| Women in Advanced Computing (WiAC) | LISA '13 | |
| Hyperscale Computing with ARM Servers | LISA '13 | |
| HotSnap: A Hot Distributed Snapshot System For Virtual Machine Cluster | LISA '13 | Lei Cui, Bo Li, Yangyang Zhang, Jianxin Li |
| Supporting Undoability in Systems Operations | LISA '13 | Ingo Weber, Hiroshi Wada, Alan Fekete, Anna Liu, Len Bass |
| Back to the Future: Fault-tolerant Live Update with Time-traveling State Transfer | LISA '13 | Cristiano Giuffrida, Calin Iorgulescu, Anton Kuijsten, Andrew S. Tanenbaum |
| Hacking your Mind and Emotions | LISA '13 | Branson Matheson |
| The Efficacy of Cybersecurity Regulation: Examining the Impact of Law on Security Practices | LISA '13 | |
| A Guide to SDN: Building DevOps for Networks | LISA '13 | |
| Enterprise Architecture Beyond the Perimeter | LISA '13 | |
| Drifting into Fragility | LISA '13 | |
| Installation of an External Lustre Filesystem using Cray esMS management and Lustre 1.8.6 | LISA '13 | Patrick Webb |
| ZFS for Everyone | LISA '13 | |
| Manta Storage System Internals | LISA '13 | |
| Rethinking Dogma: Musings on the Future of Security | LISA '13 | |
| Futures | LISA '13 | |
| Managing Macs at Google Scale | LISA '13 | |
| OS X Hardening: Securing a Large Global Mac Fleet | LISA '13 | |
| Apache Hadoop for System Administrators | LISA '13 | |
| Optimizing VM Images for OpenStack with KVM/QEMU Fall 2013 | LISA '13 | |
| Cloud/IaaS Platforms: I/O Virtualization and Scheduling | LISA '13 | |
| Cluster Management at Google | LISA '13 | |
| Scaling User Security: Lessons Learned from Shipping Security Features at Etsy | LISA '13 | |
| Building Large Scale Services | LISA '13 | |
| Managing Access Using SSH Keys | LISA '13 | |
| Secure Linux Containers | LISA '13 | |