REFEREED
PAPERS
Mardi Gras D-H
Fully
Automatic
Session Chair: John Orthoefer, Genuity Inc.
Deployme: Tellme's Package & Management Deployment System
Kyle Oppenheim and Patrick McCormick, Tellme Networks
Automating Request-based Software Distribution
Christopher Hemmerich, Indiana University
Use of Cfengine for Automated, Multi-Platform Software and Patch
Distribution
David Ressman and John Valdes, University of Chicago
|
INVITED
TALKS
Acadia
The Design and
Implementation of Highly Scalable Email Systems
Brad Knowles, Belgacom Skynet SA/NV
Email systems can scale larger than had been thought possible! This talk will
detail fundamental flaws in the current mailbox-per-user paradigm of standard
off-the-shelf Local Delivery Agent software. It will describe how they can be
scaled up to handle many more users, how virtually all synchronous metadata and
file locking can be eliminated, how storage requirements can be reduced to grow
at a rate less than O(n), and how various services can be broken out and
handled by multiple separate servers.
|
SECURITY TRACK
Carondelet
Real-World Intrusion Detection--First Steps
Mark K. Mellis, SystemExperts Corporation
For decades intrusion detection has been desired but rarely implemented at most
organizations. Finally, emerging technologies and proven techniques are making
intrusion detection not only possible but downright practical. This talk is
addressed to all technical staff and managers who want to understand how to
practice integrated intrusion detection at their site. Examples of actual
scripts and a discussion of when to use them will be included.
|
REFEREED
PAPERS
Mardi Gras D-H
Building
Blocks
Session Chair: Ruth Milner, NRAO
Unleashing the Power of JumpStart--A New Technique for Disaster Recovery,
Cloning, or Snapshotting a Solaris System
Lee Amatangelo, Collective Technologies
A Linux Appliance Construction Set
Michael W. Shaffer, Agilent Labs RCS
Automating Dual Boot (Linux & NT) Installations
Rajeev Agrawala, Shaun Erickson, and Robert Fulmer, Lucent/Bell Labs
Research
|
INVITED
TALKS
Acadia
SANs--From A to
Reality
W. Curtis Preston, Collective Technologies
Storage Area Networks (SANs) are showing up everywhere. Many IT managers have
been overheard making statements such as, "We're going to completely get rid of
X, Y, and Z, and replace it with a SAN," or "We've got to have a SAN road map."
This talk gives you the information you need to be able to respond appropriately
to such statements, and it includes examples of real-life applications of SAN
technology so that you can decide whether or not a SAN is in your future.
|
SECURITY TRACK
Carondelet
Someone's Knocking
at the Door...
Session Chair: Cat Okita, Global Crossing Ltd.
Tracing Anonymous Packets to Their Approximate Source
Hal Burch Carnegie Mellon Univ, and Bill Cheswick, Lumeta Corporation
Analyzing Distributed Denial of Service Tools: The Shaft Case
Sven Dietrich, NASA Goddard Space Flight Center; Neil Long, Oxford University; and David Dittrich, University of Washington
|
REFEREED
PAPERS
Mardi Gras D-H
Work-in-Progress
Reports
Session Chair: Peg Schafer, Harvard University
Short, pithy, and fun, Work-in-Progress reports introduce interesting new or
on-going work, and the LISA audience provides valuable discussion and feedback.
A schedule of presentations will be posted at the conference.
To present a WiP, please see the
submission instructions.
|
INVITED
TALKS
Acadia
Why the
Documentation Sucks and What You Can Do About It
Steven Levine, SGI
System administrators often complain about documentation. It can be difficult to
find just the right information in the circumstances you most need it. Why is
this so? This talk will discuss some inherent difficulties of writing
administration documentation, presented from the point of view of a technical
writer. It will also present proposals for how system administrators and
technical writers can work together to improve the general state of
administration documentation.
|
SECURITY TRACK
Carondelet
. . . Don't Let
Them In
Session Chair: Simon Cooper, SGI
YASSP! A Tool for Improving Solaris Security
Jean Chouanard, Xerox PARC
SubDomain: Parsimonious Server Security
Crispin Cowan, Steve Beattie, Greg Kroah-Hartman, Calton Pu, Perry Wagle, and
Virgil Gligor, WireX Communications, Inc.
NOOSE--Networked Object-Oriented Security Examiner
Bruce Barnett, General Electric Corporate Research & Development
|