Squeezing the Cybersecurity Lemons – A Labeling Regime for IoT Products
IoT security labels must be developed accounting for the diversity of devices and deployment contexts, the sustainability of labeling regimes, and the user experience of consumers.
Authors: Vaibhav Garg, Andreas Kuehn
Article shepherded by: Rik Farrow
Practical Doomsday
A thoughtful review of risks faced in developed countries, and what you can do to be prepared.
Authors: Rik Farrow
Article shepherded by: Rik Farrow
(How) Do people change their passwords after a breach?
Our research shows that many users ignore serious warnings about the need to change passwords and not reuse them.
Authors: Sruti Bhagavatula, Lujo Bauer, Apu Kapadia
Article shepherded by: Rik Farrow
It's Good to be Lazy
Taking good notes allows you to be lazy: you won't have to search for solutions to problems you have already solved before. I also suggest tools that help with note-taking.
Authors: Andreas Gerler
Article shepherded by: Rik Farrow
A Vulnerable System
An easy-to-read book covering the history of computer security.
Authors: Rik Farrow
Article shepherded by: Rik Farrow
Gazing into the VOID
Laura Nolan argues that reading incident reports can improve our ability to respond to production problems.
Authors: Laura Nolan
Article shepherded by: Effie Mouzeli
Improving On-call Fatigue
Daria argues the notion that "On-call shifts should be stressful and trying”, by suggesting ideas on how to spin on-call to be positive, educating, and bring teams together.
Authors: Daria Barteneva
Article shepherded by: Effie Mouzeli
Thirty-Five Years of LISA
With the LISA conference ending, the LISA Steering Committee decided to collect a history of the conference, that started in 1987 and end in 2021.
Authors: Cory Lueninghoener, Carolyn Rowland
Article shepherded by: Rik Farrow
Musings on Operating Systems Research
The lineup, followed by a discussion of Timothy Roscoe's keynote at OSDI and ATC 2021
Authors: Rik Farrow
Article shepherded by: Rik Farrow
Avoiding the 'SLOs as Reliability Theater' trap
Jacob Scott discusses some of the 'failure modes' that can happen when Service Level Objectives (SLOs) are imposed in a top-down fashion.
Authors: Jacob Scott
Article shepherded by: Laura Nolan
Kill It With Fire
Marianne Bellotti's Kill it With Fire is a book on legacy modernization, with a twist: it's written largely from an operations perspective.
Authors: Laura Nolan
Article shepherded by: Rik Farrow
Seeing like an SRE
Thomas Depierre argues that SRE can bridge the gap between high-level metrics that management requires and the contextual service-specific knowledge that engineering teams have.
Authors: Thomas Depierre
Article shepherded by: Laura Nolan
Interview with Vasily Tarasov
Vasily Tarasov explains his journey from Russia and Linux kernel work, to Stony Brook, then IBM, working with file systems.
Authors: Vasily Tarasov, Rik Farrow
Article shepherded by: Rik Farrow
Unikraft and the Coming of Age of Unikernels
Unikernels combine a program with the system call support needed to host the program in a VM without an OS; Unikraft adds features that make using it easy.
Authors: Hugo Lefeuvre, Gaulthier Gain, Daniel Dinca, Alexander Jung, Simon Kuenzer, Vlad Bădoiu, Răzvan Deaconescu , Laurent Mathy, Costin Raiciu, Pierre Olivier, Felipe Huici
Article shepherded by: Rik Farrow
Computer Graphics from Scratch
Gabriel Gambetta, a game developer and college instructor, teaches you how to write 3D shaders using simple and linear algebra and code examples.
Authors: Rik Farrow
Article shepherded by: Rik Farrow
Unikraft and the Coming of Age of Unikernels
Unikernels combine a program with the system call support needed to host the program in a VM without an OS; Unikraft adds features that make using it easy.
Authors: Hugo Lefeuvre, Gaulthier Gain, Daniel Dinca, Alexander Jung, Simon Kuenzer, Vlad Bădoiu, Răzvan Deaconescu , Laurent Mathy, Costin Raiciu, Pierre Olivier, Felipe Huici
Article shepherded by: Rik Farrow
Rethinking Service Systems
Revisiting old ideas about peer-assisted models for resource trading, the author investigates the use of cryptocurrencies for building decentralized services.
Authors: Ghada Almashaqbeh
Article shepherded by: Rik Farrow
High Velocity Kernel File Systems with Bento
Our new framework Bento enables high-velocity Linux kernel file system development. It enables file systems written in Rust and supports live upgrade and userspace debugging.
Authors: Samantha Miller, Kaiyuan Zhang, Mengqi Chen, Ryan Jennings, Ang Chen, Danyang Zhuo, Tom Anderson
Article shepherded by: Rik Farrow, Vijay Chidambaram