You are here

USENIX is fully committed to the Open Access to research movement. To that end, all videos of conference technical session presentations are now available to the general public on the USENIX website shortly after they take place. In addition, we have offered free online access to conference proceedings since 2008. Visit our proceedings page to check out the latest papers.

Interested in helping us support Open Access at USENIX? Become a member today!

To find a specific conference's videos, begin by filtering by conference group and then filter by conference.

Filter by Conference Group

Multimedia

    TitleConferenceSpeaker(s)
    Not Invented Here Syndrome and Dark Debt: The PagerDuty StorySREcon18 EuropeAish Raj Dahal
    SoundCloud's Story of Seeking Sustainable SRESREcon18 EuropeBjörn Rabenstein
    Halt and Don’t Catch FireSREcon18 EuropeEffie Mouzeli
    Know Your Kubernetes DeploysSREcon18 EuropeFelix Glaser
    Applying the Principles of Chaos to ServerlessSREcon18 EuropeYan Cui
    Dealing with Dark Debt: Lessons Learnt at Goldman SachsSREcon18 EuropeVanessa Yiu
    Lightning TalksSREcon18 Europe
    Against On-Call: A PolemicSREcon18 EuropeNiall Murphy
    Migrating Your Old Server Products to Be Stateless Cloud ServicesSREcon18 EuropeKurt Scherer, Craig Knott
    Your System Has Recovered from an Incident, but Have Your Developers?SREcon18 EuropeJaime Woo
    Impact of Network AutomationSREcon18 EuropeRoman Romanyak
    SRE for Mobile ApplicationsSREcon18 EuropeSamuel Littley
    Y2K and Other Disappointing Disasters: Risk Reduction and Harm MitigationSREcon18 EuropeHeidi Waterhouse
    Availability, Latency, and Cost: Withstanding Regional OutagesSREcon18 EuropeAaron Blohowiak
    The 7 Deadly Sins of DocumentationSREcon18 EuropeChastity Blackwell
    Sustainability Starts Early: Creating a Great Ops InternshipSREcon18 EuropeFatema Boxwala
    Migrations under Production Load: How to Switch Your Database without Disrupting ServiceSREcon18 EuropeVilde Opsal
    What Makes a Good SRE: Findings from the SRE SurveySREcon18 EuropeDawn Parzych
    The Silver Lining Consortium: Post-Mortems for the Rest of UsSREcon18 EuropeNiall Murphy
    Data Protection Update and Tales from the Introduction of the GDPRSREcon18 EuropeSimon McGarr
    SRE Theory vs. Practice: A Song of Ice and TireFireSREcon18 EuropeCorey Quinn, John Looney
    Circonus: Design (Failures) Case StudySREcon18 EuropeTheo Schlossnagle, Heinrich Hartmann
    Q: Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible? A: Because Keynote Speakers Make Bad Life Decisions and Are Poor Role ModelsUSENIX Security '18James Mickens
    Fear the Reaper: Characterization and Fast Detection of Card SkimmersUSENIX Security '18Nolen Scaife, Christian Peeters, Patrick Traynor
    BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power GridUSENIX Security '18Saleh Soltan, Prateek Mittal, H. Vincent Poor