streak.
Volume 35, Number 6, December 2010
- Robert G. Ferrell:
/dev/random. - David N. Blank-Edelman:
Practical Perl Tools: Family Man. - Peter Baer Galvin:
Pete's All Things Sun: Comparing Solaris to RedHat Enterprise and AIX. - Dave Josephsen:
iVoyeur: Ganglia on the Brain.
- Elizabeth Zwicky, Rik Farrow, Sam Stover:
Book Reviews.
- Ellie Young:
Thanks to Our Volunteers.
- Rik Farrow:
19th USENIX Security Symposium Reports.
- Robert N. M. Watson, Jonathan Anderson, Ben Laurie, Kris Kennaway:
Introducing Capsicum: Practical Capabilities for UNIX. - Moheeb Abu Rajab, Lucas Ballard, Panayiotis Mavrommatis, Niels Provos, Xin Zhao:
The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution. - Dan Geer:
Vulnerable Compliance. - Matthew Hicks, Murph Finnicum, Samuel T. King, Milo M. K. Martin, Jonathan M. Smith:
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.