Check out the new USENIX Web site.

LISA '06 Home  |   Registration  |   Organizers  |    Invitation  |    At a Glance  |   Training  |   Tech Sessions  
Hit the Ground Running Track  |   Workshops  |   WiPs  |   BoFs  |   Exhibition  |   Sponsors  |   Activities  |   Hotel/Travel
Services  |   Students  |   Questions?  |   Help Promote!  |   Call for Papers  |   Past Proceedings  |   Authors  |   Speakers

BIRDS-OF-A-FEATHER SESSIONS

Lead or attend a BoF! Meet with your peers! Present new work! Don't miss these special activities designed to maximize the value of your time at the conference. The always popular evening Birds-of-a-Feather sessions are very informal gatherings of persons interested in a particular topic.

Enhanced BoFs
Resources will be available to help facilitate a great BoF (even if you've never led a BoF before). Instant discussion lists will be provided to all BoFs so that attendees can easily continue their interactions after the session ends and keep the networking going throughout the year. Click here to create a mailman list now.

Vendor BoFs
Want to demonstrate a new product or discuss your company's latest technologies with LISA attendees? Host a Vendor BoF! These sponsored one-hour sessions give companies a chance to talk about products and proprietary technology—and they include promotional benefits. Email sponsorship@usenix.org if you're interested in sponsoring a Vendor BoF. Click here for more information about sponsorship opportunities.

Scheduling a BoF
To schedule a BoF, simply write the BoF title as well as your name and affiliation on one of the BoF Boards located in the registration area. If you have a description of our BoF you'd like posted on this Web page, please schedule your BoF on the BoF board, then send its title, the organizer's name and affiliation, and the date, time, and location of the BoF to bofs@usenix.org with "LISA '06 BoF" in the subject line.

BoF Schedule

Monday, December 4, 2006
ROOM # of Seats 7:00 p.m.–
8:00 p.m.
8:00 p.m.–
9:00 p.m.
9:00 p.m.–
10:00 p.m.
10:00 p.m.–
11:00 p.m.
Virginia A/B 100        
Virginia C 75        
Washington 1 80        
Washington 2 80        
Washington 3 80     Documentation, Wikis and Tools  
Washington 5 80        
Washington 6 80        
Coolidge 40        


Tuesday, December 5, 2006
ROOM # of Seats 7:00 p.m.–
8:00 p.m.
8:00 p.m.–
9:00 p.m.
9:00 p.m.–
10:00 p.m.
10:00 p.m.–
11:00 p.m.
Virginia A/B 100 agámi Systems Vendor BoF
Paul Massiglia, Chief Technology Strategist, agámi Systems
Solaris Configuration BoF    
Virginia C 75 Cambridge Computer Services, Inc., Vendor BoF
Cambridge Computer's USENIX Community Appreciation Night (Beer & Ice Cream Social)
   
Washington 1 80 Lesbian, Bisexual, Gay, Transgender, Intersexed Sysadmins and Friends BoF
Michael R. Crusoe, Google Corporate Reliability Engineer. / Bronze LOPSA Founding member
  Issues in HPC/EDA Environments on AMD Platforms
Travis Campbell
 
Washington 2 80 moka5 Vendor BoF
Your Secure Office Computer on a USB drive

Monica Lam, PhD, moka5
Software Licensing BoF
Sandra Bittner, Argonne National Labs
Bash Scripting Competition!
5-10 minute Bash challenges with prizes
 
Washington 3 80 Implementing a Successful NOC as Part of Your IT Infrastructure
Scott Newton & Josh Brand, CNN Internet Operations
  Educational Institution/University Issues BOF
Barb Winget, University of Wisconsin River Falls
 
Washington 5 80 LISA Flickr Meetup
Peter Norby, Yahoo! Inc.
   
Washington 6 80 Systems Management is Dead. Long Live Systems Management Consortiums!
Zenoss and Hyperic
UNIX Microsoft Interoperability    
Coolidge 40 Fedora DS Users' BoF
Chris St. Pierre, Nebraska Wesleyan University; Brian K. Jones, Princeton University
PGP Signing Party and CAcert Assurances
Teus Hagen, Stichting NLnet foundation
Wiki Talk
Hunter Matthews, Nathan Hubbard, Chris St. Pierre
 


Wednesday, December 6, 2006
ROOM # of Seats 7:00 p.m.–
8:00 p.m.
8:00 p.m.–
9:00 p.m.
9:00 p.m.–
10:00 p.m.
10:00 p.m.–
11:00 p.m.
Virginia A/B 100 ROOM NOT AVAILABLE USENIX and SAGE Community Meeting Sysadmin Education BoF
Alva Couch, Tufts University; Mark Burgess, Oslo University College
ROOM NOT AVAILABLE
Virginia C 75 GroundWork Open Source Vendor BoF
Integrating Open Source Tools for IT Monitoring
Data Domain Vendor BoF
Going Tapeless—Deduplication: Protecting Your Data in a World Without Tape

Kai Li, Co-Founder and Chief Scientist
   
Washington 1 80 BlueArc Vendor BoF
Network Storage Without Compromise: A BlueArc Customer Roundtable
Splunk Vendor BoF
Building a Log and IT Data Infrastructure

Erik Swan, Chief Technology Officer & Co-founder; Christina Noren, VP Product Management & Support
   Multimedia Streaming Practices for Universities
Real, Darwin, etc
Joe Morris, UNC Chapel Hill
Washington 2 80 PostgreSQL BoF
Josh Berkus, PostgreSQL
Config and Monitoring Tools: Should You Write Your Own?
David Israel, Intel
LOPSA Community Meeting
Doug Hughes, League of Professional System Administrators
 
Washington 3 80 Usenet and the Big-8 Management Board
Tim Skirvin, UIUC
OpenAFS
Moose, The OpenAFS Project
  Xen BoF
Mark Ballew, Univresity of California
 
Washington 5 80 Configuration Management and Server Automation
Luke Kanies, Reductive Labs (author of Puppet)
Trends and Challenges in Domain based Email Authentications
Brent Hoon Kang, Gautam Singaraju, and Sumeet Jain, University of North Carolina at Charlotte
Bcfg2 (Config Mgmt)
Narayan Desai, Argonne National Labs
 
Washington 6 80 Net Optics Vendor BoF
Network Monitoring with Test Access Ports

Dan McCarthy, Business Development Manager, Net Optics, Inc.
  RRDTool/MRTG
Q+A
Tobi Oetiker, <tobi at oetiker ch>
   
Coolidge 40 agámi Systems BoF
Live File System Replication and High Availability Network Attached Storage
 Internet Voting BoF
Discussing challenges in the system or architecture supporting RIES
Jon Meijer, SURFnet
  Barbershop #2
Joel Huddleston
Hoover 50  Configuring Large MultiTerabyte Storage
From 2TB to 16TB and Beyond. Practical tips, different platforms,etc
Sergey Sviridov [sergey at ACNC dot com]
A Crash Course in Storage Virtualization: Virtual Blocks, Volumes, and File Systems
Jacob Farmer, CTO, Cambridge Computer
   


Thursday, December 7, 2006
ROOM # of Seats 8:30 p.m.–
9:30 p.m.
9:30 p.m.–
10:30 p.m.
10:30 p.m.–
11:30 p.m.
Virginia Suite 175 Zenoss Vendor BoF
Solving Your IT Management Headaches with Open Source Software
Puppet "Vendor" BoF
Luke Kanies, Reductive Labs
 
Washington 1 80 IT Design Competition for Cyber Defense
Brent Hoon Kang, University of North Carolina at Charlotte
An Update on Standards
C, Posix, C++, LSB
Nick Stoughton
SpamAssasin: Tips & Tricks for Dealing with the Latest Barrage of Text, Image, & Any Other Spam. Come Share!
"Tokyo Jim" Gottlieb, San Diego, CA
Washington 2 80 Network Admins BoF
David Nolan, Network Services, Carnegie Mellon University
Nagios & Sec BoF
John Rouillad
 
Washington 3 80    (Very) Small Shops
Those of us who work solo + manage small numbers of machines, the challenges + changes in your corners of the world
Rowan Littell & Betsy Schwartz
Mentoring: Next Steps
Alva Couch, USENIX Board
Washington 5 80 Google Vendor BoF  
Washington 6 80 Visualization and Usability in Computer Security
Glenn Fink, Pacific Northwest National Labs
  Blackboard Issues Sakai?
Joe Morris, UNC Chapel Hill
Veritas, Anyone?
Tim Kirby, Cray
Coolidge 40 Large Volume Email Senders
Jason Faulkner, Systems Manager, IntelliContact
F5 (Big-IP, etc)
User BoF
Frank Wojcik, F5 Networks Inc.
 
Hoover 50 BoF for Red Hat Enterprise Linux Users
Joshua Jensen
*Asterisk & Sys Admin
Marin Harriss
 

BoF Descriptions

agámi Systems Vendor BoF
Organizer: Paul Massiglia, Chief Technology Strategist, agámi Systems
Tuesday, December 5, 2006, 7:00 p.m.–8:00 p.m., Virginia A/B

agámi Systems, a leading supplier of enterprise-class NAS systems, will demonstrate the use of file-level replication in its highly available and disaster tolerant NAS solutions. Using the agámi FSR™ replication capability, an agámi filer can replicate file system operations on alternate filers located either nearby (for high availability) or at a distance (for disaster recovery). In the event that the primary filer fails, or a site disaster occurs, alternate filers detect the failure, take over the failed filer's network personality, and serve its file system clients. In this BOF agámi Systems representatives will describe the technology in detail, and demonstrate file system failover between two filers.

Cambridge Computer's USENIX Community Appreciation Night (Beer & Ice Cream Social)
Tuesday, December 5, 2006, 7:00 p.m.–9:00 p.m., Virginia C

Want free beer? Want free ice cream? Want a sneak peek at the hottest topics in storage and data protection? If you answered "yes" to at least one of these questions, then plan to join Cambridge Computer and its selected storage technology showcase partners at this BoF. To show our thanks and appreciation to the USENIX community, we invite all USENIX attendees to join us for an informal evening of beer, ice cream and a little bit of storage sprinkled on top.

Lesbian, Bisexual, Gay, Transgender, Intersexed Sysadmins and Friends BoF
Organizer: Michael R. Crusoe, Google Corporate Reliability Engineer. / Bronze LOPSA Founding member
Tuesday, December 5, 2006, 7:00 p.m.–8:00 p.m., Washington 1

A gathering of LBGTIQ Sysadmins and their supporters. Come swap stories and compare notes about being out (or not) at work, corporate diversity issues, and where the best restaurants are in D.C.

Your Secure Office Computer on a USB drive
Organizer: Monica Lam, PhD, moka5
Tuesday, December 5, 2006, 7:00 p.m.–8:00 p.m., Washington 2

You’ll automatically be registered to win a COOL USB Hamster Wheel by attending the moka5 BoF session with Monica Lam, PhD. Learn how to put your secure office computer on a USB drive. In this BOF Monica will discuss and show a demonstration of the LivePC technology. moka5 develops virtual computer technology for the real world. With its patented technology, moka5 provides an engine for broad distribution of virtual computers, called LivePCs.

Implementing a Successful NOC as Part of Your IT Infrastructure
Organizers: Scott Newton & Josh Brand, CNN Internet Operations
Tuesday, December 5, 2006, 7:00 p.m.–8:00 p.m., Washington 3

A guided discussion on implementing or improving a NOC as part of your IT department.

LISA Flickr Meetup
Organizers: Peter Norby, Yahoo! Inc.
Tuesday, December 5, 2006, 7:00 p.m.–9:00 p.m., Washington 5

A social event for flickr users (or anybody who is interested in learning more about flickr or photography really, or who wants to just plain socialize) to meet, chat about flickr, photography and anything else under the sun. And of course to take pictures! Because what is a meetup without pictures?

Systems Management is Dead. Long Live Systems Management Consortiums!
Organizer: Zenoss and Hyperic
Tuesday, December 5, 2006, 7:00 p.m.–8:00 p.m., Washington 6

What is wrong with systems management? Why is it so terrible? Has any other area of IT promised so much and delivered so little? Come discuss what's wrong with the state of systems management and what is missing. Is open source a necessary component of any solution? Topics will include discussion of efforts such as the Open Management Consortium, COSMOS, and more. Attendees will include members of both efforts as well as representatives from a variety of companies that make up this space. Organized by Hyperic, members of both OMC and COSMOS.

Fedora DS Users' BoF
Organizers: Chris St. Pierre, Nebraska Wesleyan University; Brian K. Jones, Princeton University
Tuesday, December 5, 2006, 7:00 p.m.–8:00 p.m., Coolidge

An informal meeting for current or future users of Fedora Directory Server. Bring your problems, solutions, experiences, scripts, and plans.

Educational Institution/University Issues BOF
Organizer: Barb Winget, University of Wisconsin - River Falls
Tuesday, December 5, 2006, 9:00 p.m.–10:00 p.m., Washington 3

This BOF will focus on the challenges and opportunities that information technology presents to higher education System Administration. Our internal and external customers (students, staff and faculty) all want and expect more: more technology tools, more digital content, more resources, more stuff! Come share how institutions of higher education can make better use of information technology in campus operations and services. How do you stay ahead in this continuing game of digital catch-up? How are you changing what you are doing, both physically and virtually, to respond to the new ways that students and faculty are thinking, working, communicating and socializing?

PGP Signing Party and CAcert Assurances
Organizer: Teus Hagen, Stichting NLnet foundation
Tuesday, December 5, 2006, 8:00 p.m.–9:00 p.m., Coolidge

Your chance to have your PGP key(s) signed by others, as well to have your CAcert cert ID assured by CAcert Assurers! In crease the web of trust! Joining is free.

At the LISA conference you will be able to collect CAcert Assurer points enough to have at least your name on the X.509 certificate (50 points) or be an CAcert Assurer yourself (100 points). CAcert certicates are free and can be used for client (e.g. email signing,...) and server (e.g. https, ssl,...) appllications. You can have as many CAcert as you want to have.

Be prepared and have with you: your ID (passport, and/or driver license), enough PGP fingerprints, and a print off of at least two CAcert Assurer Forms. If you have not yet registered at https://www.CAcert.org please do so. The CAcert web site will enable you to print off CAcert Assurer Forms with your email address and name easily and very clearly.

At the BoF Assurer Forms will be available as well free CAcert Assurer pins in order to allow you to show that you are willing to assure CAcert applicants at LISA.

Integrating Open Source Tools for IT Monitoring
Wednesday, December 6, 2006, 7:00 p.m.–8:00 p.m., Virginia C

Review of several open source monitoring tools, their strengths and weaknesses, along with some practical examples on integrating among them. We'll also discuss issues surrounding configuration, automation, maintainability and data modeling in the open source monitoring space.

Network Storage Without Compromise: A BlueArc Customer Roundtable
Wednesday, December 6, 2006, 7:00 p.m.–8:00 p.m., Washington 1

There is a better way to deploy network storage. Join BlueArc customers from a number of innovative companies and campuses, to learn how they achieve aggressive business goals, further their academic and research missions, and enable a better infrastructure for their users.

PostgreSQL BoF
Organizer: Josh Berkus, PostgreSQL
Wednesday, December 6, 2006, 7:00 p.m.–8:00 p.m., Washington 2

PostgreSQL project leaders and major contributors will talk about what's in PostgreSQL 8.2 (released November 2006) and what's planned for PostgreSQL 8.3. Anyone using or just interested in PostgreSQL is wecome to attend.

Usenet and the Big-8 Management Board
Organizer: Tim Skirvin, UIUC
Wednesday, December 6, 2006, 7:00 p.m.–8:00 p.m., Washington 3

Usenet lives! Over the last year, a group of Usenet veterans has banded together to try to rebuild and support the Big-8 hierarchies (comp, rec, soc, sci, talk, news, misc, and humanities.*) to better reflect the current realities of Usenet. While this effort is already well underway, what is most needed now is simple awareness that changes are afoot. Anybody interested in Usenet, past or present, is welcome to come discuss their views, or just their past experiences.

Configuration Management and Server Automation
Organizer: Luke Kanies, Reductive Labs (author of Puppet)
Wednesday, December 6, 2006, 7:00 p.m.–8:00 p.m., Washington 5

This BoF is an open discussion of all aspects of high-level operating system management, including tools, practices, generally good ideas, and horrible warnings. Come along if you have something to add, something to learn, or just think maybe there's an easier way to get your machines in better shape yet still go home on time. Discussion has traditionally focused on what tools are available and what people are doing with them; Jim Thornton has kept notes from the last three years[1], so you can get an idea of what we really cover.

Going Tapeless—Deduplication: Protecting Your Data in a World Without Tape
Speaker: Kai Li, Co-Founder and Chief Scientist
Wednesday, December 6, 2006, 8:00 p.m.–9:00 p.m., Virginia C

Interested in maximizing the benefits of disk for data protection and reducing reliance on tape? What if disk storage cost less than $0.35/GB - with improved data protection? How can you vault massive amounts of data across the WAN, utilizing 99 percent less bandwidth than traditional data replication solutions? Enterprise backup customers achieved results with Data Domain's Enterprise Protection Storage that reduces data volume by 20x.

Building a Log and IT Data Infrastructure
Presenters: Erik Swan, Chief Technology Officer & Co-founder; Christina Noren, VP Product Management & Support
Wednesday, December 6, 2006, 8:00 p.m.–9:00 p.m., Washington 1

Getting to logs and other IT data when you need it can be tough, time-consuming and if you don't have access--impossible! But what if your logging infrastructure was set up to let you quickly search and navigate your way to any log events, messages and configurations and with role-based access controls, reporting and alerting capabilities too? Come join us for beverages and some logging fun. Whether you're a small IT shop with a few servers or you have several large data centers with thousands of systems, we'll show you how to architect your log and IT data infrastructure for your environment. We'll talk about, data access methods, log rotation schemes, archiving and how to get your data centralized with specific deployment architectures. You'll learn best practices for alerting on privilege events, monitoring configuration changes, performing ad hoc investigations and what you should keep in mind when granting access to your data.

About the presenters:

Erik is a product innovator, engineering manager and operations executive. Erik manages Splunk's engineering and product development team, applying the latest innovations in human interfaces, advanced algorithms, iterative product development and quality automation.

In addition to Splunk, Erik is a co-founder of several successful start-ups and has held executive engineering and operations roles at larger companies including Apple Computer, Walt Disney Company, Taligent and InfoSeek. Erik studied computer science at California Polytechnic University. He has a long history of building and leading teams and bringing to market a broad range of services and software products includes inventor credits on seven U.S. patents.

Christina is a respected authority in enterprise log solutions and a hands on product management executive immersed in large-scale data management, systems management, security information management and IT security compliance. Christina is forging an aggressive Splunk product roadmap to address the needs of availability, reporting and cost cutting in the modern IT organization.

Christina has held leadership positions at successful startups including SenSage (formerly Addamark Technologies), Portal Software and Sonic Solutions. Earlier in her career she was with Microsoft's MSN group where she was directly responsible for MSN's systems management infrastructure across all MSN properties and thousands of servers. Christina holds a B.A. in International Finance and Economics and a B.F.A. from the Dominican University of California.

OpenAFS
Organizer: Moose, The OpenAFS Project
Wednesday, December 6, 2006, 8:00 p.m.–9:00 p.m., Washington 3

Interested in learning about OpenAFS? Looking for more information?

OpenAFS is a free, secure, networked filesystem that works on a variety of platforms, including most major Unix platforms, Windows and Macs. OpenAFS uses the security of Kerberos, offers multiple replicated redundancy of static data, scalibility and location independance - users never need to know what server holds their data.

Trends and Challenges in Domain based Email Authentications
Organizers: Brent Hoon Kang, Gautam Singaraju, and Sumeet Jain, University of North Carolina at Charlotte
Wednesday, December 6, 2006, 8:00 p.m.–9:00 p.m., Washington 5

Advances in spam reduction techniques presently authenticate the sender before creating content in an Inbox. Sender Authentication systems, such as DKIM, Best-Guess SPF and SenderID, are increasingly being accepted by various organizations. These authentication techniques efficiently classify emails from authenticated senders or domains. These techniques are used along with other spam filters to classify emails from the unauthenticated senders or domains. However, recent studies have shown that a sizable amount of the authenticated emails are considered spam by the users. The sender authentication techniques have certain disadvantages: 1. most early adopters of these techniques were the spammers; 2. the domains create their own authentication schemes that are not verified by a third party; and 3. Forwarding emails are identified as a problem in some of the sender authentication techniques. More recently, attention is being placed on sender reputation management for the authenticated emails. A reputation management framework will classify emails efficiently at a domain by ranking the sending domains. We will discuss the current trends in sender authentication techniques and discuss about the need for an authorization framework for email infrastructure. We discuss the need for a distributed quantitative reputation management framework that will aid in reducing unsolicited emails. This BoF session discusses the current trends and challenges in domain based email authentication technologies.

Internet Voting BoF
Organizer: Jon Meijer, SURFnet
Wednesday, December 6, 2006, 8:00 p.m.–9:00 p.m., Coolidge

Discussing challenges in designing the next iteration of the system architecture supporting RIES, the Rijnland Internet Election System.

A number of documents describing the voting protocol and some numbers are available at https://www.surfnetters.nl/meijer/riesvoting/

In the Netherlands, water management is important enough that it is overseen by a system of water boards, regional organisations charged with the care of water levels in their area. They are run as a fully-fledged democratic system parallel to the usual National governmental system, with their own parties, elections etc.

In 2004, the Dutch water board region Rijnland (who cover a jurisdiction of 1.2 million heads) commissioned SURFnet and one-man outfits MullPon and MagicChoice to create a system that would deliver Rijnland with the capability to conduct an election through Internet voting. This system was to be first deployed during their September 2004 elections. MullPon and MagicChoice (together forming TTPI, Trusted Third Party Internetvoting) assumed responsibility for developing and running the voting software, while SURFnet was responsible for the system integration and network layer. I designed the system and network architecture and lead the 6 man SURFnet team that implemented and ran it. The system was awarded an UN Public Service Award in 2006

RIES was the system enabling Dutch expats to cast their vote over the Internet during the upcoming November 2006 parliament elections, again run by SURFnet and TTPI.

The RIES project will be continued through 2007 and 2008, where it will be used as an election platform for all 24 regional water boards (24 parallel elections) and 12.2 eligible million voters.

I am now facing the challenge of defining the system and network architecture to support the 2008 elections, and I want to make sure the design is solid, underwent public scrutiny and proper peer review.

A Crash Course in Storage Virtualization: Virtual Blocks, Volumes, and File Systems
Organizer: Jacob Farmer, CTO, Cambridge Computer
Wednesday, December 6, 2006, 8:00 p.m.–9:00 p.m., Hoover

With all the buzz about server virtualization, there is suddenly a renewed interest in the field of storage virtualization. But what the heck is storage virtualization? Depending on who you ask, you get a different answer. So, here is, a concise crash course in the different technologies that get labeled as storage virtualization.

LOPSA Community Meeting
Organizer: Doug Hughes, League of Professional System Administrators
Wednesday, December 6, 2006, 9:00 p.m.–10:00 p.m., Washington 2

LOPSA (The League of Professional System Administrators) will be holding a community meeting. Join members of the board to discuss past, current, and future directions for the organization after our first year of operation.

IT Design Competition for Cyber Defense
Organizer: Brent Hoon Kang, University of North Carolina at Charlotte
Thursday, December 7, 2006, 8:30 p.m.–9:30 p.m., Washington 1

In recent years, Cyber Defense Competitions have become increasingly popular at universities and colleges across the country. The majority of these competitions test students' reactive network defense skills when faced with a series of offensive attacks spawned by a team of seasoned IT professionals posing as hackers. While these competitions are undeniably useful in testing students ability to react quickly in a "sink or swim" environment, such competitions do little to test students' IT design capability to output a plan for IT Infrastructure Design to a given set of business requirements. It is these types of skills which are desperately needed by a work force lacking the creative design and critical problem solving skills necessary to prevent attacks from occurring in the first place. Thus, we feel that there is a need to incorporate elements of IT Infrastructure Design into current IT Defense Competitions. In doing so, not only will students be able to exercise the technical skills previously taught by faculty in a controlled environment, they will be able to get hands on experience in designing systems which are in line with core business objectives. Through the incorporation of design elements, we hope to create a new IT Design Competition for Cyber Defense, which can be in line with current ACM Programming Competitions, focusing heavily on students' design, analysis and problem solving skills.

In this BoF, we plan to share our initial experience in the hopes that others can provide insight into challenging design issues that IT Systems Defense Architects might encounter in the future.

Network Admins BoF
Organizer: David Nolan, Network Services, Carnegie Mellon University
Thursday, December 7, 2006, 8:30 p.m.–9:30 p.m., Washington 2

Switches, Routers, DNS, DHCP, RADIUS, VPN, Firewalls, Wireless, NAS/SAN, oh my... How do you manage your network? What do you automate vs what do you do by hand? What tools do you use? What hardware do you use? Where do you draw the line between Network Administration and System Administration? How do you manage the explosion of responsibility thats been placed on the network in recent years? We'll talk about all these topics and probably share a few horror stories as well...

Visualization and Usability in Computer Security
Organizer: Glenn Fink, Pacific Northwest National Labs
Thursday, December 7, 2006, 8:30 p.m.–9:30 p.m., Washington 6

This group will meet informally and discuss the importance of visualization and usability to computer security applications. I am especially interested in meeting with folks who have found that computer security technologies present overwhelming amounts of data very poorly.

Large Volume Email Senders
Organizer: Jason Faulkner, Systems Manager, IntelliContact
Thursday, December 7, 2006, 8:30 p.m.–9:30 p.m., Coolidge

Having trouble with email blacklists? Wondering why your clients and/or users aren't receiving their mail? Come talk about strategies for getting email past draconian mail filters. I face this problem in my job every day and want to swap notes with other large volume senders about deliverability strategies.

BoF for Red Hat Enterprise Linux Users
Organizer: Joshua Jensen
Thursday, December 7, 2006, 8:30 p.m.–9:30 p.m., Hoover

Join the informal meeting for those of us interested in, or currently using Red Hat Enterprise Linux. Come with questions, experiences, and needed solutions to share with fellow attendees.
Topics we may cover:

  • Corporate acceptance as a desktop platform
  • Red Hat's Enterprise Linux and Fedora strategies
  • Migrating toward or away from RHEL 3/4
  • Package Management - Red Hat Network, Zenworks Linux, or Yum?
  • Experiences and best practices
  • Third party Vendor support
  • Red Hat's Clustering Solutions
  • etc

?Need help? Use our Contacts page.

Last changed: 8 Dec. 2006 ch