LISA '06 Home  |   Registration  |   Organizers  |    Invitation  |    At a Glance  |   Training  |   Tech Sessions  
Hit the Ground Running Track  |   Workshops  |   WiPs  |   BoFs  |   Exhibition  |   Sponsors  |   Activities  |   Hotel/Travel
Services  |   Students  |   Questions?  |   Help Promote!  |   Call for Papers  |   Past Proceedings  |   Authors  |   Speakers

TECHNICAL SESSIONS: Wednesday, December 6 | Thursday, December 7 | Friday, December 8

Wednesday, December 6, 2006
8:45 a.m.–10:30 a.m. Wednesday
Opening Remarks, Awards, Keynote
Salon 2/3

Cory Doctorow

Keynote Address
Hollywood's Secret War on Your NOC

Cory Doctorow, science fiction writer, co-editor of Boing Boing, and former Director of European Affairs for the EFF

MP3 IconListen in MP3 format

The entertainment industry has tried to ban every new technology from the record player to the VCR, but when it comes to the Internet and the general-purpose PC—the battleground of the war on copying—Hollywood has far grimmer plans. Under a variety of legislative, standards, policy, and treaty negotiations, the people who brought you Police Academy n–1 are working to prohibit open source, make open ports a crime, and turn Web 2.0 into AOL 0.9b. You can fight this—you can put a stake through its heart. If you don't, kiss everything you love about the Internet goodbye.

10:30 a.m.–11:00 a.m.   Break   Salon 2/3 Foyer  
11:00 a.m.–12:30 p.m. Wednesday
REFEREED PAPERS
Maryland Suite

Electronic Mail
Session Chair: John "Rowan" Littell, California College of the Arts

Privilege Messaging: An Authorization Framework over Email Infrastructure
Brent ByungHoon Kang, Gautam Singaraju, and Sumeet Jain, University of North Carolina at Charlotte

Securing Electronic Mail on the National Research and Academic Network of Italy
Roberto Cecchini, INFN, Florence; Fulvia Costa, INFN, Padua; Alberto D'Ambrosio, INFN, Turin; Domenico Diacono, INFN, Bari; Giacomo Fazio, INAF, Palermo; Antonio Forte, INFN, Rome; Matteo Genghini, IASF, Bologna; Michele Michelotto, INFN, Padua; Ombretta Pinazza, INFN, Bologna; Alfonso Sparano, University of Salerno

Awarded Honorable Mention!
A Forensic Analysis of a Distributed Two-Stage Web-Based Spam Attack
Daniel V. Klein, LoneWolf Systems

INVITED TALKS I
Salon 2

Teaching Problem Solving: You Can and You Should
Elizabeth Zwicky, Acuitus

MP3 IconListen in MP3 format

Problem solving is the essence of what most system administrators do, but it's not often taught, and there's a lot of mystique that says it can't be taught. In fact, it's a skill, and it can be taught to the same extent that other skills can be taught. The most important tool in teaching it is simply a belief that it can be taught; this talk will attempt to convince you, and will provide you with more tools you can use to teach.

Elizabeth Zwicky has been teaching system administrators off and on since her first job. Recently, she's been hanging out with educational theorists and testing ways of teaching of problem solving to system administrators, high-school graduates who may or may not have any interest in system administration but are being paid to listen, and one two-year old.

INVITED TALKS II
Salon 3

Sysadmins, Network Managers, and Wiretap Law
Alex Muentz, Geek and Corporate Counsel, Cornerstone IT

MP3 IconListen in MP3 format

How does the law affect how you secure your network and the privacy of your users? CALEA, the Wiretap Act, the Stored Communications Act, and FISA all affect how you do your job—how you can protect yourself, your company, and your users from lawsuits and prosecution.

Alexander Muentz is currently corporate counsel and a geek for Cornerstone IT. He's been a sysadmin and network engineer in corporate IT for several years before graduating from Temple Law School in 2006. He's worked with the New Jersey Public Defender and the U.S. Court of Appeals for the Third Circuit, helping draft their network privacy policy.

THE GURU IS IN
Virginia Suite

UNIX and Microsoft Interoperability
Joseph Radin, Ricoh Company

Joseph Radin is currently working at the Ricoh Company as an Engineering Manager. For the past 6 years Joseph has served as a technical advisor to a number of major FORTUNE 500 companies, defining problems and implementing solutions, many of which involved UNIX-Microsoft interoperability. Mr. Radin has authored four books on UNIX system administration, UnixWare OS, the Mosaic Internet browser, and X Windows.

12:30 p.m.–2:00 p.m.   Lunch (on your own)
2:00 p.m.–3:30 p.m. Wednesday
REFEREED PAPERS
Maryland Suite

Boundaries
Session Chair: Rudi Van Drunen, Competa IT

Firewall Analysis with Policy-based Host Classification
Robert Marmorstein and Phil Kearns, The College of William and Mary

Secure Mobile Code Execution Service
Lap-chung Lam, Yang Yu, and Tzi-cker Chiueh, Rether Networks Inc.

FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs
Adam Slagell, Kiran Lakkaraju, and Katherine Luo, NCSA, University of Illinois at Urbana-Champaign

INVITED TALKS I
Salon 2

Site Reliability at Google/My First Year at Google
Tom Limoncelli, Google

MP3 IconListen in MP3 format

Tom will speak about what it's like to be on the team that runs www.google.com's services and explore some of the technologies that enable Google's Web services to maintain their high uptime. Google's "service oriented network" (SON) enables the creation of new products that are scalable and maintainable. Tom will give a sysadmin's view of Google technologies such as GFS, MapReduce, Sawmill, and more. He will also describe how to make a policy that is "Googley."

Tom is the author of O'Reilly's Time Management for System Administrators and co-author of The Practice of System and Network Administration from Addison-Wesley. He joined Google in January 2006. A sysadmin and network wonk since 1987, he has worked at Cibernet, Dean for America, Lumeta, Bell Labs/Lucent, Mentor Graphics, and Drew University. He is a frequent presenter at LISA conferences and joint recipient of USENIX and SAGE's 2005 Outstanding Achievement Award.

INVITED TALKS II
Salon 3

Leveraging the IT Community
Patrick McGovern, Chief Community Splunker, Splunk

MP3 IconListen in MP3 format

Troubleshooting servers can be a daunting task, particularly at 3:00 a.m. Leveraging the expertise and knowledge of IT professionals globally to find the solution greatly reduces the mean-time-to-resolution. This talk is focused on building a new broad resource for sysadmins by sysadmins. Starting with the concepts that made the site Wikipedia a great success and tools like grep so universal, this talk will discuss the challenges of building a large IT community/knowledge base and how to bring IT troubleshooting to the next level.

Patrick is Chief Community Splunker and an expert in building thriving online communities. Prior to joining Splunk, he oversaw SourceForge.net for five years. Patrick grew the site from a few thousand users to over a million registered open source developers and 97,000 open source software projects. Splunk is leveraging his experience to build a vibrant community around key Splunk technologies and services.

THE GURU IS IN
Virginia Suite

LDAP
Howard Chu, Chief Architect, Symas Corp.

Howard Chu has deep experience with system networking and security technologies. He started working with OpenLDAP in 1998 and has been one of the leading developers on the OpenLDAP core team since 1999. He is currently working on a book on OpenLDAP administration, to be released in spring 2007.

3:30 p.m.–4:00 p.m.   Break   Exhibit Hall A  
4:00 p.m.–5:30 p.m. Wednesday
REFEREED PAPERS
Maryland Suite

Security
Session Chair: Adam Moskowitz, Menlo Computing

Centralized Security Policy Support for Virtual Machine
Nguyen Anh Quynh, Ruo Ando, and Yoshiyasu Takefuji, Keio University

Awarded Best Paper!
A Platform for RFID Security and Privacy Administration
Melanie R. Rieback, Vrije Universiteit Amsterdam; Georgi N. Gaydadjiev, Delft University of Technology; Bruno Crispo, Rutger F.H. Hofman, and Andrew S. Tanenbaum, Vrije Universiteit Amsterdam

INVITED TALKS I
Salon 2

Open Source Software and Its Role in Space Exploration
DJ Byrne, Software Engineer, Jet Propulsion Laboratory

MP3 IconListen in MP3 format

View video clips in MP4 format: 1 | 2 | 3 | 4 | 5

Open source developers and NASA have a lot in common. Both are dedicated to expanding the pool of information floating freely through society. Both are focused on the cutting edge, creating new tools and capabilities. Open source software explores our solar system and observes the universe. For example, software on and around Mars today was built with gcc out of a CVS repository stored in AFS, using Kerberos authentication.

At NASA's Jet Propulsion Laboratory, DJ is privileged to be writing flight software for the 2009 Mars rover's landing radar. He has written ground system software for Voyager, Galileo, Magellan, and other missions. He's been a System Administrator for several projects and sections on a variety of operating systems. He's been JPL's kerberos admin (10,000 principals), AFS administrator (200 users), public-domain tool builder (set of ~700 for 3 platforms), a Knowledge Management System Engineer, and postmaster (~3000 mailboxes).

INVITED TALKS II
Salon 3

Virtualization: The Good, the Bad, the Ugly
Michael Baum, Splunk

MP3 IconListen in MP3 format

As virtualization goes mainstream into the IT infrastructure, IT managers and admins must contend with the new level of system complexity it introduces into the data center. It's not possible to virtualize without adding an additional layer of software and hardware to the myriad technologies already deployed within its legacy systems. This session will discuss the challenges of virtualization and offer troubleshooting tips within the IT environment.

Michael Baum is Chief Executive Splunker. Splunk is the world's first search software that indexes and links together all data being furiously logged by services, applications and devices in the data center making it possible to search and navigate IT systems at runtime. During his career, Michael has been building and managing complex computing environments at Yahoo, Infoseek, and several companies he's co-founded. His focus now is applying many of the innovations and affordances that grew out of the Web to the challenges of managing the modern data center.

4:40 p.m.–5:20 p.m.
The New Economics of Virtualization
Alex Vasilevsky, Founder and CTO, Virtual Iron Software
Cancelled

THE GURU IS IN
Virginia Suite

Spam
Doug Hughes, Global Crossing

Doug Hughes takes care of the ISP and relay mail servers for an international telecommunications provider and spends far too much time figuring out how to stop the servers from being overwhelmed with spam. He talked about some of the techniques used to do so at LISA '04's Spam Mini-Symposium and also last year in a Guru session. This will be a practical discussion of what things work, what things don't, and what things might.

TECHNICAL SESSIONS: Wednesday, December 6 | Thursday, December 7 | Friday, December 8
Thursday, December 7, 2006
9:00 a.m.–10:30 a.m. Thursday
REFEREED PAPERS
Maryland Suite

Theory
Session Chair: Narayan Desai, Argonne National Laboratory

Specification-Enhanced Policies for Automated Management of Changes in IT Systems
Chetan Shankar, University of Illinois at Urbana-Champaign; Vanish Talwar, Subu Iyer, Yuan Chen, and Dejan Milojicić, Hewlett-Packard Laboratories; Roy Campbell, University of Illinois at Urbana-Champaign

Experience Implementing an IP Address Closure
Ning Wu and Alva Couch, Tufts University

Modeling Next Generation Configuration Management Tools
Mark Burgess, Oslo University College; Alva Couch, Tufts University

INVITED TALKS I
Salon 2

Everything You Know About Monitoring Is Wrong
Mazda A. Marvasti, Integrien Corporation

MP3 IconListen in MP3 format

This talk will propose an alternative approach to managing complex distributed systems. Mazda will explain why inference from key metrics allows real-time understanding of the health of a distributed system in a way that sucking data from a packet-level fire hose does not. He'll explore the value of a steady stream of out-of-normal alerts, question the value of end-to-end service mapping, and explore whether virtualization is the silver bullet for coping with complexity.

Dr. Mazda Marvasi, Ph.D., is CTO of Integrien Corporation. Mazda leads Integrien's extensive global R&D effort as well as overseeing technology, architecture, and engineering infrastructure development at Integrien. Mazda has deep experience in leading teams in the development, deployment, and monitoring of global enterprise networks and application environments. Mazda has been recognized by "Who's Who in Science and Engineering", and received the Lockheed Leadership Fellowship Award.

INVITED TALKS II
Salon 3

Is Entropy Winning? Drowning in the Data Tsunami
Lee Damon, Sr. Computing Specialist, University of Washington; Evan Marcus, CTO and Founder, Aardvark Technologies, Ltd

MP3 IconListen in MP3 format

We're drowning under a wave of data and are oblivious to it. As data space expands we will start losing track of—and thus losing—our data. Archival backups add complexity to this already confusing situation. Then we toss in security and availability issues for some spice. Where is this going, and how can we handle it in the face of millions of gigabytes of "old cruft"?

Lee Damon has been a UNIX system administrator since 1985 and has been active in SAGE since its inception. He assisted in developing a mixed AIX/SunOS environment at IBM Watson Research and has developed mixed environments for Gulfstream Aerospace and QUALCOMM. He is currently leading the development effort for the Nikola project at the University of Washington. He is past chair of the SAGE Ethics and Policies working groups and he chaired LISA '04.

Evan founded Aardvark Technologies in 1994, which has since produced many books, papers, and tutorials. He has acquired more than 15 years of experience in UNIX systems. Evan also spent 5 years at Sun Microsystems, and 2.5 years at Fusion Systems, where he worked to bring the first high availability clustering software applications for SunOS and Solaris to market. He is the lead author of Blueprints for High Availability, and co-author and co-editor of The Resilient Enterprise.

HIT THE GROUND RUNNING TRACK
Virginia Suite

Find out from the experts everything you need to know to get started on the following topics:

Identity Management
Jon Finke, Rensselaer Polytechnic Institute

AFS
Esther Filderman, The OpenAFS Project

Build a Linux Oracle RAC Cluster
Chris Page, Corporate Technologies, Inc.

NFSv4
Michael Eisler, NetApp

SNMP
Doug Hughes, Global Crossing

For more information about the Hit the Ground Running track, click here.

10:30 a.m.–11:00 a.m.   Break   Exhibit Hall A  
11:00 a.m.–12:30 p.m. Thursday
REFEREED PAPERS
Maryland Suite

Analysis
Session Chair: Mario Obejas, Raytheon

Windows XP Kernel Crash Analysis
Archana Ganapathi, Viji Ganapathi, and David Patterson, University of California, Berkeley

SUEZ: A Distributed Safe Execution Environment for System Administration Trials
Doo San Sim and V.N. Venkatakrishnan, University of Illinois, Chicago

WinResMon: A Tool for Discovering Software Dependencies, Configuration, and Requirements in Microsoft Windows
Rajiv Ramnath, National University of Singapore; Sufatrio, Temasek Laboratories, National University of Singapore; Roland H. C. Yap and Wu Yongzheng, National University of Singapore

INVITED TALKS I
Salon 2

Perfect Data in an Imperfect World
Daniel V. Klein, Consultant

MP3 IconListen in MP3 format

It is no secret that we are at the dawn of the digital age—our parents have computers, digital cameras, MP3 players, etc. We each have more computing power in our cell phones than the mainframes of 35 years ago, and everywhere we find data acquisition and tracking systems. Privacy has never been more zealously guarded nor more freely abandoned. This talk will take a look at what our world is becoming, and perhaps suggest what we can do to make it a little less imperfect.

Dan Klein began his life of crime in 2nd grade, when he was caught with a pack of firecrackers. Since then his brushes with authority have been sporadic but relentless, but have not managed to deny him a security clearance, a job, or his well deserved reputation as an off-the-wall maverick. His computer experience has included simulation and process control, the internals of almost every UNIX kernel released in the past 28 years, and graphical user interface management systems.

INVITED TALKS II
Salon 3

QA and the System Administrator
Adam Haberlach, Google

MP3 IconListen in MP3 format

As enterprises grow and more tools and services are provided by the System Administration Organization, there is a greater need for customer representation and independent validation of both internal and external applications. We will share with you some of the tools and techniques that we've developed in order to guarantee a quality experience and maximize the productivity of our engineers. At the very least, we'll tell you why they only notice when things don't work.

Adam Haberlach leads an elite group of QA Engineers who serve the the System and Network Operations teams at Google. In his previous lives, he's been a QA engineer for Be Inc. and the sales/support engineer for a startup developing software for managing wireless networks. In between checking LDAP performance metrics and sorting bugs, his hobbies include photography and the occasional bout of rock climbing.

THE GURU IS IN
Virginia Suite

VoIP
Robert Sparks, Estacado Systems

Robert Sparks is the VP of Research and Development at Estacado Systems, providing solutions in real-time IP communications. He is a co-author of the core SIP specification, RFC3261, and several of its extensions. He is also co-author of the book SIP Beyond VoIP: The Next Step in the IP Communications Revolution. He co-chairs the IETF's SIMPLE working group, is currently President and on the board of directors of the SIP Foundry, and is an active contributor to the reSIProcate project.

12:30 p.m.–2:00 p.m.   Lunch (on your own)
1:00 p.m.–2:00 p.m.   Ice Cream Social   Exhibit Hall A
2:00 p.m.–3:30 p.m. Thursday
REFEREED PAPERS
Maryland Suite

Systems and Network Management
Session Chair: Elizabeth Zwicky, Acuitus

LiveOps: Systems Management as a Service
Chad Verbowski, Microsoft Research; Juhan Lee and Xiaogang Liu, Microsoft MSN; Roussi Roussev, Florida Institute of Technology; Yi-Min Wang, Microsoft Research

Managing Large Networks of Virtual Machines
Kyrre Begnum, Oslo University College

Directing Change Using Bcfg2
Narayan Desai, Rick Bradshaw, and Cory Lueninghoener, Argonne National Laboratory

INVITED TALKS I
Salon 2

High Availability: From Luxury to Commonplace Necessity in 10 Years
Eric Hennessey, Group Technical Product Manager, Symantec Corp.

MP3 IconListen in MP3 format

This session will cover the evolution of high-availability clustering, from server-centric active-passive paired systems, through larger and more sophisticated clusters, to wide-area clustering. We'll discuss the technologies that have enabled the evolution and the current state of clustering technology. We'll discuss the trend of using clustering as a service management tool, and the evolution to full data center and application management.

Eric Hennessey is Group Technical Product Manager for UNIX clustering solutions at Symantec. Prior to that, he spent five years with Veritas Professional Services as an Enterprise Architect deploying high availability and disaster recovery solutions for Veritas customers. He has authored a number of papers on best practices for HA and DR solutions and has over 25 years of IT industry experience.

INVITED TALKS II
Salon 3

What Do You Mean, Identity 2.0?
Cat Okita, Earthworks

MP3 IconListen in MP3 format

Identity management means different things to different people—everything from passwords through pgp to marketing preferences. What are the essential elements of the Identity 2.0 movement, and why should a system administrator care about any of this in the first place?

This talk will discuss the current state of Identity 2.0, starting with a brief survey of identity management from AAA to the user-centric identity model of Identity 2.0. I will then use Jon Callas's breakdown of identity management types to categorize and describe how and why the average system administrator would implement Identity 2.0.

Cat Okita is a professional paranoid and lapsed system administrator.

THE GURU IS IN
Virginia Suite

How to Get Your Paper Accepted at LISA
Tom Limoncelli, Google; Adam Moskowitz, Menlo Computing

Tom Limoncelli, author of O'Reilly's The Art of Time Management for System Administrators and co-author of The Practice of System and Network Administration from Addison-Wesley (second edition to be premiered at this conference), is a system administrator at Google in NYC. He received the USENIX/SAGE 2005 Outstanding Achievement award. A sysadmin and network wonk since 1987, he is a frequent presenter at LISA conferences.

Adam Moskowitz, author of the SAGE Short Topics booklet Budgeting for SysAdmins, is a Senior System Administrator at Menlo Computing; he has also been a programmer, a manager of system administrators, and a certified barbecue judge. Adam has run the LISA Advanced Topics Workshop for almost 10 years and has served on more program committees than he can remember; he has served as Invited Talks (Co-)Chair three times.

3:30 p.m.–4:00 p.m.   Break   Salon 2/3 Foyer  
4:00 p.m.–5:30 p.m. Thursday
REFEREED PAPERS
Maryland Suite

Visualization
Session Chair: Amy Rich, Tufts University

NAF: The NetSA Aggregated Flow Tool Suite
Brian Trammell, CERT/NetSA, Carnegie Mellon University; Carrie Gates, CA Labs

Interactive Network Management Visualization with SVG and AJAX
Athanasios Douitsis and Dimitrios Kalogeras, National Technical University of Athens, Greece

Bridging the Host-Network Divide: Survey, Taxonomy, and Solution
Glenn A. Fink and Vyas Duggirala, Virginia Polytechnic Institute and State University; Ricardo Correa, University of Pennsylvania; Chris North, Virginia Polytechnic Institute and State University

INVITED TALKS I
Salon 2

The Last, Best Hope: Sysadmins and DBAs as the Last Guardians of Privacy
Danny O'Brien, Activism Co-ordinator, Electronic Frontier Foundation

MP3 IconListen in MP3 format

Accusations that the NSA has access to 20Tb of commercial phone data. Mooted plans by the Attorney General to introduce compulsory data retention. Meanwhile, Google has all your email, that online quiz site knows your political opinions, and MySpace knows what your children like for lunch. Danny O'Brien takes a whistle-stop tour of our privacy laws, the current status of surveillance, and how the best chance of protecting privacy in a digital age might just lie in the BOFH.

Danny O'Brien is activism co-ordinator for the Electronic Frontier Foundation. He also writes the "Life Hacks" column for MAKE magazine, and continues to edit Need To Know, Britain's most sarcastic geek newsletter since 1997. He has written and presented science and travel shows for the BBC, and performed a solo show about the Net in the London's West End.

INVITED TALKS II
Salon 3

Command and Control: System Administration at U.S. Central Command
Andrew Seely, Global Command and Control System Lead, HQUSCENTCOM-J6/Northrop Grumman Defense Mission Systems

MP3 IconListen in MP3 format

This talk will serve as an introduction to the function of military Command and Control (C2) from a systems support perspective. Andy will discuss performing the sysadmin role in a military environment where systems can have a critical life-or-death function. He will also share examples of scripts and techniques used to solve problems created by the C2 systems environment. Finally, he will offer a glimpse into this unique environment's special quirks, challenges, and interesting lessons learned.

Andy works for Northrop Grumman as the technical lead for the Global Command and Control System at the Headquarters, U.S. Central Command (J6) in Tampa, Florida. He taught Linux and UNIX courses at the University of Maryland in Europe for five years, has been a command and control system administrator for over a decade, and was the promoter for the 2006 GCCS System Administration and Engineering Conference.

THE GURU IS IN
Virginia Suite

Time Management for System Administrators
Tom Limoncelli, Google

Tom Limoncelli, author of O'Reilly's The Art of Time Management for System Administrators and co-author of The Practice of System and Network Administration from Addison-Wesley (second edition to be premiered at this conference), is a system administrator at Google in NYC. He received the USENIX/SAGE 2005 Outstanding Achievement award. A sysadmin and network wonk since 1987, he is a frequent presenter at LISA conferences.

TECHNICAL SESSIONS: Wednesday, December 6 | Thursday, December 7 | Friday, December 8
Friday, December 8, 2006
9:00 a.m.–10:30 a.m. Friday
NETWORK SECURITY TRACK
Salon 2

Black Ops 2006: Pattern Recognition
Dan Kaminsky, DoxPara Research

MP3 IconListen in MP3 format

The "Black Ops" series of talks tend to look for useful functionality in existing systems, and this year's edition is no exception. Topics will include:

  • Detecting selective degradation along network paths
  • Results from a worldwide SSL scan
  • Cryptomnemonics
  • A midpoint between dumb fuzzing and smart fuzzing
  • Dotplots as a guide for fuzzing
  • Visual Bindiff

Dan Kaminsky is a security researcher who's been presenting research into interesting mechanisms within TCP/IP for several years. He spent two years at Cisco Systems, Inc., and two more at Avaya Inc., before starting consulting under his own DoxPara Research brand. He is best known for his work accurately estimating and visualizing the number of hosts infected by Sony Corp.'s DRM rootkit, using a quirk of the Internet's Domain Name System infrastructure.

INVITED TALKS II
Salon 3

Seriously, Tape-Only Backup Systems Are Dead
W. Curtis Preston, Glasshouse

MP3 IconListen in MP3 format

If you're performing LAN-based backups directly to today's tape drives, you're doing nothing but shooting yourself in the foot. The good news is that a number of vendors have worked very hard on disk-based solutions that solve all these problems. This talk will sift through your options while offering many stories of real people who have actually made their backup system faster and more reliable by using one or more these disk-based options.

W. Curtis Preston is well known to LISA audiences, and has spoken at several LISA shows over the years. He's been a data protection specialist for 13 years, and is known to his friends as "Mr. Backup." He's the author of the O'Reilly books Backup & Recovery and Using SANs and NAS, and has hundreds of articles to his credit as well.

THE GURU IS IN
Virginia Suite

Virtualization and the Virtual Infrastructure
John Arrasjid, John Gannon, and Michael DiPetrillo, VMware

John Arrasjid has 20 years' experience in the computer science field. He is currently a senior member of the VMware Professional Services Organization as a Consulting Architect. John has developed a number of service offerings focused on performance management, security, and disaster recovery and backup.

John Gannon has over ten years of experience architecting and implementing UNIX, Linux, and Windows infrastructures. John is currently responsible for delivering server consolidation, disaster recovery, and virtual infrastructure solutions to VMware's FORTUNE 500 clients.

10:30 a.m.–11:00 a.m.   Break   Salon 2/3 Foyer  
11:00 a.m.–12:30 p.m. Friday
REFEREED PAPERS
Maryland Suite

Potpourri
Session Chair: David Parter, University of Wisconsin, Madison

The NMI Build & Test Laboratory: Continuous Integration Framework for Distributed Computing Software
Andrew Pavlo, Peter Couvares, Rebekah Gietzel, Anatoly Karp, Ian D. Alderman, and Miron Livny, University of Wisconsin, Madison; Charles Bacon, Argonne National Laboratory

Unifying Unified Voice Messaging
Jon Finke, Rensselaer Polytechnic Institute

Fighting Institutional Memory Loss: The Trackle Integrated Issue and Solution Tracking System
Daniel S. Crosta and Matthew J. Singleton, Swarthmore College Computer Society; Benjamin A. Kuperman, Swarthmore College

NETWORK SECURITY TRACK
Salon 2

Zombies and Botnets: Attacks on Messaging Security by Organized Criminal Enterprises
Dmitri Alperovitch, Research Scientist, CipherTrust Inc.

MP3 IconListen in MP3 format

Today millions of zombies—innocent home and business computers that have been taken over by highly organized, interconnected criminal groups—are the biggest IT threat to organizations and individuals. Dmitri Alperovitch sees firsthand billions of global messages per month and will provide a view into zombie networks, an analysis of attacker methods and techniques, an overview of phishing and how phishing attacks propagate, and what organizations can do to protect themselves.

As one of the leading researchers at CipherTrust since December 2003, Dmitri Alperovitch manages its Global Research team and is one of the lead inventors of its key patent-pending anti-spam and anti-phishing technologies. Alperovitch has accomplished extensive research in the areas of public-key and identity-based cryptography, as well as network intrusion detection and prevention. A recognized authority on messaging security, he has appeared in media outlets including the New York Times, Business Week, and the LA Times.

INVITED TALKS II
Salon 3

Power-Managed Storage: Longer Data Life and Lower Energy Consumption
Aloke Guha, COPAN Systems

MP3 IconListen in MP3 format

With escalating energy costs and growing power consumption, the utility bills at many enterprise datacenters now exceed hardware acquisition costs. This talk will discuss the reliability of high-capacity disk storage systems that are being increasingly used to archive persistent data over long time periods. We will cover how long-term data repositories using Massive Array of Idle Disk (MAID) technologies that power-manage drives can reduce the failure rates.

Aloke Guha is a co-founder and CTO of COPAN Systems, a storage systems and solutions company focused on long-term, persistent data. Prior to COPAN, he was the founding CEO of Datavail Systems, the Vice President and Chief Architect at StorageTek, and the CTO of Network Systems. He is a senior member of IEEE, and has authored 24 patents (eight issued) and over 60 technical publications.

HIT THE GROUND RUNNING TRACK
Virginia A/B

Find out from the experts everything you need to know to get started on the following topics:

Bad Interview Questions
Adam Moskowitz, Menlo Computing

Spam
John "Rowan" Littell, California College of the Arts

Mac OS X
Tom Limoncelli, Google

bcfg2
Narayan Desai, Argonne National Laboratory

Puppet
Luke Kanies, Reductive Labs

For more information about the Hit the Ground Running track, click here.

12:30 p.m.–2:00 p.m.   Lunch (on your own)   Special talk scheduled during lunch; see below
1:00 p.m.–1:45 p.m. Friday
Special Lunch & Learn
Salon 2
You're welcome to pick up lunch and bring it to the talk.

The Future of System Administration: How to Stop Worrying and Learn to Love Self-Managing Systems
Alva L. Couch, Associate Professor of Computer Science, Tufts University

MP3 IconListen in MP3 format

The profession of system administration is currently threatened by many forces, including self-managing products that seem to obsolete the system administrator, a lack of upward mobility paths for professional system administrators, and a growing trend toward outsourcing system administration and related tasks. In this talk, I explore how ongoing changes in the systems we manage can drive positive changes in the profession. The bad news is that the way we prepare system administrators today is woefully inadequate for managing the systems of the future, and we must also rise to the challenge by learning to interact with the systems we manage at a very different level than we are currently trained to do.

Alva L. Couch is currently an Associate Professor of Computer Science at Tufts. Prof. Couch is the author of many LISA papers, and received "best paper" awards in both 1996 and 2005. In 2003, he received the SAGE Professional Service Award for his contributions to the theory of system administration. He currently serves as Secretary of the USENIX Board of Directors.

2:00 p.m.–3:30 p.m. Friday
WORK-IN-PROGRESS REPORTS (WIPS)
Maryland Suite

MP3 IconListen in MP3 format

Short, pithy, and fun, Work-in-Progress reports introduce interesting new or ongoing work. If you have work you would like to share or a cool idea that's not quite ready for publication, send a one- or two-paragraph summary to lisa06wips@usenix.org. We are particularly interested in presenting students' work. There are only a few slots available: submit your work before the session fills up! The current list of accepted WiPs is available here. Work-in-Progress reports are five-minute presentations; the time limit will be strictly enforced.

NETWORK SECURITY TRACK
Salon 2

Corporate Security: A Hacker Perspective
Mark "Simple Nomad" Loveless, Security Architect, Vernier Networks, Inc.

MP3 IconListen in MP3 format

Hackers typically have a flavor of the month when it comes to getting in. This talk will walk you through what hackers are truly looking to achieve—their holy grail—and what avenues they are currently looking to exploit to find it. The talk will be frank and to the point, based upon personal interactions and experiences. Expect an extremely lively, educational, controversial, and entertaining talk.

Mark Loveless, also known as "Simple Nomad," works to allow Vernier's Threat Labs to rapidly respond to new security threats and exploits, as well as give a more focused direction to the labs for future research. Mark is also the founder of the Nomad Mobile Research Center, an international group of hackers that explores technologies. He has spent years developing and testing security strengths for a broad range of computer systems.

INVITED TALKS II
Salon 3

System Administration: Drowning in Management Complexity
Chad Verbowski, Software Architect, Microsoft Research

MP3 IconListen in MP3 format

Yearly increases in the variation, complexity, and volume of systems management tasks are outpacing our ability to hire qualified administrators to maintain our IT environments. This talk presents a new black-box approach for reducing the complexity of systems and security management faced by administrators. The goal is to show this as a scalable alternative compared with current signature and declarative management approaches.

Chad's research on network management led to a job offer from MFS Datanet. He eventually arrived at Microsoft where he worked on the headless support in Windows 2000, then ran the development team for the first release of Microsoft Operations Manager before finding his niche at Microsoft Research. At MSR Chad cofounded the Cybersecurity and Systems Management research group, where he focuses on his area of interest: reducing complexity in software.

THE GURU IS IN
Virginia A/B

Backups
W. Curtis Preston, Glasshouse

W. Curtis Preston is well known to LISA audiences, and has spoken at several LISA shows over the years. He's been a data protection specialist for 13 years, and is known to his friends as "Mr. Backup." He's the author of the O'Reilly books Backup & Recovery and Using SANs and NAS, and has hundreds of articles to his credit as well.

3:30 p.m.–4:00 p.m.   Break   Salon 2/3 Foyer  
4:00 p.m.–5:30 p.m. Friday
Closing Session
Salon 2

Improv for Sysadmins
Bob Apthorpe, St. Edward's University; Dan Klein, Consultant

MP3 IconListen in MP3 format

Have you ever seen "Whose Line Is It Anyway?" and marveled at the actors? Although it may not be obvious, improvisors and sysadmins have a lot in common! We both have to think on our feet, often "winging it," and both groups actively practice ad hoc problem-solving. Management calls it "thinking outside of the box," and we say "welcome to our world."

From the outside, good improv looks like a lot of fun (it is!), and good system administration looks easy and fun (why else do we have toys in our cubes?). Both groups have fun because they both create environments to bring people together and make good things happen. At its core, improvisation is not about being funny so much as it is about carefully listening, clearly expressing oneself, and confidently making decisions and taking action. So is system administration. Our goal is to get paid to play.

This session will relate improvisational acting concepts to system administration. Improv can show us how our responses to others can be misinterpreted and, more important, how to change that by producing a constructive dialogue. Understanding your audience and their context can make everything move much more smoothly! Other topics will include the role body language plays in communication, especially in the communication of status, and the importance of observation and attention to detail, with an emphasis on "active listening," saying "yes, and . . . ," and other observation/communication techniques.

The session concludes with a question-and-answer period and additional improv demonstrations as time permits. We won't try to be funny, but we know that you'll enjoy learning some incredibly valuable improvisational techniques.

Bob Apthorpe is a system administrator at St. Edward's University in Austin, Texas. He first attended LISA in 1998 and transferred from Web development to international operations at Excite.com shortly thereafter. His current interests include risk assessment, operations-friendly software development, and improvisational theatre. Bob is a proud member of the troupe "Improv for Evil" but his wife loves him anyway.

Dan Klein began his life of crime in 2nd grade, when he was caught with a pack of firecrackers. Since then his brushes with authority have been sporadic but relentless, but have not managed to deny him a security clearance, a job, or his well deserved reputation as an off-the-wall maverick. His computer experience has included simulation and process control, the internals of almost every UNIX kernel released in the past 28 years, and graphical user interface management systems.

TECHNICAL SESSIONS: Wednesday, December 6 | Thursday, December 7 | Friday, December 8
?Need help? Use our Contacts page.

Last changed: 18 Oct. 2007 ac