Who Should Attend:
What You Will Learn: IPv6, the newest version of the Internet's core protocol, IP; how the Internet lower layers are evolving.
If your job involves scaling your company's Internet connection to meet growth requirements, IPv6 may be necessary to meet those demands.
IP version 6 (IPv6) or IP Next Generation (IPng) is the new version of the Internet's core protocol, IP. It is designed to meet the scaling requirements imposed by the explosive growth of the Internet, and to meet the demand for greater functionality at the internet layer, including strong security, automated configuration, and support for multimedia traffic.
Learn from the lead designer of IPv6 :
Steve Deering is a member of the research staff at Xerox PARC, engaged in research on advanced internetwork technologies, including multicast routing, mobile internetworking, scalable addressing, and support for multimedia applications over the Internet. He is present or past chair of numerous Working Groups of the IETF, the inventor of IP Multicast and the MBone, and the lead designer of IPv6.
Who Should Attend: Experienced programmers and technical contributors familiar with the C and C++ programming languages, the basics of OO programming, and the basics of how the Web operates and is organized.
What You Will Learn: An understanding of the structure and features of Java language; how to write programs and applets; how to include applets in an HTML page; the security features of Java.
Java is one of the most talked-about programming languages because it makes the Web interactive, rather than just a passive medium. Learn about Java and how it enables live content programming. This "live content" consists of full programs that can be placed into HTML documents. When such a document is loaded into a Java-enabled HTML viewer such as HotJava, the program is run, creating a page with active or even interactive elements.
You will also learn about Java features that allow you to write secure, robust programs that can be relied upon to run in a finite amount of space without crashing into a pile of bits. These feautres include garbage collection, exceptions, strong typing, and a clean separation between classes and interfaces. You will also examine the set of class and interface libraries which are defined as part of any compliant Java implementation.
You will find out how to create applets, programs that can be included as part of a standard HTML document, including how to write applets, what resources are available to them, and what features of the language and runtime environment allow these applets to be run securely by anyone on the Internet.
If time permits, the day will end in wild speculation and discussion of the possible technological and social impacts of the kind of computing that Java allows.
Jim Waldo is a senior staff engineer with Sun Microsystems Laboratories, where he does research in the area of reliable distributed computing. Architect of one of the first distributed object request brokers, he has written and spoken extensively on object-oriented programming techniques, distributed computing concepts, and techniques for building robust, reuseable software.
Take better advantage of Windows NT by learning its underlying internal architecture and operation. Windows NT provides an advanced, 32-bit operating system base. How does it work under the covers? What are the key system components and what do they do? You will gain an understanding of the internal structure and components of Windows NT, including what runs in kernel mode vs. what runs in user mode, and changes introduced in NT 4.0. Using a variety of tools, you will learn about internal interfaces and behavior of the system.
You will learn about these topics:
Jamie Hanrahan provides Windows NT driver development, consulting, and training services to leading companies. He is writing a book on Windows NT device drivers, to be published by O'Reilly and Associates. He is co-author of VMS Advanced Driver Techniques and received the Instructor of the Year award while teaching VMS device drivers and internals courses for Digital.
You should be familiar with general networking concepts including TCP/IP, but expertise is not required.
What You Will Learn: An understanding of the operation of mobile hosts in the Internet today and the new and proposed protocols for supporting them.
If you support or plan to support wireless and mobile networks using TCP/IP, then you face many challenges. Wireless networks have fundamentally different properties than typical wired networks, including higher error rates, lower bandwidths, nonuniform transmission propagation, increased usage costs, and increased susceptibility to interference and eavesdropping. Similarly, mobile hosts behave differently and have different limitations than stationary hosts.
You will learn about solutions for these challenges, including important properties of wireless network transmissions using radio and infrared, and protocol support for wireless and mobile hosts in the Internet at the network and transport layers. At the network layer, you will examine the Mobile IP protocol for transparent routing to mobile hosts in the Internet, and at the transport layer, the problems in the operation of TCP when using wireless links or mobile hosts.
David B. Johnson is currently leading the Monarch Project, developing adaptive networking protocols and protocol interfaces to allow truly seamless wireless and mobile host networking. He is a member of the editorial board of the new ACM/Baltzer journal on Mobile Networks and Nomadic Applications (NOMAD) . Dr. Johnson is active in the Internet Engineering Task Force (IETF) and is on of the principal designers of the IETF Mobile IP protocol.
Who Should Attend: Anyone responsible for running a Web site.
What You Will Learn: The tradeoffs in making a Web site secure and how you can likely secure it.
If you are responsible for a Web site, security is probably an important issue for you. The World Wide Web has grabbed the popular imagination and the engineering and marketing efforts of a generation of on- line entrepreneurs and consumers, but it was designed with little thought to industrial strength security. This course will survey the numerous proposals that have surfaced to secure the Web, with the goal of understanding the strengths and weaknesses of each.
You will hear about:
What You Will Learn: The important features of SimOS, a new tool developed for studying the behavior of computer systems.
SimOS is a complete machine simulation environment designed for the efficient and accurate study of both uniprocessor and multiprocessor computer systems. SimOS currently models hardware similar to that of Silicon Graphics, including CPUs, caches, multiprocessor memory busses, disk drives, ethernet, consoles, and other devices. By simulating the hardware found on commercial computer platforms, operating systems can be ported to boot and run within the SimOS environment.
You will gain an understanding of the important features of SimOS that enable it to study large and complex workloads (such as commercial relational database systems). These include extremely high speed machine simulation, highly detailed simulation, and the flexible classification and reporting mechanisms. You will also learn about the SimOS annotation mechanism that allows the user to classify simulator events in an application-specific way. Annotations can be used to pinpoint performance problems in complex workloads, study the effects of computer architecture changes, or evaluate the impact of operating system changes. You will hear several case studies that highlight SimOS's utility.
Mendel Rosenblum teaches operating systems and does research in system software, computer architecture, and computer visualization, leading the group that built SimOS. He leads the design and implementation of the Hive, the operating system on the FLASH machine. He is a 1992 recipient of the National Science Foundation's National Young Investigator award and a 1994 recipient of an Alfred P. Sloan Foundation Research Fellowship.