Skip to main content
USENIX
  • Conferences
  • Students
Sign in
  • Overview
  • Conference Organizers
  • Registration Information
    • Registration Discounts
    • Hotel and Travel Information
    • Live Streaming
  • Purchase the Box Set
  • Why Attend LISA '13?
    • Watch the Video
  • Convince Your Boss
  • Program
    • At a Glance
    • Calendar
    • Training Program
    • Technical Sessions
    • Invited Speakers
    • Workshops
    • Conference Themes
  • Co-located Events
    • SESA '13
    • Gluster Community Day
    • Puppet Camp DC
    • Data Storage Day
    • Build a Cloud Day
  • Students and Grants
  • Sponsorship and Exhibition
    • Sponsors and Exhibitors
    • Vendor Exhibition
    • Exhibitor Services
    • Download Prospectus
  • Call for Participation
  • For Participants
    • Speaker Resources
  • Help Promote!
    • Flyer PDF
    • Brochure PDF
  • Activities
    • Birds-of-a-Feather Sessions
    • Poster Session
    • Lightning Talks Sign Up Form
    • LISA Lab Hack Space
  • Services
  • Questions
  • Past Conferences

sponsors

Gold Sponsor
Gold Sponsor
Silver Sponsor
Silver Sponsor
Silver Sponsor
Silver Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
General Sponsor
General Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Industry Partner
Industry Partner
Industry Partner
Industry Partner

twitter

Tweets by @LISAConference

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

You are here

Home » Program » Conference Themes
Tweet

connect with us

http://www.facebook.com/LISAConf
http://twitter.com/LISAConference
http://www.linkedin.com/groups?home=&gid=49559
https://plus.google.com/108588319090208187909/posts
http://www.youtube.com/user/USENIXAssociation

Conference Themes

In addition to the wide variety of topics covered in the LISA ’13 program, the program committee has created six specific conference themes for those looking to focus on a key subject area. You can combine days of training or workshops with content from the technical sessions to build the conference that meets your needs. Pick and choose the sessions that best fit your interest—focus on just one topic or mix and match themes.

Training T1 Updated! Ganeti: Your Private Virtualization Cloud "the Way Google Does It"
Guido Trotter, Google, Helga Velroyen, Google

Back to Top

Training W1 Linux Performance Tuning
Theodore Ts'o, Google

Back to Top

Training R1 The Python Programming Language
Dave Beazley, Dabeaz LLC

Back to Top

Training M1 Updated! Using and Migrating to IPv6
Shumon Huque, University of Pennsylvania

Back to Top

Training S1 Securing Linux Servers
Rik Farrow, Security Consultant

Back to Top

Training F1 New! Introduction to Puppet Enterprise
James Sweeny, Puppet Labs

Back to Top

Training T2 The First Hundred Days
Geoff Halprin, The SysAdmin Group

Back to Top

Training W2 Updated! Root Cause Analysis—Beginner
Stuart Kendrick, Fred Hutchinson Cancer Research Center

Back to Top

Training R2 New! Root Cause Analysis—Intermediate
Stuart Kendrick, Fred Hutchinson Cancer Research Center

Back to Top

Training S2 New! SRE Classroom: Non-Abstract Large System Design for Sysadmins
John Looney, Google

Back to Top

Training F2 New! Hands-on Introduction to Common Hacking Tools
David Rhoades, Maven Security Consulting Inc., Steve Pinkham, Maven Security Consulting Inc.

Back to Top

Training M2 New! Hands-on Security for System Administrators
Branson Matheson, SGT

Back to Top

Training R3 Seven Habits of the Highly Effective System Administrator: Hints, Tricks, Techniques, and Tools of the Trade
Lee Damon, University of Washington, Mike Ciavarella, Coffee Bean Software Pty Ltd

Back to Top

Training S3 Updated! PowerShell Fundamentals
Steven Murawski, Stack Exchange

Back to Top

Training F3 New! Combined MGMT-101/MGMT-201: Effective Communication and Team Leadership for Sysadmins
Geoff Halprin, The SysAdmin Group

Back to Top

Training M3 Core Skills: Scripting for Automation
Mike Ciavarella, Coffee Bean Software Pty Ltd

Back to Top

Training T3 Next-Generation Storage Networking: Beyond Conventional SAN and NAS
Jacob Farmer, Cambridge Computer Services

Back to Top

Training W3 New! Introduction to Chef
Nathen Harvey, Opscode

Back to Top

Training M4 Building a Big IaaS Cloud: Building a Massively Scalable, Geographically Disparate, IaaS Cloud Using Apache CloudStack
David Nalley, Apache CloudStack

Back to Top

Training T4 Recovering from Linux Hard Drive Disasters
Theodore Ts'o, Google

Back to Top

Training S5 New! DNSSEC: DNS Security Extensions
Shumon Huque, University of Pennsylvania

Back to Top

Training M5 Updated! How to Interview a System Administrator
Adam Moskowitz

Back to Top

Training T5 Advanced Time Management: Team Efficiency
Thomas A. Limoncelli, Stack Exchange

Back to Top

Training T6 New! Continuous Integration with Jenkins
Joshua Jensen, Sirius Computer Solutions

Back to Top

Training M6 New! Navigating the Business World for Sysadmins: The Trusted Adviser
Nicole Forsgren Velasquez, Utah State University, Carolyn Rowland, NIST

Back to Top

Training M7 Advanced Shell Programming
Mike Ciavarella, Coffee Bean Software Pty Ltd

Back to Top

Training S7 New! Building Your PowerShell Toolkit
Steven Murawski, Stack Exchange

Back to Top

Training M8 Networking in the Cloud Age
David Nalley, Apache CloudStack, Chiradeep Vittal, Citrix Systems

Back to Top

Training S8 New! File Systems: Top to Bottom and Back
Richard Elling, Nexenta Systems

Back to Top

Training M9 New! Getting to Senior: Sysadmin Level IV and Beyond
Adam Moskowitz

Back to Top

Training S9 New! A New Model: Advancing Organizational Security Through Peacebuilding
Michele Chubirka, Packetpushers, Joe Weston, Consultant and founder of Respectful Confrontation method

Back to Top

Training S10 New! Build a Sysadmin Sandbox
David N. Blank-Edelman, Northeastern University College of Computer and Information Science

Back to Top

Training M10 New! Navigating the Business World for Sysadmins: Methods
Nicole Forsgren Velasquez, Utah State University, Carolyn Rowland, NIST

Back to Top

Training T10 New! Evil Genius 101
Thomas A. Limoncelli, Stack Exchange

Back to Top

Training T11 High-Availability Linux Clustering
Joshua Jensen, Sirius Computer Solutions

Back to Top

Papers Back to the Future: Fault-tolerant Live Update with Time-traveling State Transfer

Back to Top

Papers Live Upgrading Thousands of Servers from an Ancient Red Hat Distribution to 10 Year Newer Debian Based One

Back to Top

Papers Challenges to Error Diagnosis in Hadoop Ecosystems

Back to Top

Panels Women in Advanced Computing (WiAC)

Back to Top

Invited Talks Managing Access Using SSH Keys

Back to Top

Invited Talks Effective Configuration Management

Back to Top

Invited Talks Storage Performance Testing in the Cloud

Back to Top

Invited Talks A Guide to SDN: Building DevOps for Networks

Back to Top

Invited Talks Manta Storage System Internals

Back to Top

Invited Talks Scaling User Security: Lessons Learned from Shipping Security Features at Etsy

Back to Top

Invited Talks A Working Theory-of-Monitoring

Back to Top

Invited Talks Drifting into Fragility

Back to Top

Invited Talks ZFS for Everyone

Back to Top

Invited Talks Optimizing VM Images for OpenStack with KVM/QEMU Fall 2013

Back to Top

Invited Talks Cluster Management at Google

Back to Top

Invited Talks Leveraging In-Memory Key Value Stores for Large-Scale Operations

Back to Top

Invited Talks How Netflix Embraces Failure to Improve Resilience and Maximize Availability

Back to Top

Invited Talks What We Learned at Spotify, Navigating the Clouds

Back to Top

Invited Talks Enterprise Architecture Beyond the Perimeter

Back to Top

Invited Talks Managing Macs at Google Scale

Back to Top

Invited Talks Cloud/IaaS Platforms: I/O Virtualization and Scheduling

Back to Top

Invited Talks Our Jobs Are Evolving: Can We Keep Up?

Back to Top

Invited Talks User Space

Back to Top

Invited Talks Observing and Understanding Behavior in Complex Systems

Back to Top

Invited Talks Hacking your Mind and Emotions

Back to Top

Guru Sessions *aaS: Building and Maintaining the Cloud

Back to Top

Guru Sessions Time Management for System Administrators

Back to Top

Guru Sessions ZFS in Depth

Back to Top

Workshops 2. Women in Advanced Computing (WiAC): Recognizing and Overcoming Bias—Ways to Make Your Workplace More Successful and Welcoming

Back to Top

Workshops 4. Cloud

Back to Top

Gold Sponsors

Silver Sponsors

Bronze Sponsors

General Sponsors

Media Sponsors & Industry Partners

© USENIX

LISA is a registered trademark of the USENIX Association.

  • Privacy Policy
  • Contact Us