USENIX Blog

ServerSwitch: A Programmable and High Performance Platform for Data Center Networks

Paper presented by Guohan Lu, Chuanxiong Guo, Yulong Li, Zhiqiang Zhou, Tong Yuan, Haitao Wu, Yongqiang Xiong, Rui Gao, and Yongguang Zhang of Microsoft Research Asia at the 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI '11).

Recipient of the Best Paper Award.

Design, Implementation and Evaluation of Congestion Control for Multipath TCP

Paper presented by Damon Wischik, Costin Raiciu, Adam Greenhalgh, and Mark Handley of University College London at the 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI '11).

Recipient of the Best Paper Award.

Towards Street-Level Client-Independent IP Geolocation

Paper presented by Yong Wang of UESTC and Northwestern University; Daniel Burgener, Marcel Flores, and Aleksandar Kuzmanovic of Northwestern University; and Cheng Huang of Microsoft Research at the 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI '11).

Emulating Goliath Storage Systems with David

This refereed paper was presented by Nitin Agrawal of NEC Laboratories America; Leo Arulraj, Andrea C. Arpaci-Dusseau, and Remzi H. Arpaci-Dusseau of the University of Wisconsin—Madison at the 9th USENIX Conference on File and Storage Technologies (FAST '11).

Recipient of the Best Paper Award.

Reliably Erasing Data from Flash-Based Solid State Drives

This refereed paper was presented by Michael Wei, Laura Grupp, Frederick E. Spada, and Steven Swanson of the University of California, San Diego at the 9th USENIX Conference on File and Storage Technologies (FAST '11).

A Study of Practical Deduplication

This refereed paper was presented by Dutch T. Meyer of Microsoft Research and the University of British Columbia and William J. Bolosky of Microsoft Research at the 9th USENIX Conference on File and Storage Technologies (FAST '11).

Recipient of the Best Paper Award.

The end of LISA '10

Today is the last day of LISA '10.  It brings to a close a long week for everyone who made the conference happen.  As a first-time LISA attendee, I've found that there's just not enough time to take everything in.  The quality of the training and the technical sessions are amazing.  I feel like I need to repeat the week just to catch everything I missed.  One attendee called it a "firehose" conference and that's certainly an apt description.  It's easy to tell why there are so many regular attendees:  there's so much to learn and so many friends to make.

Postfix: Past, Present, and Future

Wietse Venema is best known for writing the Postfix email system; he also wrote TCP Wrapper, and SATAN that probably many system administrators have used for many years.

Birds of a Feather

One of the great things about LISA are the Birds of a Feather (BoF) sessions in the evenings.  BoFs are either vendor- or attendee-led discussions on topics of professional or social interest.   Since, like most sysadmins, I enjoy talking about my work, I decided to schedule a BoF for users of Condor.  Condor is an open-source package for distributed, high-throughput computing developed at the University of Wisconsin and used in academia, the financial sector, and by major motion picture studios.

Rethinking passwords

"We have to do better ... The bad guys are pros, they're just as good as you are and maybe better."  That's Bill Cheswick's message to the audience in his talk "Rethinking Passwords."  Comparing the password policies of various companies and educational institutions yields a confusing and sometimes contradictory set of requirements.  This makes managing passwords difficult for users.  Perhaps the solution doesn't lie in stronger passwords, but in better authentication?

Dictionary attacks are not the major the major threat anymore.  The common threats now are

Pages

Subscribe to USENIX Update