Multimedia

Search results

    TitleConferenceSpeaker(s)
    When One Line Took Thousands of Websites OfflineSREcon23 Europe/Middle East/AfricaFrancisco Borges Aurindo Barros, Jack Henschel
    Journey from Fluent Bit, Fluentd and Prometheus to OpenTelemetry Collector - Lessons LearnedSREcon23 Europe/Middle East/AfricaMarcin "Perk" Stożek
    How to Make Your Automation a Better Team PlayerSREcon23 Europe/Middle East/AfricaLaura Nolan
    The World Blew Up but We’re All Okay: How We Managed a Massive-scale Incident at DatadogSREcon23 Europe/Middle East/AfricaLaura de Vesine, Laurent Bernaille
    The Engineer/Manager Pendulum Goes MainstreamSREcon23 Europe/Middle East/AfricaCharity Majors
    Scaling Chef EmotionallySREcon23 Europe/Middle East/AfricaBrett Pemberton
    The Incident Is The Way: Using Your Incidents to Win Reliability InvestmentSREcon23 Europe/Middle East/AfricaNiall McCarthy
    Embracing the Multi-Party Dilemma: Incident Response Across Company BoundariesSREcon23 Europe/Middle East/AfricaSarah Butt, Alex Elman
    Reliable Data for Large ML Models: Principles and PracticesSREcon23 Europe/Middle East/AfricaMary McGlohon
    Looking at SRE Needs and Trends over Two Decades with a Single ServiceSREcon23 Europe/Middle East/AfricaSalim Virji, Murali Suriar
    When Clouds Stop Raining Discounts: Surviving the DroughtSREcon23 Europe/Middle East/AfricaMax Blaze
    Over, Under, Around, and Through: A Detailed Comparison of QUIC and HTTP/3 Application Mapping vs. Protocol EncapsulationSREcon23 Europe/Middle East/AfricaLucas Pardue
    New Grads Becoming New SREs: Catalyzing a “Circle of Life” in IrelandSREcon23 Europe/Middle East/AfricaJennifer Petoff, Catalina Rete
    Implementing SRE in a Telco with Reliability Enhancing ProceduresSREcon23 Europe/Middle East/AfricaFlorian Kammermann, Romain Bonjour
    From Sysadmins to (almost) Flying UnicornsSREcon23 Europe/Middle East/AfricaGuillaume Hérail, Gilberto Müller
    "Stalking is immoral but not illegal": Understanding Security, Cyber Crimes and Threats in PakistanSOUPS 2023Afaq Ashraf, - Taha, Nida ul Habib Bajwa, Cornelius J. König, Mobin Javed, Maryam Mustafa
    Lost in Conversion: Exploit Data Structure Conversion with Attribute Loss to Break Android SystemsUSENIX Security '23Rui Li, Wenrui Diao, Shishuai Yang, Xiangyu Liu, Shanqing Guo, Kehuan Zhang
    Practical Intent-driven Routing Configuration SynthesisNSDI '23Sivaramakrishnan Ramanathan, Ying Zhang, Mohab Gawish, Yogesh Mundada, Zhaodong Wang, Sangki Yun, Eric Lippert, Walid Taha, Minlan Yu, Jelena Mirkovic
    Intender: Fuzzing Intent-Based Networking with Intent-State Transition GuidanceUSENIX Security '23Jiwon Kim, Benjamin E. Ujcich, Dave (Jing) Tian
    "Would You Give the Same Priority to the Bank and a Game? I Do Not!" Exploring Credential Management Strategies and Obstacles during Password Manager SetupSOUPS 2023Sabrina Amft, Sandra Höltervennhoff, Nicolas Huaman, Yasemin Acar, Sascha Fahl
    Securing and Standardizing Data Rights Requests with a Data Rights ProtocolPEPR '23Ryan Rix
    Privacy Requirements and Realities of Digital Public GoodsPEPR '23Geetika Gopi
    Demystifying Access Control in the Modern Data WarehousePEPR '23Viraj Thakur
    Bad Metrics and Very Bad DecisionsPEPR '23Lea Kissner
    De-identified, Anonymized, or Aggregated? A Look around the GlobePEPR '23Katharina Koerner

Pages