"USENIX: the Advanced Computing Systems Association allows technicians, scientists, systems administrators and engineers to share information on developments in the field of computer science."
Joab Jackson,
GCN, 7.1.08
"The interactive session was designed to help the sysadmins in attendance solve their most pressing data center challenges, and some creative solutions were thrown around."
Bridget Botelho,
TechTarget, 6.27.08
"The USENIX LEET workshop held earlier this week in San Francisco offered neat insights into the Storm botnet, including two papers showing the difficulty of accurately measuring the botnet's size, and one on the way it conducts its spamming campaigns (down to the template language used). There was a bunch of other cool work too, so check out the papers."
Slashdot, 4.17.08
"The annual USENIX security symposium is a gathering place for all kinds of ideas: those on how to stop security flaws and those about what kinds of new security issues may emerge in the future."
Jeremy Reimer,
Ars Technica, 7.11.07
"Two bombshell papers released at the USENIX FAST '07 (File and Storage Technology) conference this week bring a welcome dose of reality to the basic building block of storage: the disk drive."
Robin Harris,
Computerworld, 2.21.07
"The 20th annual LISA (Large Installation System Administration) conference was held in Washington DC this year, from December 3rd to December 8th, continuing its tradition of excellent speakers, thought provoking side-topics and an all-around good time."
Charlie Schluting,
EnterpriseNetworkingPlanet.com, 12.14.06
"[T]he number of famous and significant leaders in the Unix and free software world I saw walking the hallways was impressive, and the line-up on the podiums was even more so."
Andy Oram,
O'Reilly Media, 06.02.06
"Some of the best Internet minds in the world met last week to discuss a wide range of methods to rid the Web of malicious traffic. The USENIX invitation-only workshop, called Steps to Reducing Unwanted Traffic on the Internet (SRUTI), brought together more than 50 academics from all over the world as well as technical staff from equipment vendors and ISPs to develop methods to cut down on spam, viruses, worms and distributed denial-of-service (DDoS) attacks - methods that are practical at an operational level."
Tim Greene,
ARNnet, 07.11.05
"USENIX conferences are not to be missed. The meetings were open technically, had topics that were well-thought out and ultimately created an environment of serious discussion. It's a great privilege to be with over 900 of the best and the brightest of technology."
George Rosamond,
Dæmon News, 07.04
"A respected computer users group has begun lobbying Congress to ignore arguments against open-source software made by Unix vendor The SCO Group."
Robert McMillan,
InfoWorld, 02.27.04
"[T]he quality and quantity of thoughtful and innovative work being demonstrated at BSDCon is nothing short of astonishing."
Michael W. Lucas,
Dæmon News, 09.03
"Large-scale systems must be secured from the bottom up with a layered approach of separately protecting the Internet, network system and site levels of activity, Akamai chief security architect Andrew Ellis said at the Usenix Security Symposium in Washington..."
Warren's Washington Internet Daily, 08.07.03
"One of my favorite conferences of the year is coming up. It's the USENIX [Annual] Technical Conference....The great thing about USENIX is it's not only Linux and free software. People with deep knowledge of both free and proprietary software attend. The result is neither free software world domination hype nor proprietary FUD stand a chance in the blazing light of USENIX scrutiny."
Don Marti, Editor in Chief, Linux Journal, 05.29.03
|
 |
Coverage of the 17th USENIX Security Symposium:
-
New Track-and-snap Anti-theft Software Roams Freely...and Privately
BetaNews, 9.26.08
-
Plug-in Opens Door for Self-signed SSL Certs in Firefox 3
SearchSecurity.com, 8.22.08
-
Russia and Georgia Continue AttacksOnline
CNET News.com, 8.12.08
-
No More Need for an Antivirus Software?
ZDNet.com, 8.12.08
-
Next-generation Computer Antivirus System Developed
ScienceDaily, 8.7.08
-
Now, Network Cloud for Next-generation Antivirus System
Thaindian News, 8.7.08
-
Firewall Pioneer Wanted a 'Super-secure' Blogging Service... So He's Built His Own
Network World, 8.5.08
-
Disk Encryption 'No Silver Bullet'
ZDNet.co.uk, 7.31.08
-
Phishing Kits Steal from Customers
The Tech Herald, 7.31.08
-
Researchers Reveal New Blacklisting Method
SearchSecurity.com, 7.31.08
-
Phishing Kits Widely Compromised to Steal from Phishers
InformationWeek, 7.31.08
-
Pure Digital's Flip Camcorder No. 1
The Tech Chronicles, SFGate.com, 7.31.08
-
'Hacktivism' Threatens World of Nations
The Register, 7.31.08
-
Most Drive-by Malware Comes from China, Google Says
CNET News.com, 7.30.08
-
Lost Laptops Get Open-source Rescue Service
ZDNet.co.uk, 7.30.08
-
Calif. Official Votes for Optical Scans, Hand Tallies
CNET News.com, 7.30.08
-
Most Drive-by Malware Comes from China, Google Says
CNET News.com, 7.30.08
-
Dr. Strangevote Saves Mankind with Luddite Voting Recipe
The Register, 7.30.08
-
One Way to Keep Track of Your Lost Laptop
The Tech Chronicles, SFGate.com, 7.28.08
-
Internet Blacklisting Tool Unveiled
Silicon.com, 7.28.08
-
PageRank-like Algorithm Creates Predictive Malware Blacklist
Ars Technica, 7.25.08
-
Researchers Redefine the Internet Blacklist
ZDNet.co.uk, 7.25.08
-
Attackers' Behavior Builds Better Blacklists
SecurityFocus, 7.24.08
-
Open Source Adeona Tracks Stolen laptops
p2pnet news, 7.23.08
-
Researchers Borrow from Google PageRank for Network Defense Service
ZDNet.com, 7.23.08
-
Data Can Leak From Partially Encrypted Disks
PC World, 7.16.08
-
New Service Tracks Missing Laptops for Free
InfoWorld, 7.14.08
Coverage of the HotSec '08: 3rd USENIX Workshop on Hot Topics in Security:
Coverage of the EVT '08: 2008 USENIX/ACCURATE Electronic Voting Technology Workshop:
Coverage of the 2008 USENIX Annual Technical Conference:
-
VMware Engineer Praises AMD's Nested Page Tables
SearchServerVirtualization.com, 7.21.08
-
Most Network Data Sits Untouched
GCN, 7.1.08
-
Serial Computing Is Dead; The Future Is Parallelism
SearchDataCenter.com, 6.30.08
-
The Data Center; A Sysadmin's Playground
TechTarget, 6.27.08
-
The JavaScript Work Turns at USENIX 2008
TechTarget, 6.27.08
-
VMware Pioneers Decoupled Dynamic Analysis
GCN, 6.26.08
-
Microsoft Exchange on Linux?!?
GCN, 6.26.08
-
Coming Soon: A Laptop in Your Pocket
Computerworld, 6.25.08
-
At USENIX '08, Worker Productivity Focus a Bone of Contention
TechTarget, 6.25.08
Coverage of NSDI '08:
5th USENIX Symposium on Networked Systems Design and Implementation:
-
ISPs Alter Web Traffic, Says Study
Web Host Industry Review, 4.18.08
-
Study Confirms ISPs Meddle With Web Traffic
Slashdot, 4.18.08
-
Remus: High Availability via Asynchronous Virtual Machine Replication
Virtualization.com, 4.16.08
-
ISPs Meddled With Their Customers' Web Traffic, Study Finds
PC World, 4.16.08
-
Internet Full of Cyberspace "Black Holes"
FOXNews.com, 4.11.08
-
Researchers Map Internet's "Black Holes"
Network World, 4.10.08
-
Research Reveals Internet "Black Holes"
Daily Tech, 4.9.08
-
Scientists Tackling Internet's "Black Holes"
Thaindian News, 4.9.08
-
Researchers Uncover Black Holes Across the Internet
TG Daily, 4.8.08

Coverage of LEET '08: First USENIX Workshop on Large-Scale Exploits and Emergent Threats:

Coverage of UPSEC '08: Usability, Psychology, and Security 2008:

Coverage of FAST '08: 6th USENIX Conference on File and Storage Technologies:
|