Check out the new USENIX Web site.


Contents

 LISA '08 Home
 Conference Overview
 Important Dates/Contact Information
 Conference Organizers
 Refereed Papers
 Training Program
 Invited Talks, The Guru Is In, and Hit the Ground Running
 Workshops, Posters, WiPs, and BoFs
 Possible Topics for Authors and Speakers
 Sponsorship and Exhibit Opportunities

Call for Participation
in PDF Format

LISA '08 Call for Participation

POSSIBLE TOPICS FOR AUTHORS AND SPEAKERS

Technical Challenges

  • Authentication and authorization: "Single sign-on" technologies, identity management
  • Autonomic computing: Self-repairing systems, zero administration systems, fail-safe design
  • Configuration management: Specification languages, configuration deployment
  • Data center design: Modern methods, upgrading old centers
  • Data management: DBMS management systems, deployment architectures and methods, real world performance
  • Email: Mail infrastructures, spam prevention
  • Grid computing: Management of grid fabrics and infrastructure
  • Hardware: Multicore processor ramifications
  • Mobile computing: Supporting and managing laptops and remote communications
  • Multiple platforms: Integrating and supporting multiple platforms (e.g., Linux, Windows, Macintosh)
  • Networking: New technologies, network management
  • Security: Malware and virus prevention, security technologies and procedures, response to cyber attacks targeting individuals
  • Service
  • Standards: Enabling interoperability of local and remote services and applications
  • Storage: New storage technologies, remote filesystems, backups, scaling
  • Web 2.0 technologies: Using, supporting, and managing wikis, blogs, and other Web 2.0 applications
  • Virtualization: Managing and configuring virtualized resources
Professional Challenges
  • Budgeting: Definitions and methods
  • Communication: Tools and procedures for improving communication between administrators and users, distribution organizations, or teams
  • Consolidation: Merging and standardizing infrastructures and procedures
  • Devolution: Managing dependence on devolved services (calendars, mail, Web 2.0, etc.) and users
  • Ethics: Common dilemmas and outcomes
  • Flexibility: Responding effectively to changes in technology and business demands
  • In-house development: The (dis)advantages and pitfalls of in-house technology development
  • Legislation: Security, privacy
  • Management: The interface and transition between "technical" and "managerial"
  • Metrics: Measuring and analyzing the effectiveness of technologies and procedures
  • Outsourcing/offshoring system administration: Is it possible?
  • Proactive administration: Transitioning from a reactive culture
  • Standardizing methodologies: Sharing best practice
  • Training and staff development: Developing and retaining good system administrators; certifications
  • User support: Systems and procedures for supporting users

Next page

?Need help?


Last changed: 11 Jan. 2008 ch

LISA '08 Index
USENIX Index