Technical Sessions
Wed., Dec. 5 |
Thurs., Dec. 6 |
Fri., Dec. 7 | Guru Is In |
All in one file
All Technical Sessions will be held in the San Diego Town and Country Resort Hotel and include:
| ||||
WEDNESDAY, DECEMBER 5, 2001 Thursday | Friday | ||||
8:45 am - 10:30 am | ||||
Opening Remarks,
Awards, and Keynote
Keynote Address: Slime vs. Silicon
The computer-savvy engineer dreams of being relieved of the burden of being encased in an expendable and fragile carbon-based unit, of uncertain but limited lifespan, and with an irritating propensity to fail at unexpected moments. The alternative: a silicon-brained metallic or polyalloy® ("Liquid Metal") body unit with a 1000-year rechargeable powerpack, unlimited warranty, and infinite upgrade capability. Into this unit the engineer will be ported with high speed and complete efficiency, to live a long, long uptime of adventure and discovery, while retaining or perhaps enhancing the ability to attract members of the opposite sex. Greg Bear will discuss the philosophical, biological, and practical aspects of this vision, and try to guess whether the U.S.'s current Republican administration will fund research into such endeavors. | ||||
10:30 am - 11:00 am Break | ||||
11:00 am - 12:30 pm 5 tracks! ——> | ||||
Stirring the Matrix: Organizational System Administration
Defining the Role of Service Manager: Sanity Through Organizational Evolution
Remote Outsourcing Services for Multiple Branch Offices and Small Businesses via the Internet
|
Security for E-Voting in Public Elections In this talk Avi will discuss the security considerations pertaining to remote electronic voting in public elections. In particular, he'll examine the feasibility of running national federal elections over the Internet. The focus of this talk is on the limitations of the currently deployed infrastructure in terms of the security of the hosts and the Internet itself.
|
Zope Zope is an open-source Web application server written in Python and C and published by Digital Creations. Michel is a software developer and documentation writer for DC who has worked with Zope for over two years and is co-author of the New Riders publication The Zope Book. He will be presenting some of the cooler features Zope has to offer to the presentation designer, content manager, programmer, and system administrator.
|
Illuminating the Dark Side: Short Topics on Security Issues (1 Talk, 3 Papers)
Where Has All the Crypto Gone? Long Time Coming: A Speculative and Historical Talk SUS - An Object Reference Model for Distributing UNIX Super User Privileges Peter D. Gray, University of Wollongong
IPSECvalidate: A Tool to Validate IPSEC Configurations
ScanSSH: Scanning the Internet for SSH Servers
|
LDAP Gerald Carter has been a member of the SAMBA Team since 1998 and is employed by VA Linux Systems. He is currently working on a guide to LDAP for system administrator's with O'Reilly Publishing. He holds a master's degree in computer science from Auburn University where he was also previously employed as a network and systems administrator. Gerald has published articles with various web based magazines such as Linuxworld, and has authored instructional course for companies such as Linuxcare. In addition to this, he acted as the lead author of "Teach Yourself Samba in 24 Hours" by Sams Publishing. |
12:30 pm - 2:00 pm Lunch (on your own) | ||||
2:00 pm - 3:30 pm 5 tracks! ——> | ||||
Technologies Indistinguishable from Magic: Analytical System Administration
Awarded
Best Theory Paper!
Scheduling Partially Ordered Events in a Randomised Framework: Empirical Results and Implications for Automatic Configuration Management
The Maelstrom: Network Service Debugging via "Ineffective Procedures"
|
2001: A Communications Anniversary We are at the end of a year that provided a flood of important anniversaries important to LISA attendees. Peter will discuss the anniversaries and the significance of this confluence. Among them:
1676: Leibnitz's mechanical calculator What a ride!
|
If I Could Talk to the Animals--What Sysadmins Can Learn About Diagnostic Skills from Another Profession Who, outside system administration, really understands our diagnostic processes and how to teach them to others? Of all of the professionals in the world, a veterinarian must command diagnostic skills closest to those of a system administrator. After explaining this premise, this talk presents some of the concrete wisdom the much older veterinary profession has gained with an eye toward its application to our field. It concludes with an exploration of how vets are taught diagnostic skills and how we can apply those teaching techniques.
|
Whither End-to-End: Placing Bandwidth and Trust at the Edge Gordon will look at what went wrong with our infrastructure builds. Why the distinction between bellhead and nethead has become blurred in a race for consolidated control over infrastructure and content. An examination of the Canadian way: light waves for end users, customer-owned networks, mandated open access at carrier-neutral co-los, an outline for cost-effective fiber to the business and neighborhood through municipalities using control over rights of way. Suggestions for the USA's policy that would create a community-owned sanctuary, an edge-controlled Internet.
|
AFS Having worked for Carnegie Mellon University since 1988 Esther has been working with AFS since it's toddlerhood, and is currently a Senior Systems Mangler and AFS administrator for the Pittsburgh Supercomputing Center. Esther has been helping to bring AFS content to LISA conferences for four years. Garry Zacheiss has spent three years working for MIT Information Systems doing both development and systems administration. As a member of the Athena Server Operations team, he works on maintaining and expanding the AFS cells used by Athena, MIT's Academic Computing Environment, as well as enhancing Moira, MIT's host and user account management system. |
3:30 pm - 4:00 pm Break | ||||
4:00 pm - 5:30 pm 5 tracks! ——> | ||||
Monte LISA Overdrive: Empirical System Administration
Performance Evaluation of Linux Virtual Server
Measuring Real-World Data Availability
Simulation of User-Driven Computer Behaviour
|
Internet Measurement: Myths About Internet Data Current papers that propose new techniques and protocols often make assumptions about traffic characteristics that are simply not validated by real data. Hypotheses about the level of fragmented traffic, encrypted traffic, topology characteristics, traffic favoritism, path symmetry, DOS attack prevalence, address space utilization and consumption, directional balance of traffic volume, routing protocol behavior and policy, and distribution statistics of path lengths, flow sizes, packet sizes, prefix lengths, and routing announcements therefore yield questionable analytical results. Even in cases where analysis is based on data attainable by a researcher on his or her local campus, attempts to generalize typically lose integrity in the face of more complete or representative data sets. This talk will show several examples of measurements that shed doubt on several commonly assumed Internet myths. The implication is that the community could make much better use of its collective intellectual resources if we could validate ideas against a larger variety of empirical data sets before investing research and development time and energy on certain studies. You'll also see pretty pictures of network data stuff, as always.
|
Crypto Blunders Cryptography has emerged as an enormously important component of the networked world. People are hesitant to trust the Web and e-commerce without the protections crypto provides. More and more applications are now built with crypto core components. Many cryptographic algorithms are almost unbreakable . . . if used properly. This presentation will describe some blunders, famous and not so famous. Some may be a little humorous--to those not involved. If nothing else, the audience will learn what not to do in their products. |
Infrastructure Architecture Steve helped pioneer the term "Infrastructure Architecture", and has worked towards industry acceptance of this "SysAdmin++" career track for the last several years. He is a consulting Infrastructure Architect, and publishes tools and techniques for automated systems administration. His deployments have ranged from financial trading floors and NASA supercomputers to web farms and growing startups. | |
THURSDAY, DECEMBER 6, 2001 Wednesday | Friday | ||||
9:00 am - 10:30 am 5 tracks! ——> | ||||
Seeing How the LAN Lies: Network Monitoring
Specific Simple Network Management Tools
Gossips: System and Service Monitor
The CoralReef Software Suite as a Tool for System and Network Administrators
|
150/5,000 Years of (E-)Commerce: History Repeats Itself Again Commerce has been around for at least 5,000 years, and e-commerce has arguably existed for nearly 150 years. Amazingly, the evolution of e-commerce has closely paralleled the evolution of "real" commerce. But it's in Internet time: 5,000 years of mistakes, failures, and successes in commerce have been repeated in less than 1% of the time. This talk will look at that parallel evolution, with numerous amusing examples. Then we'll see how people actually make money on the Net. We'll wind up with some speculations on the future (you should bring your own grains of salt).
|
The Problem with Developers There is a problem out there: developers (still) don't develop maintainable, production-ready, manageable code. This failure must then be handled by system administrators who must second-guess the developers, both as to their intent and on the behavior of the implemented system. This is not acceptable! This talk examines the area of production operations requirements. It then looks at how we can engage and educate the development community, working with them to ensure that their results are more manageable and maintainable.
|
Control Central: Three Talks on New Approaches to Security Management
A Non-Traditional Approach to Network Security Control
Beyond File Permissions: Controlling User Actions
Are Baseline Computer Security Standards the Answer?
|
PKI/Cryptography Greg Rose is a Principal Engineer for QUALCOMM International, based in Australia, where he works on cryptographic security and authentication for third-generation mobile phones and other technologies. He holds a number of patents for cryptographic methods and has successfully cryptanalyzed widely deployed ciphers. |
10:30 am - 11:00 am Break | ||||
11:00 am - 12:30 pm 5 tracks! ——> | ||||
Level 1 Diagnostics: Short Topics on Host Management
Global Impact Analysis of Dynamic Library Dependencies
Tools to Administer Domain and Type Enforcement
Solaris Bare-Metal Recovery from a Specialized CD and Your Enterprise Backup Solution
Accessing Files on Unmounted Filesystems
|
Rules of Thumb of System Administration
|
PHP for System Administration PHP is a popular scripting language for developing Web applications. Unlike Perl, PHP is not widely regarded as a scripting language for system administration. Yet its Web-oriented functionality is ideally suited to provide HTML interfaces for performing administrative tasks and monitoring systems and networks remotely over HTTPS. This talk will discuss using PHP to provide Web-based remote administrative access to system services such as email, SQL, and LDAP servers. We'll also discuss monitoring network services via SNMP (Simple Network Management Protocol).
|
The Packet Crackdown: Talks on TCP Performance Tuning and Packet Capture
TCP Performance Tuning
BPF Meets UVM
|
Writing Papers for Usenix Refereed Track Thomas A. Limoncelli is a Unix sysadmin and network administrator, author, and activist. He has had many papers accepted by LISA and has presented many Invited Talks and recently co-authored a book with Christine Hogan titled "The Practice of System and Network Administration", which is now in stores. He has served on the LISA Program Committee many times, including two years as Invited Talks Co-Chair. He is currently the Director of Operations at Lumeta Corporation in Somerset, New Jersey USA. |
12:30 pm - 2:00 pm Lunch (on your own) | ||||
2:00 pm - 3:30 pm 5 tracks! ——> | ||||
To Your Scattered PCs Go! Distributed Configuration Management
Automating Infrastructure Composition for Internet Services
TemplateTree II: The Post-Installation Setup Tool
The Arusha Project: A Framework for Collaborative UNIX System Administration
|
What Sysadmins Need to Know About the New Intellectual Property Laws Suddenly, intellectual property laws are directly affecting millions of people, and one of the emerging chokepoints for intellectual property holders are sysadmins. Often, IP holders attempt to convince the sysadmin or ISP to take down their Web site, threatening liability suits against them for "contributing" to infringement or circumvention. How valid is this threat? What is society's risk if sysadmins comply? If we don't like the answers, what can be done?
|
Hardening Windows 2000 This session will cover the steps necessary to harden Windows 2000 systems. Phil will step through the entire hardening process, showing the actual tools and steps (as appropriate). In particular, he will cover the use of IPSec filters and security configuration files. This talk is based on the "Hardening Windows 2000" document that Phil released in early 2001.
|
How Not to Configure Your Firewall: A Field Guide to Common Firewall Configurations Evidence from policy configuration files analyzed by the Lumeta Firewall Analyzer indicate that corporate firewalls are often enforcing poorly written rule-sets. Moreover, typical configuration mistakes are not very subtle or complex. Misconfigurations can be attributed to a combination of firewall vendor product design, conflicts between security and usability, and inexperienced users. The purpose of this talk is to identify the most common firewall misconfigurations, to discuss their causes, and to suggest fixes for them.
|
Backups Curtis is the owner of Storage Designs, a consulting company dedicated entirely to selecting, designing, implementing, auditing, and educating people about storage systems. Curtis has nine years experience designing storage systems for many environments, both large and small. He has developed a number of freely available tools, including ones that perform live backups of Oracle, Informix, and Sybase. Curtis is the administrator of the NetBackup, and NetWorker FAQs. He is also the author of O'Reilly's "UNIX Backup & Recovery," and "Using SANs & NAS," as well as a monthly column in UnixReview.com and SysAdmin magazines. |
3:30 pm - 4:00 pm Break | ||||
4:00 pm - 5:30 pm | ||||
Keynote: Rebuilding the Digital Enterprise Around Internet Standards Ernest Prabhakar, Apple As we enter the twenty-first century, enterprise information systems are experiencing yet another wave of radical change. Last decade we moved from managing monolithic mainframes to networking numerous nodes; now we find ourselves configuring a continuum of countless components. The technology of the Internet--Java, XML, and Open Source--promises to bring order out of this computing chaos, without the lock-in of single-vendor solutions. By embracing heterogeneity through the use of open standards, information can flow upward to ever-larger datastores while functionality flows downward to ever-smaller devices. But will this really create a Brave New World where users change applications and devices as often as they change clothes, and only data endures?
| ||||
5:45 pm - 7:00 pm | ||||
CNN.com: Facing a World Crisis William LeFebvre, CNN Internet Technologies September 11 of 2001 saw heinous events of such magnitude that the entire world was transfixed by disbelief. In the understandable hunger for news, Net users flocked to news sites. The unexpected and unprecedented demand quickly drove nearly every news site into the ground, and CNN.com was no exception. What brought our site back up was a tremendous effort of teamwork, fast thinking, and troubleshooting, all happening in the face of a terrible tragedy. In the span of 15 minutes the demand for our site increased by an order of magnitude. On September 11, with only 85% availability, we still served over 132 million pages, nearly equaling our site's all-time high. On September 12, we shattered any previous site records with 304 million page views. This talk will tell the story of CNN.com and the team that worked so hard to meet the unbelievable user demand. One of the biggest challenges faced by the team was induced by cascading failures, so that increasing capacity alone was not sufficient to resurrect the site. The talk will conclude with a discussion about the relevance of this experience to anyone who runs a Web site.
| ||||
FRIDAY, DECEMBER 7, 2001 Wednesday | Thursday | ||||
9:00 am - 10:30 am 5 tracks! ——> | ||||
Human Interface: Timely Solutions
Awarded
Best Applied Paper!
Dynamic Sublists: Scaling Unmoderated Mailing Lists
GEORDI: A Handheld Tool for Remote System Administration
|
JINI Networking Technology and Ad-Hoc Networks The Jini Networking Technology is an attempt to change the rules of network organization. By utilizing the ability to move objects, including the code that implements the object, around the network in a safe fashion, the Jini technology allows networks to spontaneously form, heal, and change without the need for explicit administration. Jim will describe the Jini technology and how it is being used. Wild speculation on other possible uses and its impact on networking in general will fill in any time remaining.
|
To Teraflops and Beyond!
Panel: An Overview of Terascale Computing
Invited Talk: San Diego Supercomputer Center's Blue Horizon
Managing the Terascale: Lessons from a 750-Node Supercomputer
Wrap-Up and Q & A
|
The Network from Orbit:
Macroscopic Internet Topology and Performance Measurements from the DNS Root Name Servers
DNS Root/g TLD Server Measurements
|
Sysadmin for Suits Bill has spent 5 years at American Express as both a sysadmin and a lead of sysadmins. He is currently the lead over a group of 8 NT, AIX and Solaris admins. In the last 18 months he has managed to help his group rise from a beaten-down overworked and almost discarded group to one that is virtually setting policy as well as driving major changes in the management of systems throughout the company. |
10:30 am - 11:00 am Break | ||||
11:00 am - 12:30 pm 5 tracks! ——> | ||||
Adapting the Collective: Short Topics on Configuration Management
Pelican DHCP Automated Self-Registration System: Distributed Registration and Centralized Management
A Management System for Network-Shareable Locally Installed Software: Merging RPM and the Depot Scheme Under Solaris
File Distribution Efficiencies: cfengine Versus rsync
CfAdmin: A User Interface for cfengine
|
Reducing System Complexity: Many organizations are tackling the problem of simplifying their computing environments, by minimizing unnecessary diversity, setting standards for hardware and software, or developing global procedures for system administration. This talk will describe one organization's ongoing project to develop a solution suitable for all its locations. It will cover the scope, decision points and processes, trade-offs, and the application of project management techniques. It will also discuss the obstacles encountered and lessons learned on the road to an environment where users can move comfortably across sites and system administrators can leverage each other's work instead of duplicating it.
|
Panel: Written Any Good Books Lately? Ever wondered what it's like to write a technical book? Here's your chance to hear five authors and an Addison-Wesley editor share their insights into and experiences of the process and the end result--seeing your name on the book's cover and collecting those royalties. Writing is never a simple task, and book-length projects increase the difficulty exponentially. The manuscript doesn't appear in print by magic, but demands a new set of skills. Finally, the publisher has to reach the people who need to read your book, to let them know it exists. Come to this talk to hear just what it took to make that book.
|
Inspection, Detection & Deflection: Armoring the Next Wave of Security Technology Efforts to solve existing network security problems are failing. There exists a need for a new, more proactive approach to the issues of insertion, evasion, and denial of service against network security technologies. This talk will describe an approach to solving the problem of network security, with particular attention to the reduction of false positives and the concept of target awareness.
|
Email MTAs Eric is the original author of sendmail. He is the author of syslog, tset, the -me nroff macros, and trek. He was the chief programmer on the INGRESS database management project, designed database user and application interfaces at Britton Lee, and contributed to the Ring Array Processor project at the International Computer Science Institute. He is a former member of the USENIX Board of Directors. |
12:30 pm - 2:00 pm Lunch (on your own) | ||||
2:00 pm - 3:30 pm 5 tracks! ——> | ||||
Work-in-Progress
Reports Short, pithy, and fun, Work-in-Progress reports introduce interesting new or on-going work, and the LISA audience provides valuable discussion and feedback. A schedule of presentations will be posted at the conference. See page 29 for complete information on how to submit presentations.
|
SANs and NAS As little as two years ago, SANs and NAS were not considered by most people to be competing technologies. Today, each type of network offers a unique solution, with its own pros and cons. Yes, they are now competing technologies. This talk will explain the similarities, differences, advantages, and disadvantages of each of these types of storage network, so that you can decide which one is right for you. (The answer may be, Both.)
|
Panel: Scripting Languages Bake-Off Join our panel of language experts as we explore the features sysadmins want most in scripting languages. Find out the strengths and weaknesses of some of the most popular languages: Perl, Tcl, Python, and PHP. Listen, participate, enjoy.
|
Panel: The Future of Computer Security Marcus and a panel of experts will discuss where computer security is headed and what can be done about it.
|
Computer Room Design/Layout Adam Moskowitz has designed, built, and overhauled computer rooms ("data centers") for such companies as Open Market, Genome Therapeutics, and LION Bioscience Research; he has also designed and built high-density compute clusters for companies including Vertex Pharmaceuticals and Biogen. Adam has over 20 years experience as a programmer and systems architect, has sat on several LISA and USENIX program committees, and is the coordinator of the LISA Advanced Topics Workshop. |
3:30 pm - 4:00 pm Break | ||||
4:00 pm - 5:30 pm | ||||
The LISA Game Show,
with your hosts, Rob
Kolstad and Dan Klein Back by popular demand, Rob Kolstad and Dan Klein host this challenging test of wits for LISA attendees. Watch contestants wither under the dual spotlights of difficult questions and special attention from the hosts. | ||||
Need help? Use our Contacts page.
Last changed: 2 Nov. 2011 ch |
|