32

REGISTERBYOCTOBER19ANDSAVE!•AREGISTERBYOCTOBER19ANDSAVE!•3 TUESDAY,NOVEMBER13 (CONTINUED) T6 MikeCiavarella AdvancedShellProgramming T7 GeoffHalprin and Management101:Effective

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

  • REGISTER BY OCTOBER 19 AND SAVE! • A

  • 1 Invitation from the ProgramChair

    1 Conference Organizers

    2–3 Training at a Glance

    4–12 Training Program

    12 A Note for Managers

    12 Continuing Education Units(CEUs)

    13–17 Training Instructors

    18 Keynote Address

    18–23 Technical Sessions

    24 Workshops

    25 Vendor Exhibition

    26 About USENIX & SAGE

    26 Corporate Supporters &Sponsors

    27 Conference Activities &Services

    27 Student Discounts & Grants

    28 Hotel & Travel Information

    29 Registration Information& Fees

    Saturday, November 106:00 p.m. –8:00 p.m. Welcome Get-Together

    and Conference Orienta-tion

    Sunday, November 119:00 a.m. –5:00 p.m. Training Program9:00 a.m. –5:00 p.m. Workshop: Fighting Spam:

    The State of the Art9:00 a.m. –5:00 p.m. Workshop: Server Room

    Best Practices9:00 a.m. –5:00 p.m. Workshop: MicroLISA

    Monday, November 129:00 a.m. –5:00 p.m. Training Program9:00 a.m. –5:00 p.m. Workshop: University

    Issues9:00 a.m. –5:00 p.m. Workshop: Configuration:

    From Managing Nodes toManaging Architecture

    7:00 p.m. –11:00 p.m. Birds-of-a-FeatherSessions

    Tuesday, November 139:00 a.m. –5:00 p.m. Training Program9:00 a.m. –5:00 p.m. Workshop: System

    Administration Education9:00 a.m. –5:00 p.m. Workshop: Advanced

    Topics7:00 p.m. –11:00 p.m. Birds-of-a-Feather

    Sessions

    Wednesday, November 148:45 a.m. –10:30 a.m. Opening Remarks,

    Awards, and Keynote9:00 a.m. –5:00 p.m. Training Program11:00 a.m. –5:30 p.m. Technical SessionsNoon –7:00 p.m. Vendor Exhibition5:30 p.m. –6:30 p.m. Exhibit Hall Happy Hour7:00 p.m. –11:00 p.m. Birds-of-a-Feather

    Sessions

    Thursday, November 159:00 a.m. –5:00 p.m. Training Program9:00 a.m. –5:30 p.m. Technical Sessions10:00 a.m. –2:00 p.m. Vendor Exhibition6:30 p.m. –8:30 p.m. Reception8:30 p.m. –11:30 p.m. Birds-of-a-Feather

    Sessions

    Friday, November 169:00 a.m. –5:00 p.m. Training Program9:00 a.m. –5:30 p.m. Technical Sessions2:00 p.m. –3:30 p.m. Work-in-Progress Reports4:00 p.m. –5:30 p.m. Closing Session

    CONFERENCE AT A GLANCE CONTENTS

    “”

    WHY ATTEND LISA ’07?“There is always one thing that I learn that makes me want to shout, ‘That justpaid for the entire conference!’ Also, there have been many times when Ilearned about a new sysadmin tool at LISA years before it was popular: that’sreally helped me stay ahead of the pack.”

    —Tom Limoncelli, Google NYC

    Register today at www.usenix.org/lisa2007

    REGISTER BY OCT. 19, 2007

    EARLY BIRD

    DISCOUNTSAVE!

    E

    FOCUS ON DEVELOPINGYOUR SYSADMIN SKILLS.[ ]

    USENIX, SAGE, and LISA are registered trademarks of the USENIX Association.USENIX acknowledges all trademarks herein.

  • REGISTER BY OCTOBER 19 AND SAVE! • 1

    Dear Colleague,

    On behalf of all of the LISA ’07 organizers, I’d like to invite you to join us inDallas, TX, for the 21st Large Installation System Administration Conference.

    For the past 20 years LISA has been the focal point for the global communi-ty of system and network administrators. This year LISA continues that tra-dition, featuring innovative tools and techniques essential for your profes-sional and technical development.

    Take advantage of the popular 6 days of training. Select from over 50 tutorials taught by highlyexpert instructors, including:

    • Tom Limoncelli on Time Management for System Administrators

    • Steve VanDevender on High-Capacity Email System Design

    • Æleen Frisch on Administering Linux in Production Environments

    • Faisal N. Jawdat on Introduction to Ruby, Rails, and Capistrano

    • And more . . .

    In addition to the training, 3 days of technical sessions include top-notch refereed papers,informative invited talks, expert Guru Is In sessions, and the popular Hit the Ground Runningtrack.

    Our 20+ invited talks feature our most impressive slate of speakers to date. They include:

    • Keynote: “Autonomic Administration: HAL 9000 Meets Gene Roddenberry,” byJohn Strassner, Motorola Fellow and Vice President, Autonomic Networking andCommunications, Motorola Research Labs

    • “A Service-Oriented Data Grid: Beyond Storage Virtualization,” by Bruce Moxon,Senior Director of Strategic Technology and Grid Guru, Network Appliance, Inc.

    • “The LHC Computing Challenge,” by Tony Cass, CERN

    • “Scaling Production Repairs and QA Operations in a Live Environment,” by ShaneKnapp and Avleen Vig, Google, Inc.

    • “Experiences with Scalable Network Operations at Akamai,” by Erik Nygren, ChiefSystems Architect, Akamai Technologies

    • “The Economic Meltdown of Moore’s Law,” by Kenneth G. Brill, Executive Director,Uptime Institute

    LISA is the premier forum for presenting new research in system administration. We selectedpapers from over 50 submissions, showcasing state-of-the-art work on topics including config-uration management, managing grids and clusters, virtualization, security via firewalls, and more.

    Get a head start on key technologies with 15-minute talks in the Hit the Ground Runningtrack. Find out about the basic concepts, what acronyms you will encounter, and what Websites and books are the best resources.

    Bring your perplexing technical questions to experts at LISA’s Guru Is In sessions.

    Explore the latest commercial innovations at the Vendor Exhibition.

    Benefit from new opportunities for peer interaction around the topics that mean the most to you.

    Early registration discounts for LISA ’07, taking place November 11–17, 2007, in Dallas, TX,are now available. Register by Friday, October 19, and save up to $300!

    We’re pleased to bring LISA to Dallas, and we look forward to seeing you there.

    Paul Anderson, University of EdinburghLISA ’07 Program Chair

    LISA ’07 OrganizersProgram ChairPaul Anderson, University of Edin-burgh

    Program CommitteeCharlie Catlett, NSF Teragrid Project

    William Cheswick, Consultant,cheswick.com

    Alva Couch, Tufts University

    Æleen Frisch, Exponential Consulting

    Peter Baer Galvin, Corporate Tech-nologies, Inc.

    Andrew Hume, AT&T Labs–Research

    William LeFebvre, Independent Con-sultant

    Adam Moskowitz, Menlo Computing

    Sanjai Narain, Telcordia Technologies

    Melanie Rieback, Vrije UniversiteitAmsterdam

    Kent Skaar, Bladelogic

    Chad Verbowski, Microsoft Research

    Invited Talk CoordinatorsRudi van Drunen, Competa IT/Xlexit

    Doug Hughes, D.E. Shaw Research,LLC

    Workshops CoordinatorLee Damon, University of Washington

    Guru Is In CoordinatorsPhilip Kizer, Estacado Systems

    John “Rowan” Littell, CaliforniaCollege of the Arts

    Hit the Ground Running TrackCoordinatorAdam Moskowitz, Menlo Computing

    Work-in-Progress Reports andPosters CoordinatorBrent Hoon Kang, University of NorthCarolina at Charlotte

    The USENIX Association Staff

    JOIN US![ ]

  • 2 • REGISTER TODAY: WWW.USENIX.ORG/LISA2007

    SUNDAY, NOVEMBER 11

    S1 Simson L. Garfinkel Computer Forensics

    S2 John Arrasjid and Introduction to VMware VirtualStephen Sorota Infrastructure 3

    S3 Geoff Halprin Effective Change Management:Making System Integrity Easy

    S4 Jim Reid Advanced Topics in DNS Administration

    S5 Marc Staveley System and Network PerformanceTuning

    S6 Heison Chak VoIP Jumpstarting: Getting Overthe Initial Hurdles

    S7 Tom Limoncelli Time Management for SystemAdministrators

    S8 David Hankins Advanced DHCP (This Is Not YourGrandparents’ DHCP)

    S9 Mark Burgess Integrating Cfengine intoOrganizational Service Management

    S10 Heison Chak Deploying VoIP: How to Identifyand Avoid Pitfalls

    S11 Chris Page Systems Topics in OracleDatabase Administration

    S12 Michael W. Lucas Network Diagnosis andImprovement with Netflow

    S13 Mark Burgess Implementing AutonomicPrinciples Using Cfengine

    MONDAY, NOVEMBER 12

    M1 Æleen Frisch Administering Linux in ProductionEnvironments

    M2 Stephen Sorota and Advanced Topics in VMwareDan Anderson Virtual Infrastructure 3

    M3 Lee Damon Issues in UNIX Infrastructure Design

    MONDAY, NOVEMBER 12 (CONTINUED)

    M4 Steve VanDevender High-Capacity Email SystemDesign

    M5 Peter Baer Galvin Solaris 10 Administration Workshopand Marc Staveley (Hands-on)

    M6 David N. Over the Edge System Administration,Blank-Edelman Volume 1

    M7 Tobias Oetiker RRDtool as a CommunicationTool

    M8 Strata Rose Chalup Practical Project Management forSysadmins and IT Professionals

    M9 Adam Moskowitz How to Interview a System Administrator

    M10 David N. Over the Edge System Administration,Blank-Edelman Volume 2

    M11 Tobias Oetiker The Joy of Running DisklessLinux

    M12 Strata Rose Chalup Problem-Solving for IT Professionals

    M13 John Sellens Nagios in Depth

    TUESDAY, NOVEMBER 13

    T1 Faisal N. Jawdat Introduction to Ruby, Rails, andCapistrano

    T2 Alan Robertson Configuring and DeployingLinux-HA

    T3 Marcus Ranum Thinking About Security (BecauseThey Really Are Out to Get You)

    T4 Patrick Ben Koetter Postfix Configuration andand Ralf Hildebrandt Administration

    T5 Peter Baer Galvin Solaris 10 Security Features Workshop(Hands-on)

    NEW!

    NEW!

    NEW!

    NEW!

    FULL DAY: 9:00 A.M.–5:00 P.M.

    NEW!

    NEW!

    HALF DAY AFTERNOON: 1:30 P.M.–5:00 P.M.

    NEW!

    HALF DAY MORNING: 9:00 A.M.–12:30 P.M.

    NEW!

    FULL DAY: 9:00 A.M.–5:00 P.M. (CONTINUED)

    NEW!

    NEW!

    FULL DAY: 9:00 A.M.–5:00 P.M.

    NEW!

    NEW!

    NEW!

    NEW!

    NEW!

    NEW!

    NEW!

    NEW!

    HALF DAY AFTERNOON: 1:30 P.M.–5:00 P.M.

    HALF DAY MORNING: 9:00 A.M.–12:30 P.M.

    FULL DAY: 9:00 A.M.–5:00 P.M.

    TRAINING AT A GLANCE[ ]

  • REGISTER BY OCTOBER 19 AND SAVE! • 3

    TUESDAY, NOVEMBER 13 (CONTINUED)

    T6 Mike Ciavarella Advanced Shell Programming

    T7 Geoff Halprin and Management 101: EffectiveElizabeth Zwicky Communication Tools for SysAdmins

    T8 Æleen Frisch and Virtualization: VMs! What AreKyrre Begnum They Good For?

    T9 Jacob Farmer Disk-to-Disk Backup and EliminatingBackup System Bottlenecks

    T10 Mike Ciavarella Documentation Techniques forSysadmins

    T11 Geoff Halprin and Management 201: EffectiveElizabeth Zwicky Team Management of System

    Administrators

    T12 Gerald Carter So You Have Active Directory: NowWhat? A Guide to AD Integration forUNIX Sysadmins

    T13 Jacob Farmer Next-Generation Storage Networking

    WEDNESDAY, NOVEMBER 14

    W1 Lee Damon and Seven Habits of the Highly EffectiveMike Ciavarella System Administrator: Hints, Tricks,

    Techniques, & Tools of the Trade

    W2 James Mauro Solaris 10 Performance, Observability,& Debugging

    W3 Ralf Hildebrandt and Postfix Anti-Spam WorkshopPatrick Ben Koetter

    W4 Tom Limoncelli Climb Out of the “Bad IT” Hole

    W5 Gerald Carter Wireshark (Ethereal) and the Art ofDebugging Networks

    WEDNESDAY, NOVEMBER 14 (CONTINUED)

    W6 Patrick Ben Koetter Cyrus SASL Authenticationand Ralf Hildebrandt Workshop

    W7 Hunter Matthews Setting Up a Server Room orData Center (or Data Closet)

    W8 Æleen Frisch What’s Up with Windows?Administering Vista and Beyond

    THURSDAY, NOVEMBER 15

    R1 Jeff Victor Resource Management withSolaris Containers

    R2 Don Bailey RF Road Warrior: SecureWireless Computing for Home, Work,and the Road

    R3 Rudi van Drunen Hardware for the (Software-Oriented) Sysadmin

    R4 John Sellens Databases: What You Need to Know

    R5 Evan Marcus Disaster Preparedness (and Recovery):How to Keep Your Company (and YourJob) Alive

    R6 Æleen Frisch Beyond Shell Scripts: 21st-CenturyAutomation Tools and Techniques

    R7 John Sellens Performance Tracking with Cacti

    FRIDAY, NOVEMBER 16

    F1 Gerald Carter Implementing [Open]LDAP Directories

    F2 Don Bailey Wireless Networking, Security,Vulnerability Assessment, andPenetration Testing

    F3 Evan Marcus Achieving High Availability (in YourLifetime)

    F4 David Beazley Python in Action

    HALF DAY MORNING: 9:00 A.M.–12:30 P.M.

    NEW!

    NEW!

    HALF DAY AFTERNOON: 1:30 P.M.–5:00 P.M.

    NEW!

    FULL DAY: 9:00 A.M.–5:00 P.M.

    NEW!

    NEW!

    NEW!

    NEW!

    NEW!

    NEW!

    NEW!

    NEW!

    NEW!

    NEW!

    NEW!

    HALF DAY MORNING: 9:00 A.M.–12:30 P.M.

    HALF DAY AFTERNOON: 1:30 P.M.–5:00 P.M.

    FULL DAY: 9:00 A.M.–5:00 P.M.

    HALF DAY AFTERNOON: 1:30 P.M.–5:00 P.M.

    HALF DAY MORNING: 9:00 A.M.–12:30 P.M.

    FULL DAY: 9:00 A.M.–5:00 P.M.

  • 4 • REGISTER TODAY: WWW.USENIX.ORG/LISA2007

    SUNDAY, NOVEMBER 11

    S1 Computer ForensicsSimson L. Garfinkel, Naval PostgraduateSchool

    Who should attend: Anyone interest-ed in recovering lost or deleted data,hunting for clues, and tracking informa-tion.

    Take back to work: An in-depthunderstanding of why forensic tools arepossible, what they can do, their limits,and the legal environment that governsU.S. forensics.

    Topics include:

    � Memory forensics and file carving

    � Forensics and policy

    � Disk, network, document, and Webforensics

    � Anti-forensics

    S2 Introduction to VMware VirtualInfrastructure 3John Arrasjid and Stephen Sorota, VMware

    Who should attend: Sysadmins andarchitects who are interested in deploy-ing a VMware Virtual Infrastructure,including ESX Server and VirtualCenter,in a production environment.

    Take back to work: How to deploy aVMware virtual infrastructure effectivelyon your own site.

    Topics include:

    � ESX Server and VirtualCenter overview

    � Installation and configuration

    � Virtual machine creation and operation

    � Migration technologies

    S3 Effective Change Management:Making System Integrity Easy

    Geoff Halprin, Consultant

    Who should attend: Sysadmins whowish to learn how to better managechange and risk, those who are respon-sible for developing or managing theirorganization’s change managementprocess, and those who are hoping toimprove their organization’s process.

    Take back to work: A grasp of themany aspects of effective change man-agement and how you can improve theprocess.

    Topics include:

    � Building a change plan

    � Regression planning and risk manage-ment strategies

    � Change execution tools and tech-niques

    � Emergency changes and downtimeconferences

    S4 Advanced Topics in DNSAdministrationJim Reid, Nominum

    Who should attend: DNS administra-tors who wish to extend their under-standing of how to configure and man-age name servers running BIND 9.

    Take back to work: An in-depthanswer to the question, “I’ve set upmaster (primary) and slave (secondary)name servers. What else can I do withthe name server?”

    Topics include:

    � The BIND 9 logging subsystem

    � Managing the name server with rndc

    � Securing the name server

    � Dynamic DNS (DDNS)

    � Secure DNS (DNSSEC)

    S5 System and Network PerformanceTuningMarc Staveley, Consultant

    Who should attend: Novice andadvanced UNIX system and networkadministrators, and UNIX developersconcerned about network performanceimpacts.

    Take back to work: Procedures andtechniques for tuning your systems,networks, and application code, alongwith guidelines for capacity planningand customized monitoring.

    Topics include:

    � Performance tuning strategies

    � NFS performance tuning

    � Network performance, design, andcapacity planning

    � Application tuning

    S6 VoIP Jumpstarting: Getting Overthe Initial HurdlesHeison Chak, CIBC

    Who should attend: Managers andsysadmins involved in the evaluation,design, or implementation of VoIP infra-structures.

    Take back to work: A solid under-standing of how to leverage VoIP tomeet the requirements of your business.

    Topics include:

    � Dial-plan manipulation

    � Traffic shaping

    � Integration with legacy systems

    � Conversation auditing

    NEW!

    HALF DAY: 9:00 A.M.–12:30 P.M.

    NEW!NEW!

    FULL DAY: 9:00 A.M.–5:00 P.M.

    TRAINING PROGRAM[ ]

    Want more info? Please see www.usenix.org/lisa07/training for comprehensivetutorial descriptions, including full topics lists and prerequisites.

  • REGISTER BY OCTOBER 19 AND SAVE! • 5

    S7 Time Management for SystemAdministratorsTom Limoncelli, Google NYC

    Who should attend: IT people, sysad-mins, and other busy people who wantto have more control over their time andbetter follow-through on assignments.

    Take back to work: The skills youneed to streamline your workflow tomake your users—and you!—happy.

    Topics include:

    � Why typical “time management” booksdon’t work for sysadmins

    � What makes “to-do” lists fail, and howto make them work

    � How not to forget a user’s request everagain!

    S8 Advanced DHCP (This Is Not YourGrandparents’ DHCP)David Hankins, ISC

    Who should attend: Anyone who isinvolved in administering a network andwho still believes that DHCP is a simpleprotocol like ARP that you just turn onand forget.

    Take back to work: How to useDHCP to keep your networks secureand reliable.

    Topics include:

    � How to have more flexible control overusers

    � Integrating DHCP with Dynamic DNS

    � Configuring a DHCP server so that itcan support VOIP phones

    � Using the new RFC 3925 Vendor-Iden-tifying Options

    S9 Integrating Cfengine into Organiza-tional Service ManagementMark Burgess, Oslo University College

    Who should attend: Anyone with abasic knowledge of cfengine and aninterest in organizational (including busi-ness) processes who would like anoverview of the concepts surroundingconfiguration management for business,with implementation examples.

    Take back to work: The informationneeded to evaluate the principles usedin configuring hosts and devices, relatethem to standards, and apply them toyour own environments.

    Topics include:

    � Availability and capacity management

    � Security management

    � Supply chains and e-commerce mod-els

    � Inter-domain management configura-tion

    S10 Deploying VoIP: How to Identifyand Avoid PitfallsHeison Chak, CIBC

    Who should attend: Managers andsysadmins involved in the evaluation,design, or implementation of VoIP infra-structures.

    Take back to work: The do’s anddon’ts of VoIP, along with well-honedtroubleshooting skills.

    Topics include:

    � Testing and deployment strategies

    � How to prevent users’ complaints andmanagers’ headaches

    � Voice quality issues

    � Challenges in maintaining system avail-ability

    S11 Systems Topics in Oracle DatabaseAdministrationChris Page, Corporate Technologies, Inc.

    Who should attend: Anyone interest-ed in learning about the operating sys-tems features that Oracle databasesrely upon and about the new systemstechnology introduced by Oracle whichis blurring the line between system anddatabase administration.

    Take back to work: An understandingof how the new Oracle technologies willchange the sysadmin’s job and of thepotential consequences when a DBA isattempting to deploy them.

    Topics include:

    � Oracle database architecture review

    � The Oracle OS interface

    � Oracle’s Volume Manager (ASM)

    � Oracle Clusterware and RAC

    S12 Network Diagnosis andImprovement with NetflowMichael W. Lucas, Author and Consultant

    Who should attend: Administratorswho need more information about theirnetworks.

    Take back to work: The ability towork with Netflow the day you returnhome.

    Topics include:

    � Netflow architecture

    � Implementing the sensor and the col-lector

    � flowscan, flowdumper, flow-stat, andflow-print

    � Filtering flows

    S13 Implementing AutonomicPrinciples Using CfengineMark Burgess, Oslo University College

    Who should attend: Anyone whowants to make the most of a tool thatdeals with long- and short-term man-agement.

    Take back to work: A simple way touse cfengine to achieve the goals ofautonomic management.

    Topics include:

    � Self-adaptation and self-healing

    � Fixed-point rules

    � Probabilistic management

    � Intermittency and reliability measures

    NEW!

    NEW!

    NEW!

    NEW!

    NEW!

    NEW!

    HALF DAY: 1:30 P.M.–5:00 P.M.

    Please see www.usenix.org/lisa07/trainingfor full tutorial descriptions.

  • 6 • REGISTER TODAY: WWW.USENIX.ORG/LISA2007

    MONDAY, NOVEMBER 12

    M1 Administering Linux in ProductionEnvironmentsÆleen Frisch, Exponential Consulting

    Who should attend: Both currentLinux sysadmins and administratorsfrom sites considering converting toLinux or adding Linux systems to theircurrent computing resources.

    Take back to work: The ability toselect the appropriate facilities for useof Linux in your environment and tobegin deploying them.

    Topics include:

    � High-performance I/O

    � High availability Linux: fault-toleranceoptions

    � Enterprise-wide authentication andother security features

    � Automating installations and othermass operations

    M2 Advanced Topics in VMware VirtualInfrastructure 3Stephen Sorota and Dan Anderson,VMware

    Who should attend: People with Vir-tual Infrastructure 3 skills interested inlearning more. This includes systemadministrators and architects who areinterested in advanced topics ondeploying a VMware Virtual Infrastruc-ture.

    Take back to work: Ways to makethe most of your Virtual Infrastructure 3environment.

    Topics include:

    � Server consolidation and containmentmethodology for Intel/AMD environ-ments

    � Disaster recovery technologies

    � Performance optimization (VMwareDRS)

    M3 Issues in UNIX InfrastructureDesignLee Damon, University of Washington

    Who should attend: Anyone who isdesigning, implementing, or maintaininga UNIX environment with 2 to 20,000+hosts; sysadmins, architects, and man-agers who need to maintain multiplehosts with few admins.

    Take back to work: Questions youshould ask (and the answers to them)while designing and implementing themixed-architecture or single-architec-ture UNIX environment that will meetyour needs.

    Topics include:

    � Administrative domains: Who isresponsible for what, and what canusers do for themselves?

    � Security vs. sharing: Your users wantaccess to everything. So do the crack-ers . . .

    � Single system images: Can users seejust one environment, no matter howmany OSes there are?

    M4 High-Capacity Email SystemDesignSteve VanDevender, University of Oregon

    Who should attend: Anyone whoneeds to design a high-volume, secureemail system or upgrade an existingone.

    Take back to work: An understandingof available choices in email systemsoftware and methods, with their trade-offs and domains of applicability.

    Topics include:

    � Mail system architecture and compo-nents:

    � Implementation concerns

    � Scaling and reliability methods

    M5 Solaris 10 AdministrationWorkshop (Hands-on)Peter Baer Galvin, Corporate Technologies;Marc Staveley, Consultant

    Who should attend: Solaris systemsmanagers and administrators interestedin learning the new administration fea-tures in Solaris 10 (and features in previ-ous Solaris releases that they might notbe using).

    Take back to work: All you need toconsider in deploying, implementing,and managing Solaris 10.

    Topics include:

    � ZFS, the new endian-neutral file sys-tem that “will make you forget every-thing you thought you knew about filesystems”

    � Virtualization

    � DTrace, Solaris 10’s system profilingand debugging tool

    � Fault Management Architecture (FMA)

    M6 Over the Edge SystemAdministration, Volume 1David N. Blank-Edelman, NortheasternUniversity

    Who should attend: Old-timers whothink they’ve already seen it all, andthose who want to develop inventivethinking.

    Take back to work: New approachesto old problems, along with some waysto solve the insolubles.

    Topics include:

    � How to increase user satisfaction dur-ing downtimes with 6 lines of Perl

    � How to improve your network servicesby throwing away data

    � How to drive annoying Web-only appli-cations without lifting a finger

    � How to use ordinary objects, such asSilly Putty, to make your life easier

    NEW!

    NEW! HALF DAY: 9:00 A.M.–12:30 P.M.

    FULL DAY: 9:00 A.M.–5:00 P.M.

    TRAINING PROGRAM[ ]

    Want more info? Please see www.usenix.org/lisa07/training for comprehensivetutorial descriptions, including full topics lists and prerequisites.

  • REGISTER BY OCTOBER 19 AND SAVE! • 7

    M7 RRDtool as a Communication Tool

    Tobias Oetiker, Consultant and author ofRRDTool

    Who should attend: Scripters andprogrammers who would like to createa custom monitoring application withgreat presentation tools.

    Take back to work: Ideas for buildingthe monitoring application of yourdreams.

    Topics include:

    � RRDtool overview

    � Programming with RRDtool

    � In-depth graphing

    � Scaling RRDtool

    M8 Practical Project Management forSysadmins and IT ProfessionalsStrata Rose Chalup, Project ManagementConsultant

    Who should attend: Sysadmins whowant to stay hands-on as team leads orsystem architects and need a new setof skills with which to tackle bigger,more complex challenges.

    Take back to work: A no-nonsensegrounding in methods that work withoutadding significantly to one’s workload.You will be able to reduce a dauntingtask to a plan of attack that will be real-istic, will lend itself to tracking, and willhave functional, documented goals. Youwill be able to give useful feedback tomanagement on project viability andtimelines and easily deliver regularprogress reports.

    Topics include:

    � Quick basics of project management

    � Skill sets

    � Problem areas

    � Project management tools

    M9 How to Interview a SystemAdministratorAdam Moskowitz, Constant Contact

    Who should attend: Sysadmins of alllevels of experience, as well as man-agers of sysadmins.

    Take back to work: Increased confi-dence in your ability to weed out theposers and hire really great sysadmins.

    Topics include: The course will focuson techniques for interviewers, but evensysadmins who are just starting out willlearn some things to use as an inter-viewee. Managers of sysadmins willlearn, among other things, how to inter-view someone who knows more thanyou do. Junior administrators will alsolearn how to respond when asked abad question—in particular, how to turnit into a better question.

    M10 Over the Edge SystemAdministration, Volume 2David N. Blank-Edelman, NortheasternUniversity

    Who should attend: Old-timers whothink they’ve already seen it all, andthose who want to develop inventivethinking.

    Take back to work: Approaches tosystem administration you neverdreamed of—but you wish you had!

    Topics include:

    � How to benefit from side effects

    � Arts and crafts for sysadmins

    � Web apps as sysadmin tools

    M11 The Joy of Running Diskless Linux

    Tobias Oetiker, Consultant

    Who should attend: Linux/UNIXsysadmins who manage several net-worked UNIX workstations or clusternodes.

    Take back to work: The ability toslash your installation times and down-time.

    Topics include:

    � Installing Linux without a workstation

    � Providing a homogeneous applicationenvironment

    � How to make the automounter sit upand beg

    � Managing mixed 32- and 64-bit envi-ronments

    M12 Problem-Solving for ITProfessionalsStrata Rose Chalup, Project ManagementConsultant

    Who should attend: IT support peo-ple who would like to have a bettergrasp of problem-solving as a discipline.

    Take back to work: A solid groundingin the process of solving problems.

    Topics include:

    � A framework on which to build special-ized troubleshooting techniques thatare specific to your environment

    � How to trace out common patterns ofinteraction

    � How to apply basic principles to isolatesymptoms and interactions betweensubsystems

    M13 Nagios in DepthJohn Sellens, SYONEX

    Who should attend: Network andsystem administrators ready to imple-ment or extend their use of the Nagiossystem and network monitoring tool.

    Take back to work: The informationyou need to immediately implement anduse Nagios and related tools for moni-toring systems and devices on your net-works.

    Topics include:

    � Introduction: Functionality, features,use, and application

    � Installation

    � Theory of operation

    � Plug-ins, extensions, and add-ons

    NEW!

    NEW!

    NEW!

    HALF DAY: 1:30 P.M.–5:00 P.M.

    Please see www.usenix.org/lisa07/trainingfor full tutorial descriptions.

  • 8 • REGISTER TODAY: WWW.USENIX.ORG/LISA2007

    TUESDAY, NOVEMBER 13

    T1 Introduction to Ruby, Rails, andCapistranoFaisal N. Jawdat, Consultant

    Who should attend: Programmers, aswell as sysadmins with programmingexperience, who want to understandRuby on Rails.

    Take back to work: The ability towrite scripts using Ruby and create anddeploy your own applications usingRails and Capistrano.

    Topics include:

    � Significant Ruby packages and tech-nologies

    � Ruby scripting for admins

    � Building a Rails application

    � Using Capistrano to deploy and man-age distributed applications

    T2 Configuring and Deploying Linux-HAAlan Robertson, IBM Linux TechnologyCenter

    Who should attend: Sysadmins andIT architects who architect, evaluate,install, or manage critical computingsystems.

    Take back to work: Both the basictheory of high availability systems andpractical knowledge of how to plan,install, and configure highly availablesystems using Linux-HA.

    Topics include:

    � General HA principles

    � Compilation, installation, and configu-ration

    � Commonly used resource agents

    � Co-location and resource location con-straints

    T3 Thinking About Security (BecauseThey Really Are Out to Get You)

    Marcus Ranum, Tenable Network Security,Inc.

    Who should attend: Developers andmanagers involved in the design, speci-fication, deployment, or maintenance ofcomputer-based applications.

    Take back to work: Much betterequipment for coping with security.

    Topics include:

    � The natural laws of security

    � Whitelisting and blacklisting

    � Security in the design process

    � The insider threat and counter-intelli-gence problem

    T4 Postfix Configuration andAdministrationPatrick Ben Koetter, state of mind; RalfHildebrandt, T-Systems

    Who should attend: Novice andadvanced sysadmins and integratorsinterested in a crash course on Postfix.

    Take back to work: In-depth instruc-tion in the installation and configurationof Postfix and software commonly usedin conjunction with Postfix, along withan understanding of the administrativeissues that arise when you are running aPostfix SMTP server.

    Topics include:

    � System architecture

    � Single domain, multi-domain, and relaydomain configuration

    � Relay control

    � Controlling message flow

    T5 Solaris 10 Security FeaturesWorkshop (Hands-on)Peter Baer Galvin, Corporate Technologies

    Who should attend: Solaris systemsmanagers and administrators interestedin the new security features in Solaris 10(and features in previous Solaris releas-es that they might not be using).

    Take back to work: During this explo-ration of the important new features ofSolaris 10, you’ll not only learn what itdoes and how to get it done, but alsobest practices. Also covered is the sta-tus of each of these new features, howstable it is, whether it is ready for pro-duction use, and expected futureenhancements.

    Topics include:

    � Privileges: A new Solaris facility basedon the principle of least privilege

    � The latest version of NFS (based on anindustry standard), featuring statefulconnection, more and better security,write locks, and faster performance

    � BSM (the Basic Security Module), pro-viding a security auditing system

    � BART (Basic Audit Reporting Tool)

    T6 Advanced Shell ProgrammingMike Ciavarella, University of Melbourne,Australia

    Who should attend: Junior or inter-mediate sysadmins or anyone with abasic knowledge of programming,preferably with some experience inBourne/Korn shells (or their derivatives).

    Take back to work: The informationneeded to immediately implement,extend, and manage popular monitoringtools on your systems and networks.

    Topics include:

    � Modular shell script programming

    � Writing secure shell scripts

    � Performance tuning

    � Addressing portability at the designstage

    T7 Management 101: EffectiveCommunication Tools forSysadminsGeoff Halprin, Consultant; Elizabeth Zwicky,Acutis, Inc.

    Who should attend: Sysadmins whowish to become more proactive in man-

    NEW!

    NEW!

    NEW!

    NEW!

    HALF DAY: 9:00 A.M.–12:30 P.M.

    FULL DAY: 9:00 A.M.–5:00 P.M.

    TRAINING PROGRAM[ ]

  • REGISTER BY OCTOBER 19 AND SAVE! • 9

    aging their duties and to learn tools andtips that will assist them to communi-cate more effectively with their man-agers, users, and other important con-stituents of their services.

    Take back to work: Improved com-munication skills that will make you amore effective system administrator.

    Topics include:

    � Oral and written communication

    � Understanding others

    � Time, risk, and project management

    T8 Virtualization: VMs! What Are TheyGood For?Æleen Frisch, Exponential Consulting; KyrreBegnum, Oslo University College

    Who should attend: Sysadmins whoare curious about the benefits of virtual-ization or who need to deploy it in theirenvironment.

    Take back to work: The ability tobegin deploying virtualization in yourenvironment.

    Topics include:

    � What virtualization is and what it canand cannot do for you

    � Software and management options

    � Typical deployment scenarios and spe-cial-purpose solutions

    � Administrative challenges

    T9 Disk-to-Disk Backup andEliminating Backup SystemBottlenecksJacob Farmer, Cambridge ComputerServices

    Who should attend: Sysadminsinvolved in the design and managementof backup systems and policymakersresponsible for protecting their organi-zation’s data. A general familiaritywith server and storage hardware isassumed. The class focuses on archi-tectures and core technologies and isrelevant regardless of what backuphardware and software you currentlyuse.

    Take back to work: Ideas for immedi-ate, effective, inexpensive improve-ments to your backup systems.

    Topics include:

    � The various roles for inexpensive disk

    � SAN-enabled backup

    � The current state and future of tapedrives

    � iSCSI

    T10 Documentation Techniques forSysadminsMike Ciavarella, University of Melbourne,Australia

    Who should attend: Sysadmins whoneed to produce documention for thesystems they manage or who want toimprove their documentation skills.

    Take back to work: The ability tomake immediate, practical use of thetechniques presented in this tutorial inyour day-to-day tasks.

    Topics include:

    � The document life cycle

    � Targeting your audience

    � An adaptable document framework

    � Tools to assist in documentation

    T11 Management 201: Effective TeamManagement of SystemAdministratorsGeoff Halprin, Consultant; Elizabeth Zwicky,Acutis, Inc.

    Who should attend: Sysadmins whohave found themselves being given (orare hoping to be given, or are anticipat-ing with apprehension) responsibilitiesfor other people.

    Take back to work: The techniquesyou need to be effective in your “organi-zation-facing” duties.

    Topics include:

    � Sysadmin workflow

    � Personal and workgroup productivity

    � Progress reporting and journals

    � Financial management

    T12 So You Have Active Directory: NowWhat? A Guide to AD Integrationfor UNIX SysadminsGerald Carter, Centeris/Samba Team

    Who should attend: Sysadmins whoare tasked with integrating authentica-tion, Web, and file/print services provid-ed by UNIX hosts into an Active Directo-ry domain.

    Take back to work: In-depth under-standing of the best approaches tomanaging your system services withActive Directory.

    Topics include:

    � AD domain membership using Samba

    � NTLM and Kerberos authentication forApache

    � Using PAM for NTLM and Kerberosauthentication

    � Searching Active Directory using LDAPclients

    T13 Next-Generation StorageNetworkingJacob Farmer, Cambridge ComputerServices

    Who should attend: Sysadmins run-ning day-to-day operations and thosewho set or enforce budgets.

    Take back to work: An understandingof general architectures, various ap-proaches to scaling in both perfor-mance and capacity, relative costs ofdifferent technologies, and strategies forachieving results on a limited budget.

    Topics include:

    � The latest storage interfaces

    � Content-Addressable Storage (CAS)

    � Information Life Cycle Management(ILM) and Hierarchical Storage Man-agement (HSM)

    � High-performance file sharing

    NEW!

    NEW!

    HALF DAY: 1:30 P.M.–5:00 P.M.

    Want more info? Please see www.usenix.org/lisa07/training for comprehensivetutorial descriptions, including full topics lists and prerequisites.

  • 10 • REGISTER TODAY: WWW.USENIX.ORG/LISA2007

    WEDNESDAY, NOVEMBER 14

    W1 Seven Habits of the HighlyEffective System Administrator:Hints, Tricks, Techniques, & Toolsof the TradeLee Damon, University of Washington; MikeCiavarella, University of Melbourne,Australia

    Who should attend: Junior sysadminswho want to “do it right the first time.”

    Take back to work: Ideas about howto streamline your systems and yourworkload, and, just as important, whereto look to find more answers.

    Topics include:

    � Why your computers should all agreeon the time

    � Why not to back up everything

    � Budgeting

    � Books that can help you and yourusers

    W2 Solaris 10 Performance,Observability, and DebuggingJames Mauro, Sun Microsystems

    Who should attend: Anyone whosupports or may support Solaris 10machines.

    Take back to work: How to resolveperformance issues and pathologicalbehavior, and to understand the systemand workload better.

    Topics include:

    � Memory use and performance

    � I/O flow and performance

    � Network traffic and performance

    � Application and kernel interaction

    W3 Postfix Anti-Spam WorkshopRalf Hildebrandt, T-Systems; Patrick BenKoetter, state of mind

    Who should attend: Sysadmins andintegrators interested in using Postfix tostem the tide of spam.

    Take back to work: The ability tobecome a hero to your users by deci-mating the amount of spam theyreceive.

    Topics include:

    � Available methods

    � Solaris 10 tools and utilities

    � The order in which restrictions areapplied

    � How to make exceptions

    W4 Climb Out of the “Bad IT” Hole

    Tom Limoncelli, Google NYC

    Who should attend: IT and sysadminmanagers who want to know how tosolve some fundamental managementproblems.

    Take back to work: Ideas about howto make your life and your team worksmoothly and happily.

    Topics include:

    � Tricks to help stop “fire fighting”

    � Handling user requests really well

    � Eliminating “time sink”

    � Documentation (no, really!)

    W5 Wireshark (Ethereal) and the Artof Debugging NetworksGerald Carter, Centeris

    Who should attend: System and net-work administrators who are interestedin learning how network traffic monitor-ing and analysis can be used as adebugging, auditing, and security tool.

    Take back to work: How to use theEthereal protocol analyzer as a debug-ging and auditing tool for TCP/IP net-works.

    Topics include:

    � Wireshark for network tracing

    � TCP/IP protocol basics

    � Analysis of popular application proto-cols

    � How some kinds of TCP/IP networkattacks can be recognized

    W6 Cyrus SASL AuthenticationWorkshopPatrick Ben Koetter, state of mind; RalfHildebrandt, T-Systems

    Who should attend: System adminis-trators and integrators who know thatthere’s no (usable) user manual.

    Take back to work: How to install,configure, and test Cyrus SASL.

    Topics include:

    � What is Cyrus SASL made of?

    � How to install Cyrus SASL

    � Configuration

    � Ways to verify and/or debug CyrusSASL authentication

    W7 Setting Up a Server Room or DataCenter (or Data Closet)Hunter Matthews, Duke University

    Who should attend: Sysadmins whohave either inherited a server “closet” orare trying to build a small server room.

    Take back to work: How to plan thebest ways to configure your serverroom space and spend your money.

    Topics include:

    � Layout

    � Electrical power

    � Cooling

    � Budgeting

    W8 What’s Up with Windows?Administering Vista and Beyond

    Æleen Frisch, Exponential Consulting

    Who should attend: Anyone whowants a jumpstart on Microsoft’s latestchallenge for systems administrators.

    Take back to work: How best to dealwith the latest Microsoft systems.

    Topics include:

    � Active Directory (incl. interoperability)

    � Networking enhancements

    � Managing users

    � Is the security really improved?

    NEW!

    NEW!

    NEW!

    HALF DAY: 1:30 P.M.–5:00 P.M.

    NEW!

    NEW!

    HALF DAY: 9:00 A.M.–12:30 P.M.

    FULL DAY: 9:00 A.M.–5:00 P.M.

    TRAINING PROGRAM[ ]

  • REGISTER BY OCTOBER 19 AND SAVE! • 11

    THURSDAY, NOVEMBER 15

    R1 Resource Management with SolarisContainersJeff Victor, Sun Microsystems

    Who should attend: Sysadmins whowant to improve resource utilization oftheir Solaris systems.

    Take back to work: A solid under-standing of the facilities and commandsavailable for your Solaris systems.

    Topics include:

    � What are resources and why wouldyou want to manage them?

    � How do you use Solaris features suchas Dynamic Resource Pools, ResourceCapping and Memory Sets, IPQoS,Schedulers, and Zones?

    R2 RF Road Warrior: Secure WirelessComputing for Home, Work, andthe RoadDon Bailey, Consultant

    Who should attend: Security and ITprofessionals interested in using 802.11wireless networks while avoiding securi-ty pitfalls.

    Take back to work: The knowledge ofwhat wireless threats you may face andhow to be secure at home and on theroad.

    Topics include:

    � Setting up a truly secure wireless net-work at work or at home

    � Detecting and avoiding rogue accesspoints and nearby hackers

    � Secure Web surfing and credit cardpayments at hotspots and airports

    R3 Hardware for the (Software-Oriented) SysdadminRudi van Drunen, Consultant

    Who should attend: Anyone whowants to understand why hardwareissues occur and to avoid common mis-takes.

    Take back to work: A more thoroughunderstanding of electronics, with theability to attack hardware-related prob-lems at a fundamental level.

    Topics include:

    � Signals

    � Power

    � Circuit boards

    � How to fix your hardware or keep itrunning until on-site support arrives

    R4 Databases: What You Need to KnowJohn Sellens, SYONEX

    Who should attend: System andapplication administrators who need tosupport databases and database-backed applications.

    Take back to work: A better under-standing of databases and how to deployand support common database softwareand database-backed applications.

    Topics include:

    � MySQL, PostgreSQL, Berkeley DB

    � Security, user management, andaccess controls

    � Ad hoc queries with standard inter-faces

    � Database access from other tools(Perl, PHP, sqsh, etc.)

    R5 Disaster Preparedness (andRecovery): How to Keep YourCompany (and Your Job) AliveEvan Marcus, QD Technology

    Who should attend: Data centermanagers, IT directors, and anyonewho needs to avoid extended downtimeafter an outage.

    Take back to work: The ability to puttogether a plan that fits your company.

    Topics include:

    � What a DR plan should contain, howmuch it costs, and how to test it

    � Building and staffing DR teams

    � Senior management’s role

    R6 Beyond Shell Scripts: 21st-CenturyAutomation Tools and TechniquesÆleen Frisch, Exponential Consulting

    Who should attend: Sysadmins whowant to explore new ways of automat-ing administrative tasks.

    Take back to work: How to profitfrom the efficiency, reliability, and thor-oughness of these tools.

    Topics include:

    � Expect: automating interactiveprocesses

    � Bacula, an enterprise backup manage-ment facility

    � Network and system monitoring tools

    R7 Performance Tracking with Cacti

    John Sellens, SYONEX

    Who should attend: Network andsystem administrators ready to imple-ment an integrated, Web-based per-formance and activity monitoring tool.

    Take back to work: The informationneeded to immediately implement anduse Cacti to monitor systems anddevices on your networks.

    Topics include:

    � Installation

    � Configuration

    � User management, security concerns,and access control

    � Ongoing operations

    NEW!

    NEW!

    NEW!

    NEW!

    HALF DAY: 1:30 P.M.–5:00 P.M.

    HALF DAY: 9:00 A.M.–12:30 P.M.

    FULL DAY: 9:00 A.M.–5:00 P.M.

    TRAINING PROGRAM[ ]

    Want more info? Please see www.usenix.org/lisa07/trainingfor comprehensive tutorial descriptions, including full topicslists and prerequisites.

  • 12 • REGISTER TODAY: WWW.USENIX.ORG/LISA2007

    FRIDAY, NOVEMBER 16TRAINING PROGRAM[ ]F1 Implementing [Open]LDAP

    DirectoriesGerald Carter, Centeris/Samba Team

    Who should attend: Both LDAP direc-tory administrators and architects. Thefocus is on integrating standard networkservices with LDAP directories.

    Take back to work: Comfort withLDAP terms and concepts and anunderstanding of how to integrate futureapplications using LDAP into your net-work.

    Topics include:

    � Integrating Samba domain file and printservers

    � Integrating MTAs

    � Creating customized LDAP schemaitems

    � Examining scripting solutions for devel-oping your own directory administrationtools

    F2 Wireless Networking, Security,Vulnerability Assessment, andPenetration TestingDon Bailey, Consultant

    Who should attend: Security and ITprofessionals interested in the securityassessment of 802.11 wireless networksor the practical threats wireless net-works are faced with.

    Take back to work: A strong aware-ness of the threats against 802.11 wire-less networks, as well as what practicaltools and techniques are needed toproperly assess the security of thosenetworks.

    Topics include:

    � The 802.11 protocol and how to cap-ture and analyze Wi-Fi traffic

    � Wireless network security architectures,technology, and products

    � The range and impact of 802.11 wire-less network threats, vulnerabilities, andexploits

    � Successful design and implementationof secure 802.11 wireless networks

    F3 Achieving High Availability (in YourLifetime)Evan Marcus, QD Technology

    Who should attend: Sysadmins anddata center managers, developers andtheir managers, and IT managers.

    Take back to work: Simple and practi-cal tools you can use right away to per-suade the bean counters in your organi-zation of the value of putting high avail-ability techniques and practices intoplace.

    Topics include, in reference to highavailability:

    � Backups and restores

    � Security

    � Networking

    � WANs and replication

    F4 Python in ActionDavid Beazley, Consultant

    Who should attend: Software devel-opers and sysadmins who want to knowthe inside story of why Python program-mers are able to be so productive whilestill having time to enjoy life, go on vaca-tion, and play in bands.

    Take back to work: An eagerness andability to apply Python to some of yourmost common and your most annoyingtasks.

    Topics include:

    � A tour of the Python language

    � A look at major library modules

    � Practical programming examples

    Want more info? Please seewww.usenix.org/lisa07/trainingfor comprehensive tutorialdescriptions, including fulltopics lists and prerequisites.

    Attention Managers: Why You ShouldSend Your Employees to LISA ’07Technology continues to evolve. To stay aheadof the game, your employees must continue toenhance their skills.

    The LISA ’07 training program offers a cost-effective, one-stop shop for training current ITand development employees. 55+ tutorialstaught by the most respected leaders in thefield provide an unparalleled opportunity tolearn from the best. Tutorials cover a multitudeof system administration topics.

    Combining tutorials with days of technical ses-sions on groundbreaking research related tosystem and network administration makes theLISA ’07 experience even more valuable. Addi-tionally, the evening receptions and Birds-of-a-Feather sessions provide your staff with achance to network with peers and industryleaders to gain that all-important “insider” ITknowledge that will keep your company currentand running smoothly.

    Keeping up with technology can be costly andtime-consuming in this unforgiving economy:take advantage of this opportunity to have yourstaff learn from the top researchers, practition-ers, and authors all in one place, at one time.

    Continuing Education Units (CEUs)USENIX provides Continuing Education Unitsfor a small additional administrative fee. TheCEU is a nationally recognized standard unit ofmeasure for continuing education and trainingand is used by thousands of organizations.

    Each full-day tutorial qualifies for 0.6 CEUs. Youcan request CEU credit by completing the CEUsection on the registration form. USENIX pro-vides a certificate for each attendee taking atutorial for CEU credit and maintains transcriptsfor all CEU students. CEUs are not the same ascollege credits. Consult your employer orschool to determine their applicability.

    Our GuaranteeIf you’re not happy, we’re not happy. If you feela tutorial does not meet the high standards youhave come to expect from USENIX, let us knowby the first break and we will change you to anyother available tutorial immediately.

    NEW!

    NEW!

    FULL DAY: 9:00 A.M.–5:00 P.M.

  • John ArrasjidS2

    John Arrasjid has 20 yearsof experience in the com-puter science field. Hisexperience includes workwith companies such as

    AT&T, Amdahl, 3Dfx Interactive, KubotaGraphics, Roxio, and his own company,WebNexus Communications, where hedeveloped consulting practices and built across-platform IT team. John is currently asenior member of the VMware ProfessionalServices Organization as a Consulting Archi-tect. John has developed a number of PSOengagements, including Performance, Secu-rity, and Disaster Recovery and Backup.

    Don BaileyR2, F2

    Don Bailey is a D.C.-areacomputer security engi-neer with nearly six yearsof professional experiencein the computer security

    industry. He has performed numerous vul-nerability assessments and penetrationtests, as well as exploit and virus evaluation,and has developed secure laboratory tech-nologies and architectures to support com-puter network attack–related experimenta-tion and training. In recent years, he hastested and evaluated a wide range of com-mercial and consumer wireless technologies.His war-driving setup and wireless adven-tures have been covered by NBC, NPR, theWashington Times, and the Baltimore Sun.Commonly referred to as “Beetle,” Mr. Baileyhas presented on the topic of wireless secu-rity at a variety of security/hacker confer-ences, including Black Hat, DefCon, Toor-Con, LayerOne, and DallasCon.

    David BeazleyF4

    David Beazley is theauthor of the PythonEssential Reference andhas been an active mem-ber of the Python commu-

    nity since 1996. He is most widely known forcreating several Python-related open sourcepackages, including SWIG (a tool for build-ing C/C++ extension modules to Python)and PLY (a Python version of the lex/yaccparsing tools). In the 1990s, while working atLos Alamos National Laboratory, he helpedpioneer the use of Python on massively par-allel supercomputers. From 1998 through2005, he was an assistant professor at theUniversity of Chicago. Dave is currently afreelance software developer, Python trainer,and jazz musician living in Chicago.

    Kyrre BegnumT8

    Kyrre Begnum is currently completing hisPh.D. in Network and System Administrationat Oslo University College in Norway. Part ofhis research focuses on managing virtualinfrastructures, and he is the author of theManage Large Networks (MLN) VM adminis-trative tool.

    David N. Blank-EdelmanM6, M10

    David N. Blank-Edelman isthe Director of Technologyat the Northeastern Uni-versity College of Comput-

    er and Information Science and the author ofthe O’Reilly book Perl for System Adminis-tration. He has spent the past 20+ years asa system/network administrator in largemulti-platform environments, including Bran-deis University, Cambridge TechnologyGroup, and the MIT Media Laboratory. Hewas the program chair of LISA ’05 and wasone of the LISA ’06 Invited Talks co-chairs.

    Mark BurgessS9, S13

    Mark Burgess is Profes-sor of Network and Sys-tem Administration atOslo University College,Norway (a member of the

    EMANICS Network of Excellence). He is theauthor of the configuration managementsystem cfengine and of several books andmany papers on the topic.

    Gerald CarterT12, W5, F1

    Gerald Carter has been amember of the SambaDevelopment Team since1998. He has been devel-oping, writing about, and

    teaching on open source since the late1990s. Currently employed by Centeris as aSamba and open source developer, Geraldhas written books for SAMS Publishing andfor O’Reilly Publishing.

    Heison ChakS6, S10

    Heison Chak is currentlyemployed at CIBC as aSenior Infrastructure Engi-neer focusing on theSolaris platform. Heison

    has long been an active member of theAsterisk community and a frequent speakeron VoIP topics. His VoIP column in ;login: iswell received.

    Strata Rose ChalupM8, M12

    Strata Rose Chalup hasbeen leading and manag-ing complex IT projects formany years. She has writ-ten a number of articles

    and has volunteered for BayLISA and SAGE.Strata has built a successful consultingpractice around being an avid early adopterof new tools. Another MIT dropout, Stratafounded VirtualNet Consulting in 1993.

    TRAINING INSTRUCTORS[ ]

    REGISTER BY OCTOBER 19 AND SAVE! • 13

  • Mike CiavarellaT6, T10, W1

    Mike Ciavarella has beenproducing and editingtechnical documentationsince he naively agreed towrite application manuals

    for his first employer in the early 1980s. Hehas been a technical editor for MacMillanPress and has been teaching system admin-istrators about documentation for the pasteight years. Mike has an Honours Degree inScience from the University of Melbourne.After a number of years working as SeniorPartner and head of the Security Practice forCybersource Pty Ltd, Mike returned to hisalma mater, the University of Melbourne. Henow divides his time between teaching soft-ware engineering, providing expert testimo-ny in computer security matters, and tryingto complete a doctorate. In his ever-dimin-ishing spare time, Mike is a caffeine addictand photographer.

    Lee DamonM3, W1

    Lee Damon has a B.S. inSpeech Communicationfrom Oregon State Univer-sity. He has been a UNIXsystem administrator

    since 1985 and has been active in SAGEsince its inception. He assisted in develop-ing a mixed AIX/SunOS environment at IBMWatson Research and has developed mixedenvironments for Gulfstream Aerospace andQUALCOMM. He is currently leading thedevelopment effort for the Nikola project atthe University of Washington Electrical Engi-neering department. Among other profes-sional activities, he is a charter member ofLOPSA and SAGE and past chair of theSAGE Ethics and Policies working groups,and he was the chair of LISA ’04.

    Jacob FarmerT9, T13

    Jacob Farmer is a well-known figure in the datastorage industry. He haswritten numerous papersand articles and is a regu-

    lar speaker at trade shows and conferences.In addition to his regular expert advice col-umn in the “Reader I/O” section of InfoStorMagazine, the leading trade magazine of thedata storage industry, Jacob also serves asthe publication’s senior technical advisor.Jacob has over 18 years of experience withstorage technologies and is the CTO ofCambridge Computer Services, a nationalintegrator of data storage and data protec-tion solutions.

    Æleen FrischM1, T8, W8, R6

    Æleen Frisch has been asystem administrator forover 20 years. She cur-rently looks after a patho-logically heterogeneous

    network of UNIX and Windows systems.She is the author of several books, includingEssential System Administration (now in its3rd edition). Æleen was the program com-mittee chair for LISA ’03 and is a frequentpresenter at USENIX and SAGE events, aswell as presenting classes for universitiesand corporations worldwide.

    Peter Baer GalvinM5, T5

    Peter Baer Galvin is theChief Technologist forCorporate Technologies,Inc., a systems integratorand VAR. He has written

    articles for Byte and other magazines. Hewrote the “Pete’s Wicked World” and “Pete’sSuper Systems” columns at SunWorld.He was contributing editor for Sys Admin,where he managed the Solaris Corner. Peteris co-author of the Operating Systems Con-cepts and Applied Operating Systems Con-cepts textbooks.

    Simson L. GarfinkelS1

    Simson L. Garfinkel is anAssociate Professor at theNaval PostgraduateSchool in Monterey, CA,and a fellow at the Center

    for Research on Computation and Society atHarvard University. He is also the founder ofSandstorm Enterprises, a computer securityfirm that develops advanced computerforensic tools used by businesses and gov-ernments to audit their systems. Garfinkelhas research interests in computer foren-sics, the emerging field of usability andsecurity, information policy, and terrorism.He has actively researched and published inthese areas for more than two decades. Hewrites a monthly column for CSO Magazine,for which he has been awarded four nationaljournalism awards, and is the author or co-author of fourteen books on computing. Heis perhaps best known for Database Nation:The Death of Privacy in the 21st Centuryand for Practical UNIX and Internet Security.

    Geoff HalprinS3, T7, T11

    Geoff Halprin has spentover 30 years as a soft-ware developer, systemadministrator, consultant,and troubleshooter. He

    has written software from system manage-ment tools to mission-critical billing systems,has built and run networks for enterprises ofall sizes, and has been called upon to diag-nose problems in every aspect of computinginfrastructure and software. He is the authorof the System Administration Body ofKnowledge (SA-BOK) and the SAGE bookletA System Administrator’s Guide to Auditing,and was the recipient of the 2002 SAGE-AUaward for outstanding contribution to thesystem administration profession. Geoff hasserved on the boards of SAGE, SAGE-AU,USENIX, and LOPSA. He has spoken atconferences in Australia, New Zealand,Canada, Europe, and the U.S.

    14 • REGISTER TODAY: WWW.USENIX.ORG/LISA2007

    TRAINING INSTRUCTORS[ ]

  • REGISTER BY OCTOBER 19 AND SAVE! • 15

    David HankinsS8

    David Hankins (S8) is asoftware engineer at ISCwho has in the pastworked in the trenches asa sysadmin and a network

    administrator. He is the engineering lead onthe ISC DHCP project and knows moreabout it than anyone.

    Ralf HildebrandtT4, W3, W6

    Ralf Hildebrandt has studied computer sci-ence at the University of Braunschweig. Heis now working for T-Systems BusinessServices GmbH as a Manager Technik at theCharite hospital in Berlin. Co-author of TheBook of Postfix, he is also author of Postfix:Einrichtung, Betrieb und Wartung and vari-ous magazine articles.

    Faisal N. JawdatT1

    Faisal N. Jawdat has beendeveloping in Ruby andRails since before therelease of Rails 1.0. Inpast life he has been a

    sysadmin, engineer, and product manager,working on projects from an early B2Bexchange to the first carrier-scale 3gphone/Internet gateway. He has contributedto multiple books on programming for theInternet and maintains the FAQ for the Railsmailing list.

    Patrick Ben KoetterT4, W3, W6

    Patrick Ben Koetter is the Chief Technologistfor state of mind, Partnerschaft Koetter,Schmidt, & Schosser, a systems integrator,and was Information Architect at the Lud-wig-Maximilians Universität in Munich, Ger-many. He has written articles for Germany’sc’t magazine, Linuxmagazin, and other mag-azines. Patrick is co-author of The Book ofPostfix. As a consultant and trainer, Patrickregularly teaches classes on email, anti-virus, and spam measurements and applica-tion-level Web interfaces. He has given talksat many conferences on these and similiartopics.

    Tom LimoncelliS7, W4

    Tom Limoncelli author ofO’Reilly’s The Art of TimeManagement for SystemAdministrators and co-author of The Practice of

    System and Network Administration fromAddison-Wesley (second edition to be pre-miered at this conference), is a systemadministrator at Google in NYC. He receivedthe SAGE 2005 Outstanding Achievementaward. A sysadmin and network wonk since1987, he has worked at Cibernet, Dean forAmerica, Lumeta, Bell Labs/Lucent, AT&T,Mentor Graphics, and Drew University. He isa frequent presenter at LISA conferences.

    Michael W. LucasS12

    Michael W. Lucas

    (http://www.blackhelicopters.org/~mwlucas)is a network engineer whose UNIX experi-ence is old enough to drink. He’s worked onnetworks that span the planet, networkswith three people on them, and just abouteverything in between. Lucas’s latest book isAbsolute FreeBSD, joining several otherbooks by him on UNIX, networking, andcryptography. He has a slew of certificationsfor assorted security vendor products, aswell as a CISSP. Lucas has spent the pastfew years eliminating the guesswork fromnetwork management and replacing it withfact-based troubleshooting.

    Evan MarcusR5, F3

    Evan Marcus joined QDTechnology in 2006 as theDirector of TechnicalSales. QD Technology is apremier provider of next-

    generation database technology that com-presses databases by 90%, puts them on adesktop or laptop, and speeds up theiraccess by 10 times or more. Evan has near-ly 20 years of experience in UNIX systems.Before joining QD, he spent 8 years at VERI-TAS Software as a systems engineer, speak-er, and author. He also spent 5 years at SunMicrosystems and 2+ years at Fusion Sys-tems, where he worked to bring the firsthigh availability software applications forSunOS and Solaris to market. He also spenttwo years as a system administrator on theequities trading floor of a multinational trad-ing institution. He is the co-author of Blue-prints for High Availability (2nd edition, JohnWiley & Sons, 2003) and co-author and co-editor of The Resilient Enterprise (VERITASPublications, 2002). He is a well-regardedand popular speaker on the design of highly

    EARLY BIRD

    DISCOUNTSAVE!

    E

    Register by October 19, 2007, and SAVE!www.usenix.org/lisa2007

    Want more info about the LISA ’07 training program?Please see www.usenix.org/lisa07/training for com-prehensive tutorial descriptions, including full topicslists and prerequisites, and complete instructor biog-raphies.

  • available and disaster-resilient systems, andon fixed-content storage archives.

    Hunter MatthewsW7

    Hunter Matthews is the senior UNIX systemadministrator at the Duke University Depart-ment of Biology, where he is responsible fortwo small server rooms and one small data-center, having built two of them. He consultswith other departments across the universityon server room planning and operation. Hehas been involved in UNIX system adminis-tration for 15 years, including acting as leadsystem administrator for an FAA project.

    James MauroW2

    James Mauro is a SeniorStaff Engineer in the Per-formance and AvailabilityEngineering group at SunMicrosystems. Jim’s cur-

    rent interests and activities are centered onbenchmarking Solaris 10 performance,workload analysis, and tool development.This work includes Sun’s new Opteron-based systems and multicore performanceon Sun’s Chip Multithreading (CMT) Niagaraprocessor. Jim resides in Green Brook, NewJersey, with his wife and two sons. He spentmost of his spare time in the past year work-ing on the second edition of Solaris Inter-nals. Jim co-authored the first edition ofSolaris Internals with Richard McDougall andhas been writing about Solaris in variousforums for the past eight years.

    Adam MoskowitzM9

    Adam Moskowitz in hisroles as IT manager andsenior system administra-tor, and on behalf of sev-eral of his consulting

    clients, has interviewed more candidates forsystem administration positions than he canremember. By virtue of having worked for alot of companies that are no longer in busi-

    ness, he has been a candidate for almostthat many system administration positions.Over the years he’s been asked good ques-tions, bad questions, and horrible questions,and has seen candidates become flum-moxed when asked what seemed like rathersimple questions. All this plus his almost 30years of experience in the field (not to men-tion a darned good ratio of interviews to joboffers) has given Adam considerable fieldexperience to draw on for this tutorial.

    When he’s not in an interview, Adam worksas a system administrator—but only to sup-port his hobby of judging barbecue contestsand to keep food in his puppy’s bowl.

    Tobias OetikerM7, M11

    Tobias Oetiker is an elec-trical engineer by educa-tion and a system admin-istrator by vocation. Forten years he has been

    working for the Swiss Federal Institute ofTechnology in Zurich, providing studentsand staff with a deluxe UNIX workstationenvironment. Last year he started his owncompany, OETIKER+PARTNER AG, runningUNIX servers for industry customers,improving his pet open source projectsMRTG, RRDtool, and SmokePing, andapplying these tools to solve the customers’problems.

    Chris PageS11

    Chris Page is a Principal Engineer at Corpo-rate Technologies, Inc., where he is also thetechnical lead for Oracle database– relatedtechnologies. He was previously IT Directorat Millennium Pharmaceuticals, where hewas responsible for global UNIX system,database, and network management.

    Marcus RanumT3

    Marcus Ranum has beenbuilding and designingsecurity and security sys-tems since 1989. He isthe author of several

    books on security, and has been, variously,network manager, C programmer, develop-ment team leader, VP of engineering, CSO,CEO, and consultant. He is currently theCSO of Tenable Network Security.

    Jim ReidS4

    Jim Reid started using aPDP11/45 running V7UNIX over 25 years agoand has been workingwith UNIX systems ever

    since. He worked for three years at Originon behalf of Philips Electronics, where hewrote a DNS management system anddesigned, built, and ran the DNS infrastruc-ture for the corporate network, one of thebiggest in the world. He has over a decade’sexperience in writing and teaching trainingcourses ranging from kernel internals,through system administration and networksecurity, to DNS administration. He’s a fre-quent speaker at conferences and work-shops in Europe and the U.S. Jim is co-chair of the DNS Working Group at RIPEand founded its ENUM Working Group. Hehas co-authored or contributed to a numberof Internet standards documents, includingENUM (RFC3761) and Secure DNS (RFCs4033, 4034 & 4035).

    Alan RobertsonT2

    Alan Robertson foundedthe High Availability Linux(Linux-HA) project in 1998and has been projectleader for it since then. He

    worked for SuSE for a year, then in March2001 joined IBM’s Linux Technology Center,

    16 • REGISTER TODAY: WWW.USENIX.ORG/LISA2007

    TRAINING INSTRUCTORS[ ]

  • REGISTER BY OCTOBER 19 AND SAVE! • 17

    where he works on it full time. Before joiningSuSE, he was a Distinguished Member ofTechnical Staff at Bell Labs. He worked forBell Labs for 21 years in a variety of roles.These included providing leading-edge com-puting support, writing software tools, anddeveloping voicemail systems. Alan is a fre-quent speaker at international open sourceand Linux conferences.

    John SellensM13, R4, R7

    John Sellens has beeninvolved in system andnetwork administrationsince 1986 and is theauthor of several related

    USENIX papers, a number of ;login: articles,and the SAGE Short Topics in SystemAdministration booklet #7, System and Net-work Administration for Higher Reliability.He holds an M.Math. in computer sciencefrom the University of Waterloo and is aChartered Accountant. He is the proprietorof SYONEX, a systems and networks con-sultancy, and is currently a member of thesystems team at Magna International. From1999 to 2004, he was the General Managerfor Certainty Solutions in Toronto. Prior tojoining Certainty, John was the Director ofNetwork Engineering at UUNET Canada andwas a staff member in computing and infor-mation technology at the University ofWaterloo for 11 years.

    Stephen SorotaS2, M2

    Steve Sorota has over tenyears of experience archi-tecting solutions whileworking for several serviceproviders and ISVs. He is

    currently a senior member of the VMwareProfessional Services Organization, wherehe is responsible for delivering a variety ofcustom engagements and workshops,including virtualization-based disaster recov-ery, VMware SDK development, and charge-back.

    Marc StaveleyS5, M5

    Marc Staveley now workswith Soma Networks,where he is applying hismany years of experiencewith UNIX development

    and administration in leading their IT group.Previously Marc had been an independentconsultant and also held positions at SunMicrosystems, NCR, Princeton University,and the University of Waterloo. He is a fre-quent speaker on the topics of standards-based development, multi-threaded pro-gramming, system administration, andperformance tuning.

    Steve VanDevenderM4

    Steve VanDevender, byonce not knowing to beafraid of Sendmail, hasended up specializing inemail system administra-

    tion for much of his system administrationcareer. At efn.org between 1994 and 2002,he ended up managing a mail system thatgrew to 10,000 users; at the University ofOregon since 1996, he has helped managea mail system that has grown from 20,000to 30,000 users and, more important, hasgrown even more in message volume anduser activity, with many correspondingchanges to cope with that growth. Since2000, he has taught a popular course insystem administration for the University ofOregon’s Department of Computer andInformation Science.

    Rudi van DrunenR3

    Rudi van Drunen studiedelectronics engineeringand met the UNIX OS andfriends about 25 yearsago on a DEC VAX at the

    University of Groningen (NL). Apparently thetwo got along pretty well, as nowadays he is

    employed as CTO and senior UNIX infra-structure consultant at Competa IT in theNetherlands. Before that, he was head of ITfor a medical lab, where he did a.o. UNIXsystem administration and applied researchin image analysis and neural networks. He isone of the tech gurus and a founding boardmember of Wireless Leiden, the leadingwireless community in the Netherlands. Rudihas his own small open source and hard-ware design company, Xlexit. He has taughta number of classes and given invited talkson wireless and other topics at events suchas LISA and SANE and to the Dutch UNIXcommunity.

    Jeff VictorR1

    Jeff Victor as been usingUNIX systems since 1984.His two-decade careerhas included softwardesign and development,

    network and telecomm administration, andten years as a Systems Engineer at SunMicrosystems. Jeff wrote the Sun BluePrint“Solaris Containers Technology ArchitectureGuide” and the “How to Move a Container”guide, both available at www.sun.com. Healso maintains the Solaris Zones and Con-tainers FAQ at opensolaris.org.

    Elizabeth ZwickyT7, T11

    Elizabeth Zwicky has beenmanaging system admin-istrators off and on sinceher first job. Recently,she’s been hanging out

    with educational theorists and testing waysof teaching problem solving to systemadministrators, high-school graduates whomay or may not have any interest in systemadministration but are being paid to listen,and a three-year-old.

    EARLY BIRD

    DISCOUNTSAVE!

    E

    Register by October 19, 2007, and SAVE!www.usenix.org/lisa2007

  • WEDNESDAY, NOVEMBER 14TECHNICAL SESSIONS[ ]11:00 A.M.–12:30 P.M.

    Security via FirewallsPolicyVis: Firewall Security Policy Visualization and Inspec-tionTung Tran, University of Waterloo; Ehab Al-Shaer, University of Waterlooand DePaul University; Raouf Boutaba, University of Waterloo

    Inferring Higher Level Policies from Firewall RulesAlok Tongaonkar, Niranjan Inamdar, and R.C. Sekar, Stony BrookUniversity

    Assisted Firewall Policy Repair Using Examples and HistoryRobert Marmorstein and Phil Kearns, College of William and Mary

    The Biggest Game of Clue® You Have Ever PlayedDon Scelza, Director, CDS Outdoor School, Inc.

    It’s 3:30 in the morning and your pager is going off. There’s a newmystery to be solved and you’re the one who’s been picked tosolve it. That mystery may be a server down or a lost hiker. Whilethe problem spaces are different, the problem-solving techniquesare similar. This talk will look at the methodology used in lost per-son search management: preplanning, event notification andmobilization, team dynamics, objectives, strategy, tactics, investi-gation, statistical analysis, paperwork, and demobilization. Theseare all puzzle pieces regardless of the problem space. Can youfigure it out?

    Deploying Nagios in a Large Enterprise EnvironmentCarson Gaspar, Goldman Sachs

    This talk will cover scalability issues, security issues, our designand how it has evolved, user acceptance issues, integrating mon-itoring of proprietary applications, monitoring “closed” devices,high availability/disaster recovery, and lessons learned.

    Virtualization/VMwareMike DiPetrillo and Dan Anderson, VMware

    Bring your most perplexing questions on this topic to our gurus.See www.usenix.org/lisa07/tech for more information.

    [ INVITED TALKS 2 ]

    [ INVITED TALKS 1 ]

    [ THE GURU IS IN ]

    [ REFEREED PAPERS ]

    18 • REGISTER TODAY: WWW.USENIX.ORG/LISA2007

    8:45 A.M.–10:30 A.M.

    Keynote Address

    Autonomic Administration: HAL9000 Meets Gene RoddenberryJohn Strassner, Motorola Fellow and VicePresident, Autonomic Networking andCommunications, Motorola Research Labs

    How will we enhance network manage-ment so that the promise of future technologies and ser-vices can be realized? This talk will first provide an intro-duction to the problems that make network managementdifficult from the point of view of the practitioner. Then itwill examine some exciting new technologies that, whencombined, offer a holistic solution that could be used forsystem administration as well. The talk will conclude withexamples from autonomic networking research being donein Motorola Labs that can be used in network and systemadministration.

    John Strassner is a Motorola Fellow and Vice President,directing autonomic networking and communications atMotorola Research Labs. He is also responsible for direct-ing policy management and knowledge engineering. Previ-ously, John was the Chief Strategy Officer for Intelliden anda Cisco Fellow. John invented DEN (Directory EnabledNetworks) and DEN-ng as a new paradigm for managingand provisioning networks and networked applications.Currently, he is the Chairman of the Autonomic Communi-cations Forum. He also has authored two books, DirectoryEnabled Networks and Policy Based Network Manage-ment, has contributed chapters for three other books, andhas over 160 refereed conference and journal publications.John is a TMF Distinguished Fellow, a member of the TMFAdvisory Board, and a member of the Industry AdvisoryBoard of the University of California, Davis. He is also anassociate professor for the Waterford Institute of Technolo-gy, Waterford, Ireland.

    [ OPENING REMARKS, AWARDS, AND KEYNOTE ]

    Please seewww.usenix.org/lisa07/techfor complete technical program info.

  • REGISTER BY OCTOBER 19 AND SAVE! • 19

    2:00 P.M.–3:30 P.M.

    PerformanceNetADHICT: A Tool for Understanding Network TrafficHajime Inoue, Dana Jansens, Abdulrahman Hijazi, and Anil Somayaji,Carleton University

    CAMP: A Comman API for Measuring PerformanceMichael Haungs and Mark Gabel, California Polytechnic State University

    Application Buffer-Cache Management for Performance:Running the World’s Largest MRTGDavid Plonka, Archit Gupta, and Dale Carder, University of Wisconsin—Madison

    Scaling Production Repairs and QA Operations in a LiveEnvironmentShane Knapp and Avleen Vig, Google, Inc.

    Google has seen explosive growth over the years, and this hasevidenced itself in the increase in size of the production fleet. Asthe fleet increases, so do the number of machines both beingreleased and repaired. This talk will cover how, operationally andin many different locations, the methods in which data centerwork, and the systems that support it, were developed.

    A Service-Oriented Data Grid: Beyond StorageVirtualizationBruce Moxon, Senior Director of Strategic Technology and Grid Guru,Network Appliance, Inc.

    The storage industry talks about “virtualization” in static anddevice-specific contexts, while enterprise IT organizations areunder pressure to deliver a range of data “services” to their cus-tomers, with a tiered pricing model and verifiable service levels.These disparate producer- and consumer-oriented views of stor-age leave an implementation gap that must be filled in order torealize the “virtual everything” vision of enterprise grid computing.We will identify key storage and data management trends that areevolving to deliver this service-oriented view of data.

    Find out from the experts everything you need to know to getstarted on hot topics. See p. 22 for more information andwww.usenix.org/lisa07/htg for the complete schedule.

    4:00 P.M.–5:40 P.M.

    VirtualizationStork: Package Management for Distributed VM Environ-mentsJustin Cappos, Scott Baker, Jeremy Plichta, Duy Nyugen, Jason Hardies,Matt Borgard, Jeffry Johnston, and John H. Hartman, University ofArizona

    Decision Support for Virtual Machine Re-Provisioning inProduction EnvironmentsKyrre Begnum and Matthew Disney, Oslo University College; ÆleenFrisch, Exponential Consulting; Ingard Mevåg, Oslo University College

    OS Circular: Internet Client for ReferenceKuniyasu Suzaki, Toshiki Yagi, Kengo Iijima, and Nguyen Anh Quynh,National Institute of Advanced Industrial Science and Technology (AIST)

    Secure Isolation of Untrusted Legacy ApplicationsShaya Potter and Jason Nieh, Columbia University

    Who’s the Boss? Autonomics and New-Fangled SecurityGizmos with Minds of Their OwnGlenn Fink, Pacific Northwest National Laboratory

    How do humans stay in the loop when autonomics seems to bepushing them out? What do you do with a system designed tohave a mind of its own? Who’s responsible when it makes agree-ments with other systems that may cost your company money?This talk will incorporate the results of interviews with sysadminsworking with autonomic systems. I’ll share their reflections andmy own on the potential impacts of future autonomic systems.

    No Terabyte Left BehindAndrew Hume, AT&T Labs—Research

    Yes, disk is marvelous, getting inexorably cheaper and bigger. Buthere’s the dark side: How do you attach, configure, and mounttens of TB on a PC? How do you manage the files and back upthat data? Worst of all, vast amounts of cheap disk allow users todream of projects requiring petabytes of disk and ask you tomake it happen. This talk will identify most of the serious issuesand will describe solutions.

    Time Management for System AdministratorsTom Limoncelli, Google NYC

    Bring your most perplexing questions on this topic to our guru.See www.usenix.org/lisa07/tech for more information.

    [ THE GURU IS IN ]

    [ INVITED TALKS 2 ]

    [ INVITED TALKS 2 ]

    [ INVITED TALKS 1 ]

    [ INVITED TALKS 1 ]

    [ REFEREED PAPERS ]

    [ HIT THE GROUND RUNNING TRACK ]

    [ REFEREED PAPERS ]

  • 20 • REGISTER TODAY: WWW.USENIX.ORG/LISA2007

    THURSDAY, NOVEMBER 15TECHNICAL SESSIONS[ ]9:00 A.M.–10:30 A.M.

    The LHC Computing ChallengeTony Cass, CERN

    CERN’s Large Hadron Collider turns on next year, providing high-energy particle collisions for four experiments that, between them,are expected to generate up to 15PB of data per year. After givinga brief introduction to the accelerator and experiments, this talkwill outline the associated computing challenges—in particular,cluster management, data storage and distribution, and grid com-puting—and describe how CERN and the worldwide particlephysics community have been preparing to meet them.

    UNIX and Microsoft InteroperabilityJoseph Radin, Ricoh Company

    Bring your most perplexing questions on this topic to our guru.See www.usenix.org/lisa07/tech for more information.

    11:00 A.M.–12:30 P.M.

    Topics in System AdministrationPolicy-Driven Management of Data SetsJim Holl, Kostadis Roussos, and Jim Voll, Network Appliance, Inc.

    ATLANTIDES: An Architecture for Alert Verification in Net-work Intrusion Detection SystemsDamiano Bolzoni, University of Twente, The Netherlands; Bruno Crispo,University of Trento, Italy, and Vrije Universiteit, Amsterdam, TheNetherlands; Sandro Etalle, University of Twente, The Netherlands

    PDA: A Tool for Automated Problem DeterminationYaoping Ruan, Hai Huang, Raymond Jennings, Ramendra Sahoo, SambitSahu, and Anees Shaikh, IBM T.J. Watson Research Center

    Experiences with Scalable Network Operations at AkamaiErik Nygren, Chief Systems Architect, Akamai Technologies

    Akamai’s platform for content delivery and application accelera-tion consists of over 20,000 servers in over 2,800 locations in 72countries and over 1000 networks. Providing high levels of per-formance and reliability without requiring a large network opera-tions team necessitates significant automation. Further challengesare introduced by the highly distributed nature of the Akamai sys-tem. We’ll discuss some methodologies and systems we havedeveloped for operating the Akamai network.

    Ganeti: An Open Source Multi-Node HA Cluster Based onXenGuido Trotter, Google

    Ganeti is a cluster management tool we built at Google that lever-ages the power of Xen and other open source software in orderto provide a seamless environment in which to manage highlyavailable virtual instances. The talk will focus on what Ganeti pro-vides, what audience it is targeted to, and what the plans for itsfuture are.

    AFS 11:00 a.m.–11:45 a.m.Esther Filderman, The OpenAFS Project

    Data Center Design 11:45 a.m.–12:30 p.m.Doug Hughes, D.E. Shaw Research, LLC

    Bring your most perplexing questions on these topics to ourgurus. See www.usenix.org/lisa07/tech for more information.

    [ INVITED TALKS 2 ]

    [ INVITED TALKS 1 ]

    [ THE GURU IS IN ]

    [ THE GURU IS IN ]

    [ REFEREED PAPERS ][ PLENARY SESSION ]

    [ ]

    TRAINING AND TECHNICAL SESSIONS:THE PERFECT COMBINATIONLISA ’07 is designed to give you the optimum learningexperience. To get the most out of LISA ’07, we encour-age you to take part in both training and technical ses-sions. Please note that you cannot take a full day of train-ing and a full day of tech sessions on the same day. Donot despair, though; all is not lost. Take advantage ofRegistration Package G, Wednesday/Thursday Half-and-Half Tech and Training: Attend any combination of twohalf-days of training and two half-days of technical ses-sions on Wednesday and Thursday. To help you makeyour decisions, the complete training program schedulecan be found on pp. 4–12, and pp. 18–23 have the entiretechnical sessions schedule laid out for you. Finally, learnmore about Package G and our other discount registrationpackages on p. 29.

    Please seewww.usenix.org/lisa07/techfor complete technical program info.

  • REGISTER BY OCTOBER 19 AND SAVE! • 21

    2:00 P.M.–3:30 P.M.

    Managing Grids and ClustersUsher: An Extensible Framework for Managing Clusters ofVirtual MachinesMarvin McNett, Diwaker Gupta, Amin Vahdat, and Geoffrey M. Voelker,University of California, San Diego

    Remote Control: Distributed Application Configuration,Management, and Visualization with PlushJeannie Albrecht, Ryan Braud, Darren Dao, Nikolay Topilski, ChristopherTuttle, Alex C. Snoeren, and Amin Vahdat, University of California, SanDiego

    Everlab: A Production Platform for Research in NetworkExperimentation and ComputationElliot Jaffe, Danny Bickson, and Scott Kirkpatrick, Hebrew University ofJerusalem

    Using Throttling and Traffic Shaping to Combat Botnet SpamKen Simpson, Founder and CEO, MailChannels

    In this talk, Ken Simpson describes his research into spammerbehavior and explains how spammers’ impatience can be usedfor spam suppression. During this talk, you will learn about spam-mer economics and spammer behavior, get an introduction toconnection management, and hear how we have used connectionmanagement in some real-world scenarios to reduce spam traffic.

    Hardening Your Systems Against LitigationAlexander Muentz, OnSite E-Discovery

    Recent amendments to the Federal Rules of Civil Procedurerequire parties in litigation to make electronically stored informa-tion available to the opposing side. Unfortunately, legal and ITdepartments still don’t communicate well with one another. Thepresentation will include an overview of the parts of the FederalRules that are relevant to IT professionals and how IT staff shouldapproach their legal department. Some examples of how not tohandle a litigation hold will be given, as well as how to prepareone’s systems for potential or pending litigation.

    Find out from the experts everything you need to know to getstarted on hot topics. See p. 22 for more information andwww.usenix.org/lisa07/htg for the complete schedule.

    4:00 P.M.–5:30 P.M.

    Masters Operations ScoreMaster Education Programmes in Network and SystemAdministrationMark Burgess, Oslo University College; Karst Koymans, University ofAmsterdam

    Operations Friendly ApplicationsJames Hamilton, Microsoft Windows Live Core

    RepuScore: Collaborative Reputation Management Frame-work for Email InfrastructureGautam Singaraju and Brent ByungHoon Kang, University of NorthCarolina at Charlotte

    The State of Spam Plus BGP HijackingDavid Josephsen, Senior Systems Engineer, DBG, Inc.

    The talk begins with an overview of the spam war. The war is bro-ken down into two types of attacks: delivery countermeasuresand content filtering. I provide an overview of most of the attacksand defenses on each front thus far. Next I define short-lived BGPprefix hijacking, how it works, and why you might want to use it.Then I discuss the published evidence that it is occurring in thewild and the potential for abuse in the context of unallocated IPv4address spa