The USENIX Association is the Advanced Computing Systems Association. It was founded in 1975 under the name "Unix Users Group," focusing primarily on the study and development of Unix and similar systems. In June 1977, a lawyer from AT&T Corporation informed the group that they could not use the word UNIX as it was a trademark of Western Electric (the manufacturing arm of AT&T until 1995), which led to the change of name to USENIX. It has since grown into a respected organization among practitioners, developers, and researchers of computer operating systems more generally. Since its founding, it has published a technical journal entitled ;login:.

Wikipedia
USENIX Association
USENIX Association
YouTube Video

New YouTube videos detected.

  • SREcon17Europe/Middle East/Africa - Lightning Talks
    6 Ways a Culture of Communication Strengthens Your Team’s Resiliency Jaime Woo, Shopify Dynamic Documentation in 5 minutes Daniel Lawrence, LinkedIn Resource management and isolation, the non-shiny way Luiz Viana, Demonware Collecting metrics with Snap - the open telemetry framework Guy Fighel, SignifAI Decentralized Data Jason Koppe, Indeed Failovers Emil Stolarsky, Production Engineer, Sh...
USENIX Association
USENIX Association
YouTube Video

New YouTube videos detected.

  • SREcon17 Europe/Middle East/Africa - Case Study: Lessons Learned from Our First Worldwide Outage
    Yoav Cohen, Imperva Incapsula Last year, on March 10, Incapsula experienced the first worldwide outage in its history… While relatively short in duration, it affected thousands of websites that rely on our security and acceleration every day. Rooted in a 3-year old dormant bug in our IncapRules code, this outage made us realize there were changes we needed to make in the way we write and qualify...
USENIX Association
USENIX Association
YouTube Video

New YouTube videos detected.

  • SREcon17 Europe/Middle East/Africa - Care and Feeding of SRE
    Narayan Desai, Google As SRE enters the ops zeitgeist, much of the focus has been placed on tactics—techniques that individual operations teams can adopt to improve their effectiveness. While there is value in singleton adoption, I'll make the case in this talk that organizational support and culture across the organization that corresponds with these tactics results in impact far greater than th...
USENIX Association
USENIX Association
YouTube Video

New YouTube videos detected.

  • SREcon17 Europe/Middle East/Africa - OK Log: Distributed and Coördination-Free Logging
    Peter Bourgon, Fastly This talk explores the motivation, design, prototype, and optimization of OK Log, a distributed and coördination-free log system for big ol' (cloud-native) clusters. We first motivate the need for a such a system, setting it apart from existing products like Elasticsearch. Then, we carve out a solution in the distributed systems space, paying due homage to the old gremlins ...
USENIX Association
USENIX Association
YouTube Video

New YouTube videos detected.

  • SREcon17 Europe/Middle East/Africa - Monitoring Cloudflare's Planet-Scale Edge Network
    Matt Bostock, Cloudflare Cloudflare operates a global anycast edge network serving content for 6 million web sites. This talk explains how we monitor our network, how we migrated from Nagios to Prometheus and the architecture we chose to provide maximum reliability for monitoring. We'll also discuss the impact of alert fatigue and how we reduced alert noise by analysing data, making alerts more a...
USENIX Association
USENIX Association
YouTube Video

New YouTube videos detected.

  • SREcon17 Europe/Middle East/Africa - Run Less Software; Use Less Bits
    Rich Archbold, Intercom At Intercom, we believe that to enable us to: improve availability and reduce risks, save time and money, improve operability, and enable us to move fast for the long term we should build and run Intercom using the smallest sensible set of core infrastructure components. we are cautious about adding new technologies to the mix we’d often rather consider using one of our e...
USENIX Association
USENIX Association
YouTube Video

New YouTube videos detected.

  • SREcon17 Europe/Middle East/Africa - Why Work with a Tech Writer?
    Betsy Beyer, Google The sparsely-attended SREcon17 Americas Tech Writing talk focused on HOW to work with Tech Writers. I'm instead focusing on WHY you should work with a TW--because they make your life easier, and can make the work you're already doing have more impact. Reasons to engage a TW: If you need to explain your product/service/etc. to users: Chances are, the most satisfying, enjoyabl...
USENIX Association
USENIX Association
YouTube Video

New YouTube videos detected.

USENIX Association
USENIX Association
YouTube Video

New YouTube videos detected.

  • SREcon17 Europe/Middle East/Africa - Capturing and Analyzing Millions...
    Capturing and Analyzing Millions of Queries without Any Overhead Karthik Appigatla, Sr. Database Engineers, LinkedIn, and Basavaiah Thambara, LinkedIn This talk is about a new way of monitoring and analyzing millions of queries with no overhead. Optimizing queries is the most important aspect of scaling database servers. Before we can optimize, we need to identify the problematic queries. We h...
USENIX Association
USENIX Association
YouTube Video

New YouTube videos detected.

  • SREcon17 Europe/Middle East/Africa - The Never-Ending Story of Site Reliability
    Kurt Andersen, LinkedIn I strongly believe that the commonly proposed bogey-man of "automating ourselves out of a job" betrays a simplistic and highly incomplete understanding of the SRE field. SRE teams can always grow and develop. The Dreyfus model is a model of professional expertise that plots an individual's progression through a series of five levels: novice, advanced beginner, competent, ...
USENIX Association
USENIX Association
YouTube Video

New YouTube videos detected.

  • SREcon17 Europe/Middle East/Africa - Have You Tried Turning It off and Turning It on Again?
    Tanya Reilly, Google Most of us have a backup strategy, many of us have a restore strategy and several of us have a fully tested restore strategy. But backups are not the whole story. I'll talk about the parts of disaster recovery we're less prepared for, and dependencies that you might not think about until one day when you really do turn an entire service, entire site or (perish the thought!) a...
USENIX Association
USENIX Association
YouTube Video

New YouTube videos detected.

  • SREcon17 Europe/Middle East/Africa - Want to Solve Over-Monitoring...
    Want to Solve Over-Monitoring and Alert Fatigue? Create the Right Incentives! Kishore Jalleda, Yahoo, Inc. Telemetry monitors and their (constant) beeping is a pretty common sight in hospitals. I saw these at the NICU where my twins were being cared for after being born prematurely. My wife and I used to freak out every time one of these went off. Unlike a missed alarm that said your site's down...
USENIX Association
USENIX Association
YouTube Video

New YouTube videos detected.

  • SREcon17 Europe/Middle East/Africa - How We Try to Make a Lion Bulletproof...
    How We Try to Make a Lion Bulletproof; Setting Up SRE in a Global Financial Organization Janna Brummel and Robin van Zijll, ING By now, most of us have read the O’Reilly book about Google SRE or have heard of other tech companies’ SRE teams. Our story is about doing SRE in a more traditional and more regulated environment: in the largest bank in the Netherlands. This talk will address the hist...
USENIX Association
USENIX Association
YouTube Video

New YouTube videos detected.

  • SREcon17 Europe/Middle East/Africa - Building a Culture of Reliability
    Arup Chakrabarti, PagerDuty Getting customers to care about Reliability is hard. Getting stakeholders to care about Reliability is harder. Getting the entire company to care about Reliability is even harder. In this talk, I will cover what steps that every leader in any organization can take to get more people to care about Reliability. Because Reliability is one of those things that people only...
USENIX Association
USENIX Association
YouTube Video

New YouTube videos detected.

  • SREcon17 Europe/Middle East/Africa - The Why, What, and How of Starting an SRE Engagement
    Richard Clawson and Josh Gilliland, Microsoft Azure One of the hardest things to do is trust an outside voice. What are the boundaries between live site features and service features? How much expertise is required to be on-call? Who decides what’s in the best interests of the service? How is this not another Ops team or a staff augment? Who’s "in charge" and who makes prioritization calls? How d...
USENIX Association
USENIX Association
YouTube Video

New YouTube videos detected.

  • USENIX Security '17 - HELP: Helper-Enabled In-Band Device Pairing…
    HELP: Helper-Enabled In-Band Device Pairing Resistant Against Signal Cancellation Nirnimesh Ghose, Loukas Lazos, and Ming Li, Electrical and Computer Engineering, University of Arizona, Tucson, AZ Bootstrapping trust between wireless devices without entering or preloading secrets is a fundamental security problem in many applications, including home networking, mobile device tethering, and the In...
USENIX Association
USENIX Association
YouTube Video

New YouTube videos detected.

  • USENIX Security ’17 - Understanding the Mirai Botnet
    Manos Antonakakis, Georgia Institute of Technology; Tim April, Akamai; Michael Bailey, University of Illinois, Urbana-Champaign; Matt Bernhard, University of Michigan, Ann Arbor; Elie Bursztein, Google; Jaime Cochran, Cloudflare; Zakir Durumeric and J. Alex Halderman, University of Michigan, Ann Arbor; Luca Invernizzi, Google; Michalis Kallitsis, Merit Network, Inc.; Deepak Kumar, University of Il...
USENIX Association
USENIX Association
YouTube Video

New YouTube videos detected.

  • USENIX Security '17 - Picking Up My Tab
    Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment Xiaolong Bai Tsinghua University Mobile off-line payment enables purchase over the counter even in the absence of reliable network connections. Popular solutions proposed by leading payment service providers (e.g., Google, Amazon, Samsung, Apple) rely on direct communication between the paye...
USENIX Association
USENIX Association
YouTube Video

New YouTube videos detected.

  • USENIX Security '17 - BLENDER: Enabling Local Search with a Hybrid Differential Privacy
    Brendan Avent University of Southern California We propose a hybrid model of differential privacy that considers a combination of regular and opt-in users who desire the differential privacy guarantees of the local privacy model and the trusted curator model, respectively. We demonstrate that within this model, it is possible to design a new type of blended algorithm for the task of privately co...
USENIX Association
USENIX Association
YouTube Video

New YouTube videos detected.

  • USENIX Security '17 - Towards Efficient Heap Overflow Discovery
    Xiangkun Jia, TCA/SKLCS, Institute of Software, Chinese Academy of Sciences; Chao Zhang, Institute for Network Science and Cyberspace, Tsinghua University; Purui Su, Yi Yang, Huafeng Huang, and Dengguo Feng, TCA/SKLCS, Institute of Software, Chinese Academy of Sciences Heap overflow is a prevalent memory corruption vulnerability, playing an important role in recent attacks. Finding such vulnerabi...
USENIX Association
USENIX Association
YouTube Video

New YouTube videos detected.

USENIX Association
USENIX Association
YouTube Video

New YouTube videos detected.

  • USENIX Security '17 - Identifier Binding Attacks and Defenses in Software-Defined Networks
    Samuel Jero, Purdue University; William Koch, Boston University; Richard Skowyra and Hamed Okhravi, MIT Lincoln Laboratory; Cristina Nita-Rotaru, Northeastern University; David Bigelow, MIT Lincoln Laboratory In this work, we demonstrate a novel attack in SDN networks, Persona Hijacking, that breaks the bindings of all layers of the networking stack and fools the network infrastructure into belie...
USENIX Association
USENIX Association
YouTube Video

New YouTube videos detected.

  • USENIX Security '17 - A Longitudinal, End-to-End View of the DNSSEC Ecosystem
    A Longitudinal, End-to-End View of the DNSSEC Ecosystem Taejoong Chung Northeastern University The Domain Name System’s Security Extensions (DNSSEC) allow clients and resolvers to verify that DNS responses have not been forged or modified inflight. DNSSEC uses a public key infrastructure (PKI) to achieve this integrity, without which users can be subject to a wide range of attacks. However, DNSS...
USENIX Association
USENIX Association
YouTube Video

New YouTube videos detected.

  • USENIX Security '17 - Adaptive Android Kernel Live Patching
    Yue Chen, Florida State University; Yulong Zhang, Baidu X-Lab; Zhi Wang, Florida State University; Liangzhao Xia, Chenfu Bao, and Tao Wei, Baidu X-Lab Android kernel vulnerabilities pose a serious threat to user security and privacy. They allow attackers to take full control over victim devices, install malicious and unwanted apps, and maintain persistent control. Unfortunately, most Android devi...
USENIX Association
USENIX Association
YouTube Video

New YouTube videos detected.

  • USENIX Security '17 - Phoenix: Rebirth of a Cryptographic Password-Hardening Service
    Phoenix: Rebirth of a Cryptographic Password-Hardening Service Russell W. F. Lai Friedrich-Alexander-University Erlangen-Nürnberg, Chinese University of Hong Kong Password remains the most widespread means of authentication, especially on the Internet. As such, it is the Achilles heel of many modern systems. Facebook pioneered using external cryptographic services to harden password-based authen...
USENIX Association
USENIX Association
YouTube Video

New YouTube videos detected.

  • USENIX Security '17 - Detecting Credential Spearphishing in Enterprise Settings
    Grant Ho, UC Berkeley; Aashish Sharma, The Lawrence Berkeley National Labratory; Mobin Javed, UC Berkeley; Vern Paxson, UC Berkeley and ICSI; David Wagner, UC Berkeley Distinguished Paper Award Winner and winner of the 2017 Internet Defense Prize! We present a new approach for detecting credential spearphishing attacks in enterprise settings. Our method uses features derived from an analysis of ...
USENIX Association
USENIX Association
YouTube Video

New YouTube videos detected.

  • USENIX Security '17 - SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data
    SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data Md Nahid Hossain Stony Brook University We present an approach and system for real-time reconstruction of attack scenarios on an enterprise host. To meet the scalability and real-time needs of the problem, we develop a platform-neutral, main-memory based, dependency graph abstraction of audit-log data. We then present efficien...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.