For the best experience on desktop, install the Chrome extension to track your reading on news.ycombinator.com
Hacker Newsnew | past | comments | ask | show | jobs | submit | history | fromregister
EM Eavesdropping Attack on Digital Microphones Using Pulse Density Modulation (usenix.org)
43 points by gnabgib 9 months ago | past | 4 comments
Large scale analysis of 100s of cache clusters at Twitter [pdf] (usenix.org)
1 point by emrah 10 months ago | past
Silent bugs matter: a study of compiler-introduced security bugs (usenix.org)
1 point by fanf2 10 months ago | past | 1 comment
AIOps: Prove It an Open Letter to Vendors Selling AI for SREs (usenix.org)
3 points by mooreds 10 months ago | past | 1 comment
Performance and Compatibility in the HongMeng Production Microkernel [pdf] (usenix.org)
4 points by rguiscard 10 months ago | past
Weaver Codes: Highly Fault Tolerant Erasure Codes for Storage Systems (2005) (usenix.org)
1 point by panrobo 10 months ago | past
Weaver Codes: Highly Fault Tolerant Erasure Codes for Storage Systems (2005) (usenix.org)
11 points by Tomte 10 months ago | past | 1 comment
Usenix ATC Announcement (usenix.org)
113 points by eatbitseveryday 10 months ago | past | 12 comments
A Formal Analysis of Apple's iMessage PQ3 Protocol [pdf] (usenix.org)
161 points by luu 10 months ago | past | 134 comments
Usenix Announces the Discontinuation of ATC Conference (usenix.org)
8 points by septicmk 11 months ago | past
Technical debt as theory building and practice (usenix.org)
2 points by fanf2 11 months ago | past
A discipline of error handling [pdf] (usenix.org)
4 points by fanf2 11 months ago | past
Cognitive SSD: A Deep Learning Engine for In-Storage Data Retrieval [pdf] (usenix.org)
2 points by rbanffy 11 months ago | past
The Process File System and Process Model in Unix System V [pdf] (1991) (usenix.org)
4 points by naltun 11 months ago | past | 2 comments
Technical Debt as Theory Building and Practice (usenix.org)
1 point by todsacerdoti 11 months ago | past
Silent Bugs Matter: A Study of Compiler-Introduced Security Bugs (usenix.org)
8 points by todsacerdoti 11 months ago | past | 1 comment
Running Disaster Recovery Plan Tabletop Exercises (usenix.org)
2 points by jruohonen 11 months ago | past
Graham: Synchronizing Clocks by Leveraging Local Clock Properties (usenix.org)
6 points by todsacerdoti 11 months ago | past
Using PDDL to find privilege escalation paths (usenix.org)
7 points by peperunas 11 months ago | past
Postfix, past present and future (2010) [pdf] (usenix.org)
1 point by jruohonen on April 2, 2025 | past
Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 (usenix.org)
1 point by b-man on March 18, 2025 | past
The File System Belongs in the Kernel [pdf] (1991) (usenix.org)
2 points by vacuity on March 17, 2025 | past | 1 comment
The Night Watch (2013) [pdf] (usenix.org)
205 points by mifydev on March 12, 2025 | past | 33 comments
Soft Updates: A Technique for Eliminating Most Synchronous Writes in FFS (1999) [pdf] (usenix.org)
1 point by Tomte on March 10, 2025 | past
Don't Stack your Log on my Log (2014) [pdf] (usenix.org)
1 point by 10000truths on Feb 27, 2025 | past
High-Performance, Application-Integrated Far Memory (2020) [pdf] (usenix.org)
3 points by qianli_cs on Feb 23, 2025 | past
Quantum Computing Notes: Why Is It Always Ten Years Away? – Usenix (usenix.org)
2 points by rbanffy on Feb 17, 2025 | past | 1 comment
Measuring China's DNS Censorship (usenix.org)
2 points by nkko on Feb 16, 2025 | past
Quantum Computing Notes: Why Is It Always Ten Years Away? – Usenix (usenix.org)
2 points by rbanffy on Feb 14, 2025 | past
Autothrottle: Resource Management for SLO-Targeted Microservices (usenix.org)
22 points by mlerner on Feb 2, 2025 | past | 1 comment

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search:

HN For You