| 
| Technical Sessions   
Wednesday, Nov. 10 | 
Thursday, Nov. 11 | 
Friday, Nov. 12 | All in one file |  
 
|  |  |  |  | Wednesday, November 10
   Thursday | Friday |  | 9:00am - 10:30am   Opening Remarks & Keynote - Rooms 6A & 6B |  | Getting the Space Shuttle Ready to Fly Joe Ruga, IBM Global Services Division at Boeing North American
 
Joe is the lead of the engineering computing center for design, analysis, and
support of each shuttle flight. He will discuss the ins and outs of system
administration for the space shuttle--a very large production environment. |  | 10:30am - 11:00am   Break |  
|  |  |  |  | 11:00am - 12:30pm |  | REFEREED
PAPERS Room 6A
 
Using Electronic MailSession Chair: Josh Simon, Collective Technologies
 
ssmail:  Opportunistic Encryption in Sendmail
Damian Bentley, Australian National University;
Greg Rose, QUALCOMM Australia; Tara Whalen, Communications Research
Centre Canada
 
MJDLM: Majordomo based Distribution List Management
Vincent D. Skahan, Jr. and Robert Katz, The Boeing Company
 
RedAlert: A Scalable System for Application Monitoring
Eric Sorenson, Explosive
Networking; Strata Rose Chalup, VirtualNet
 
 | INVITED
TALKS Room 6B
 
Deep Space BINDPaul Vixie, Internet Software Consortium
 
After having been relatively stable and reliable for about fifteen years, DNS is undergoing its inevitable rototilling, and BIND
with it. It's time 
for the world to learn what to expect from BIND-9 and EDNS.
 | PRACTICUM Room 6C
 
Look, Ma, No Hands! Coping with RSITrey Harris, University of North Carolina, Chapel Hill
 
Repetitive Strain Injury (RSI) is an occupational hazard faced by many people
who work long hours at a keyboard. Most RSI sufferers either ignore symptoms
until they cannot work, or attempt to self-treat in ineffective or even harmful
ways. This talk will address effective strategies for living and working with
RSI, including the pros and cons of voice recognition technology for technical
work, how to evaluate ergonomic products, and tips for work and living habits
that can help prevent the occurrence, or reoccurrence, of RSI.
 |  | 12:30pm - 2:00pm   Lunch (on your own) |  
|  |  |  |  | 2:00pm - 3:30pm |  | REFEREED
PAPERS Room 6A
 
The Way We WorkSession Chair: Cat Okita, Earthworks
 
Deconstructing User Requests and the Nine Step Model
Thomas A. Limoncelli, Lucent Technologies/Bell Labs
 
Adverse Termination Procedures -or- "How to Fire a System Administrator"
Matthew F. Ringel; Thomas A. Limoncelli, Lucent
Technologies/Bell Labs
 
Organizing the Chaos: Managing Request Tickets in a Large Environment
Steve Willoughby, Intel Corporation
 
 | INVITED
TALKS Room 6B
 
The Four-Star Approach to Network ManagementJeff R. Allen, WebTV Networks, Inc.
 David Williamson, Global Networking and Computing, Inc.
 Presentation slides
 
Experience shows that large network-management platforms that promise to be all
things to all people usually don't solve the problems we need them to. An
alternative to using one big tool is to assemble a collection of smaller tools
that do precisely what you need. In this talk, I'll explain how WebTV chooses
and uses tools, giving particular attention to Cricket, a tool which has given
us great visibility into the behavior of our systems.
 | PRACTICUM Room 6C
 
Hot Topics/Buzzword BingoModerator: Daniel V. Klein, Consultant
 
What's the buzz? Come hear our panel of "experts" comment on current technology
buzzwords--what they're about, and whether you should care. Next time your boss
sends you on a hunt, know whether you're chasing something good or just
pointy-haired vaporware.
 |  | 3:30pm - 4:00pm   Break |  
|  |  |  |  | 4:00pm - 5:30pm |  | REFEREED
PAPERS Room 6A
 
ToolsSession Chair: Adam Moskowitz, LION bioscience Research, Inc.
 
GTrace - A Graphical Traceroute Tool
Ram Periakaruppan and Evi Nemeth, University of Colorado at Boulder and
Cooperative Association for Internet Data Analysis
 
rat: A Secure Archiving Program with Fast Retrieval
Willem A. (Vlakkies) Schreüder and Maria Murillo, University of Colorado at Boulder
 
Cro-Magnon: A Patch Hunter-Gatherer
Jeremy Bargen, University of Colorado at Boulder and Raytheon
Systems Company; Seth Taplin, University of Colorado at Boulder and CiTR, Inc.
 
 | INVITED
TALKS Room 6B
 
Microsoft's Internal Deployment of Windows 2000Curt Cummings, Microsoft, Information Technology Group
 
The Information Technology Group (ITG) at Microsoft has aggressively planned and implemented Windows 2000 on a global scale. Microsoft's IT group will share its
deployment process, problems, and concerns with others in the industry.
Discussion of deployment topics includes best practices for global
infrastructure deployment, namespace design, domain hierarchies for a global
environment, Active Directory utilization and planning, schema management, and
custom application integration as an active directory component.
 | PRACTICUM Room 6C
 
A Couple of Web Servers, a Small Staff, Thousands of Users, and Millions of
Web Pages...How We Manage (Sort of)Anne Salemme and Jag Patel, MIT
 Presentation slides
 
The Web has become an essential part of day-to-day life at MIT, and supporting
the rapidly  changing needs of the Web publishers at MIT is a challenge, given
the staff and funding resources of MIT Information Systems. We have been able to
provide Web service for static content for thousands of users and millions of
Web pages by supporting Web servers as basically an add-on to the necessary
underlying services we already provided. This model is challenged by potential
future needs, such as dynamically generated content and authenticated access for
publishers to their content via the Web. We will discuss day-to-day problems
solved and lessons learned, and make some guesses about what we might be
learning in the future.
 |  | Thursday, November 11
   Wednesday | Friday |  | 9:00am - 10:30am |  | REFEREED
PAPERS Room 6A
 
Thinking on the JobSession Chair: Thomas A. Limoncelli, Lucent Technologies/Bell Labs
 
A Retrospective on Twelve Years of LISA Proceedings
Eric Anderson and Dave Patterson, University of California at Berkeley
 
Managing Security in Dynamic Networks
Alexander V. Konstantinou, Yechiam Yemini, Columbia University; Sandeep Bhatt, and S. Rajagopalan, Telcordia Technologies (formerly Bellcore)
 
It's Elementary, Dear Watson: Applying Logic Programming to Convergent
System Management Processes
Dr. Alva L. Couch and Michael Gilfix, Tufts University
 
 | INVITED
TALKS Room 6B
 
Real World Intrusion DetectionMark K. Mellis, Consultant, SystemExperts Corp.
 
As e-commerce and extranet applications introduce riskier Internet protocols,
sysadmins need intrusion detection techniques in order to distribute security
countermeasures on increasingly open networks.
 | PRACTICUM Room 6C
 
Budgeting for SysAdminsAdam Moskowitz, LION bioscience Research, Inc., and Gregory H. Hamm,
GPC USA, Inc.
 
This session will present the nuts and bolts--and pitfalls--of preparing a
budget for the systems department: what to include in a budget, what you're
likely to forget to include, how to justify the money you're asking for, what
kinds of questions senior management is likely to ask when you present your
budget, and what to do when they don't give you as much money as you wanted.
 |  | 10:30am - 11:00am   Break |  
|  |  |  |  | 11:00am - 12:30pm |  | REFEREED
PAPERS Room 6A
 
Network InfrastructureSession Chair: Greg Rose, QUALCOMM Australia
 
NetReg: An Automated DHCP Registration System
Peter Valian and Todd K. Watson, Southwestern University
 
Dealing with Public Ethernet Jacks - Switches, Gateways, and
Authentication
Robert Beck, University of Alberta
 
NetMapper: Hostname Resolution Based on Client Network Location
Josh Goldenhar, Cisco Systems, Inc.
 
 | INVITED
TALKS Room 6B
 
The System Administrator's Body of KnowledgeGeoff Halprin, The SysAdmin Group
 
The maturing field of systems administration to date lacks a formal
understanding of the profession which organizations can use to assess their
maturity and individuals can consult to plan their career development. The
Systems Administration Body Of Knowledge (a.k.a. Taxonomy of Best Practices)
project is working toward defining the duties and responsibilities of the
profession and capturing industry best practices. This talk provides an overview
of the project, the progress made to date, and the projected path toward the
SA-BOK's goals.
 | PRACTICUM Room 6C
 
Inexpensive FirewallsSimon Cooper, SGI
 Presentation Slides
 
Building inexpensive firewalls using low cost hardware, freely
available tools and configuration time can be used to provide both Internet and
internal security solutions.  This talk will show how inexpensive
firewalls can become part of your security toolbox.
 |  | 12:30pm - 2:00pm   Lunch (on your own) |  
|  |  |  |  | 2:00pm - 3:30pm |  | REFEREED
PAPERS Room 6A
 
File SystemsSession Chair: Doug Kingston, Deutsche Bank
 
Enhancements to the Autofs Automounter
Ricardo Labiaga, Sun Microsystems, Inc.
 
The Advancement of NFS Benchmarking: SFS 2.0
David Robinson, Sun Microsystems, Inc.
 
Moving Large Filesystems On-Line, Including Exiting HSM Filesystems
Vincent Cordrey, Doug Freyburger, Jordan Schwartz, and Liza Weissler,
Collective Technologies
 
 | INVITED
TALKS Room 6B
 
Building Internet DatacentersJay Yu and Bryan McDonald, GNAC, Inc.
 
How to plan and build datacenters from an IT perspective. Topics include: 
 Basic and advanced requirements
Trade-offs among wants, needs, and budget
Working with construction contractors
Building your own datacenter vs. co-location or other
alternatives
Building or campuswide infrastructure requirements and
recommendations
 
 | PRACTICUM Room 6C
 
EthicsLee Damon, Qualcomm, and Rob Kolstad, SANS Institute
 
We'll start with a discussion of the ethics canons of various SAGE organizations
and continue to an interactive bimediated debate on some practical ethical
situations from the workplace. Raise your awareness of real-world ethical
dilemmas and how to avoid them (or cope with them once they're upon you!).
 |  | 3:30pm - 4:00pm   Break |  
|  |  |  |  | 4:00pm - 5:30pm |  | REFEREED
PAPERS Room 6A
 
SystemsSession Chair: Eric Anderson, University of California at Berkeley
 
ServiceTrak Meets NLOG/NMAP
Jon Finke, Rensselaer Polytechnic Institute
 
Burt: The Backup and Recovery Tool
Eric Melski, Scriptics Corporation
 
Design and Implementation of a Failsafe Print System
Giray Pultar, Coubros Consulting LLC
 
 | INVITED
TALKS Room 6B
 
Approaching a PetabyteHal Miller, University of Washington
 Presentation paper
 
We know how to grow computing sites incrementally, aiming into the terabytes of
storage. This talk discusses some issues involved in massive growth of online
storage needs--to a petabyte and beyond.What questions need to be answered
before designing significant expansion or a very large new site? What can be
learned from others' experiences?
 | PRACTICUM Room 6C
 
NETA/LISA-NT/Security Highlights
 
Speakers:David Williamson, GNAC, Inc.
 Gerald W. Carter, Auburn University
 Greg Rose, Qualcomm Australia
 Security Highlights slides
 |  | Friday, November 12
   Wednesday | Thursday |  | 9:00am - 10:30am |  | REFEREED
PAPERS Room 6A
 
Network SecuritySession Chair: Doug Hughes, Auburn University
 
Snort - Lightweight Intrusion Detection for Networks
Martin Roesch, Stanford Telecommunications, Inc.
 
Internet Routing and DNS Voodoo in the Enterprise
D. Brian Larkins, Lucent Technologies
 
Moat: A Virtual Private Network Appliance and Services Platform
John S. Denker and  Steven M. Bellovin, AT&T Laboratories; Hugh Daniel,
FreeS/WAN Project; Nancy L. Mintz, Tom Killian, and Mark A. Plotnick, AT&T Laboratories
 
 | INVITED
TALKS Room 6B
 
NT Without Domain ControllersChris Stradtman, SYSNET Inc.
 
Four people set up and support 50+ NT 4.0 client sites using an NT domain served
by SAMBA on a Linux box. Result: Low cost, low on-site support time, reasonable
remote management.
 
Providing Reliable NT Desktop Services 
by Avoiding NT Server
Thomas A. Limoncelli, Lucent Technologies/Bell Labs
 
How does Bell Labs integrate NT and UNIX? We use open protocols to build a rich
and reliable user environment. We'll give you the technical underpinnings--and
how to sell the idea to management.
 | PRACTICUM Room 6C
 
University Issues Panel
 
William Annis, University of WisconsinDavid Brumley, Stanford University
 Robyn Landers, University of Waterloo
 Kathy Penn, University of Maryland
 Moderator: Jon Finke, Rensselaer Polytechnic Institute
 Presentation slides
 
In this highly interactive session, a panel of university sysadmins and the
audience will discuss problems common to the realm of academia.
 |  | 10:30am - 11:00am   Break |  
|  |  |  |  | 11:00am - 12:30pm |  | REFEREED
PAPERS Room 6A
 
Win a WiP!Session Chair: Peg Schafer, Harvard University
 
Short, pithy, and fun, Work in Progress reports introduce interesting new or
on-going work. Fast paced and spontanious, the WiPs feature new ideas
or novel solutions to old problems.  The number of presenters is limited,
so reserve your WiPs slot by sending a note to lisawips@usenix.org.
Work in Progress reports are generally five-minute presentations;
really interesting work can get more air time.
 | INVITED
TALKS Room 6B
 
Managing Your Network(s): Corporate Mergers & Acquisitions, or, You Got
Your Chocolate in My Peanut ButterEliot Lear, Cisco Systems
 
Is your company growing by purchasing other companies or by being purchased?
What do you need to do to your network to prepare for a merger? What do you need
to do to complete a merger? What tools will help you? We'll discuss routing
systems, addressing, firewalls, and network management tools and processes. And
of course there will be war stories!
 | PRACTICUM Room 6C
 
Results!
 
Summaries of the Topic Workshops (held earlier in the week), the Terminal Room
InstallFest, Day in the Life of a SysAdmin, and the salary survey.
 |  | 12:30pm - 2:00pm   Lunch (on your own) |  
|  |  |  |  | 2:00pm - 3:30pm |  | REFEREED
PAPERS Room 6A
 
InstallationsSession Chair: Evi Nemeth, University of Colorado and Cooperative Ass'n for
Internet Data Analysis
 
Automated Installation of Linux Systems Using YaST
Dirk Hohndel and Fabian Herschel, SuSE Rhein/Main AG
 
Enterprise Rollouts with Jumpstart
Jason Heiss, Collective Technologies
 
Automated Client-side Integration of Distributed Application Servers
Conrad E. Kimball, Vincent D. Skahan, Jr., and David J. Kasik, The  Boeing Company; Roger L. Droz,
Analysts International
 
 | | INVITED
TALKS Room 6B
 | PRACTICUM |  | State of the Art in Internet Measurement and Data Analysis: Topology,
Workload, Performance and Routing Statistics
 kc claffy, cooperative association for internet data analysis
 
This talk discusses the collection, analysis, and visualization of four forms of
Internet traffic data. Topology data describe network link infrastructure
at a variety of protocol layers. Workload measurements involve the
collection of traffic information from a point within a network. Performance
measurements involve the introduction of traffic into the network in order
to monitor delay between specific end-points. Routing data includes data
from Border Gateway Protocol (BGP) routing tables, which reflect the transit
relationships between individual Autonomous Systems (ASes) at a given point in
time.
 
The talk describes the role of each measurement area in understanding Internet
behavior and evolution; offers state-of-the-art analysis examples; outlines
current research priorities; and describes obstacles to making progress in each
area. | 
 
 |  | 3:30pm - 4:00pm   Break |  
|  |  |  |  | 4:00pm - 5:30pm |  | Win, Place, or Show? The New LISA Game Show, with your host, Rob Kolstad
 
Join Rob and the LISA gang for the revival of one of your favorite TV
shows--the way sysadmins do it!
 |  
 |