Search results

    When One Line Took Thousands of Websites OfflineSREcon23 Europe/Middle East/AfricaFrancisco Borges Aurindo Barros, Jack Henschel
    Journey from Fluent Bit, Fluentd and Prometheus to OpenTelemetry Collector - Lessons LearnedSREcon23 Europe/Middle East/AfricaMarcin "Perk" Stożek
    How to Make Your Automation a Better Team PlayerSREcon23 Europe/Middle East/AfricaLaura Nolan
    The World Blew Up but We’re All Okay: How We Managed a Massive-scale Incident at DatadogSREcon23 Europe/Middle East/AfricaLaura de Vesine, Laurent Bernaille
    The Engineer/Manager Pendulum Goes MainstreamSREcon23 Europe/Middle East/AfricaCharity Majors
    Practical Intent-driven Routing Configuration SynthesisNSDI '23Sivaramakrishnan Ramanathan, Ying Zhang, Mohab Gawish, Yogesh Mundada, Zhaodong Wang, Sangki Yun, Eric Lippert, Walid Taha, Minlan Yu, Jelena Mirkovic
    "Stalking is immoral but not illegal": Understanding Security, Cyber Crimes and Threats in PakistanSOUPS 2023Afaq Ashraf, - Taha, Nida ul Habib Bajwa, Cornelius J. König, Mobin Javed, Maryam Mustafa
    Scaling Chef EmotionallySREcon23 Europe/Middle East/AfricaBrett Pemberton
    The Incident Is The Way: Using Your Incidents to Win Reliability InvestmentSREcon23 Europe/Middle East/AfricaNiall McCarthy
    Embracing the Multi-Party Dilemma: Incident Response Across Company BoundariesSREcon23 Europe/Middle East/AfricaSarah Butt, Alex Elman
    Lost in Conversion: Exploit Data Structure Conversion with Attribute Loss to Break Android SystemsUSENIX Security '23Rui Li, Wenrui Diao, Shishuai Yang, Xiangyu Liu, Shanqing Guo, Kehuan Zhang
    Reliable Data for Large ML Models: Principles and PracticesSREcon23 Europe/Middle East/AfricaMary McGlohon
    Looking at SRE Needs and Trends over Two Decades with a Single ServiceSREcon23 Europe/Middle East/AfricaSalim Virji, Murali Suriar
    When Clouds Stop Raining Discounts: Surviving the DroughtSREcon23 Europe/Middle East/AfricaMax Blaze
    ConfD: Analyzing Configuration Dependencies of File Systems for Fun and ProfitFAST '23Tabassum Mahmud, Om Rameshwar Gatla, Duo Zhang, Carson Love, Ryan Bumann, Mai Zheng
    Over, Under, Around, and Through: A Detailed Comparison of QUIC and HTTP/3 Application Mapping vs. Protocol EncapsulationSREcon23 Europe/Middle East/AfricaLucas Pardue
    New Grads Becoming New SREs: Catalyzing a “Circle of Life” in IrelandSREcon23 Europe/Middle East/AfricaJennifer Petoff, Catalina Rete
    Implementing SRE in a Telco with Reliability Enhancing ProceduresSREcon23 Europe/Middle East/AfricaFlorian Kammermann, Romain Bonjour
    From Sysadmins to (almost) Flying UnicornsSREcon23 Europe/Middle East/AfricaGuillaume Hérail, Gilberto Müller
    "Would You Give the Same Priority to the Bank and a Game? I Do Not!" Exploring Credential Management Strategies and Obstacles during Password Manager SetupSOUPS 2023Sabrina Amft, Sandra Höltervennhoff, Nicolas Huaman, Yasemin Acar, Sascha Fahl
    Intender: Fuzzing Intent-Based Networking with Intent-State Transition GuidanceUSENIX Security '23Jiwon Kim, Benjamin E. Ujcich, Dave (Jing) Tian
    SelfTune: Tuning Cluster ManagersNSDI '23Ajaykrishna Karthikeyan, Nagarajan Natarajan, Gagan Somashekar, Lei Zhao, Ranjita Bhagwan, Rodrigo Fonseca, Tatiana Racheva, Yogesh Bansal
    Building Dynamic Configuration into TerraformSREcon22 Europe/Middle East/AfricaIsabelle Miller, Hosh Sadiq
    Securing and Standardizing Data Rights Requests with a Data Rights ProtocolPEPR '23Ryan Rix
    "If I could do this, I feel anyone could:" The Design and Evaluation of a Secondary Authentication Factor ManagerUSENIX Security '23Garrett Smith, Tarun Yadav, Jonathan Dutson, Scott Ruoti, Kent Seamons