USENIX logo
A whole new look is coming
Check back again soon!

Multimedia

Search results

    TitleConferenceSpeaker(s)
    How a Single API Endpoint Saved Us 3000 CPUSREcon24 Europe/Middle East/AfricaLasse Hels
    AppStack: An Open Source Cloud Native Platform for Running Digital Public ServicesSREcon24 Europe/Middle East/AfricaDimitris Mitropoulos, Alex Kiousis
    Red Tide RevertSREcon24 Europe/Middle East/AfricaDavid Newman
    Dude, You Forgot the Feedback: How Your Open Loop Control Planes Are Causing OutagesSREcon24 Europe/Middle East/AfricaLaura de Vesine
    Anomaly Detection in Time Series from Scratch Using Statistical AnalysisSREcon24 Europe/Middle East/AfricaIvan Shubin
    Survivor: MySQL Island – Outwit, Outplay, Outlast Metadata Locking ChallengesSREcon24 Europe/Middle East/AfricaJulia Jablonska
    Achieving Excellence: SLO Thresholds That Transform Service QualitySREcon24 Europe/Middle East/AfricaThiara Ortiz
    Rock around the Clock (Synchronization): Improve Performance with High Precision Time!SREcon24 Europe/Middle East/AfricaLerna Ekmekcioglu
    Taming Noisy Benchmark Results Using Change Point DetectionSREcon24 Europe/Middle East/AfricaMatt Fleming
    When SRE and Security Teams Meet to Face a CrisisSREcon24 Europe/Middle East/AfricaJR Aquino
    SRE Stakeholders: A Spotter’s GuideSREcon24 Europe/Middle East/AfricaDave O'Connor
    Sailing the Database Seas: Applying SRE Principles at ScaleSREcon24 Europe/Middle East/AfricaIoannis Androulidakis, Martin Alderete
    Science Reliability Engineering for High Performance ComputingSREcon24 Europe/Middle East/AfricaNicholas Jones
    Enabling Product Scalability through Load TestingSREcon24 Europe/Middle East/AfricaMonica Baluna, Ehab Tawfik
    Generative AI: Beyond (Just) HypeSREcon24 Europe/Middle East/AfricaTodd Underwood
    Mnemonic Rules for Eponymous Laws or: There’s a Law for That!SREcon24 Europe/Middle East/AfricaPeter Burkholder
    Treat Your Code as a Crime SceneSREcon24 Europe/Middle East/AfricaAdam Tornhill
    Panel Discussion: Is Reliability a Luxury Good?SREcon24 Europe/Middle East/AfricaEmil Stolarsky, Andrew Ellam, Niall Murphy, Joan O'Callaghan, Avleen Vig
    Managing the Risk of Software Supply Chain AttacksSREcon24 Europe/Middle East/AfricaMark Hahn
    Fixing Your Noisy Pager in 500 Easy StepsSREcon24 Europe/Middle East/AfricaChris Sinjakli
    Enhancing Elasticsearch Performance: Innovative Reindexing Strategies Using Dedicated Nodes and KEDA AutoscalersSREcon24 Europe/Middle East/AfricaLeila Vayghan
    An Exploration in Storing Telemetry in Cloud Object StorageSREcon24 Europe/Middle East/AfricaMike Heffner, Ray Jenkins
    Are We Really Engineers?SREcon24 Europe/Middle East/AfricaHillel Wayne
    From PIDs to Pods: The Life Cycle of an eBPF-Autoinstrumented ApplicationSREcon24 Europe/Middle East/AfricaMarc Tudurí
    I Can OIDC You Clearly Now: How We Made Static Credentials a Thing of the PastSREcon24 Europe/Middle East/AfricaIain Lane, Dimitris Sotirakis

    Pages