Practical Doomsday
A thoughtful review of risks faced in developed countries, and what you can do to be prepared.
Authors: Rik Farrow
Article shepherded by: Rik Farrow
(How) Do people change their passwords after a breach?
Our research shows that many users ignore serious warnings about the need to change passwords and not reuse them.
Authors: Sruti Bhagavatula, Lujo Bauer, Apu Kapadia
Article shepherded by: Rik Farrow
It's Good to be Lazy
Taking good notes allows you to be lazy: you won't have to search for solutions to problems you have already solved before. I also suggest tools that help with note-taking.
Authors: Andreas Gerler
Article shepherded by: Rik Farrow
A Vulnerable System
An easy-to-read book covering the history of computer security.
Authors: Rik Farrow
Article shepherded by: Rik Farrow
Gazing into the VOID
Laura Nolan argues that reading incident reports can improve our ability to respond to production problems.
Authors: Laura Nolan
Article shepherded by: Effie Mouzeli
Improving On-call Fatigue
Daria argues the notion that "On-call shifts should be stressful and trying”, by suggesting ideas on how to spin on-call to be positive, educating, and bring teams together.
Authors: Daria Barteneva
Article shepherded by: Effie Mouzeli
Thirty-Five Years of LISA
With the LISA conference ending, the LISA Steering Committee decided to collect a history of the conference, that started in 1987 and end in 2021.
Authors: Cory Lueninghoener, Carolyn Rowland
Article shepherded by: Rik Farrow
Musings on Operating Systems Research
The lineup, followed by a discussion of Timothy Roscoe's keynote at OSDI and ATC 2021
Authors: Rik Farrow
Article shepherded by: Rik Farrow
Avoiding the 'SLOs as Reliability Theater' trap
Jacob Scott discusses some of the 'failure modes' that can happen when Service Level Objectives (SLOs) are imposed in a top-down fashion.
Authors: Jacob Scott
Article shepherded by: Laura Nolan
Kill It With Fire
Marianne Bellotti's Kill it With Fire is a book on legacy modernization, with a twist: it's written largely from an operations perspective.
Authors: Laura Nolan
Article shepherded by: Rik Farrow
Seeing like an SRE
Thomas Depierre argues that SRE can bridge the gap between high-level metrics that management requires and the contextual service-specific knowledge that engineering teams have.
Authors: Thomas Depierre
Article shepherded by: Laura Nolan
Interview with Vasily Tarasov
Vasily Tarasov explains his journey from Russia and Linux kernel work, to Stony Brook, then IBM, working with file systems.
Authors: Vasily Tarasov, Rik Farrow
Article shepherded by: Rik Farrow
Unikraft and the Coming of Age of Unikernels
Unikernels combine a program with the system call support needed to host the program in a VM without an OS; Unikraft adds features that make using it easy.
Authors: Hugo Lefeuvre, Gaulthier Gain, Daniel Dinca, Alexander Jung, Simon Kuenzer, Vlad Bădoiu, Răzvan Deaconescu , Laurent Mathy, Costin Raiciu, Pierre Olivier, Felipe Huici
Article shepherded by: Rik Farrow
Computer Graphics from Scratch
Gabriel Gambetta, a game developer and college instructor, teaches you how to write 3D shaders using simple and linear algebra and code examples.
Authors: Rik Farrow
Article shepherded by: Rik Farrow
Unikraft and the Coming of Age of Unikernels
Unikernels combine a program with the system call support needed to host the program in a VM without an OS; Unikraft adds features that make using it easy.
Authors: Hugo Lefeuvre, Gaulthier Gain, Daniel Dinca, Alexander Jung, Simon Kuenzer, Vlad Bădoiu, Răzvan Deaconescu , Laurent Mathy, Costin Raiciu, Pierre Olivier, Felipe Huici
Article shepherded by: Rik Farrow
Rethinking Service Systems
Revisiting old ideas about peer-assisted models for resource trading, the author investigates the use of cryptocurrencies for building decentralized services.
Authors: Ghada Almashaqbeh
Article shepherded by: Rik Farrow
High Velocity Kernel File Systems with Bento
Our new framework Bento enables high-velocity Linux kernel file system development. It enables file systems written in Rust and supports live upgrade and userspace debugging.
Authors: Samantha Miller, Kaiyuan Zhang, Mengqi Chen, Ryan Jennings, Ang Chen, Danyang Zhuo, Tom Anderson
Article shepherded by: Rik Farrow, Vijay Chidambaram
Interview with Ski Kacoroski about His Ransomware Experience
Ransomware should be easy to repair: just restore from backups, right? But attackers have been at this a long time and know how to make things difficult. Recovery is long.
Authors: Ski Kacoroski
Article shepherded by: Rik Farrow