Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
from
login
Memory safety is table stakes
(
usenix.org
)
90 points
by
comradelion
10 days ago
|
past
|
129 comments
EM Eavesdropping Attack on Digital Microphones Using Pulse Density Modulation
(
usenix.org
)
43 points
by
gnabgib
24 days ago
|
past
|
4 comments
Large scale analysis of 100s of cache clusters at Twitter [pdf]
(
usenix.org
)
1 point
by
emrah
29 days ago
|
past
Silent bugs matter: a study of compiler-introduced security bugs
(
usenix.org
)
1 point
by
fanf2
29 days ago
|
past
|
1 comment
AIOps: Prove It an Open Letter to Vendors Selling AI for SREs
(
usenix.org
)
3 points
by
mooreds
41 days ago
|
past
|
1 comment
Performance and Compatibility in the HongMeng Production Microkernel [pdf]
(
usenix.org
)
4 points
by
rguiscard
47 days ago
|
past
Weaver Codes: Highly Fault Tolerant Erasure Codes for Storage Systems (2005)
(
usenix.org
)
1 point
by
panrobo
52 days ago
|
past
Weaver Codes: Highly Fault Tolerant Erasure Codes for Storage Systems (2005)
(
usenix.org
)
11 points
by
Tomte
52 days ago
|
past
|
1 comment
Usenix ATC Announcement
(
usenix.org
)
113 points
by
eatbitseveryday
58 days ago
|
past
|
12 comments
A Formal Analysis of Apple's iMessage PQ3 Protocol [pdf]
(
usenix.org
)
161 points
by
luu
58 days ago
|
past
|
134 comments
Usenix Announces the Discontinuation of ATC Conference
(
usenix.org
)
8 points
by
septicmk
60 days ago
|
past
Technical debt as theory building and practice
(
usenix.org
)
2 points
by
fanf2
61 days ago
|
past
A discipline of error handling [pdf]
(
usenix.org
)
4 points
by
fanf2
64 days ago
|
past
Cognitive SSD: A Deep Learning Engine for In-Storage Data Retrieval [pdf]
(
usenix.org
)
2 points
by
rbanffy
66 days ago
|
past
The Process File System and Process Model in Unix System V [pdf] (1991)
(
usenix.org
)
4 points
by
naltun
69 days ago
|
past
|
2 comments
Technical Debt as Theory Building and Practice
(
usenix.org
)
1 point
by
todsacerdoti
70 days ago
|
past
Silent Bugs Matter: A Study of Compiler-Introduced Security Bugs
(
usenix.org
)
8 points
by
todsacerdoti
70 days ago
|
past
|
1 comment
Running Disaster Recovery Plan Tabletop Exercises
(
usenix.org
)
2 points
by
jruohonen
70 days ago
|
past
Graham: Synchronizing Clocks by Leveraging Local Clock Properties
(
usenix.org
)
6 points
by
todsacerdoti
80 days ago
|
past
Using PDDL to find privilege escalation paths
(
usenix.org
)
7 points
by
peperunas
81 days ago
|
past
Postfix, past present and future (2010) [pdf]
(
usenix.org
)
1 point
by
jruohonen
3 months ago
|
past
Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0
(
usenix.org
)
1 point
by
b-man
3 months ago
|
past
The File System Belongs in the Kernel [pdf] (1991)
(
usenix.org
)
2 points
by
vacuity
3 months ago
|
past
|
1 comment
The Night Watch (2013) [pdf]
(
usenix.org
)
205 points
by
mifydev
3 months ago
|
past
|
33 comments
Soft Updates: A Technique for Eliminating Most Synchronous Writes in FFS (1999) [pdf]
(
usenix.org
)
1 point
by
Tomte
3 months ago
|
past
Don't Stack your Log on my Log (2014) [pdf]
(
usenix.org
)
1 point
by
10000truths
4 months ago
|
past
High-Performance, Application-Integrated Far Memory (2020) [pdf]
(
usenix.org
)
3 points
by
qianli_cs
4 months ago
|
past
Quantum Computing Notes: Why Is It Always Ten Years Away? – Usenix
(
usenix.org
)
2 points
by
rbanffy
4 months ago
|
past
|
1 comment
Measuring China's DNS Censorship
(
usenix.org
)
2 points
by
nkko
4 months ago
|
past
Quantum Computing Notes: Why Is It Always Ten Years Away? – Usenix
(
usenix.org
)
2 points
by
rbanffy
4 months ago
|
past
More
Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: