The submission deadline for the 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '09) is quickly approaching.
Please submit full papers by 11:59 p.m. PST, Friday, January 16, 2009.
LEET '09 will focus on the underlying mechanisms used to compromise and control hosts, the large-scale "applications" being perpetrated upon this framework, or the social and economic networks driving these threats.
The submission deadline for the 12th Workshop on Hot Topics in Operating Systems (HotOS XII) is quickly approaching.
Please submit all work by January 13, 2009.
HotOS XII will bring together innovative practitioners and researchers in computing systems, broadly construed. Continuing the HotOS tradition, participants will present and discuss new ideas about computer systems research and how technological advances and new applications are shaping our computational infrastructure.
The Large Installation System Administration Conference (LISA) has been the premier system administration conference for over 20 years. It offers an unparalleled opportunity to meet and mingle with the leaders of the system administration industry. The goal of this conference is to provide attendees with the practical information they need to succeed in their jobs. Information is arranged in a "learn it today—use it tomorrow" format.
The theme for LISA '09 is "Putting Theory into Practice."
Join us in San Francisco, CA, February 24-27, 2009, for the 7th USENIX Conference on File and Storage Technologies. On Tuesday, February 24, FAST '09 offers ground-breaking file and storage tutorials by industry leaders such as Brent Welch, Marc Unangst, Simson Garfinkel, and more. This year's innovative 3-day technical program includes 23 technical papers, as well as a Keynote Address, Work-in-Progress Reports (WiPs), and a Poster Session. Don't miss out on opportunities for peer interaction on the topics that mean the most to you.
The December 2008 edition of ;login: is now available online. This issue features five security articles covering topics such as highly predictive blacklisting to threat analysis of a campus wireless network and more. This issue also contains reports from five of the USENIX conferences and columns by David N. Blank-Edelman and Peter Baer Galvin, just to name a few. Check it out here.