Conferences

Search results

    TitleConferenceSpeaker(s)
    Transforming Tier 1 Caterpillars to ButterfliesSREcon16Nina Mushiana
    Avoiding Cascading Failures at eBay?SREcon16Craig Fender, Ravindra Punati
    Less Alarming Alerts!SREcon16Robert Treat
    Shaping Reality to Shape Outcomes: Making SRE Work with Uber GrowthSREcon16Tom Croucher
    Panel: Who/What Is SRE?SREcon16
    Performance Checklists for SREsSREcon16Brendan Gregg
    Moving Large Workload from a Public Cloud to an OpenStack Private Cloud: Is It Really Worth It?SREcon16Nicolas Brousse
    The Evolution of Global Traffic Routing and FailoverSREcon16Aaron Heady
    Privacy Reliability Engineering: Looking at Privacy through the Lens of SRESREcon16Amber Yust
    Stepping Up to ScaleSREcon16
    Finding the Order in ChaosSREcon16
    SRE at a Start-Up: Lessons from LinkedInSREcon16Craig Sebenik
    Disrupting Nation State HackersEnigma 2016Rob Joyce
    Internet Voting: What Could Go Wrong?Enigma 2016J. Alex Halderman
    We Need Something Better—Building STAR VoteEnigma 2016Dana DeBeauvoir
    Verification, Auditing, and Evidence: If We Didn’t Notice Anything Wrong, Is the Election Outcome Right?Enigma 2016Vanessa Teague
    Timeless DebuggingEnigma 2016George Hotz
    A Million Hit Points and Infinite Charisma: How Games Can Fix Computer Security EducationEnigma 2016Zachary Peterson
    Capture the Flag: An Owner’s ManualEnigma 2016Vito Genovese
    Building a Competitive Hacking TeamEnigma 2016Tyler Nighswander
    Sanitize, Fuzz, and Harden Your C++ CodeEnigma 2016Kostya Serebryany
    ToStaticHTML for Everyone! About DOMPurify, Security in the DOM, and Why We Really Need BothEnigma 2016Mario Heiderich
    What Makes Software Exploitation Hard?Enigma 2016Ben Hawkes
    The Golden Age of Bulk SurveillanceEnigma 2016Nicholas Weaver
    Keys Under Doormats: Mandating Insecurity by Requiring Government Access to All Data and CommunicationsEnigma 2016Ron Rivest

Pages