Tutorials:
Overview |
By Day
(Sunday,
Monday, Tuesday) |
By Instructor | All in One File
T1 Building and Using a Personal Beowulf NEW Willem A. (Vlakkies) Schreuder, CU Boulder Who should attend: The tutorial is designed for individuals or small groups on a limited budget who need a personal supercomputer. The tutorial differs from most tutorials on Beowulfs in that it is aimed at small installations rather than, for example, national labs. The goal is to provide attendees with practical advice on how to put together the hardware, install the software, and use the system successfully to speed up tasks. Topics include:
Tutorial materials includes a CD-ROM for the Scyld Beowulf distribution.
Willem A. (Vlakkies) Schreuder (T1) holds a Ph.D. in
Who should attend: Web site designers or programmers working on Web-related projects. No programming background is required, but a basic understanding of HTML and HTTP is assumed. PHP is a popular scripting language used for creating dynamic Web sites. This tutorial, taught by the original developer of the language, will cover all the main features of the language. Topics include:
Anybody involved with Web development will come out of this tutorial with some new approaches to common problems.
Rasmus Lerdorf (T4) has been designing large-scale
Who should attend: System administrators interested in learning about the cryptographic tools SASL and openssl, which are now bundled in Linux and available for all versions of UNIX. Sendmail administrators interested in learning about the AUTH and STARTTLS extensions to SMTP will also benefit. Attendees need basic system administration skills and knowledge of sendmail configuration to gain the most benefit from this course. Soon all Linux and UNIX systems will ship with built-in cryptographic capabilities. System administrators need to understand what those tools can and cannot do for them and how to use the tools. This tutorial outlines the current state of cryptographic support in Linux and shows attendees how to make use of the openssl and SASL services. The network protocols that underlie these cryptographic services are described. Attendees will receive practical advice about using strong authentication and encrypted data streams with sendmail. Sendmail is also used as a model to show the strengths and weaknesses of cryptography for security. This tutorial describes in detail how to install, configure, and use openssl, SASL and sendmail to support the AUTH and STARTTLS mail protocol extensions. Topics include:
Craig Hunt (T5) is the author of the bestsellers "TCP/IP
Who should attend: Anyone interested in threats to UNIX security and how to deal with them. This tutorial uses case histories to show what vulnerabilities the attackers exploited, how the system administrators might have closed those loopholes, and how the intruders were discovered. Concepts and mechanisms, as well as publicly available tools, are discussed. This course focuses on non-network problems. Topics include:
Matt Bishop (T6) began working on problems of com
Who should attend: Current Linux system administrators, and administrators from sites considering converting to or adding Linux systems. Attendees who are new to system administration will find the pace quite rapid. We will focus on the administrative issues that arise when Linux systems are deployed to address a variety of real-world tasks and problems arising from both commercial and R&D contexts. Topics include:
Aeleen Frisch (T7) has been a system administrator for
Who should attend: Novice and advanced UNIX system and network administrators, and UNIX developers concerned about network performance impacts. A basic understanding of UNIX system facilities and network environments is assumed. We will explore techniques for tuning systems, networks, and application code. Starting from a single-system view, we'll examine how the virtual memory system, the I/O system, and the file system can be measured and optimized. We'll move on to Network File System tuning and performance strategies. Detailed treatment of network performance problems will lead to examples of network capacity planning. Application issues will be covered. Many examples will be given, along with guidelines for capacity planning and customized monitoring based on your workloads and traffic patterns. Analysis periods for particular situations will be provided. Topics include:
Marc Staveley (T8) recently left Sun Microsystems
Who should attend: Developers and system administrators familiar with at least one high-level language who want to add Python to their toolbox. Python is interpreted, interactive, and inherently object-oriented, featuring an easy-to-learn syntax that is clear and concise. As a scripting language, Python is often used for many common network and system administration tasks. Python is available for many versions of UNIX (e.g. Solaris, Linux, FreeBSD), Windows 3.x/9x/NT/2000, and Macintosh, as well as less common platforms such as OS/2, PalmPilot, and DOS. Python is also available in a Java-compiled interpreter called Jython, which will run anywhere a Java Virtual Machine (JVM) is available. Python classes can interact with Java classes and vice versa, making Jython a powerful tool in Java development. Topics include:
Wesley J. Chun (T10, T14) holds Who should attend: System administrators and system engineers responsible for the design and implementation of storage systems. Attendees should be aware of storage systems concepts; a basic familiarity with SAN and NAS is helpful but not required. This tutorial will explain the differences and similarities between Storage Area Networks (SAN) and Network Attached Storage (NAS), including an explanation of why NAS is now competing with SAN in certain markets. It will also cover the myriad of backup and recovery options that each brings to the table, and the pros and cons of each of them. It will then offer guidelines on how to decide whether SAN or NAS is right for you. Topics include:
W. Curtis Preston (M9, T11, T15) has been specializing
Who should attend: System administrators who need to produce documention for the systems they manage or who want to improve their documentation skills. Attendees will learn basic techniques for writing effective documentation and improving their documentation practices. Topics include:
Attendees should be able to make immediate, practical use of the techniques presented in this tutorial in their day-to-day tasks. Particular emphasis is placed on documentation as a time-saving tool rather than a workload imposition.
Mike Ciavarella (T13, T16) has been producing and editing technical
documentation since he naively agreed to write application manuals for his first
employer in the early 1980s. He has been a technical editor for MacMillan Press
and has been teaching system administrators about documentation for the past
four years. Mike has an Honours Degree in Science from the University of
Melbourne in Australia, and is currently a Senior Partner with Cybersource Pty
Ltd, where he heads Cybersource's Security Practice. In his spare time, Mike is
a caffeine addict and photographer.
Who should attend: Developers familiar with Python who are interested in exploring client-server socket programming, Web client development, and CGI programming in Python. This tutorial will introduce current Python programmers to three different areas of network programming. Attendees will leave this tutorial able to "start coding back in their hotel room." An introduction to each topic will be followed by a walk-through of sample code. Topics include:
Wesley J. Chun (T10, T14) holds Who should attend: System administrators involved in the design, implementation, and administration of Veritas NetBackup. Participants who are not yet using NetBackup should review NetBackup documentation before attending this session. Anyone who has implemented a medium-to-large installation of any commercial backup software package understands the challenges that such a project will face. This tutorial focuses on the challenges unique to Veritas NetBackup, with heavy emphasis on configuring NetBackup in such a way that it will be easier to automate, easier to monitor and make reports from, takes full advantage of your storage resources, and, above all, ensures that your data is being protected properly. The tutorial will also answer the questions that all NetBackup administrators find themselves asking and will provide scripts to automate NetBackup. Topics include (with an emphasis on decisions to be made):
After completing this tutorial, participants will be able to answer all of these questions and will have the tools necessary to better automate their NetBackup installation. They will also be aware of common pitfalls and how to avoid them.
W. Curtis Preston (M9, T11, T15) has been specializing
Who should attend: Junior or intermediate system administrators or anyone with a basic knowledge of programming, preferably with some experience in Bourne/Korn shells (or their derivatives). The humble shell script is still a mainstay of UNIX/Linux system administration, despite the wide availability of other scripting languages. This tutorial details techniques that move beyond the quick-and-dirty shell script. Topics include:
Mike Ciavarella (T13, T16) has been producing and editing technical documentation since he naively agreed to write application manuals for his first employer in the early 1980s. He has been a technical editor for MacMillan Press and has been teaching system administrators about documentation for the past four years. Mike has an Honours Degree in Science from the University of Melbourne in Australia, and is currently a Senior Partner with Cybersource Pty Ltd, where he heads Cybersource's Security Practice. In his spare time, Mike is a caffeine addict and photographer.
T17 Practical Project Management
NEW Who should attend: Sysadmins who want to stay hands-on as team leads or system architects and need a new set of skills with which to tackle bigger, more complex challenges. No previous experience with project management is required. Participants will get a no-nonsense grounding in methods that work without adding significantly to one's workload. People who have been through traditional multi-day project management courses will be shocked, yet refreshed, by the practicality of our approach. To get the most out of this tutorial, participants should have some real-world project or complex task in mind for the lab sections. This tutorial focuses on complementing your own organizational style (or lack thereof) with a toolbox of ways to organize and manage complex tasks without drowning in paperwork or clumsy, meeting-intensive methodologies. Also emphasized is how to bridge the gap between ad-hoc methods and the kinds of tracking and reporting that traditionally trained managers will understand. Topics include:
Strata Rose Chalup (T17) began as a fledgling sysad
|
![]() Last changed: 21 November 2001 ml |
|