Skip to main content

USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.

Home
  • About
  • Conferences
  • Publications
    • Proceedings
    • Author Resources
    • ;login: Online
    • Writing for ;login: Online
    • ;login: Archive
  • Membership
  • Students
  • Search
  • Donate Today
  • Sign In
  • Search
  • About
    • USENIX Board
    • Staff
    • Newsroom
    • Good Works
    • Blog
    • Governance and Financials
    • USENIX Awards
    • USENIX Supporters
    • 2022 Board Election
    • Board Meeting Minutes
    • Annual Fund
  • Conferences
    • Upcoming
    • By Name
    • Calls for Papers
    • Grants
    • Sponsorship
    • Best Papers
    • Test of Time Awards
    • Multimedia
    • Conference Policies
    • Code of Conduct
  • Publications
    • Proceedings
    • Author Resources
    • ;login: Online
    • Writing for ;login: Online
    • ;login: Archive
  • Membership
  • Students
    • Conference Fees
    • Campus Representative Program
    • Student Grant Program
  • Search
  • Donate Today

You are here

Publications
Donate Today
An open access publication driven by the USENIX community
81 Results
May 22, 2023
Bcrypt at 25: A Retrospective on Password Security

Celebrating 25 years of bcrypt! Dive into its journey, enduring impact on password security, and unique ways it's shaping the future.
Authors: Niels Provos
Article shepherded by:
Rik Farrow
Read article now
May 8, 2023
Responding to and Learning from Distributed Incidents

Step through a distributed systems incident and see how teams can learn from these events.
Authors: Philipp Böschen
Article shepherded by:
Laura Nolan
Read article now
April 25, 2023
Codon: Python Compiler

Codon is a compiler for Python scripts that produces optimized code suitable for analyzing large amounts of data, with some limitations.
Authors: Rik Farrow
Article shepherded by:
Laura Nolan
Read article now
April 18, 2023
A Study in Practical Deduplication

Using data collected from 875 Microsoft employees' desktops and servers, the authors analyzed file metadata and potential deduplication strategies.
Authors: Dutch Meyer, Bill Bolosky, Rik Farrow
Article shepherded by:
Rik Farrow
Read article now
March 15, 2023
You don’t have a production environment

Your staging environment cannot accurately replicate your production environment. Multi-tenancy can solve this problem.
Authors: Avishai Ish-Shalom
Article shepherded by:
Laura Nolan
Read article now
March 7, 2023
Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress Marketplaces

Authors: Ranjita Pai Sridhar, Jonathan Fuller, Yiting Sun, Omar Chabklo, Andres Rodriguez, Jeman Park, Brendan Saltaformaggio
Article shepherded by:
Rik Farrow
Read article now
March 5, 2023
Musings on Operating Systems

Why is Windows on the desktop, while Linux rules the cloud?
Authors: Rik Farrow
Article shepherded by:
Rik Farrow, Laura Nolan
Read article now
February 27, 2023
Workload Security Rings

Authors: Michał Czapiński , Rainer Wolafka
Article shepherded by:
Laura Nolan
Read article now
February 21, 2023
CI is Alerting

Adding lots of alerts during the early stages of development can pay off later in an Continuous Integration environment.
Authors: Titus Winters
Article shepherded by:
Rik Farrow, Laura Nolan
Read article now
February 10, 2023
Rock Fishing and Incident Analysis

What can technologists learn from studying how rock fishers think about safety?
Authors: Thai Wood
Article shepherded by:
Laura Nolan
Read article now
February 6, 2023
Detecting Fail-Slow Failures in Large-Scale Cloud Storage Systems

Researchers tried several different methods for discovering fail-slow drives before developing PERSEUS for very large cloud storage
Authors: Ruiming Lu, Erci Xu, Yiming Zhang, Fengyi Zhu, Zhaosheng Zhu, Mengtian Wang, Zongpeng Zhu, Guangtao Xue, Jiwu Shu, Minglu Li, Jiesheng Wu
Article shepherded by:
Rik Farrow
Read article now
February 1, 2023
Caching Entire Systems without Invalidation

Peter Sperl presents two systems design patterns for implementing resilient and layered caching in large distributed systems.
Authors: Peter Sperl
Article shepherded by:
Laura Nolan
Read article now
January 23, 2023
Interview with Matt Welsh

Rik Farrow interviews Matt Welsh about Rust and the future of replacing programmers with AI/ML.
Authors: Rik Farrow, Matt Welsh
Article shepherded by:
Rik Farrow
Read article now
January 21, 2023
Space Rogue

The story of the L0pht, the group best known for their Senate testimony about security in 1998, as told by Chris Thomas, Space Rogue.
Authors: Rik Farrow
Article shepherded by:
Rik Farrow
Read article now
January 13, 2023
Interview with Warren Toomey, Founder of the Unix Heritage Society

Warren Toomey became interested in Unix as a high school student, an interest the affected his career and the creation of the Unix Heritage Society
Authors: Warren Toomey, Rik Farrow
Article shepherded by:
Rik Farrow
Read article now
January 1, 2023
Kairux: Distributed System Fault Localization based on The Inflection Point Hypothesis

Uncovering fault locations in distributed Java-based applications.
Authors: Yongle Zhang, Kirk Rodrigues, Yu Luo, Michael Stumm, Ding Yuan
Article shepherded by:
Rik Farrow
Read article now
December 15, 2022
Reliability Maturity Model

Learn about the reliability maturity of your organization from examples, as well as why maintaining the right level is important.
Authors: Vartika Agarwal, Tracy Ferrell
Article shepherded by:
Laura Nolan, Rik Farrow
Read article now
December 10, 2022
Fred Brooks as Mentor

Richard Sites tells about having Fred Brooks, best-known for the Mythical Man-Month, as his PhD advisor.
Authors: Richard L. Sites
Article shepherded by:
Rik Farrow
Read article now

Pages

  • 1
  • 2
  • 3
  • 4
  • 5
  • next ›
  • last »
See ;login: editions prior to 2021
Home

© USENIX
Website designed and built
by Giant Rabbit LLC

  • Privacy Policy
  • Contact Us
Sign up for Our Newsletter: