Check out the new USENIX Web site.
FAST '08 Banner
TUTORIAL PROGRAM

Overview | Tutorial Descriptions
To meet your needs, the tutorial program at FAST '08 provides in-depth, immediately useful training in the latest techniques, effective tools, and best strategies. The new one-day program offers 4 half-day sessions to choose from.

USENIX tutorials survey the topic, then dive into the specifics of what to do and how to do it. Instructors are well-known experts in their fields, selected for their ability to teach complex subjects. Attend tutorials at FAST '08 and take valuable skills back to your company or organization. Take advantage of the special FAST offer: Buy one tutorial and get the second for free! Register now to guarantee your first choice—seating is limited.

Our Guarantee
If you're not happy, we're not happy. If you feel a tutorial does not meet the high standards you have come to expect from USENIX, let us know by the first break and we will change you to any other available tutorial immediately.
Continuing Education Units (CEUs)
USENIX provides Continuing Education Units for a small additional administrative fee. The CEU is a nationally recognized standard unit of measure for continuing education and training and is used by thousands of organizations.
    Two half-day tutorials qualify for 0.6 CEUs. You can request CEU credit by completing the CEU section on the registration form. USENIX provides a certificate for each attendee taking a tutorial for CEU credit and maintains transcripts for all CEU students. CEUs are not the same as college credits. Consult your employer or school to determine their applicability.

Tuesday, February 26, 2008   
 Half Day Tutorials (a.m.)   
T1
Regency 2
Brent Welch &
Marc Unangst
Clustered and Parallel Storage System Technologies
T2
Gold Room
Richard Freitas, Winfried Wilcke, & Bülent Kurdi
Storage Class Memory, Technology, and Use
 Half Day Tutorials (p.m.)   
T3
Regency 2
Rob Ross & Rob Latham
Parallel I/O for High-Performance Computing
T4
Gold Room
Christian Cachin
Cryptographic Methods for Protecting Storage Systems
footer
?Need help? Use our Contacts page.

Last changed: 22 Feb. 2008 mn