Conferences

Search results

    TitleConferenceSpeaker(s)
    Women in Advanced Computing (WiAC)LISA '13
    Hyperscale Computing with ARM ServersLISA '13
    HotSnap: A Hot Distributed Snapshot System For Virtual Machine ClusterLISA '13Lei Cui, Bo Li, Yangyang Zhang, Jianxin Li
    Supporting Undoability in Systems OperationsLISA '13Ingo Weber, Hiroshi Wada, Alan Fekete, Anna Liu, Len Bass
    Back to the Future: Fault-tolerant Live Update with Time-traveling State TransferLISA '13Cristiano Giuffrida, Calin Iorgulescu, Anton Kuijsten, Andrew S. Tanenbaum
    Hacking your Mind and EmotionsLISA '13Branson Matheson
    The Efficacy of Cybersecurity Regulation: Examining the Impact of Law on Security PracticesLISA '13
    A Guide to SDN: Building DevOps for NetworksLISA '13
    Enterprise Architecture Beyond the PerimeterLISA '13
    Drifting into FragilityLISA '13
    Installation of an External Lustre Filesystem using Cray esMS management and Lustre 1.8.6LISA '13Patrick Webb
    ZFS for EveryoneLISA '13
    Manta Storage System InternalsLISA '13
    Rethinking Dogma: Musings on the Future of SecurityLISA '13
    FuturesLISA '13
    Managing Macs at Google ScaleLISA '13
    OS X Hardening: Securing a Large Global Mac FleetLISA '13
    Apache Hadoop for System AdministratorsLISA '13
    Optimizing VM Images for OpenStack with KVM/QEMU Fall 2013LISA '13
    Cloud/IaaS Platforms: I/O Virtualization and SchedulingLISA '13
    Cluster Management at GoogleLISA '13
    Scaling User Security: Lessons Learned from Shipping Security Features at EtsyLISA '13
    Building Large Scale ServicesLISA '13
    Managing Access Using SSH KeysLISA '13
    Secure Linux ContainersLISA '13

Pages