Technical Sessions
| |||||||||||||||||||||||
WEDNESDAY, NOVEMBER 6, 2002
Thursday, November 7 |
Friday, November 8 |
All in one file
| |||||||||||||||||||||||
8:45 a.m. - 10:30 a.m.
| |||||||||||||||||||||||
Opening Remarks, Awards, and Keynote
Keynote: Scaling the Web: An Overview of Google (A Linux Cluster for Fun and Profit)
Want to know how to build an Internet search engine that indexes several terabytes of dataover 3 billion Web documentsand serves it up at a rate of thousands of requests per second? (Hint: Start with a farm of 10,000+ Linux servers.) This talk will cover the technology behind Google: company overview, search parameters and results, hardware and query load balancing, Linux cluster topology, scalability, fault tolerance, and more.
| |||||||||||||||||||||||
10:30 a.m. - 11:00 a.m. Break | |||||||||||||||||||||||
11:00 a.m. - 12:30 p.m. | |||||||||||||||||||||||
Working Smarter
Chair: Aeleen Frisch, Exponential Consulting
Awarded
Best Paper!
Spam Blocking with a Dynamically Updated Firewall Ruleset
Holistic Quota Management: The Natural Path to a Better, More Efficient Quota System
|
Domain Name Server Comparison: BIND 8 vs. BIND 9 vs. djbdns vs. ???
Brad Knowles, Snow BV
Name server administration is getting harder. With "black hats" trying to break in or use your machine for attacks elsewhere, 5kr1pt-k1dd135 DoS-ing it, and misconfigured clients burying it, you still have to serve your clients. We'll look at DNS server programs for RFC compliance, performance, ease of use, and security. We'll also survey the root and various TLD name servers. Finally, we'll recommend improvements, with particular attention paid to the default installation.
|
Security on Macintosh OS X
John Hurley, Apple, Inc.
Leveraging the power of UNIX, many security features have been integrated into Apple's new operating system. The security architecture will be presented, along with ideas on how to configure and use the security features of OS X.
As the Security Policy Architect for Apple, John Hurley works with the Data Security team and other groups at Apple to define the security policies for Mac OS X.
|
SAMBA Guru
Gerald Carter, SAMBA Team/
Gerald has been a member of the SAMBA Team since 1998. At Hewlett-Packard, he works on Samba-based print appliances and acts as the release coordinator for the SAMBA project. He is currently working on a guide to LDAP for system administrators with O'Reilly Publishing and is the author of Teach Yourself Samba in 24 Hours for Sams Publishing.
| ||||||||||||||||||||
12:30 p.m. - 2:00 p.m. Lunch (on your own)
| |||||||||||||||||||||||
2:00 p.m. - 3:30 p.m.
| |||||||||||||||||||||||
Service, Risk, and Scale
Chair: Alex Keller, IBM Research
Application Aware Management
Geographically Distributed System for Catastrophic Recovery
Embracing and Extending
|
Load Balancers
Tony Bourke
Tony Bourke will inspect the changing landscape of server load balancing
|
The Evolving Ethics of System Administration
Lee Damon, University of Washington, & Rob Kolstad, SAGE Executive Director
We'll start with a discussion of the ethics canons of various SAGE organizations and continue on to an interactive, bi-mediated debate on some practical ethical situations from the workplace. Raise your awareness of real-world ethical dilemmas and how to avoid them (or cope with them once they're upon you!).
|
AFS Gurus
Esther Filderman, Pittsburgh Supercomputing Center, and
Having worked for Carnegie Mellon University since 1988, Esther has been working with AFS since its toddlerhood. She is currently a Senior Systems Mangler and AFS administrator for the Pittsburgh Supercomputing Center. As a member of the Athena Server Operations team, Garry maintains and expands the AFS cells used by Athena.
Practical Theory
Chair: Paul Anderson, University of Edinburgh
Stem: The System Administration Enabler
Pan: A High-Level Configuration Language
Why Order Matters: Turing Equivalence in Automated Systems Administration
Tim Pozar, Late Night Software
802.11 technology has significantly reduced the cost and technical knowledge needed to deploy wireless networking, making 802.11 radios attractive not only for the office and home user but to ISPs for last-mile, to educational institutions and corporations for campus networking, and to the Internet activist working on full neighborhood connectivity. This presentation will address what the technology can and can't do, available equipment, security, and the regulatory issues in deploying networks.
The Constitutional & Financial Argument Against Spam
Daniel V. Klein, LoneWolf Systems
Spam: you either loathe it or you hate it. It consumes bandwidth, disk space, and, perhaps most important, your time. It is, however, defended by the spammers themselves as an exercise of free speech. We will look at how spammers avoid detection and payment, and how you can defend against spam. The ultimate thrust of the talk will be to show the economic impact of spam and to examine the
Consulting Guru
Nick Stoughton, MSB Associates
Nick is a principal with MSB Associates. He has been working as a
|
Need help? Use our Contacts page.
Last changed: 20 Nov. 2002 aw |
|