;login:
 ;login: online
 
 Unrestricted ;login: Content
 
 Open Articles
 Book Reviews
 Conference Reports
 Musings
 Standards Reports
 USENIX Notes
 Why the Semicolon?
 Advertising
 Writing for ;login:
 
 Schedule

;login: Open Articles

Each issue of ;login: contains material that is free to everyone from the get-go, even though most of the issue is restricted to members for a year after publication. The editor's Musings or MOTD, Book Reviews, USENIX Notes, Conference Reports, and Standards Reports are always open to everyone. In addition, each issue since 2004 contains one or more articles of broad interest that are made available to all. For your convenience, we have collected them for you here.

2012

Btrfs: The Swiss Army Knife of Storage by Josef Bacik

2011

The Halting Problems of Network Stack Insecurity by Len Sassaman, Meredith L. Patterson, Sergey Bratus, and Anna Shubina

NoSQL by Greg Burd

A RESTful Web Service for Internet Name and Address Directory Services by Andrew Newton, Dave Piscitello, Benedetto Fiorelli, and Steve Sheng

Mesos: Flexible Resource Sharing for the Cloud by Benjamin Hindman, Andy Konwinski, Matei Zaharia, Ali Ghodsi, Anthony D. Joseph, Randy H. Katz, Scott Shenker, and Ion Stoica

LISA '11: Theme—"DevOps: New Challenges, Proven Values" by Thomas A. Limoncelli and Doug Hughes

Apache Hadoop: The Scalability Update by Konstantin V. Shvachko

Getting Started with Configuration Management by Cory Lueninghoener

Namespace Management in Virtual Desktops by Dutch T. Meyer, Jake Wires, Norman C. Hutchinson, and Andrew Warfield

2010

Introducing Capsicum: Practical Capabilities for UNIX by Robert N.M. Watson, Jonathan Anderson, Ben Laurie, and Kris Kennaway

A System Administration Parable: The Waitress and the Water Glass by Thomas A. Limoncelli

Ceph as a Scalable Alternative to the Hadoop Distributed File System by Carlos Maltzahn, Esteban Molina-Estolano, Amandeep Khurana, Alex J. Nelson, Scott A. Brandt, and Sage Weil

MINIX 3: Status Report and Current Research by Andrew Tanenbaum, Raja Appuswamy, Herbert Bos, Lorenzo Cavallaro, Cristiano Giuffrida, Tomáš Hrubý, Jorrit Herder, Erik van der Kouwe, and David van Moolenbroek

LISA: Beginning the Journey by Matt Simmons

HDFS Scalability: The Limits to Growth by Konstantin V. Shvachko

Building and Installing a Hadoop/Mapreduce Cluster from Commodity Components: A Case Study by Jochen L. Leidner and Gary Berosik

2009

The Conflicts Facing Those Responding to Cyberconflict by David Dittrich

Improving TCP Security with Robust Cookies by Perry Metzger, William Allen Simpson, and Paul Vixie

Chips and Static Electricity by Rudi Van Drunen

Cumulus: Filesystem Backup to the Cloud by Michael Vrable, Stefan Savage, and Geoffrey M. Voelker

Secure Provenance: Protecting the Genealogy of Bits by Ragib Hasan, Radu Sion, and Marianne Winslett

Difference Engine by Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, and Amin Vahdat

Package Managers Still Vulnerable: How to Protect Your Systems by Justin Samuel and Justin Cappos

2008

Masquerade: Simulating a Thousand Victims by Sam Small, Joshua Mason, Ryan MacArthur, and Fabian Monrose

Solaris Virtualization Options by Wenjin Hu, Todd Deshane, and Jeanna Matthews

Benchmarking Amazon EC2 for High-Performance Scientific Computing by Edward Walker

"Standard Deviations" of the Average System Administrator by Alva Couch

Storm: When Researchers Collide by Brandon Enright, Geoff Voelker, Stefan Savage, Chris Kanich, and Kiril Levchenko

Data Corruption in the Storage Stack: A Closer Look by Lakshmi Bairavasundaram, Garth Goodson, Bianca Schroeder, Andrea Arpaci-Dusseau, and Remzi Arpaci-Dusseau

The Present and Future of SAN/NAS: Interview with Dave Hitz and Brian Pawlowsky of NetApp Interview by Margo Seltzer (The full transcript of the interview is also available.)

IPv6: It's Time to Make the Move by Mark Kosters and Megan Kruse

Achieving High Performance by Targeting Multiple Parallelism Mechanisms by Michael D. McCool

Fear and Loathing in the Routing System by Joe Abley

From x=1 to (setf x 1): What Does Configuration Management Mean? by Alva Couch

2007

Command and Control Structures in Malware: From Handler/Agent to P2P by David Dittrich and Sven Dietrich

Why Some Dead OSes Still Matter by Andrey Mirtchovski and Latchesar Ionkov

Building BitTyrant, a (More) Strategic BitTorrent Client by Michael Piatek, Tomas Isdal, Tom Anderson, Arvind Krishnamurthy, and Arun Venkataramani

A Brief History of the BSD Fast File System by Marshall Kirk McKusick

Ext4: The Next Generation of the Ext3 File System by Avantika Mathur, Mingming Cao, and Andreas Dilger

Autonomic Computing: Freedom or Threat? by Glenn Fink and Deb Frincke

Commodity Grid Computing with Amazon's S3 and EC2 by Simson Garfinkel

Roadmap to a Failure-Resilient Operating System by Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, and Andrew S. Tanenbaum

2006

The Underground Economy: Priceless by Team Cymru

Algorithms for the 21st Century by Stephen C. Johnson

DataMonster: Building a Cost-Effective, High-Speed, Heterogeneous Shared File System by Mark Uris

A Comparison of Disk Drives for Enterprise Computing by Kurt Chan

Disks from the Perspective of a File System by Marshall Kirk McKusick

Modular System Programming in MINIX 3 by Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, and Andrew S Tanenbaum

/dev/random by Robert G. Ferrell

Why Configuration Management Is Crucial by Paul Anderson

2005

Monoculture on the Back of the Envelope by Dan Geer

A Summary of Savvy Backbone Defense by Raven Alder

DNS-based Spam Rejection by Hobbit

Primer on Cybercrime Laws by Daniel L. Appelman

Musings by Rik Farrow

Finding Malware on Compromised Windows Machines

Musings by Rik Farrow

SAGE-News Article on SCO Defacement by Rob Kolstad

Voice over IP with Asterisk by Heison Chak

The Profession of System Administration by Mark Burgess

?Need help?

Last changed: 17 Feb. 2012 jel
;login: home
USENIX home