LISA '07 Home |  Registration |  Organizers |   Invitation |   At a Glance |  Training |  Tech Sessions  
Hit the Ground Running Track |  Workshops |  WiPs |  Posters |  BoFs |  Exhibition |  Sponsors |  Activities |  Hotel/Travel
Services |  Students |  Questions? |  Help Promote! |  Call for Papers |  Past Proceedings |  Authors |  Speakers


TECHNICAL SESSIONS

Wednesday | Thursday | Friday | Invited Talk Speakers

Wednesday, November 14
8:45 a.m.–10:30 a.m. Wednesday
Opening Remarks, Awards, Keynote
Landmark CD

John Strassner


Keynote Address
Autonomic Administration: HAL 9000 Meets Gene Roddenberry

John Strassner, Motorola Fellow and Vice President, Autonomic Networking and Communications, Motorola Research Labs

VideoView the Keynote MP4 video

MP3 IconListen to the Keynote in MP3 format

View the presentation slides

How will we enhance network management so that the promise of future technologies and services can be realized? This talk will first provide an introduction to the problems that make network management difficult from the point of view of the practitioner. Then it will examine some exciting new technologies that, when combined, offer a holistic solution that could be used for system administration as well. The talk will conclude with examples from autonomic networking research being done in Motorola Labs that can be used in network and system administration.

John Strassner is a Motorola Fellow and Vice President, directing autonomic networking and communications at Motorola Research Labs. He is also responsible for directing policy management and knowledge engineering. Previously, John was the Chief Strategy Officer for Intelliden and a Cisco Fellow. John invented DEN (Directory Enabled Networks) and DEN-ng as a new paradigm for managing and provisioning networks and networked applications. Currently, he is the Chairman of the Autonomic Communications Forum. He also has authored two books, Directory Enabled Networks and Policy Based Network Management, has contributed chapters for three other books, and has over 160 refereed conference and journal publications. John is a TMF Distinguished Fellow, a member of the TMF Advisory Board, and a member of the Industry Advisory Board of the University of California, Davis. He is also an associate professor for the Waterford Institute of Technology, Waterford, Ireland.

10:30 a.m.–11:00 a.m.   Break    Landmark Foyer  
11:00 a.m.–12:30 p.m. Wednesday
REFEREED PAPERS
Reunion AB

Security via Firewalls
Session Chair: Æleen Frisch, Exponential Consulting

PolicyVis: Firewall Security Policy Visualization and Inspection
Tung Tran, University of Waterloo; Ehab Al-Shaer, University of Waterloo and DePaul University; Raouf Boutaba, University of Waterloo, Canada

Inferring Higher Level Policies from Firewall Rules
Alok Tongaonkar, Niranjan Inamdar, and R. Sekar, Stony Brook University

Assisted Firewall Policy Repair Using Examples and History
Robert Marmorstein and Phil Kearns, The College of William & Mary

INVITED TALKS I
Landmark C

The Biggest Game of Clue® You Have Ever Played
Don Scelza, Director, CDS Outdoor School, Inc.

MP3 IconListen in MP3 format

View the presentation slides

It's 3:30 in the morning and your pager is going off. There's a new mystery to be solved and you're the one who's been picked to solve it. That mystery may be a server down or a lost hiker. While the problem spaces are different, the problem-solving techniques are similar. This talk will look at the methodology used in lost person search management: preplanning, event notification and mobilization, team dynamics, objectives, strategy, tactics, investigation, statistical analysis, paperwork, and demobilization. These are all puzzle pieces regardless of the problem space. Can you figure it out?

INVITED TALKS II
Landmark D

Deploying Nagios in a Large Enterprise Environment
Carson Gaspar, Goldman Sachs

VideoView the MP4 video

MP3 IconListen in MP3 format

View the presentation slides

This talk will cover scalability issues, security issues, our design and how it has evolved, user acceptance issues, integrating monitoring of proprietary applications, monitoring "closed" devices, high availability/disaster recovery, and lessons learned.

THE GURU IS IN
Reunion C

Virtualization/VMware
Kenon Owens,VMware

Kenon Owens has worked in the computer industry for over 13 years as an email and virtualization specialist. Kenon has worked for VMware for over 8 years and is currently a Staff Systems Engineer specializing in industry research and competitive analysis. In this role, Kenon works with VMware executives and R&D to track the virtualization landscape for industry trends, new technologies, and product direction. Prior to this, Kenon worked with numerous customers developing and delivering successful VMware Infrastructure implementations. Kenon holds a B.S. in Mechanical Engineering and Marine Engineering Technology.

12:30 p.m.–2:00 p.m.   Lunch (on your own)    Click here for lunch purchasing options.
2:00 p.m.–3:30 p.m. Wednesday
REFEREED PAPERS
Reunion AB

Performance
Session Chair: Melanie Rieback, Vrije Universiteit Amsterdam

NetADHICT: A Tool for Understanding Network Traffic
Hajime Inoue, ATC-NY, Ithaca, NY; Dana Jansens, Abdulrahman Hijazi, and Anil Somayaji, Carleton University, Ottawa, Canada

CAMP: A Common API for Measuring Performance
Mark Gabel and Michael Haungs, California Polytechnic State University, San Luis Obispo

Awarded Best Paper!
Application Buffer-Cache Management for Performance: Running the World’s Largest MRTG
David Plonka, Archit Gupta, and Dale Carder, University of Wisconsin—Madison

INVITED TALKS I
Landmark C

Scaling Production Repairs and QA Operations in a Live Environment
Shane Knapp and Avleen Vig, Google, Inc.

MP3 IconListen in MP3 format

View Shane Knapp's presentation slides

View Avleen Vig's presentation slides

Google has seen explosive growth over the years, and this has evidenced itself in the increase in size of the production fleet. As the fleet increases, so do the number of machines both being released and repaired. This talk will cover how, operationally and in many different locations, the methods in which data center work, and the systems that support it, were developed.

INVITED TALKS II
Landmark D

A Service-Oriented Data Grid: Beyond Storage Virtualization
Bruce Moxon, Senior Director of Strategic Technology and Grid Guru, Network Appliance, Inc.

VideoView the MP4 video

MP3 IconListen in MP3 format

The storage industry talks about "virtualization" in static and device-specific contexts, while enterprise IT organizations are under pressure to deliver a range of data "services" to their customers, with a tiered pricing model and verifiable service levels. These disparate producer- and consumer-oriented views of storage leave an implementation gap that must be filled in order to realize the "virtual everything" vision of enterprise grid computing. We will identify key storage and data management trends that are evolving to deliver this service-oriented view of data.

HIT THE GROUND RUNNING TRACK
Reunion C

Find out from the experts everything you need to know to get started on the following topics:

Databases: Hit the Ground, Running?
John Sellens, SYONEX

Everything You Need to Know About Spam (in 15 Minutes)
Chris St. Pierre, Nebraska Wesleyan University

Datacenter Design Issues
Doug Hughes, D.E. Shaw Research, LLC

Active Directory Group Policy for UNIX
Gerald Carter, SAMBA/Centeris

Autonomic Computing: Our Hopes, Dreams, and Fears
Glenn Fink, Pacific Northwest National Laboratory

For more information about the Hit the Ground Running track, click here.

3:30 p.m.–4:00 p.m.   Break   Vendor Exhibition, Marsalis Hall  
4:00 p.m.–5:40 p.m. Wednesday
REFEREED PAPERS
Reunion AB

Virtualization
Session Chair: Alva Couch, Tufts University

Stork: Package Management for Distributed VM Environments
Justin Cappos, Scott Baker, Jeremy Plichta, Duy Nyugen, Jason Hardies, Matt Borgard, Jeffry Johnston, and John H. Hartman, University of Arizona

Decision Support for Virtual Machine Re-Provisioning in Production Environments
Kyrre Begnum and Matthew Disney, Oslo University College, Norway; Æleen Frisch, Exponential Consulting; Ingard Mevåg, Oslo University College

OS Circular: Internet Client for Reference
Kuniyasu Suzaki, Toshiki Yagi, Kengo Iijima, and Nguyen Anh Quynh, National Institute of Advanced Industrial Science and Technology, Japan

Secure Isolation of Untrusted Legacy Applications
Shaya Potter, Jason Nieh, and Matt Selsky, Columbia University

INVITED TALKS I
Landmark C

Who's the Boss? Autonomics and New-Fangled Security Gizmos with Minds of Their Own
Glenn Fink, Pacific Northwest National Laboratory

MP3 IconListen in MP3 format

View the presentation slides

How do humans stay in the loop when autonomics seems to be pushing them out? What do you do with a system designed to have a mind of its own? Who's responsible when it makes agreements with other systems that may cost your company money? This talk will incorporate the results of interviews with sysadmins working with autonomic systems. I'll share their reflections and my own on the potential impacts of future autonomic systems.

INVITED TALKS II
Landmark D

No Terabyte Left Behind
Andrew Hume, AT&T Labs—Research

VideoView the MP4 video

MP3 IconListen in MP3 format

Yes, disk is marvelous, getting inexorably cheaper and bigger. But here's the dark side: How do you attach, configure, and mount tens of TB on a PC? How do you manage the files and back up that data? Worst of all, vast amounts of cheap disk allow users to dream of projects requiring petabytes of disk and ask you to make it happen. This talk will identify most of the serious issues and will describe solutions.

THE GURU IS IN
Reunion C

Samba
Gerald Carter, Centeris/Samba Team

Gerald Carter has been a member of the Samba Development Team since 1998. He has been developing, writing about, and teaching on open source since the late 1990s. Currently employed by Centeris as a Samba and open source developer, Gerald has written books for SAMS Publishing and for O'Reilly Publishing.

Note: This session replaces Tom Limoncelli's "Time Management for System Administrators." Interested in the topic? Register to attend his half-day tutorial on the morning of Sunday, November 11.

TECHNICAL SESSIONS: Wednesday | Thursday | Friday | Invited Talk Speakers
Thursday, November 15
9:00 a.m.–10:30 a.m. Thursday
PLENARY SESSION
Landmark CD

The LHC Computing Challenge
Tony Cass, CERN

VideoView the MP4 video

MP3 IconListen in MP3 format

View the presentation slides

CERN's Large Hadron Collider turns on next year, providing high-energy particle collisions for four experiments that, between them, are expected to generate up to 15PB of data per year. After giving a brief introduction to the accelerator and experiments, this talk will outline the associated computing challenges—in particular, cluster management, data storage and distribution, and grid computing—and describe how CERN and the worldwide particle physics community have been preparing to meet them.

THE GURU IS IN
Reunion C

UNIX and Microsoft Interoperability
Joseph Radin, Ricoh Company

Joseph Radin is currently working at the Ricoh Company as an Engineering Manager. For the past 6 years Joseph has served as a technical advisor to a number of major FORTUNE 500 companies, defining problems and implementing solutions, many of which involved UNIX-Microsoft interoperability. Mr. Radin has authored four books on UNIX system administration, UnixWare OS, the Mosaic Internet browser, and X Windows.

10:30 a.m.–11:00 a.m.   Break    Landmark Foyer  
11:00 a.m.–12:30 p.m. Thursday
REFEREED PAPERS
Reunion AB

Miscellaneous Topics, I
Session Chair: Sanjai Narain, Telcordia Technologies

Policy-Driven Management of Data Sets
Jim Holl, Kostadis Roussos, and Jim Voll, Network Appliance, Inc.

ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems
Damiano Bolzoni, University of Twente, The Netherlands; Bruno Crispo, Vrije Universiteit, The Netherlands & University of Trento, Italy; Sandro Etalle, University of Twente, The Netherlands

PDA: A Tool for Automated Problem Determination
Hai Huang, Raymond Jennings III, Yaoping Ruan, Ramendra Sahoo, Sambit Sahu, and Anees Shaikh, IBM T.J. Watson Research Center

INVITED TALKS I
Landmark C

Experiences with Scalable Network Operations at Akamai
Erik Nygren, Chief Systems Architect, Akamai Technologies

VideoView the MP4 video

MP3 IconListen in MP3 format

Akamai's platform for content delivery and application acceleration consists of over 20,000 servers in over 2,800 locations in 72 countries and over 1000 networks. Providing high levels of performance and reliability without requiring a large network operations team necessitates significant automation. Further challenges are introduced by the highly distributed nature of the Akamai system. We'll discuss some methodologies and systems we have developed for operating the Akamai network.

INVITED TALKS II
Landmark D

Ganeti: An Open Source Multi-Node HA Cluster Based on Xen
Guido Trotter, Google

MP3 IconListen in MP3 format

View the presentation slides

Ganeti is a cluster management tool we built at Google that leverages the power of Xen and other open source software in order to provide a seamless environment in which to manage highly available virtual instances. The talk will focus on what Ganeti provides, what audience it is targeted to, and what the plans for its future are.

THE GURU IS IN
Reunion C

AFS
11:00 a.m.–11:45 a.m.
Esther Filderman, The OpenAFS Project

Moose (Esther Filderman) has been working with AFS since before it was called AFS. She enjoys preaching and teaching about AFS and has been bringing AFS content to LISA for many years.

Data Center Design
11:45 a.m.–12:30 p.m.
Doug Hughes, D.E. Shaw Research, LLC

Doug Hughes is an officially titleless sysadmin for D.E. Shaw Research, LLC, where he goes about his day solving problems that need to be solved and designing things that need to be designed. One of his tasks is designing a data center to hold a customer purpose-specific supercomputer, a terabyte per day in storage growth per supercomputer segment, and a few thousand nodes of commodity computers for data analysis.

12:30 p.m.–2:00 p.m.   Exhibit Hall Pizza Party   Vendor Exhibition, Marsalis Hall
2:00 p.m.–3:30 p.m. Thursday
REFEREED PAPERS
Reunion AB

Managing Grids and Clusters
Session Chair: Chad Verbowski, Microsoft Research

Usher: An Extensible Framework for Managing Clusters of Virtual Machines
Marvin McNett, Diwaker Gupta, Amin Vahdat, and Geoffrey M. Voelker, University of California, San Diego

Remote Control: Distributed Application Configuration, Management, and Visualization with Plush
Jeannie Albrecht, Williams College; Ryan Braud, Darren Dao, Nikolay Topilski, Christopher Tuttle, Alex C. Snoeren, and Amin Vahdat, University of California, San Diego

Everlab: A Production Platform for Research in Network Experimentation and Computation
Elliot Jaffe, Danny Bickson, and Scott Kirkpatrick, Hebrew University of Jerusalem, Israel

INVITED TALKS I
Landmark C

Using Throttling and Traffic Shaping to Combat Botnet Spam
Ken Simpson, Founder and CEO, MailChannels

VideoView the MP4 video

MP3 IconListen in MP3 format

View the presentation slides

In this talk, Ken Simpson describes his research into spammer behavior and explains how spammers' impatience can be used for spam suppression. During this talk, you will learn about spammer economics and spammer behavior, get an introduction to connection management, and hear how we have used connection management in some real-world scenarios to reduce spam traffic.

INVITED TALKS II
Landmark D

Panel on Configuration Tools: LCFG, Cfengine, BCFG, and Puppet

Moderator: Adam Moskowitz, Menlo Computing

Panelists: Paul Anderson, University of Edinburgh; Mark Burgess, Oslo University College; Narayan Desai, Argonne National Laboratory; Luke Kanies, Reductive Labs

The authors of the major configuration tools will provide an enlightening overview and a balanced comparison that will help you decide how best to automate management of your systems.

HIT THE GROUND RUNNING TRACK
Reunion C

Find out from the experts everything you need to know to get started on the following topics:

NetFlow; or, How to Know What Your Network Really Did Without Going Broke
Michael W. Lucas, GKN Driveline North America, Inc.

ZFS
Jeff Bonwick, Sun Microsystems

Jails, VMs, and Sandboxes
Bill Cheswick, AT&T Research

Big Nagios
Carson Gaspar, Goldman Sachs

Eco Computing: Improving Data Center Energy Efficiency
Lou Marchant, Sun Microsystems, Inc.

For more information about the Hit the Ground Running track, click here.

3:30 p.m.–4:00 p.m.   Break    Landmark Foyer  
4:00 p.m.–5:30 p.m. Thursday
REFEREED PAPERS
Reunion AB

Miscellaneous Topics, II
Session Chair: Alva Couch, Tufts University

Master Education Programmes in Network and System Administration
Mark Burgess, Oslo University College; Karst Koymans, Universiteit van Amsterdam

On Designing and Deploying Internet-Scale Services
James Hamilton, Windows Live Services Platform

RepuScore: Collaborative Reputation Management Framework for Email Infrastructure
Gautam Singaraju and Brent ByungHoon Kang, University of North Carolina at Charlotte

INVITED TALKS I
Landmark C

Homeless Vikings: BGP Prefix Hijacking and the Spam Wars
David Josephsen, Senior Systems Engineer, DBG, Inc.

VideoView the MP4 video

MP3 IconListen in MP3 format

BGP prefix hijacks take the IP addresses of others and make them your own. This talk provides a chilling account of the current use of prefix hijacks by spammers in a successful effort to defeat RBLs. Placed within the context of the history of the spam wars, this talk makes clear the grim future we face if we continue to escalate the spam wars into the network layer; namely, a future where every spammer on earth can arbitrarily choose and make routable an unallocated IPv4 address (one that the RBLs have never seen) once per day for the next few hundred years or so without ever using the same address twice or ever colliding with any other spammer.

INVITED TALKS II
Landmark D

Beyond NAC: What's Your Next Step?
Mark "Simple Nomad" Loveless, Security Architect, Vernier Networks, Inc.

MP3 IconListen in MP3 format

View the presentation slides

Now that you have adopted Network Access Control, what is your next step? With the NAC market maturing at a rapid rate, most companies have either already implemented NAC or are evaluating it for future deployment. However, there is still much confusion about what is and what isn't NAC. This presentation will clearly outline how NAC is an important security enhancement, and why it is not an end-all security solution. Attendees of this presentation will learn the technology that is required in today's world to ensure network security and effectively mitigate threats.

THE GURU IS IN
Reunion C

ZFS
Jeff Bonwick, Sun Microsystems

View the presentation slides

Jeff Bonwick, Storage CTO, Sun Fellow at Sun Microsystems, is the chief architect of ZFS, a new kind of file system that provides simple administration, transactional semantics, end-to-end data integrity, and immense scalability using commodity hardware. He invented the slab allocator, which has been adopted by most modern operating systems; created observability tools such as kstat and lockstat; and authored many core Solaris services, including mutexes and rwlocks, priority inheritance, callouts, task queues, file descriptor management, high-resolution timing, the LZJB compression algorithm, libkvm, and virtual address allocation. Not only that, but he roasts his own coffee.

TECHNICAL SESSIONS: Wednesday | Thursday | Friday | Invited Talk Speakers
Friday, November 16
9:00 a.m.–10:30 a.m. Friday
PLENARY SESSION
Landmark D

The Economic Meltdown of Moore's Law and the Green Data Center
Kenneth G. Brill, Executive Director, Uptime Institute

VideoView the MP4 video

MP3 IconListen in MP3 format

View the presentation slides

The net economic productivity of IT is threatened because server power consumption improvement is occurring at a slower rate than the increase in computer performance. As a result, the enterprise TCO per unit of computing has not been falling nearly as rapidly as senior executives might think. The one-time benefit of killing dead servers and virtualization will defer this new economic reality, but CFOs, CTOs, and CIOs need to change their economic decision models now or risk investing in new applications that can't pay back their real costs.

THE GURU IS IN
Reunion C

NTP
9:00 a.m.–9:45 a.m.
Brad Knowles, Consultant and Author

Since 2003, Brad Knowles has been a volunteer systems staff member (postmaster, listmaster, etc.) for the NTP Public Services Project (at ntp.org), as well as a frequent contributor to the NTP Community Supported Documentation at http://support.ntp.org/. He is also a member of the IETF NTP Working Group, helping to set the official standard for the NTPv4 protocol. He can frequently be found on the #ntp irc channel at irc.freenode.net. He is currently living in Austin, TX, setting up his own consulting company, has co-authored SAGE Short Topics Booklet #15 Internet Postmaster: Duties and Responsibilities, and is still trying to write his first book.

Legal Issues/Forensics
9:45 a.m.–10:30 a.m.
Jason Park, MD5Group

10:30 a.m.–11:00 a.m.   Break    Landmark Foyer  
11:00 a.m.–12:30 p.m. Friday
REFEREED PAPERS
Reunion AB

Configuration Management
Session Chair: Paul Anderson, University of Edinburgh

Moobi: A Thin Server Management System Using BitTorrent
Chris McEniry, Sony Computer Entertainment America

Awarded Best Paper!
PoDIM: A Language for High-Level Configuration Management
Thomas Delaet and Wouter Joosen, Katholieke Universiteit Leuven, Belgium

Network Patterns in Cfengine and Scalable Data Aggregation
Mark Burgess and Matt Disney, Oslo University College; Rolf Stadler, KTH Royal Institute of Technology, Stockholm

INVITED TALKS I
Landmark C

Hardening Your Systems Against Litigation
Alexander Muentz, Esq.

MP3 IconListen in MP3 format

View the presentation slides

Recent amendments to the Federal Rules of Civil Procedure require parties in litigation to make electronically stored information available to the opposing side. Unfortunately, legal and IT departments still don't communicate well with one another. The presentation will include an overview of the parts of the Federal Rules that are relevant to IT professionals and how IT staff should approach their legal department. Some examples of how not to handle a litigation hold will be given, as well as how to prepare one's systems for potential or pending litigation.

INVITED TALKS II
Landmark D

Data Center Growing Pains
Lou Marchant, Sun Microsystems

VideoView the MP4 video

MP3 IconListen in MP3 format

View the presentation slides

Data centers can't be built fast enough to take care of the increases in power consumption and lack of available floor space for numerous companies. Companies are concerned over new environmental legislation being considered and how it will impact their business. If you aren't seeing these issues in your data centers now, you could in the next five years. Hear about what we at Sun have done in our own data centers and how we are trying to approach the problems with a fresh new perspective.

THE GURU IS IN
Reunion C

SIP/VoIP
11:00 a.m.–11:45 a.m.
Robert Sparks, Estacado Systems

Robert Sparks is the VP of Research and Development at Estacado Systems, providing solutions in real-time IP communications. He is a co-author of the core SIP specification, RFC3261, and several of its extensions. He is also co-author of the book SIP Beyond VoIP: The Next Step in the IP Communications Revolution. He co-chairs the IETF's SIMPLE working group, is currently on the board of the SIP Forum, coordinates the international SIP interoperability test events (SIPit), and is an active contributor to the reSIProcate project.

LDAP
11:45 a.m.–12:30 p.m.
Howard Chu, Chief Architect, Symas Corp.

Howard Chu has deep experience with system networking and security technologies. He started working with OpenLDAP in 1998 and has been one of the leading developers on the OpenLDAP core team since 1999.

12:30 p.m.–2:00 p.m.   Lunch (on your own)   Special talk scheduled during lunch; see below
1:00 p.m.–1:45 p.m. Friday
Special Lunch & Learn
Landmark D
You're welcome to pick up lunch and bring it to the talk. Click here for lunch purchasing options.

Should the Root Prompt Require a Road Test?
Alva L. Couch, Associate Professor of Computer Science, Tufts University

View the presentation slides

A lot of attention and energy have been put into certification programs, but exactly what do they certify? Written tests are no substitute for direct observation of an administrator performing a task. I explore the concept of a "road test" for system administrators, what it might entail, and what we can learn from experts about evaluating knowledge by observing behavior. I conjecture that current written tests only help us evaluate system administrators who already possess a set of core skills that no written test could measure. If a certification is like an endorsement on a driver's license, then what should obtaining the license itself entail?

2:00 p.m.–3:30 p.m. Friday
WORK-IN-PROGRESS REPORTS (WIPS)
Reunion AB

Session Chair: Brent Hoon Kang, University of North Carolina at Charlotte

MP3 IconListen in MP3 format

A Work-in-Progress report (WiP) is a very short presentation about current work. It is a great way to poll the LISA audience for feedback and interest. See the schedule of WiPs and available presentation slides here.

INVITED TALKS I
Landmark D

Prince Caspian on Location: Commodity Hardware and Gaffer Tape
Trey Darley, Technical Consultant

MP3 IconListen in MP3 format

View the presentation slides

View the Prince Caspian Movie Trailer

The as yet unreleased Walden/Disney production Prince Caspian was shot on location throughout Europe and New Zealand. While you might expect that a big-budget Hollywood production replete with thousands of SFX shots would have a tightly organized, well-financed, top-notch IT department, the truth might surprise you. Trey Darley saw it all first-hand and will talk about how the Prince Caspian IT department pulled it off using mainly commodity hardware, their wits, and lots of gaffer tape.

INVITED TALKS II
Landmark C

The Security Butterfly Effect
Cat Okita, Earthworks

MP3 IconListen in MP3 format

View the presentation slides

The butterfly effect is traditionally described as the almost imperceptible flap of a butterfly's wings causing changes that result in a tornado being formed (or not!). In information security, a change that seems simple may result in serious vulnerabilities—and as the complexity and interdependence of the environments we manage increase, predicting the effects of apparently innocent actions will become infinitely more challenging. This talk will discuss some notable examples of the butterfly effect in security, as well as giving a brief overview of future hot points to look toward.

HIT THE GROUND RUNNING TRACK
Reunion C

Find out from the experts everything you need to know to get started on the following topics:

VoIP with NATs and Firewalls
Robert Sparks, Estacado Systems

OpenLDAP: Highlights for 2.4
Howard Chu, Symas Corp./OpenLDAP Project

Ruby: Productivity or Penance?
Andrew Hume, AT&T—Research

Ganeti: An Open Source High-Availability Cluster Based on Xen
Guido Trotter, Google Ganeti Team

How to Get Your LISA Paper Accepted
Tom Limoncelli, Google NYC; Paul Anderson, University of Edinburgh; Adam Moskowitz, Menlo Computing

For more information about the Hit the Ground Running track, click here.

3:30 p.m.–4:00 p.m.   Break    Landmark Foyer  
4:00 p.m.–5:30 p.m. Friday
Closing Session
Landmark D

Cookin' at the Keyboard
David N. Blank-Edelman, Northeastern University CCIS; Lee Damon, University of Washington

MP3 IconListen in MP3 format

View the presentation slides

There's a field in which people routinely:

  • Work well under pressure—improvising and showing great creativity even in the worst of situations
  • Create (repeatable!) multi-step procedures that integrate different components into cohesive systems
  • Document these procedures so that even total neophytes can understand them
  • Train other people to do the same

Nope, not system administration. Sysadmins only wish we could consistently do these things.

All of this stuff is taken for granted in the world of cooking. How the heck do they do it?

David and his lovely assistant Lee Damon will not only tell you how they do it, but will also show you some of how it is done. We'll take a highly entertaining romp through the cooking world to find the tools, techniques, and processes that can be applied to system administration. You'll never look at your food or your field in the same way again.

?Need help? Use our Contacts page.

Last changed: 6 Feb. 2008 mn