Conferences

Search results

    TitleConferenceSpeaker(s)
    What's on the Horizon?SaTCPI ’15
    Ethics in Security and Privacy ResearchSaTCPI ’15
    Educating EveryoneSaTCPI ’15
    T.S. Kuhn RevisitedSaTCPI ’15
    Ideas to InnovationsSaTCPI ’15
    Security and Privacy Challenges in Health InformaticsSaTCPI ’15
    Future of PrivacySaTCPI ’15
    Keynote AddressSaTCPI ’15
    SaTC 2029?SaTCPI ’15
    Rapid-Fire Cross-CollaborationsSaTCPI ’15
    SaTCPI '15 Opening Session 01/07/2015SaTCPI ’15
    Transforming to a Culture of Continuous ImprovementLISA14Courtney Kissler
    The Top 5 Things I Learned While Building Anomaly Detection Algorithms for IT OpsLISA14Toufic Boubez
    Why Test Driven Development Works for SysAdminsLISA14Garrett Honeycutt
    Is Your Team Instrument Rated? (Or Deploying 89,000 Times per Day)LISA14J. Paul Reed
    Linux Performance Analysis: New Tools and Old SecretsLISA14Brendan Gregg
    Testing Storage Systems: Methodology and Common PitfallsLISA14John Constable
    IP Traffic Visualizers from Utah State UniversityLISA14Eldon Koyle
    Developers and Application Security: Who is Responsible? LISA14Mark Miller
    Getting a Hold of the Hype: Making Containers Useful with Project AtomicLISA14Brian Proffitt
    Gauges, Counters, and Ratios, Oh My!LISA14Caskey L. Dickson
    High-Speed Network Traffic Monitoring Using ntopngLISA14Luca Deri
    Keep it Simple, Stupid: Why the Usual Password Policies Don't Work, and What to Do About ItLISA14Abe Singer, Warren Anderson
    Taming Operations in the Apache Hadoop EcosystemLISA14Kathleen Ting, Jonathan Hsieh
    I Am SysAdmin (And So Can You!)LISA14Ben Rockwood

Pages