You are here

USENIX is fully committed to the Open Access to research movement. To that end, all videos of conference technical session presentations are now available to the general public on the USENIX website shortly after they take place. In addition, we have offered free online access to conference proceedings since 2008. Visit our proceedings page to check out the latest papers.

Interested in helping us support Open Access at USENIX? Become a member today!

To find a specific conference's videos, begin by filtering by conference group and then filter by conference.

Filter by Conference Group


    System Administration: Drowning in Management ComplexityLISA '06Chad Verbowski
    Corporate Security: A Hacker PerspectiveLISA '06Mark "Simple Nomad" Loveless
    The Future of System Administration: How to Stop Worrying and Learn to Love Self-Managing SystemsLISA '06Alva L. Couch
    The NMI Build & Test Laboratory: Continuous Integration Framework for Distributed Computing Software LISA '06Andrew Pavlo, Peter Couvares, Rebekah Gietzel, Anatoly Karp, Ian D. Alderman, Miron Livny, Charles Bacon
    Unifying Unified Voice Messaging LISA '06Jon Finke
    Fighting Institutional Memory Loss: The Trackle Integrated Issue and Solution Tracking System LISA '06Daniel S. Crosta, Matthew J. Singleton, Benjamin A. Kuperman
    Zombies and Botnets: Attacks on Messaging Security by Organized Criminal EnterprisesLISA '06Dmitri Alperovitch
    Power-Managed Storage: Longer Data Life and Lower Energy ConsumptionLISA '06Aloke Guha
    Black Ops 2006: Pattern RecognitionLISA '06Dan Kaminsky
    Seriously, Tape-Only Backup Systems Are DeadLISA '06W. Curtis Preston
    NAF: The NetSA Aggregated Flow Tool Suite LISA '06Brian Trammell, Carrie Gates
    Interactive Network Management Visualization with SVG and AJAX LISA '06Athanasios Douitsis, Dimitrios Kalogeras
    Bridging the Host-Network Divide: Survey, Taxonomy, and Solution LISA '06Glenn A. Fink, Vyas Duggirala, Ricardo Correa, Chris North
    The Last, Best Hope: Sysadmins and DBAs as the Last Guardians of PrivacyLISA '06Danny O'Brien
    Command and Control: System Administration at U.S. Central CommandLISA '06Andrew Seely
    LiveOps: Systems Management as a Service LISA '06Chad Verbowski, Juhan Lee, Xiaogang Liu, Roussi Roussev, Yi-Min Wang
    Managing Large Networks of Virtual Machines LISA '06Kyrre Begnum
    Directing Change Using Bcfg2 LISA '06Rick Bradshaw, Cory Lueninghoener
    High Availability: From Luxury to Commonplace Necessity in 10 YearsLISA '06Eric Hennessey
    What Do You Mean, Identity 2.0?LISA '06Cat Okita
    Windows XP Kernel Crash Analysis LISA '06Archana Ganapathi, Viji Ganapathi, David Patterson
    SUEZ: A Distributed Safe Execution Environment for System Administration Trials LISA '06Doo San Sim, V.N. Venkatakrishnan
    WinResMon: A Tool for Discovering Software Dependencies, Configuration and Requirements in Microsoft Windows LISA '06Rajiv Ramnath, Sufatrio , Roland H. C. Yap, Wu Yongzheng
    Perfect Data in an Imperfect WorldLISA '06Daniel V. Klein