Steve Acheson (S5) is currently an Information Security Architect at Cisco
Systems, where he is a senior member of the Corporate Information
Security Department, responsible for network and system security,
including designing internal security architecture and external/firewall
access. Before working for Cisco, Steve managed security for
NASA's Numerical Aerospace Simulations facility at Ames Research
Center. He has worked in the field as a system administrator,
network engineer, and security analyst for over 15 years. |
William Arbaugh (T3) has spent over 15 years performing security research and engineering. Arbaugh and his students were among the first to identify security flaws in the IEEE 802.11 standard, as well as several proposed fixes to the standard. He and his students are actively involved in the IEEE and the IETF standards processes, doing their best to ensure that future standards are more robust. He and Jon Edney are the authors of a forthcoming book (Addison-Wesley, Fall 2003) entitled Wi-Fi Protected Access: Wireless Security and 802.11.
|
David N. Blank-Edelman (T10, T13) is the Director of Technology at the
Northeastern University College of Computer and Information Science and the author of the O'Reilly book Perl for System Administration. He has spent the last 16 years as a system/network administrator in large multi-platform environments, including Brandeis University, Cambridge Technology Group, and the MIT Media Laboratory. He has served as Senior Technical Editor for the Perl Journal.
|
Mark Burgess (M12) is a professor at Oslo University College and is the
author of cfengine. He has been researching the principles of network
and system administration for over ten years and is the author
of Principles of Network and System Administration (John Wiley & Sons).
He is frequently invited to speak at conferences.
|
Gerald Carter (S1, M3) has been a member of the SAMBA Team since 1998. He has published articles in various
Web-based magazines and gives instructional courses as a
consultant for several companies. Currently employed by
Hewlett-Packard as a Samba developer, Gerald has written
books for SAMS Publishing and is the author of the recent
LDAP System Administration (O'Reilly & Associates).
|
Sweth Chandramouli (S9) is the Founder and President of
Idiopathic Systems Consulting, providing information security, UNIX and
network systems design and implementation, and data analysis services
for a client base ranging from sole proprietorships to Fortune 100
companies to the US government. He has previously served as CTO for
Homeland Security (Justice Programs) at Lockheed Martin Information
Technology, and as Director of Systems Architecture for ServerVault,
Inc.
Sweth has an extensive background in the field of Log Analysis,
including the development of log analysis tools for companies such as
Counterpane Internet Security and agencies such as the US DHS Bureau of
Immigration and Customs Enforcement. He is also an active contributor
to the loganalysis mailing list, and has written about the topic
extensively.
|
Mike Ciavarella (S3, M9, M11) has been producing and editing technical
documentation since he naively agreed to write application manuals for his first
employer in the early 1980s. He has been a technical editor for
MacMillan Press and has been teaching system administrators about
documentation for the past four years. Mike has an Honours Degree in
Science from the University of Melbourne and is currently
a Senior Partner with Cybersource Pty Ltd, where he heads Cybersource's
Security Practice. In his spare time, Mike is a caffeine addict and
photographer.
|
Lee Damon (S3) has been a UNIX systems administrator since 1985 and has been active in SAGE since its inception. He assisted in developing a mixed AIX/SunOS environment
at IBM Watson Research and has developed mixed environments for Gulfstream
Aerospace and QUALCOMM. He is currently leading the development effort
for the Nikola project at the University of Washington Electrical Engineering
department. He is a member of the SAGE Ethics Working Group and was one of
the commentators on the SAGE Ethics document. He has championed awareness of
Ethics in the systems administration community, including writing it into
policy documents. Lee holds a B.S. in Speech Communication from Oregon State University.
|
Mike DeGraw-Bertsch (S8, M7) has been working with FreeBSD for ten years, and
has been active in security for the last five years. He has written
articles for the O'Reilly Network and SysAdmin Magazine and is writing
UNIX Systems and Network Security for Springer-Verlag. Mike
is a security and networking consultant and spends
his free time as an ice hockey goalie.
|
Mark-Jason Dominus (S10, S13, M10, M13) has been programming in Perl since 1992. He is a moderator of the comp.lang.perl.moderated newsgroup, the author of the Text::Template, Tie::File, and Memoize modules, a contributor to the Perl core, and author of the perlreftut man page. His work on the Rx regular expression debugger won the 2001 Larry Wall Award for Practical Utility. He lives in Philadelphia with his wife and several plush octopuses.
|
Jacob Farmer (T8, T11) is the CTO of Cambridge Computer Services, a specialized
integrator of backup systems and storage networks. He has over 15
years' experience with storage technologies and writes an expert
advice column for InfoStor magazine. He is currently writing a book
on storage networking which is scheduled to be completed toward
the end of 2003.
|
Peter Baer Galvin (T4) is the Chief Technologist for Corporate Technologies and was the systems manager for Brown University's Computer Science Department. He has written articles for Byte and other magazines, is a contributing editor for SysAdmin Magazine, and is coauthor of the Operating Systems Concepts and the Applied Operating Systems Concepts textbooks. Peter has taught tutorials on security and system administration and has given talks at many conferences and institutions on such topics as Web
services, performance tuning, and high availability. |
Trent Hein (T1) is co-founder of Applied Trust Engineering. Trent worked on the 4.4 BSD port to the MIPS architecture at Berkeley, is co-author of both the UNIX Systems Administration Handbook and the Linux Administration Handbook, and holds a B.S. in computer science from the University of Colorado.
|
Doug Hughes (S11) is a founding member of and frequent contributor to the veritas-vx
and ssa-managers mailing lists. He has been using Veritas Volume Manager
since the mid 1990s. He is also the keeper of one of the tips and
tricks Web pages for Veritas and related storage technologies
(https://www.will.to/vxstuff). Doug has a B.E. in Computer Engineering
from Pennsylvania State University and currently works for a large
multinational telecommunications company.
|
Laura Kuiper (S5) is currently a Computer Security Architect at Cisco
Systems, where she is a senior member of the Computer Information
Security Department, responsible for network and system security,
including designing internal security architecture and external/firewall
access. Before working for Cisco, Laura managed the network at SAIC. She has worked in the field as a
network engineer and security analyst for over 9 years.
|
Tom Limoncelli (T9, T12), co-author of
The Practice of System and Network
Administration (Addison-Wesley), is Director of Network Operations
at Lumeta Corporation, where he is responsible for building and
scaling the network. A sysadmin and network wonk since 1987, he
has worked at Bell Labs/Lucent, Mentor Graphics, and Drew
University. He is a frequent presenter at LISA conferences.
|
Evan Marcus (T7) is a Principal Engineer
and Data Availability Maven with VERITAS Software Corporation. Evan has more than 15 years of experience in UNIX system administration. While working at Fusion Systems and OpenVision Software, Evan worked to bring to market the first high-availability software application for SunOS and Solaris. He is the author of several articles and talks on the design of high-availability systems and is the co-author, with Hal Stern, of the new second edition of Blueprints for High Availability: Designing Resilient Distributed Systems (John Wiley & Sons, 2003). Evan also co-edited and contributed to The Resilient Enterprise, VERITAS Publishing's disaster recovery book.
|
James Mauro (S4) is a Senior Staff Engineer in the Performance and
Availability Engineering group at Sun Microsystems. Jim's
current projects are focused on quantifying and improving
enterprise platform availability, including minimizing recovery
times for data services and Solaris. Jim co-developed a framework
for system availability measurement and benchmarking and is
working on implementing this framework within Sun.
|
Ned McClain (T1), co-founder and CTO of Applied Trust Engineering, lectures around the globe on applying cutting-edge technology in production computing environments. Ned holds a B.S. in computer science from Cornell University and is a contributing author
to both the UNIX System Administration Handbook and the Linux Administration Handbook.
|
Richard McDougall (S4) is an established engineer in the Performance Application
Engineering group at Sun Microsystems, where he focuses on large systems
performance and architecture. He has over twelve years of performance tuning,
application/kernel development and capacity planning experience on many
different flavours of UNIX. Richard has written a wide range of papers and
tools for measurement, monitoring, tracing, and sizing UNIX systems,
including the memory sizing methodology for Sun, the set of tools known as
"MemTool" to allow fine-grained instrumentation of memory for Solaris, the
recent "Priority Paging" memory algorithms in Solaris, and many of the
unbundled tools for Solaris.
|
George Neville-Neil (T5) is a Senior Software Engineer on the Nominum DCS
product, a high-performance DHCP server targeted at the enterprise
market. He has taught courses on DHCP, as well as other networking
subjects, for USENIX, APRICOT, and others. He is a member of the
ACM Queue editorial advisory board and is the author of
several articles. He has a B.Sc. in Computer Science from Northeastern
University in Boston. His computing interests include network
protocols, operating systems, and embedded systems.
|
Dustin Puryear (M1) is a
consultant providing expertise in managing and integrating UNIX and Windows
systems and services, with a strong focus on open source, and is author of
Integrate Linux Solutions into Your Windows Network. As a consultant,
Dustin has worked on projects ranging from tuning and managing Linux and
FreeBSD high-availability web farms to developing custom management
software for qmail-based mail systems.
|
Marcus J. Ranum (S6, M6)
is a world-renowned expert on security system design and implementation. He is recognized as
the inventor of the proxy firewall and the implementor of the
first commercial firewall product. Since the late 1980s, he has
designed a number of ground-breaking security products, including
the DEC SEAL, the TIS firewall toolkit, the Gauntlet firewall, and
Network Flight Recorder's intrusion detection system. He has
been involved in every level of operations of a security product
business, from developer to founder and CEO of NFR. Marcus has
served as a consultant to many FORTUNE 500 firms and national
governments, as well as serving as a guest lecturer and instructor
at numerous high-tech conferences. He holds both the TISC "Clue" award and the ISSA Hall of Fame award.
|
Jim Reid (S2) started using a PDP11/45 running V7 UNIX 21 years ago and has been working with UNIX systems ever since. He worked for three years at Origin on behalf of Philips Electronics, where he wrote a DNS management system and designed, built, and ran the DNS infrastructure for the corporate network, one of the biggest in the world. He has over a decade's experience in writing and teaching training courses ranging from kernel internals, through system administration and network security, to DNS administration. He's a frequent speaker at conferences and workshops in Europe and the U.S.
|
David Rhoades (M5, T6) is a principal consultant with Maven Security Consulting. Since 1996 David has been providing information protection services for various Fortune 500 customers. His work has taken him across the United States and to Europe and Asia, where he has lectured and consulted in various areas of information security. David holds a B.S. in computer engineering from Pennsylvania State University and is an instructor for the SANS Institute, the MIS Training Institute, and Sensecurity (based in Singapore).
|
John Sellens (M2, T2)
has been involved in system and network administration since 1986 and is the author of several related USENIX papers, a number of ;login: articles, and SAGE booklet #7, System and Network Administration for Higher Reliability. He holds an M.S. in computer science from the University of Waterloo and is a chartered accountant. He is currently the General Manager for Certainty Solutions (formerly known as GNAC) in Toronto. Prior to joining Certainty, John was the Director of Network Engineering at UUNET Canada and was a staff member in computing and information technology at the University of Waterloo for 11 years.
|
David Skoll (S12) is founder and president of Roaring Penguin Software,
Inc., a consulting firm focused on deploying intelligent computing
infrastructures for businesses of all sizes and incorporating Linux
into heterogeneous environments. Skoll is the developer of MIMEDefang,
the acclaimed open-source email inspection software, and creator of
RP-PPPoE, deployed across Linux servers and clients worldwide. He is
author of Caldera's OpenLinux Unleashed and frequently writes and
presents for the Linux and open source communities. More information
can be found at https://www.roaringpenguin.com.
|
Marc Staveley (M4) works with Soma Networks, where he is applying his many
years of experience with UNIX development and administration in
leading their IT group. Previously Marc has been an independent
consultant and has also held positions at Sun Microsystems, NCR,
Princeton University, and the University of Waterloo. He is a
frequent speaker on the topics of standards-based development,
multi-threaded programming, system administration, and performance
tuning.
|
Leon Towns-von Stauber (S7, M8) started using UNIX systems in 1990 and
has been administering them professionally for the last nine
years in service provider, corporate, and educational
environments. Although he's worked extensively with Solaris,
Linux, HP-UX, AIX, and too many other flavors of UNIX, the
purchase of a NeXT workstation in 1991 introduced him to the
operating system lineage that he would follow from NeXTstep
through to Mac OS X today. Currently he is working on books
for O'Reilly & Associates on Mac OS X security and system
administration.
|
|