| Preventing the Revealing of Online Passwords to Inappropriate Websites with LoginInspector | LISA '12 | Chuan Yue |
| XUTools: Unix Commands for Processing Next-Generation Structured Text | LISA '12 | Gabriel A. Weaver, Sean W. Smith |
| Managing User Requests With the Grand Unified Task System (GUTS) | LISA '12 | Andrew Stromme, Danica J. Sutherland, Nicholas Felt, Alex Burka, Ben Lipton, Rebecca Roelofs, Daniel-Elia Feist-Alexandrov, Steve Dini, Allen Welkie |
| Bayllocator: A Proactive System to Predict Server Utilization and Dynamically Allocate Memory Resources Using Bayesian Networks and Ballooning | LISA '12 | Vangelis Tasoulas, H.rek Haugerud, Kyrre Begnum |
| A Sustainable Model for ICT Capacity Building in Developing Countries | LISA '12 | Rudy Gaevart |
| Teaching System Administration | LISA '12 | Steve VanDevender |
| Training and Professional Development in an IT Community | LISA '12 | George William Herbert |
| Extensible Monitoring with Nagios and Messaging Middleware | LISA '12 | Jonathan Reams |
| Efficient Multidimensional Aggregation for Large Scale Monitoring | LISA '12 | Lautaro Dolberg, Jerome Francois, Thomas Engel |
| On the Accurate Identification of Network Service Dependencies in Distributed Systems | LISA '12 | Barry Peddycord III, Peng Ning, Sushil Jajodia |
| What Your CDN Won't Tell You: Optimizing a News Website for Speed and Stability | LISA '12 | Julian Dunn, Blake Crosby |
| Building a 100K log/sec Logging Infrastructure | LISA '12 | David Lang |
| Building a Protocol Validator for Business to Business Communications | LISA '12 | Rudi van Drunen |
| Building the Network Infrastructure for the International Mathematics Olympiad | LISA '12 | Rudi van Drunen |
| Lessons Learned When Building a Greenfield High Performance Computing Ecosystem | LISA '12 | Andrew Keen |
| Building a Wireless Network for a High Density of Users | LISA '12 | David Lang |
| TTL of a Penetration | LISA '12 | Branson Matheson |
| The Internet of Things and Sensors and Actuators! | LISA '12 | Vint Cerf |
| The Evolution of Ethernet | LISA '12 | John D'Ambrosia, Chauncey Schwartz II |
| IPv6: A Guide to Address Planning | LISA '12 | Owen DeLong |
| OpenStack: Leading the Open Source Cloud Revolution | LISA '12 | Vish Ishaya |
| Analysis of an Internet-wide Stealth Scan from a Botnet | LISA '12 | kc claffy, Alberto Dainotti |
| Database Server Safety Nets: Options for Predictive Server Analytics | LISA '12 | Joe Conway, Jeff Hamann |
| Ceph: Managing a Distributed Storage System at Scale | LISA '12 | Sage Weil |
| System Log Analysis Using BigQuery | LISA '12 | Gustavo Franco |