


default search action
26th LISA 2012: San Diego, CA, USA
- Carolyn Rowland:
Strategies, Tools , and Techniques: Proceedings of the 26th Large Installation System Administration Conference, LISA 2012, San Diego, CA, USA, December 9-14, 2012. USENIX Association 2012
Storage and Data
- Daniel Pollack:
A Simple File Storage System for Web Applications. 1-15 - Suzhen Wu, Hong Jiang, Bo Mao:
IDO: Intelligent Data Outsourcing with Improved RAID Reconstruction Performance in Large-Scale Data Centers. 17-32 - Elmer Garduño, Soila Kavulya, Jiaqi Tan, Rajeev Gandhi, Priya Narasimhan:
Theia: Visual Signatures for Problem Diagnosis in Large Hadoop Clusters. 33-42
Security and Systems Management
- Tim Bell:
Lessons in iOS Device Configuration Management. 43-49 - John A. Hewson, Paul Anderson, Andrew D. Gordon:
A Declarative Approach to Automated Configuration. 51-66 - Chuan Yue:
Preventing the Revealing of Online Passwords to Inappropriate Websites with LoginInspector. 67-81
Tools You Can Use
- Gabriel A. Weaver, Sean W. Smith:
XUTools: Unix Commands for Processing Next-Generation Structured Text. 83-99 - Andrew Stromme, Danica J. Sutherland, Nicholas Felt, Alex Burka, Benjamin Lipton, Rebecca Roelofs, Daniel-Elia Feist-Alexandrov, Steve Dini, Allen Welkie:
Managing User Requests With the Grand Unified Task System (GUTS). 101-110 - Vangelis Tasoulas, Hårek Haugerud, Kyrre M. Begnum:
Bayllocator: A Proactive System to Predict Server Utilization and Dynamically Allocate Memory Resources Using Bayesian Networks and Ballooning. 111-121
Community and Teaching
- Rudy Gaevart:
A Sustainable Model for ICT Capacity Building in Developing Countries. 123-134 - Steve VanDevender:
Teaching System Administration. 135-141 - George William Herbert:
Training and Professional Development in an IT Community. 143-152
If You Can't Monitor It, You Can't Manage It
- Jonathan Reams:
Extensible Monitoring with Nagios and Messaging Middleware. 153-162 - Lautaro Dolberg, Jérôme François, Thomas Engel:
Efficient Multidimensional Aggregation for Large Scale Monitoring. 163-180 - Barry W. Peddycord III, Peng Ning, Sushil Jajodia:
On the Accurate Identification of Network Service Dependencies in Distributed Systems. 181-194
Content, Communication, and Collecting
- Julian Dunn, Blake Crosby:
What Your CDN Won't Tell You: Optimizing a News Website for Speed and Stability. 195-201 - David Lang:
Building a 100K log/sec Logging Infrastructure. 203-213 - Rudi van Drunen:
Building a Protocol Validator for Business to Business Communications. 215-222
Invited Talks 3
- Scott Rose:
DNSSEC Deployment in .gov: Progress and Lessons Learned. 223-228
If You Build It They Will Come
- Rudi van Drunen:
Building the Network Infrastructure for the International Mathematics Olympiad. 229-236 - Andrew Keen:
Lessons Learned When Building a Greenfield High Performance Computing Ecosystem. 237-245 - David Lang:
Building a Wireless Network for a High Density of Users. 247-256

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.