Conferences

Search results

    TitleConferenceSpeaker(s)
    SRE for [cyber]securitySREcon23 Europe/Middle East/AfricaNicolas Fischbach
    Designing Matrix: A Global Decentralised End-to-End Encrypted Communication NetworkSREcon23 Europe/Middle East/AfricaMatthew Hodgson
    Scaling Chef EmotionallySREcon23 Europe/Middle East/AfricaBrett Pemberton
    The Engineer/Manager Pendulum Goes MainstreamSREcon23 Europe/Middle East/AfricaCharity Majors
    Do Not Thrash the Node.js Event LoopSREcon23 Europe/Middle East/AfricaMatteo Collina
    Scale Your Future: An Immersive Engineering ProgrammeSREcon23 Europe/Middle East/AfricaRadha Kumari, Margarita Glushkova, Berkeli Halmyradov
    Deploying and Debugging HTTP/3SREcon23 Europe/Middle East/AfricaRobin Marx
    Over, Under, Around, and Through: A Detailed Comparison of QUIC and HTTP/3 Application Mapping vs. Protocol EncapsulationSREcon23 Europe/Middle East/AfricaLucas Pardue
    New Grads Becoming New SREs: Catalyzing a “Circle of Life” in IrelandSREcon23 Europe/Middle East/AfricaJennifer Petoff, Catalina Rete
    Reliable Data for Large ML Models: Principles and PracticesSREcon23 Europe/Middle East/AfricaMary McGlohon
    Implementing SRE in a Telco with Reliability Enhancing ProceduresSREcon23 Europe/Middle East/AfricaFlorian Kammermann, Romain Bonjour
    From Sysadmins to (almost) Flying UnicornsSREcon23 Europe/Middle East/AfricaGuillaume Hérail, Gilberto Müller
    Symptom-based Alerting for Machine Learning - What I Learned from Monitoring More than 30 Machine Learning Use CasesSREcon23 Europe/Middle East/AfricaLina Weichbrodt
    Building a 5-Exaflop Supercomputer for Meta-AI Research and Supporting Large-Scale Model Training with a Small Distributed Software and Production Engineering TeamSREcon23 Europe/Middle East/AfricaKalyan Saladi, Chris Bray
    eBPF Superpowers for SRESREcon23 Europe/Middle East/AfricaLiz Rice
    Privacy Requirements and Realities of Digital Public GoodsPEPR '23Geetika Gopi
    Confirmation Bias in the Privacy Profession: Common Misreading of the NIST Privacy FrameworkPEPR '23Nandita Rao Narla, R. Jason Cronk
    De-identified, Anonymized, or Aggregated? A Look around the GlobePEPR '23Katharina Koerner
    Beware, Data Processing! Proposing Categories for Risk Communication Related to the Processing of Personal DataPEPR '23Lukas Seiling
    The Missing Link in Privacy Risk AssessmentsPEPR '23Jared Maslin
    Putting Privacy on the MapPEPR '23Jayati Dev
    Designing for Privacy Needs of Bystanders in Smart Homes: A Systematic Review of RecommendationsPEPR '23Julia Bernd
    How Does AI Change Privacy? Towards Helping Practitioners Scope, Motivate, and Conduct Privacy Work for AI Products and ServicesPEPR '23Dr. Sauvik Das
    Spot the Fed: Mastodon, the Fediverse, and Why You Can't Run Servers Like It's 1999PEPR '23Tariq Yusuf
    Evolution of Privacy Pass at CloudflarePEPR '23Thibault Meunier

Pages