LISA '10 Banner

LISA '10 Home |  Registration |  Discounts |  Organizers |  Invitation |  At a Glance |  Calendar |  Training |  Tech Sessions
Workshops |  Data Storage Day |  Poster Sessions |  BoFs |  Exhibition |  Sponsors |  Activities |  Hotel/Travel
Services |  Students |  Questions? |  Help Promote! |  For Participants |  Call for Papers |  Past Proceedings


TECHNICAL SESSIONS

All sessions taking place in the San Jose Marriott are denoted by the Marriott logo icon throughout the LISA '10 Web site. All other session locations are in the San Jose McEnery Convention Center.

See the floor plans: Marriott | Convention Center


VideoJust Up! Videos of the presentations will be posted as soon as they become available. Access is currently restricted to USENIX and SAGE members and LISA '10 conference attendees. Not a member? Join today!

Conference full papers and formal proceedings are available to conference registrants immediately and to everyone beginning Wednesday, November 10. Everyone can view the abstracts and the proceedings front matter immediately.

Proceedings Front Matter: Title Page and List of Organizers | Table of Contents | Message from the Program Chair

Complete Proceedings (PDF)

NEW! E-Book Proceedings: Read the proceedings on the go in iPad-friendly EPUB format or Kindle-friendly Mobipocket format.

Tech Sessions: Wednesday, November 10 | Thursday, November 11 | Friday, November 12 | Invited Talk Speakers

Wednesday, November 10
8:45 a.m.–10:30 a.m. Wednesday

A1–3/6–8

Opening Remarks, Awards, and Keynote Address

LISA '10 Program Chair: Rudi van Drunen, Competa IT and Xlexit Technology, The Netherlands


Video View the Video

Keynote Address
The LHC Computing Challenge: Preparation, Reality, and Future Outlook

Tony Cass, CERN


Video View the Video | Slides

MP3 Icon Listen to the MP3

CERN's IT department, in collaboration with particle physics computing institutes around the world, has been preparing for the arrival of Large Hadron Collider (LHC) data since early 2000. Now that the accelerator is in operation—with routine operation at record colliding energies since March—I will report on how the computing infrastructure has stood up to the test of real data, compare today's reality to both recent tests and original predictions, and then risk some predictions about the future evolution of the Worldwide LHC Computing Grid.

10:30 a.m.–11:00 a.m.   Break with Beverages and Snacks, Concourse 1
11:00 a.m.–12:30 p.m. Wednesday

REFEREED PAPERS

A2/7

Session Chair: Cory Lueninghoener, Los Alamos National Laboratory

A Survey of System Configuration Tools
Thomas Delaet, Wouter Joosen, and Bart Vanbrabant, DistriNet, K.U. Leuven

Read the Abstract |
Full paper

View the Slides


Video View the Video

MP3 Icon Listen to the MP3

High Performance Multi-Node File Copies and Checksums for Clustered File Systems
Paul Z. Kolano and Robert B. Ciotti, NASA Ames Research Center

Read the Abstract |
Full paper

View the Slides


Video View the Video

MP3 Icon Listen to the MP3

Fast and Secure Laptop Backups with Encrypted De-duplication
Paul Anderson and Le Zhang, University of Edinburgh

Read the Abstract |
Full paper

View the Slides


Video View the Video

MP3 Icon Listen to the MP3

INVITED TALKS I

A1/8

Session Chair: Rudi van Drunen, Competa IT and Xlexit Technology, The Netherlands

IPv6: No Longer Optional
Richard Jimmerson, ARIN


Video View the Video

MP3 Icon Listen to the MP3

When LISA '10 takes place, there will still be IPv4 address space remaining in the free pools of the Regional Internet Registries. When LISA '11 takes place, it will likely be fully depleted—gone. In this session, Richard Jimmerson, CIO of the American Registry for Internet Numbers (ARIN), will describe the key considerations for and benefits of IPv6 adoption and the steps all system and network administrators and engineers should be taking to prepare for IPv4 depletion challenges.

INVITED TALKS II

A3/6

Session Chair: Doug Hughes, D. E. Shaw Research, LLC

Storage Performance Management at Weta Digital
Matt Provost, Weta Digital


View the Slides


Video View the Video

MP3 Icon Listen to the MP3

Weta Digital has had to deal with enormous growth in storage from The Fellowship of the Ring through to Avatar. In this talk Matt will outline some of the problems with NFS storage the company has faced over the years and the solutions they have developed. This will include the design and evolution of DSMS, the system Weta uses to provide a global namespace, unifying multiple heterogeneous file servers and file systems. He will also cover NFS performance monitoring, management, and troubleshooting in a high-performance computing cluster environment and the challenges these present at a large scale.

THE GURU IS IN

C1/2

Session Chair: Tom Limoncelli, Google Inc.

Time Management
Tom Limoncelli, Google, Inc.


View the Slides

Thomas A. Limoncelli is an internationally recognized author, speaker, and system administrator. His books include The Practice of System and Network Administration (Addison-Wesley) and Time Management for System Administrators (O'Reilly). He received the SAGE 2005 Outstanding Achievement Award. He works at Google in NYC and blogs at https://EverythingSysadmin.com/.

12:30 p.m.–2:00 p.m.   Lunch (on your own; head over to the concession cart in the Vendor Exhibition)
2:00 p.m.–3:30 p.m. Wednesday

REFEREED PAPERS

A2/7

Session Chair: Matt Disney, Oak Ridge National Laboratory

The Margrave Tool for Firewall Analysis
Timothy Nelson, Worcester Polytechnic Institute; Christopher Barratt, Brown University; Daniel J. Dougherty and Kathi Fisler, Worcester Polytechnic Institute; Shriram Krishnamurthi, Brown University

Read the Abstract |
Full paper

View the Slides


Video View the Video

MP3 Icon Listen to the MP3

Towards Automatic Update of Access Control Policy
Jinwei Hu, University of Western Sydney and Huazhong University of Science and Technology; Yan Zhang, University of Western Sydney; Ruixuan Li, Huazhong University of Science and Technology

Read the Abstract |
Full paper

View the Slides


Video View the Video

MP3 Icon Listen to the MP3

Awarded Best
Student Paper!

First Step Towards Automatic Correction of Firewall Policy Faults
Fei Chen and Alex X. Liu, Michigan State University; JeeHyun Hwang and Tao Xie, North Carolina State University

Read the Abstract |
Full paper

View the Slides


Video View the Video

MP3 Icon Listen to the MP3

INVITED TALKS I

A1/8

Session Chair: Amy Rich, Tufts University

Storage over Ethernet: What's in It for Me?
Stephen Foskett, Gestalt IT


View the Slides


Video View the Video

MP3 Icon Listen to the MP3

Convergence is coming, or so the storage, network, and server vendors want us to believe. Fibre Channel is moving to Ethernet with FCoE, and SCSI is already there, thanks to iSCSI. But why is everything heading to Ethernet and what's the value to the system administrator and the business? This session gives an overview of this new "everything over Ethernet" world, from DCB to virtual I/O, and offers practical advice on systems architecture, how long to wait, and when to buy.

INVITED TALKS II

A3/6

Session Chair: Duncan Hutty, Carnegie Mellon University

The 10 Commandments of Release Engineering
Dinah McNutt, Google


View the Slides


Video View the Video

MP3 Icon Listen to the MP3

A system administrator who is educated in the features of a well-designed build and release process can become proactive and make sure that the products being developed internally and purchased are deployable and maintainable. I will present 10 commandments that I have found to be truths in my 20 years of building commercial software. This talk will help sysadmins understand more about how decisions made during the release engineering process can positively (or negatively) impact the successful deployment of software and will arm them with the ability to develop their own commandments and communicate those truths to vendors and development groups.

THE GURU IS IN

C1/2

Session Chair: TBA

Disaster Recovery
Joseph Kern, Google, Inc.

3:30 p.m.–4:00 p.m.   Break with Beverages in the Vendor Exhibition, Exhibit Hall 1
4:00 p.m.–5:30 p.m. Wednesday

PRACTICE AND EXPERIENCE REPORTS

A2/7

Session Chair: Narayan Desai, Argonne National Laboratory

When Anti-virus Doesn't Cut It: Catching Malware with SIEM
Wyman Stocks, NetApp

Read the Abstract |
Full paper


Video View the Video

MP3 Icon Listen to the MP3

In-Flight Mechanics: A Software Package Management Conversion Project
Philip J. Hollenback, Yahoo, Inc.

Read the Abstract |
Full paper

View the Slides


Video View the Video

MP3 Icon Listen to the MP3

Experiences with Eucalyptus: Deploying an Open Source Cloud
Rick Bradshaw and Piotr T Zbiegiel, Argonne National Laboratory

Read the Abstract |
Full paper

View the Slides


Video View the Video

MP3 Icon Listen to the MP3

INVITED TALKS I

A1/8

Session Chair: Rudi van Drunen, Competa IT and Xlexit Technology, The Netherlands

Commencing Countdown: DNSSEC On!
Roland van Rijswijk, SURFnet Middleware Services


View the Slides


Video View the Video

MP3 Icon Listen to the MP3

DNSSEC is taking off: The root was signed this year and many top-level domains are DNSSEC-ready. The focus is now shifting to second-level domain owners; they can now start rolling out DNSSEC. But DNSSEC is a complex technology and many organizations face challenges if they want to deploy DNSSEC.

This talk will focus on the why and how of DNSSEC: Why do you need it? What is the impact on your systems? How can you roll out DNSSEC? What can you expect when you roll it out?

SURFnet's own experiences with DNSSEC will serve as a basis for this presentation.

INVITED TALKS II

A3/6

Session Chair: Doug Hughes, D. E. Shaw Research, LLC

Postfix: Past, Present, and Future
Wietse Venema, IBM T.J. Watson Research Center


View the Slides


Video View the Video

MP3 Icon Listen to the MP3

In the twelve years since its initial release by IBM, the open source Postfix mail system has become part of the email infrastructure. The system has proven itself on personal systems and on ISP infrastructures with tens of millions of mailboxes. After Postfix reached completion in 2006, the focus of development moved from building new functionality toward making the system more extensible and more survivable in the face of changing requirements and threats. In this presentation Wietse will review lessons learned and current developments and will offer some speculation about the future.

THE GURU IS IN

C1/2

Session Chair: William LeFebvre, Digital Valence, LLC

ZFS
Richard Elling, Nexenta Systems

Richard Elling has been designing and building dependable, networked computer systems to solve complex problems for more than 25 years. He was an early adopter of ZFS and has developed benchmarks and analysis techniques for evaluation of data protection schemes and performability of systems. He wrote Designing Enterprise Solutions with Sun Cluster 3.0 (Prentice Hall, 2002) and has authored many white papers, Sun BluePrints, and refereed papers on dependable systems and performability. He is a regular contributor to the ZFS community and is currently the Director of Solution Engineering for Nexenta Systems.

5:30 p.m.–6:30 p.m. Wednesday

Vendor Exhibition, Exhibit Hall 1

Exhibit Hall Happy Hour

Join us at the Vendor Exhibition for refreshments and take the opportunity to learn about the latest products and technologies. Don't forget to get your vendor passport stamped!

6:30 p.m.–7:30 p.m. Wednesday

Concourse 1

Poster Session

Check out the cool new ideas and the latest preliminary work on display at the Poster Sessions. Take advantage of an opportunity to mingle with colleagues who may be interested in the same area. The list of accepted posters is available here.

Tech Sessions: Wednesday, November 10 | Thursday, November 11 | Friday, November 12 | Invited Talk Speakers
Thursday, November 11
9:00 a.m.–10:30 a.m. Thursday

REFEREED PAPERS

A2/7

Session Chair: Sean Kamath, PDI/Dreamworks

Using TCP/IP Traffic Shaping to Achieve iSCSI Service Predictability
J. Bjørgeengen, University of Oslo; H. Haugerud, Oslo University College

Read the Abstract |
Full paper

View the Slides

YAF: Yet Another Flowmeter
Christopher M. Inacio, Carnegie Mellon University; Brian Trammell, ETH Zurich

Read the Abstract |
Full paper

View the Slides


Video View the Video

MP3 Icon Listen to the MP3

Nfsight: NetFlow-based Network Awareness Tool
Robin Berthier, University of Illinois at Urbana-Champaign; Michel Cukier, University of Maryland, College Park; Matti Hiltunen, Dave Kormann, Gregg Vesonder, and Dan Sheleheda, AT&T Labs—Research

Read the Abstract |
Full paper

View the Slides


Video View the Video

MP3 Icon Listen to the MP3

INVITED TALKS I

A1/8

Session Chair: William LeFebvre, Digital Valence, LLC

Visualizations for Performance Analysis (and More)
Brendan Gregg, Joyent


View the Slides


Video View the Video

MP3 Icon Listen to the MP3

Visualizations that include heat maps can be an effective way to present performance data: I/O latency, resource utilization, and more. Patterns can emerge that would be difficult to notice from columns of numbers or line graphs, which are revealing previously unknown behavior. These visualizations are used in a product as a replacement for traditional metrics such as %CPU and are allowing end users to identify more issues much more easily (and some issues are becoming nearly impossible to identify with tools such as vmstat(1)). This talk covers what has been learned, crazy heat map discoveries, and thoughts for future applications beyond performance analysis.

INVITED TALKS II

A3/6

Session Chair: Rudi van Drunen, Competa IT and Xlexit Technology, The Netherlands

Rethinking Passwords
William Cheswick, AT&T Labs—Research


View the Slides


Video View the Video

MP3 Icon Listen to the MP3

Passwords and PINs are used everywhere these days, but their use is often painful. Traditional password advice and rules are seldom appropriate for today's threats, yet we labor with the password rules and servers of yesteryear. Strong passwords are weakening our security, and it is time to fix that.

There are numerous proposals for new password solutions. I will present a few half-baked ideas. But there are good solutions available now.

We are facing much more worrisome security challenges: we ought to get this easy stuff right.

THE GURU IS IN

C1/2

Session Chair: Alva L. Couch, Tufts University

Interviewing and Job Hunting
Adam Moskowitz

Adam Moskowitz has at various times been a programmer, a system administrator, a manager of sysadmins, and a technical trainer. He has been a Guru and speaker at past LISA conferences, has taught several LISA tutorials about interviewing, has run the LISA Advanced Topics Workshop for the past 13 years, and was the Program Chair of LISA '09. Adam doesn't blog, but he does maintain a Web page of cute pictures of his dog Ancho.

10:30 a.m.–11:00 a.m.   Break with Beverages and Snacks in the Vendor Exhibition, Exhibit Hall 1  
11:00 a.m.–12:30 p.m. Thursday

PRACTICE AND EXPERIENCE REPORTS

A2/7

Session Chair: Carolyn Rowland, National Institute of Standards and Technology (NIST)

Implementing IPv6 at ARIN
Matt Ryanczak, ARIN

Read the Abstract |
Full paper


Video View the Video

MP3 Icon Listen to the MP3

Awarded Best Practice
and Experience Report!

Internet on the Edge
Andrew Mundy, National Institute of Standards and Technology (NIST)

Read the Abstract |
Full paper

View the Slides


Video View the Video

MP3 Icon Listen to the MP3

Managing Vendor Relations: A Case Study of Two HPC Network Issues
Loren Jan Wilson, Argonne National Laboratory

Read the Abstract |
Full paper


Video View the Video

MP3 Icon Listen to the MP3

INVITED TALKS I

A1/8

Session Chair: Alva L. Couch, Tufts University

System Administrators in the Wild: An Outsider's View of Your World and Work
Eben M. Haber, IBM Research—Almaden


View the Slides

You understand the work of system administration, but how do you explain it to others? Since 2002 a group at IBM has been studying sysadmins in the wild to better understand how they work, both to inspire improvements in tools and practices and to explain the ever-growing human costs in enterprise IT. As outsiders we were fascinated by what we learned, so we've written a book on the subject to explain your work to the rest of the world. This talk provides a summary of our most important findings, supported by real-life footage of sysadmins at work.

INVITED TALKS II

A3/6

Session Chair: Tom Limoncelli, Google Inc.

Enterprise-scale Employee Monitoring
Mario Obejas, Raytheon


View the Slides


Video View the Video

MP3 Icon Listen to the MP3

Since June 2009, I have been the program manager responsible for successfully deploying an employee monitoring system in a 12K employee business unit of a large US firm. This talk is for anyone considering implementing employee monitoring and may include the following mission-specific elements:

  • Data leak vectors
  • Privacy and legal concerns
  • Resistance to monitoring
  • Carefully crafting the communications
  • Deployment ramp-up considerations (e.g., who goes first, second, etc.)
  • Management challenges
  • What to do when part of it doesn't work

THE GURU IS IN

C1/2

Session Chair: Amy Rich, Tufts University

Consulting
Strata Rose Chalup, Project Management Consultant, and Adam Moskowitz

Strata Rose Chalup began as a fledgling sysadmin in 1983. She has been leading and managing complex IT projects for many years, serving in roles ranging from Project Manager to Director of Network Operations. She has authored a number of articles on management and working with teams and has applied her management skills on various volunteer boards, including BayLISA and SAGE. Strata has a keen interest in network information systems and new publishing technologies and built a successful consulting practice around being an avid early adopter of new tools, starting with ncsa_httpd and C-based CGI libraries in 1993 and moving on to wikis, RSS readers, and blogging. Another MIT dropout, Strata founded VirtualNet Consulting in 1993.

Adam Moskowitz has at various times been a programmer, a system administrator, a manager of sysadmins, and a technical trainer. He has been a Guru and speaker at past LISA conferences, has taught several LISA tutorials about interviewing, has run the LISA Advanced Topics Workshop for the past 13 years, and was the Program Chair of LISA '09. Adam doesn't blog, but he does maintain a Web page of cute pictures of his dog Ancho.

12:30 p.m.–2:00 p.m.   Lunch (on your own; head over to the concession cart in the Vendor Exhibition)
2:00 p.m.–3:30 p.m. Thursday

REFEREED PAPERS

A2/7

Session Chair: Alva L. Couch, Tufts University

Using Syslog Message Sequences for Predicting Disk Failures
R. Wesley Featherstun and Errin W. Fulp, Wake Forest University

Read the Abstract |
Full paper

View the Slides


Video View the Video

MP3 Icon Listen to the MP3

Awarded Best Paper!
Log Analysis and Event Correlation Using Variable Temporal Event Correlator (VTEC)
Paul Krizak, Advanced Micro Devices, Inc.

Read the Abstract |
Full paper

View the Slides


Video View the Video

MP3 Icon Listen to the MP3

Chukwa: A System for Reliable Large-Scale Log Collection
Ariel Rabkin and Randy Katz, University of California, Berkeley

Read the Abstract |
Full paper

View the Slides


Video View the Video

MP3 Icon Listen to the MP3

INVITED TALKS I

A1/8

Session Chair: Mario Obejas, Raytheon

Flying Instruments-Only: Navigating Legal and Security Issues from the Cloud
Richard Goldberg, Attorney at Law, Washington, DC


View the Slides


Video View the Video

MP3 Icon Listen to the MP3

Although cloud computing is seen as a simple, low-cost alternative for storing, protecting, and providing access to important information, the legal and privacy concerns are largely being ignored. This talk addresses the following questions, among others: What legal risks are created when data is located "elsewhere"—and users don't know more than that? Can using cloud computing violate federal, state, or international data-privacy laws? Can everyone do everything right and still create unreasonable risks? Who is responsible if—or, more likely, when—something goes wrong? What precautions can be taken to solve these problems? And will that be enough?

INVITED TALKS II

A3/6

Session Chair: Amy Rich, Tufts University

The Path to Senior Sysadmin
Adam Moskowitz


View the Slides


Video View the Video

MP3 Icon Listen to the MP3

Being a senior system administrator is about more than knowing all the options to mount(8) or that modprobe is what's used to replace that buggy kernel module with the latest version. Rather, a good senior sysadmin will have a wide knowledge of relevant technical topics, in-depth knowledge of one or more technologies, good interpersonal skills, and the ability to manage "problem users" and will be comfortable making presentations to and negotiating with mid- and upper-level management. This talk will cover the skills a senior sysadmin needs and why they are necessary and will provide some suggestions for how to acquire these skills.

THE GURU IS IN

C1/2

Session Chair: Rudi van Drunen, Competa IT and Xlexit Technology, The Netherlands

IPv6
Owen DeLong, DeLong Consulting

Owen DeLong is an IPv6 Evangelist at Hurricane Electric and a member of the ARIN Advisory Council. Owen brings more than 25 years of industry experience. He is an active member of the system administration, operations, and IP Policy communities. In the past, Owen has worked at Tellme Networks (Senior Network Engineer); Exodus Communications (Senior Backbone Engineer), where he was part of the team that took Exodus from a pre-IPO start-up with two data centers to a major global provider of hosting services; Netcom Online (Network Engineer), where he worked on a team that moved the Internet from an expensive R&E tool to a widely available public access system accessible to anyone with a computer; Sun Microsystems (Senior Systems Administrator); and more.

3:30 p.m.–4:00 p.m.   Break with Beverages, Concourse 1
4:00 p.m.–5:30 p.m. Thursday

REFEREED PAPERS

A2/7

Session Chair: Matthew Sacks, GlassCode Inc.

How to Tame Your VMs: An Automated Control System for Virtualized Services
Akkarit Sangpetch, Andrew Turner, and Hyong Kim, Carnegie Mellon University

Read the Abstract |
Full paper

View the Slides


Video View the Video

MP3 Icon Listen to the MP3

Empirical Virtual Machine Models for Performance Guarantees
Andrew Turner, Akkarit Sangpetch, and Hyong S. Kim, Carnegie Mellon University

Read the Abstract |
Full paper

View the Slides


Video View the Video

MP3 Icon Listen to the MP3

RC2—A Living Lab for Cloud Computing
Kyung Dong Ryu, Xiaolan Zhang, Glenn Ammons, Vasanth Bala, Stefan Berger, Dilma M Da Silva, Jim Doran, Frank Franco, Alexei Karve, Herb Lee, James A Lindeman, Ajay Mohindra, Bob Oesterlin, Giovanni Pacifici, Dimitrios Pendarakis, Darrell Reimer, and Mariusz Sabath, IBM T.J. Watson Research Center

Read the Abstract |
Full paper

View the Slides


Video View the Video

MP3 Icon Listen to the MP3

INVITED TALKS I

A1/8

Session Chair: Mario Obejas, Raytheon

Panel: Legal and Privacy Issues in Cloud Computing
Richard Goldberg, Attorney at Law, Washington, DC; Bill Mooz, VMware


Video View the Video

MP3 Icon Listen to the MP3

INVITED TALKS II

A3/6

Session Chair: William LeFebvre, Digital Valence, LLC

Centralized Logging in a Decentralized World
Tim Hartmann and Jim Donn, Harvard University


View the Slides


Video View the Video

MP3 Icon Listen to the MP3

As environments grow and systems become more complex, building and managing a usable centralized logging infrastructure can be a daunting task. In this talk, we will walk through our real-life experiences implementing a centralized logging infrastructure for our Network, Systems, Security, and Application teams. Over the past three years, we have had to change our strategies and architecture to account for organic customer growth, changes in team requirements, and evolutions in technology.

THE GURU IS IN

C1/2

Session Chair: Tom Limoncelli, Google Inc.

Project Management
Strata Rose Chalup, Project Management Consultant

Strata Rose Chalup began as a fledgling sysadmin in 1983. She has been leading and managing complex IT projects for many years, serving in roles ranging from Project Manager to Director of Network Operations. She has authored a number of articles on management and working with teams and has applied her management skills on various volunteer boards, including BayLISA and SAGE. Strata has a keen interest in network information systems and new publishing technologies and built a successful consulting practice around being an avid early adopter of new tools, starting with ncsa_httpd and C-based CGI libraries in 1993 and moving on to wikis, RSS readers, and blogging. Another MIT dropout, Strata founded VirtualNet Consulting in 1993.

5:30 p.m.–6:30 p.m. Thursday

Concourse 1

Poster Session

Check out the cool new ideas and the latest preliminary work on display at the Poster Sessions. Take advantage of an opportunity to mingle with colleagues who may be interested in the same area. The list of accepted posters is available here.

6:30 p.m.–8:30 p.m. Thursday

Ballroom

LISA '10 Reception: Adventure Carnival

Join us for a dinner buffet and games designed to test your inner Indy. Show off your skills in boulder bowling, mingle as you root for your favorite dromedary in the camel races, or challenge your colleagues in the monkey brains shuffle. Collect raffle tickets for winning at each booth for the chance to win fabulous prizes.

Tech Sessions: Wednesday, November 10 | Thursday, November 11 | Friday, November 12 | Invited Talk Speakers
Friday, November 12
9:00 a.m.–10:30 a.m. Friday

REFEREED PAPERS

A2/7

Session Chair: Chad Verbowski, eBay

PeerMon: A Peer-to-Peer Network Monitoring System
Tia Newhall, Jānis Lībeks, Ross Greenwood, and Jeff Knerr, Swarthmore College

Read the Abstract |
Full paper

View the Slides


Video View the Video

MP3 Icon Listen to the MP3

Keeping Track of 70,000+ Servers: The Akamai Query System
Jeff Cohen, Thomas Repantis, and Sean McDermott, Akamai Technologies; Scott Smith, Formerly of Akamai Technologies; Joel Wein, Akamai Technologies

Read the Abstract |
Full paper

View the Slides


Video View the Video

MP3 Icon Listen to the MP3

Troubleshooting with Human-readable Automated Reasoning
Alva L. Couch, Tufts University; Mark Burgess, Oslo University College and Cfengine AS

Read the Abstract |
Full paper

View the Slides

INVITED TALKS I

A1/8

Session Chair: Rudi van Drunen, Competa IT and Xlexit Technology, The Netherlands

10,000,000,000 Files Available Anywhere: NFS at Dreamworks
Sean Kamath and Mike Cutler, PDI/Dreamworks


View the Slides

"I need it all, available anywhere. Physics, shymsics! Make it so."

OK, Jean Luc, you asked for it.

Since Dreamworks employees collaborate globally, we represent data so that it feels like a laptop has a 2PB drive. Learn how we leverage NFS and the automounter to maximum effect. We uncover vendor bugs and implementation inconsistencies as we push the performance envelope to the limit. It's about free thinking and breaking some rules that we all cling to. Step over the brink and prepare to leave with ideas you can implement in your environments that will change how you think.

INVITED TALKS II

A3/6

Session Chair: Cory Lueninghoener, Los Alamos National Laboratory

Data Structures from the Future: Bloom Filters, Distributed Hash Tables, and More!
Thomas A. Limoncelli, Google, Inc.


View the Slides


Video View the Video

MP3 Icon Listen to the MP3

Greetings, earthlings of the year 2010! I've traveled back in time to share with you some of the technologies that system administrators operate in the future. Chances are you know what a cache is and how to tune it. In the future, there will be glorious things such as "bloom filters," "distributed hash tables," and "NoSQL databases." I will reveal what they are and (more important) how to tune them. (This will be an informal talk with a lot of hand-waving.)

THE GURU IS IN

C1/2

Session Chair: Matthew Sacks, GlassCode Inc.

Production Documentation
Matthew Sacks, GlassCode Inc.


View the Slides | Handout

Matthew Sacks is a system administrator specializing in high-traffic Web sites and their accompanying infrastructures. He founded the USENIX Blog Team and is also the Founding Editor of TheBitsource.com, a successful online technical publication and research company. He has written technical articles for various IT and computing industry magazines such as InformIT.com, Linux Pro Magazine, and Sys Admin Magazine.

10:30 a.m.–11:00 a.m.   Break with Beverages and Snacks, Concourse 1
11:00 a.m.–12:30 p.m. Friday

PRACTICE AND EXPERIENCE REPORTS

A2/7

Session Chair: Æleen Frisch, Exponential Consulting

Configuration Management for Mac OS X: It's Just Unix, Right?
Janet Bass and David Pullman, National Institute of Standards and Technology (NIST)

Read the Abstract |
Full paper

View the Slides


Video View the Video

MP3 Icon Listen to the MP3

Anycast as a Load Balancing Feature
Fernanda Weiden and Peter Frost, Google Switzerland GmbH

Read the Abstract |
Full paper

View the Slides


Video View the Video

MP3 Icon Listen to the MP3

iSCSI SANs Don't Have to Suck
Derek J. Balling, Answers.com

Read the Abstract |
Full paper

View the Slides


Video View the Video

MP3 Icon Listen to the MP3

INVITED TALKS I

A1/8

Session Chair: Tom Limoncelli, Google Inc.

Operations at Twitter: Scaling Beyond 100 Million Users
John Adams, Twitter


View the Slides


Video View the Video

MP3 Icon Listen to the MP3

John will cover many aspects of Twitter's scaling efforts, including:

  • Finding the weak points in Ruby on Rails and repairing them
  • In-house peer-to-peer: High-speed deploys across thousands of machines in no time at all
  • Managing thousands of machines: Why you need a central machine database, now
  • User management: How do you onboard many new developers and still remain fault-tolerant?
  • Caching methodologies and Twitter's open source efforts
  • Asynchronous versus synchronous processing during request lifetime
  • Life after syslog: What do you do when it won't work anymore?

INVITED TALKS II

A3/6

Session Chair: Matt Disney, Oak Ridge National Laboratory

Er, What? Requirements, Specifications, and Reality: Distilling Truth from Friction
Cat Okita


View the Slides

MP3 Icon Listen to the MP3

A humorous look at requirements and specifications: what they are and why you'd want them in the first place, with some ideas about how to create good requirements and specifications, recognize bad ones, and play nicely with others to end up with results that everyone can live with.

THE GURU IS IN

C1/2

Session Chair: Carolyn Rowland, National Institute of Standards and Technology (NIST)

SELinux
Rik Farrow, Security Consultant

Rik Farrow has been teaching UNIX security classes since 1987. He wrote the second book on UNIX security, as well as hundreds of security-related articles. His experience with Linux security goes back over ten years and has led him to believe that sandboxing applications with SELinux is not just a good idea, but necessary. Rik Farrow is also Editor of ;login:.

12:30 p.m.–2:00 p.m.   Lunch (on your own)
2:00 p.m.–3:30 p.m. Friday

INVITED TALK

A2/7

Session Chair: Alva L. Couch, Tufts University

Using Influence to Understand Complex Systems
Adam J. Oliner, Stanford University


Video View the Video

MP3 Icon Listen to the MP3

When a complex production system misbehaves, the debugging technique of first resort is to examine instrumentation logs, which are normally noisy and incomplete. We define a statistical notion of "influence" between components that gracefully handles this situation. Intuitively, two components influence each other if they tend to exhibit surprising behavior around the same time. We show how to efficiently compute and answer queries about influence and how to present results in a useful form as a Structure-of-Influence Graph among components, and we give example applications of these ideas to several production systems, including autonomous vehicles, clusters, and supercomputers.

INVITED TALKS I

A1/8

Session Chair: Duncan Hutty, Carnegie Mellon University

Scalable, Good, Cheap: Get Your Infrastructure Started Right
Avleen Vig, Patrick Carlisle, and Marc Cluet, woome.com


View the Slides


Video View the Video

MP3 Icon Listen to the MP3

Traditional organic infrastructure growth enables quick start-up but increases your technical debt, while spending too long planning is resource-heavy and can result in lost opportunities. We'll discuss how to balance your infrastructure's growth with planning for the future, using the proper balance of open source tools, good process, architecture and design, monitoring, configuration management, and the data mining you will need to empower your systems. Learning how to do the right things now will enable your future success.

INVITED TALKS II

A3/6

Session Chair: Matthew Sacks, GlassCode Inc.

Reliability at Massive Scale: Lessons Learned at Facebook
Robert Johnson, Director of Engineering, Facebook, Inc.; Sanjeev Kumar, Engineering Manager, Facebook, Inc.


Video View the Video

MP3 Icon Listen to the MP3

As the Facebook Web site and platform grow to an ever larger scale, one of the most difficult challenges is running reliably while constantly changing our product. Over the years we have developed a number of principles around avoiding large failures while making frequent, small changes to our system. These principles have allowed us to run with a low rate of serious incidents, but they still do occur. I'll be walking through the details of a recent site outage to illustrate the way these principles work and how things can go wrong when they aren't followed.

THE GURU IS IN

C1/2

Session Chair: Chad Verbowski, eBay

Security
Jamie Adams, Trusted Computer Solutions

Jamie Adams is the Principal Secure Systems Engineer for Trusted Computer Solutions. He has spent over 20 years in the business of operating system security and compliance, developing security solutions for the government and commercial companies. Jamie holds considerable expertise on compliance with industry standard guidelines (DISA STIGs, CIS, PCI, etc.) and is an expert on how to provide "real world" security at the IT foundation.

3:30 p.m.–4:00 p.m.   Break with Beverages, Concourse 1
4:00 p.m.–5:30 p.m. Friday

A1/2/7/8

Closing Session

Session Chair: Rudi van Drunen, Competa IT and Xlexit Technology, The Netherlands

Look! Up in the Sky! It's a Bird! It's a Plane! It's a Sysadmin!
David N. Blank-Edelman, Northeastern University CCIS


Video View the Video

Yes, it's a sysadmin—a somewhat strange visitor who might as well be from another planet, with powers and abilities far beyond those of mortal users.

That's you, right? So these powers and abilities—How did you get them? How did you figure out which ones you had? How have you honed them? How have you learned to cope with them and the responsibilities they brought?

I don't really believe sysadmins are superheroes just like those in comic books. But I do think that we are different from others in a similar way, complete with, yes, powers and abilities that often exceed those around us. Some of these powers we already have whether we know it or not and some we'll have to strive to develop. But all come with their own set of practical and ethical obligations.

For almost eighty years, American comic books have been mulling over just the sorts of questions you and I face each day we live as sysadmins, so why not look at what they have to say on this subject? In this talk we'll explore just what superpowers you really do have or could attain with just a bit of work. We'll also address some of the moral and ethical implications of being "super" you'll need to face as you progress in your sysadmin career. Sure, our time together will be entertaining, but it won't be all "Biff! Pow! Sudo!" If I'm right, you could take away a new sense of yourself as a sysadmin.

?Need help? Use our Contacts page.

Last changed: 25 Feb. 2011 jp