Technical Sessions
Wednesday, Nov. 10 |
Thursday, Nov. 11 |
Friday, Nov. 12 | All in one file
|
|
|
|
Wednesday, November 10
Thursday | Friday
|
9:00am - 10:30am Opening Remarks & Keynote - Rooms 6A & 6B
|
Getting the Space Shuttle Ready to Fly
Joe Ruga, IBM Global Services Division at Boeing North American
Joe is the lead of the engineering computing center for design, analysis, and
support of each shuttle flight. He will discuss the ins and outs of system
administration for the space shuttle--a very large production environment. |
10:30am - 11:00am Break
|
|
|
|
11:00am - 12:30pm
|
REFEREED
PAPERS Room 6A
Using Electronic Mail
Session Chair: Josh Simon, Collective Technologies
ssmail: Opportunistic Encryption in Sendmail
Damian Bentley, Australian National University;
Greg Rose, QUALCOMM Australia; Tara Whalen, Communications Research
Centre Canada
MJDLM: Majordomo based Distribution List Management
Vincent D. Skahan, Jr. and Robert Katz, The Boeing Company
RedAlert: A Scalable System for Application Monitoring
Eric Sorenson, Explosive
Networking; Strata Rose Chalup, VirtualNet
|
INVITED
TALKS Room 6B
Deep Space BIND
Paul Vixie, Internet Software Consortium
After having been relatively stable and reliable for about fifteen years, DNS is undergoing its inevitable rototilling, and BIND
with it. It's time
for the world to learn what to expect from BIND-9 and EDNS.
|
PRACTICUM Room 6C
Look, Ma, No Hands! Coping with RSI
Trey Harris, University of North Carolina, Chapel Hill
Repetitive Strain Injury (RSI) is an occupational hazard faced by many people
who work long hours at a keyboard. Most RSI sufferers either ignore symptoms
until they cannot work, or attempt to self-treat in ineffective or even harmful
ways. This talk will address effective strategies for living and working with
RSI, including the pros and cons of voice recognition technology for technical
work, how to evaluate ergonomic products, and tips for work and living habits
that can help prevent the occurrence, or reoccurrence, of RSI.
|
12:30pm - 2:00pm Lunch (on your own)
|
|
|
|
2:00pm - 3:30pm
|
REFEREED
PAPERS Room 6A
The Way We Work
Session Chair: Cat Okita, Earthworks
Deconstructing User Requests and the Nine Step Model
Thomas A. Limoncelli, Lucent Technologies/Bell Labs
Adverse Termination Procedures -or- "How to Fire a System Administrator"
Matthew F. Ringel; Thomas A. Limoncelli, Lucent
Technologies/Bell Labs
Organizing the Chaos: Managing Request Tickets in a Large Environment
Steve Willoughby, Intel Corporation
|
INVITED
TALKS Room 6B
The Four-Star Approach to Network Management
Jeff R. Allen, WebTV Networks, Inc.
David Williamson, Global Networking and Computing, Inc.
Presentation slides
Experience shows that large network-management platforms that promise to be all
things to all people usually don't solve the problems we need them to. An
alternative to using one big tool is to assemble a collection of smaller tools
that do precisely what you need. In this talk, I'll explain how WebTV chooses
and uses tools, giving particular attention to Cricket, a tool which has given
us great visibility into the behavior of our systems.
|
PRACTICUM Room 6C
Hot Topics/Buzzword Bingo
Moderator: Daniel V. Klein, Consultant
What's the buzz? Come hear our panel of "experts" comment on current technology
buzzwords--what they're about, and whether you should care. Next time your boss
sends you on a hunt, know whether you're chasing something good or just
pointy-haired vaporware.
|
3:30pm - 4:00pm Break
|
|
|
|
4:00pm - 5:30pm
|
REFEREED
PAPERS Room 6A
Tools
Session Chair: Adam Moskowitz, LION bioscience Research, Inc.
GTrace - A Graphical Traceroute Tool
Ram Periakaruppan and Evi Nemeth, University of Colorado at Boulder and
Cooperative Association for Internet Data Analysis
rat: A Secure Archiving Program with Fast Retrieval
Willem A. (Vlakkies) Schreüder and Maria Murillo, University of Colorado at Boulder
Cro-Magnon: A Patch Hunter-Gatherer
Jeremy Bargen, University of Colorado at Boulder and Raytheon
Systems Company; Seth Taplin, University of Colorado at Boulder and CiTR, Inc.
|
INVITED
TALKS Room 6B
Microsoft's Internal Deployment of Windows 2000
Curt Cummings, Microsoft, Information Technology Group
The Information Technology Group (ITG) at Microsoft has aggressively planned and implemented Windows 2000 on a global scale. Microsoft's IT group will share its
deployment process, problems, and concerns with others in the industry.
Discussion of deployment topics includes best practices for global
infrastructure deployment, namespace design, domain hierarchies for a global
environment, Active Directory utilization and planning, schema management, and
custom application integration as an active directory component.
|
PRACTICUM Room 6C
A Couple of Web Servers, a Small Staff, Thousands of Users, and Millions of
Web Pages...How We Manage (Sort of)
Anne Salemme and Jag Patel, MIT
Presentation slides
The Web has become an essential part of day-to-day life at MIT, and supporting
the rapidly changing needs of the Web publishers at MIT is a challenge, given
the staff and funding resources of MIT Information Systems. We have been able to
provide Web service for static content for thousands of users and millions of
Web pages by supporting Web servers as basically an add-on to the necessary
underlying services we already provided. This model is challenged by potential
future needs, such as dynamically generated content and authenticated access for
publishers to their content via the Web. We will discuss day-to-day problems
solved and lessons learned, and make some guesses about what we might be
learning in the future.
|
Thursday, November 11
Wednesday | Friday
|
9:00am - 10:30am
|
REFEREED
PAPERS Room 6A
Thinking on the Job
Session Chair: Thomas A. Limoncelli, Lucent Technologies/Bell Labs
A Retrospective on Twelve Years of LISA Proceedings
Eric Anderson and Dave Patterson, University of California at Berkeley
Managing Security in Dynamic Networks
Alexander V. Konstantinou, Yechiam Yemini, Columbia University; Sandeep Bhatt, and S. Rajagopalan, Telcordia Technologies (formerly Bellcore)
It's Elementary, Dear Watson: Applying Logic Programming to Convergent
System Management Processes
Dr. Alva L. Couch and Michael Gilfix, Tufts University
|
INVITED
TALKS Room 6B
Real World Intrusion Detection
Mark K. Mellis, Consultant, SystemExperts Corp.
As e-commerce and extranet applications introduce riskier Internet protocols,
sysadmins need intrusion detection techniques in order to distribute security
countermeasures on increasingly open networks.
|
PRACTICUM Room 6C
Budgeting for SysAdmins
Adam Moskowitz, LION bioscience Research, Inc., and Gregory H. Hamm,
GPC USA, Inc.
This session will present the nuts and bolts--and pitfalls--of preparing a
budget for the systems department: what to include in a budget, what you're
likely to forget to include, how to justify the money you're asking for, what
kinds of questions senior management is likely to ask when you present your
budget, and what to do when they don't give you as much money as you wanted.
|
10:30am - 11:00am Break
|
|
|
|
11:00am - 12:30pm
|
REFEREED
PAPERS Room 6A
Network Infrastructure
Session Chair: Greg Rose, QUALCOMM Australia
NetReg: An Automated DHCP Registration System
Peter Valian and Todd K. Watson, Southwestern University
Dealing with Public Ethernet Jacks - Switches, Gateways, and
Authentication
Robert Beck, University of Alberta
NetMapper: Hostname Resolution Based on Client Network Location
Josh Goldenhar, Cisco Systems, Inc.
|
INVITED
TALKS Room 6B
The System Administrator's Body of Knowledge
Geoff Halprin, The SysAdmin Group
The maturing field of systems administration to date lacks a formal
understanding of the profession which organizations can use to assess their
maturity and individuals can consult to plan their career development. The
Systems Administration Body Of Knowledge (a.k.a. Taxonomy of Best Practices)
project is working toward defining the duties and responsibilities of the
profession and capturing industry best practices. This talk provides an overview
of the project, the progress made to date, and the projected path toward the
SA-BOK's goals.
|
PRACTICUM Room 6C
Inexpensive Firewalls
Simon Cooper, SGI
Presentation Slides
Building inexpensive firewalls using low cost hardware, freely
available tools and configuration time can be used to provide both Internet and
internal security solutions. This talk will show how inexpensive
firewalls can become part of your security toolbox.
|
12:30pm - 2:00pm Lunch (on your own)
|
|
|
|
2:00pm - 3:30pm
|
REFEREED
PAPERS Room 6A
File Systems
Session Chair: Doug Kingston, Deutsche Bank
Enhancements to the Autofs Automounter
Ricardo Labiaga, Sun Microsystems, Inc.
The Advancement of NFS Benchmarking: SFS 2.0
David Robinson, Sun Microsystems, Inc.
Moving Large Filesystems On-Line, Including Exiting HSM Filesystems
Vincent Cordrey, Doug Freyburger, Jordan Schwartz, and Liza Weissler,
Collective Technologies
|
INVITED
TALKS Room 6B
Building Internet Datacenters
Jay Yu and Bryan McDonald, GNAC, Inc.
How to plan and build datacenters from an IT perspective. Topics include:
- Basic and advanced requirements
- Trade-offs among wants, needs, and budget
- Working with construction contractors
- Building your own datacenter vs. co-location or other
alternatives
- Building or campuswide infrastructure requirements and
recommendations
|
PRACTICUM Room 6C
Ethics
Lee Damon, Qualcomm, and Rob Kolstad, SANS Institute
We'll start with a discussion of the ethics canons of various SAGE organizations
and continue to an interactive bimediated debate on some practical ethical
situations from the workplace. Raise your awareness of real-world ethical
dilemmas and how to avoid them (or cope with them once they're upon you!).
|
3:30pm - 4:00pm Break
|
|
|
|
4:00pm - 5:30pm
|
REFEREED
PAPERS Room 6A
Systems
Session Chair: Eric Anderson, University of California at Berkeley
ServiceTrak Meets NLOG/NMAP
Jon Finke, Rensselaer Polytechnic Institute
Burt: The Backup and Recovery Tool
Eric Melski, Scriptics Corporation
Design and Implementation of a Failsafe Print System
Giray Pultar, Coubros Consulting LLC
|
INVITED
TALKS Room 6B
Approaching a Petabyte
Hal Miller, University of Washington
Presentation paper
We know how to grow computing sites incrementally, aiming into the terabytes of
storage. This talk discusses some issues involved in massive growth of online
storage needs--to a petabyte and beyond.What questions need to be answered
before designing significant expansion or a very large new site? What can be
learned from others' experiences?
|
PRACTICUM Room 6C
NETA/LISA-NT/Security Highlights
Speakers:
David Williamson, GNAC, Inc.
Gerald W. Carter, Auburn University
Greg Rose, Qualcomm Australia
Security Highlights slides
|
Friday, November 12
Wednesday | Thursday
|
9:00am - 10:30am
|
REFEREED
PAPERS Room 6A
Network Security
Session Chair: Doug Hughes, Auburn University
Snort - Lightweight Intrusion Detection for Networks
Martin Roesch, Stanford Telecommunications, Inc.
Internet Routing and DNS Voodoo in the Enterprise
D. Brian Larkins, Lucent Technologies
Moat: A Virtual Private Network Appliance and Services Platform
John S. Denker and Steven M. Bellovin, AT&T Laboratories; Hugh Daniel,
FreeS/WAN Project; Nancy L. Mintz, Tom Killian, and Mark A. Plotnick, AT&T Laboratories
|
INVITED
TALKS Room 6B
NT Without Domain Controllers
Chris Stradtman, SYSNET Inc.
Four people set up and support 50+ NT 4.0 client sites using an NT domain served
by SAMBA on a Linux box. Result: Low cost, low on-site support time, reasonable
remote management.
Providing Reliable NT Desktop Services
by Avoiding NT Server
Thomas A. Limoncelli, Lucent Technologies/Bell Labs
How does Bell Labs integrate NT and UNIX? We use open protocols to build a rich
and reliable user environment. We'll give you the technical underpinnings--and
how to sell the idea to management.
|
PRACTICUM Room 6C
University Issues Panel
William Annis, University of Wisconsin
David Brumley, Stanford University
Robyn Landers, University of Waterloo
Kathy Penn, University of Maryland
Moderator: Jon Finke, Rensselaer Polytechnic Institute
Presentation slides
In this highly interactive session, a panel of university sysadmins and the
audience will discuss problems common to the realm of academia.
|
10:30am - 11:00am Break
|
|
|
|
11:00am - 12:30pm
|
REFEREED
PAPERS Room 6A
Win a WiP!
Session Chair: Peg Schafer, Harvard University
Short, pithy, and fun, Work in Progress reports introduce interesting new or
on-going work. Fast paced and spontanious, the WiPs feature new ideas
or novel solutions to old problems. The number of presenters is limited,
so reserve your WiPs slot by sending a note to lisawips@usenix.org.
Work in Progress reports are generally five-minute presentations;
really interesting work can get more air time.
|
INVITED
TALKS Room 6B
Managing Your Network(s): Corporate Mergers & Acquisitions, or, You Got
Your Chocolate in My Peanut Butter
Eliot Lear, Cisco Systems
Is your company growing by purchasing other companies or by being purchased?
What do you need to do to your network to prepare for a merger? What do you need
to do to complete a merger? What tools will help you? We'll discuss routing
systems, addressing, firewalls, and network management tools and processes. And
of course there will be war stories!
|
PRACTICUM Room 6C
Results!
Summaries of the Topic Workshops (held earlier in the week), the Terminal Room
InstallFest, Day in the Life of a SysAdmin, and the salary survey.
|
12:30pm - 2:00pm Lunch (on your own)
|
|
|
|
2:00pm - 3:30pm
|
REFEREED
PAPERS Room 6A
Installations
Session Chair: Evi Nemeth, University of Colorado and Cooperative Ass'n for
Internet Data Analysis
Automated Installation of Linux Systems Using YaST
Dirk Hohndel and Fabian Herschel, SuSE Rhein/Main AG
Enterprise Rollouts with Jumpstart
Jason Heiss, Collective Technologies
Automated Client-side Integration of Distributed Application Servers
Conrad E. Kimball, Vincent D. Skahan, Jr., and David J. Kasik, The Boeing Company; Roger L. Droz,
Analysts International
|
INVITED
TALKS Room 6B |
PRACTICUM |
State of the Art in Internet Measurement and Data Analysis: Topology,
Workload, Performance and Routing Statistics
kc claffy, cooperative association for internet data analysis
This talk discusses the collection, analysis, and visualization of four forms of
Internet traffic data. Topology data describe network link infrastructure
at a variety of protocol layers. Workload measurements involve the
collection of traffic information from a point within a network. Performance
measurements involve the introduction of traffic into the network in order
to monitor delay between specific end-points. Routing data includes data
from Border Gateway Protocol (BGP) routing tables, which reflect the transit
relationships between individual Autonomous Systems (ASes) at a given point in
time.
The talk describes the role of each measurement area in understanding Internet
behavior and evolution; offers state-of-the-art analysis examples; outlines
current research priorities; and describes obstacles to making progress in each
area. |
|
3:30pm - 4:00pm Break
|
|
|
|
4:00pm - 5:30pm
|
Win, Place, or Show?
The New LISA Game Show, with your host, Rob Kolstad
Join Rob and the LISA gang for the revival of one of your favorite TV
shows--the way sysadmins do it!
|
|