Check out the new USENIX Web site.
LISA 2000: 14th Systems Administration Conference, 
New Orleans, December 3-8, 2000
Conference Home  | At a Glance  | Register/Hotel  | Tutorials  | Technical Sessions  |  | Exhibition  | Organizers  | Activities

Technical Sessions    Wed., Dec. 6 | Thurs., Dec. 7 | Fri., Dec. 8 | Guru Is In | All in one file

All Technical Sessions will be held in the New Orleans Marriott Hotel.

FRIDAY, DECEMBER 8, 2000
9:00 am - 10:30 am
REFEREED PAPERS
Mardi Gras D-H

Fully Automatic
Session Chair: John Orthoefer, Genuity Inc.

Deployme: Tellme's Package & Management Deployment System
Kyle Oppenheim and Patrick McCormick, Tellme Networks

Automating Request-based Software Distribution
Christopher Hemmerich, Indiana University

Use of Cfengine for Automated, Multi-Platform Software and Patch Distribution
David Ressman and John Valdes, University of Chicago

INVITED TALKS
Acadia

The Design and Implementation of Highly Scalable Email Systems
Brad Knowles, Belgacom Skynet SA/NV

Email systems can scale larger than had been thought possible! This talk will detail fundamental flaws in the current mailbox-per-user paradigm of standard off-the-shelf Local Delivery Agent software. It will describe how they can be scaled up to handle many more users, how virtually all synchronous metadata and file locking can be eliminated, how storage requirements can be reduced to grow at a rate less than O(n), and how various services can be broken out and handled by multiple separate servers.

SECURITY TRACK
Carondelet

Real-World Intrusion Detection--First Steps
Mark K. Mellis, SystemExperts Corporation

For decades intrusion detection has been desired but rarely implemented at most organizations. Finally, emerging technologies and proven techniques are making intrusion detection not only possible but downright practical. This talk is addressed to all technical staff and managers who want to understand how to practice integrated intrusion detection at their site. Examples of actual scripts and a discussion of when to use them will be included.

10:30 am - 11:00 am   Break
11:00 am - 12:30 pm
REFEREED PAPERS
Mardi Gras D-H

Building Blocks
Session Chair: Ruth Milner, NRAO

Unleashing the Power of JumpStart--A New Technique for Disaster Recovery, Cloning, or Snapshotting a Solaris System
Lee Amatangelo, Collective Technologies

A Linux Appliance Construction Set
Michael W. Shaffer, Agilent Labs RCS

Automating Dual Boot (Linux & NT) Installations
Rajeev Agrawala, Shaun Erickson, and Robert Fulmer, Lucent/Bell Labs Research

INVITED TALKS
Acadia

SANs--From A to Reality
W. Curtis Preston, Collective Technologies

Storage Area Networks (SANs) are showing up everywhere. Many IT managers have been overheard making statements such as, "We're going to completely get rid of X, Y, and Z, and replace it with a SAN," or "We've got to have a SAN road map." This talk gives you the information you need to be able to respond appropriately to such statements, and it includes examples of real-life applications of SAN technology so that you can decide whether or not a SAN is in your future.

SECURITY TRACK
Carondelet

Someone's Knocking at the Door...
Session Chair: Cat Okita, Global Crossing Ltd.

Tracing Anonymous Packets to Their Approximate Source
Hal Burch Carnegie Mellon Univ, and Bill Cheswick, Lumeta Corporation

Analyzing Distributed Denial of Service Tools: The Shaft Case
Sven Dietrich, NASA Goddard Space Flight Center; Neil Long, Oxford University; and David Dittrich, University of Washington

12:30 pm - 2:00 pm   Lunch (on your own)
2:00 pm - 3:30 pm
REFEREED PAPERS
Mardi Gras D-H

Work-in-Progress Reports
Session Chair: Peg Schafer, Harvard University

Short, pithy, and fun, Work-in-Progress reports introduce interesting new or on-going work, and the LISA audience provides valuable discussion and feedback.

A schedule of presentations will be posted at the conference.

To present a WiP, please see the submission instructions.

INVITED TALKS
Acadia

Why the Documentation Sucks and What You Can Do About It
Steven Levine, SGI

System administrators often complain about documentation. It can be difficult to find just the right information in the circumstances you most need it. Why is this so? This talk will discuss some inherent difficulties of writing administration documentation, presented from the point of view of a technical writer. It will also present proposals for how system administrators and technical writers can work together to improve the general state of administration documentation.

SECURITY TRACK
Carondelet

. . . Don't Let Them In
Session Chair: Simon Cooper, SGI

YASSP! A Tool for Improving Solaris Security
Jean Chouanard, Xerox PARC

SubDomain: Parsimonious Server Security
Crispin Cowan, Steve Beattie, Greg Kroah-Hartman, Calton Pu, Perry Wagle, and Virgil Gligor, WireX Communications, Inc.

NOOSE--Networked Object-Oriented Security Examiner
Bruce Barnett, General Electric Corporate Research & Development

3:30 pm - 4:00 pm   Break
4:00 pm - 5:30 pm    (Bissonet/Carondelet)
The LISA Game Show, with your host, Rob Kolstad

Back by popular demand, Rob Kolstad hosts this challenging test of wits for LISA attendees. Watch contestants wither under the dual spotlights of difficult questions and special attention of the moderator. Entry forms for contestants available Thursday around noon.

Thursday Technical Sessions Guru Is In
Previous Page Next Page


?Need help? Use our Contacts page.
Last changed: 30 Nov 2000 bleu
LISA 2000 index
Events calendar
USENIX home