Check out the new USENIX Web site.
2001 USENIX Annual Technical Conference, June 25-30, 2001, Boston, MA
Conference Home At a Glance Register/Hotel Tutorials Tech Sessions FREENIX Exhibition Organizers Activities/BoFs

Tutorials: Overview | By Day (Monday, Tuesday, Wednesday) | By Instructor | All in One File

Tutorial Instructors    

Eric Allman (M5) is the original author of sendmail. He allman_eric is the author of syslog, tset, the -me troff macros, and trek. He was the chief programmer on the INGRES database management project, designed database user and application interfaces at Britton Lee,and contributed to the Ring Array Processor project at the International Computer Science Institute. He is a former member of the USENIX Board of Directors. Doris Baker (T5), as a freelance writer and technical editor, has collaborated with H. X. Mel on many projects. Over the past twenty years, she's worn the hats of magazine editor, public relations manager, and computer-training government contractor.
Tina Bird (W10) is a network security architect at bird_tina Counterpane Internet Security. She has implemented and managed a variety of wide-area-network security technologies and has developed, implemented, and enforced corporate IS security policies. She is the moderator of the VPN mailing list and the owner of "VPN Resources on the World Wide Web." Tina has a B.S. in physics from Notre Dame and an M.S. and Ph.D. in astrophysics from the University of Minnesota. David N. Blank-Edelman (T2) is the Director of blank-edelman Technology at the Northeastern University College of Computer Science and the author of Perl for System Administration (O'Reilly). He has spent the last 15 years as a system/network administrator in large multi-platform environments and has served as Senior Technical Editor for the Perl Journal. He has also written many magazine articles on world music.
Gerald Carter (M7, W7), a member of the Samba Team carter_gerald since 1998, is employed by VA Linux Systems. He is working with O'Reilly Publishing on a guide to LDAP for system administrators. He holds an M.S. in computer science from Auburn University, where he also served as a network and systems administrator. Gerald has published articles with Web-based magazines such as Linuxworld and has authored courses for companies such as Linuxcare. He is the lead author of Teach Yourself Samba in 24 Hours (Sams Publishing). Tom Christiansen (M3, T3) has been involved with Perl christiansen_tom since day zero of its initial public release in 1987. Lead author of The Perl Cookbook, co-author of the second editions of Programming Perl and Learning Perl, and co-author of Learning Perl on Win32 Systems, Tom is also the major caretaker of Perl's online documentation. He holds undergraduate degrees in computer science and Spanish and a master's in computer science. He now lives in Boulder, Colorado.
Phil Cox (T10) is a consultant for SystemExperts cox_phil Corporation. Phil frequently writes and lectures on issues of UNIX and Windows NT integration and on information security. He is the lead author of Windows 2000 Security Handbook, 2nd Edition, and a featured columnist in ;login: The Magazine of USENIX & SAGE. He has served on numerous USENIX program committees. Phil holds a B.S. in computer science from the College of Charleston, South Carolina. Lee Damon (M8) holds a B.S. in speech communication damon_lee from Oregon State University. He has been a UNIX system administrator since 1985 and has been active in SAGE since its inception. He has developed several large-scale mixed environments. He is a member of the SAGE Ethics Working Group and was one of the commentators on the SAGE Ethics document.
Ed DeHart (T1) is a former member of Carnegie Mellon dehart_ed University's CERT Coordination Center, which he helped found in 1988. Ed has also owned an ISP, Pittsburgh OnLine Inc., which operated several UNIX servers. Currently, Ed is President of Prism Servers, Inc., a manufacturer of Internet firewalls and UNIX-based Internet servers. Rik Farrow (W1) provides UNIX and Internet security farrow_ rik consulting and training. He has been working with UNIX system security since 1984 and with TCP/IP networks since 1988. He has taught at the IRS, Department of Justice, NSA, US West, Canadian RCMP, Swedish Navy, and for U.S. and European user groups. He is the author of UNIX System Security (Addison-Wesley) and System Administrator's Guide to System V (Prentice Hall). He writes columns for ;login: and for Network.
Bill Fenner (T4) is a Principal Technical Staff Member at AT&T Labs—Research in Menlo Park, California, where he primarily works on IP multicasting and IP network management and measurement. Bill is an active participant in the IETF, chairing two working groups and contributing to several more. He also occasionally acts as a developer for the FreeBSD project, concentrating on networking issues. Peter Baer Galvin (T7) is the chief technologist for galvin_peter Corporate Technologies, Inc., and was the systems manager for Brown University's Computer Science Department. He has written articles for Byte and other magazines, is a columnist for SunWorld, and is co-author of the Operating Systems Concepts and the Applied Operating Systems Concepts textbooks. Peter has taught tutorials on security and systems administration and has given talks at many conferences.
Brad Johnson (M1, T10) is vice president of johnson_brad SystemExperts Corporation. He has participated in the Open Software Foundation, X/Open, and the IETF, and has often published about open systems.Brad has served as a security advisor to organizations such as Dateline NBC and CNN. He is a frequent tutorial instructor and conference speaker on network security, penetration analysis, middleware, and distributed systems. He has a B.A. in computer science from Rutgers University and an M.S. in applied management from Lesley University. Michael K. Johnson (M2) has worked with Linux since the first publicly released version. He is the co-author of Linux Application Development (Addison-Wesley, 1998) and is a software developer for Red Hat, Inc. Michael has written kernel, system, and application code for Linux and has been teaching Linux courses and tutorials for six years.
Stephen Johnson (M9, T9) has been a technical man Johnson_Steve ager on and off for nearly two decades, in both large and small companies. At AT&T, he is best known for writing Yacc, Lint, and the Portable C Compiler. He served as the head of the UNIX Languages Department at AT&T's Summit Labs and has been involved in a number of Silicon Valley startup companies. He served for ten years on the USENIX Board of Directors, four of them as president. He presented an invited talk at LISA three years ago, he has taught USENIX tutorials on technical subjects, and he has led management training seminars at USENIX conferences, as well as at Transmeta. Vincent C. Jones (T6) is the founder and principal con jones_vincent_c sultant of Networking Unlimited, Inc., a network design consulting firm specializing in network performance and reliability enhancement. Vince has been applying the theory of networking to the solution of real-world problems for almost three decades and is the author of High Availability Network Design, to be published later this year by Addison-Wesley.
George Kurtz (W2) has performed hundreds of firewall, kurtz_george network, and e-commerce—related security assessments throughout his security consulting career. He is a regular speaker at many security conferences and is frequently quoted in The Wall Street Journal, InfoWorld, USA Today, and the Associated Press and is a co-author of the widely acclaimed Hacking Exposed: Network Security Secrets & Solutions. Evan Marcus (M6) , who has 14 years of experience in marcus_evan UNIX systems administration, is now VERITAS Software Corporation's Data Availability Maven. At Fusion Systems and OpenVision Software, Evan worked to bring the first high availability software application for SunOS and Solaris to market. He is the author of several articles and talks on the design of high availability systems and is the co-author, with Hal Stern, of Blueprints for High Availability: Designing Resilient Distributed Systems (John Wiley & Sons, 2000).
Ned McClain (M4, T4) is a lead engineer at XOR mcclain_ned Network Engineering. He is currently helping with the 3rd edition of the UNIX System Administration Handbook (by Nemeth, Snyder, and Hein). He has a degree in computer science from Cornell University and has done research with both the CS and Engineering Physics departments at Cornell. Stuart McClure (W2) specializes in security assess mcclure_stuart ments, firewall reviews, e-commerce application testing, hosts reviews, PKI technologies, intrusion detection, and incident response. For the past two years Stuart has co-authored a weekly column on security for InfoWorld magazine. For the past four years, he has worked both with Big 5 security consulting and the InfoWorld Test Center. Before InfoWorld, Mr. McClure has managed and secured a wide variety of corporate, academic, and government networks and systems.
Richard McDougall (W9), an Established Engineer in mcdougall_richard the Performance Application Engineering Group at Sun Microsystems, focuses on large systems performance and architecture. He has over twelve years of experience in UNIX performance tuning, application/kernel development, and capacity planning. Richard is the author of many papers and tools for measurement, monitoring, tracing and sizing UNIX systems, including the memory-sizing methodology for Sun, the MemTool set for Solaris, the recent Priority Paging memory algorithms in Solaris, and many unbundled tools for Solaris, and is co-author of Solaris Internals: Architecture Tips and Techniques (Sun Microsystems Press/Prentice Hall, 2000). James Mauro (W9) is a Senior Staff Engineer in the mauro_james Performance and Availability Engineering group at Sun Microsystems. His current projects are focused on quantifying and improving enterprise platform availability, including minimizing recovery times for data services and Solaris. Jim, co-author ed Solaris Internals: Architecture Tips and Techniques (Sun Microsystems Press/Prentice Hall, 2000) and writes the monthly "Inside Solaris" column for UNIX Insider.
H.X. Mel (T5) has taught custom-designed technology courses for employees of Lucent, Xerox, MIT, the US Treasury/GAO, Motorola, Goldman Sachs, and Price Waterhouse Coopers. Over the last seven years, Mel has taught a variety of subjects, including Java, C++, and Visual Basic, and in the past two years he managed the development of a secure file-transport program using cryptographic technologies and wrote Cryptography Decrypted. Tor Mohling (M4) is currently a Unix systems adminis mohling_tor trator for the University of Colorado at Boulder's Computer Science department. He was bewitched by Evi Nemeth as a young child and forced to run dump(8) on VAX 11/780's running BSD 4.0. After under-graduate work in Comparative Religion and Philosophy, he worked as a brewer. This work drove him into graduate school studying Computer Science. He teaches sys-admin classes for the CS department at CU Boulder.
Chris Murphy (M10) is a network engineer in the Net murphy_chris work Operations Group at MIT. He and his colleagues manage the design, implementation, and operation of a TCP/IP and Appletalk network with over 25,000 hosts and 18,000 users. He was responsible for the design and implementation of MIT's dial-up PPP service, Tether. Mr. Murphy is also a co-manager of MIT's Desktop Products team. Evi Nemeth (M4, T4), a faculty member in computer sci- nemeth_evi ence at the University of Colorado, has managed UNIX systems for the past 20 years, both from the front lines and from the ivory tower. She is co-author of the UNIX System Administration Handbook.
Jon Rochlis (M10) provides advice on networking, net- rochlis_jon_a work security, distributed systems design and management, and electronic commerce to both large and small businesses. He has been a senior consultant with SystemExperts Corp., an engineering manager with BBN Planet, Director of the Cambridge Technology Center of OpenVision Technologies, and a technical supervisor for the Development Group of MIT's Distributed Computing and Network Services, the follow-on to Project Athena. Jon has also served on the NEARnet Technical Committee. He holds a B.S. in computer science and engineering from MIT. Steve Romig (T8, W8) is in charge of the Ohio State romig_steve University Incident Response Team and is working with a group of Central Ohio businesses to improve Internet security practices. Steve has also worked as lead UNIX system administrator at one site with 40,000 users and 12 hosts and another with 3,000 users and over 500 hosts. Steve received his B.S. in mathematics (computer science track) from Carnegie Mellon University.
Greg Rose (W5) is a Principal Engineer for QUALCOMM rose_greg International, based in Australia, where he works on cryptographic security and authentication for third-generation mobile phones and other technologies. He holds a number of patents for cryptographic methods and has successfully cryptanalyzed widely deployed ciphers. Andy Rudoff (T4) works for Sun Microsystems in rudoff_andy Boulder, Colorado, where he is a software architect focusing on reliability, availability, and serviceability. His background is in operating systems, networking, and fle systems. He has taught various courses over the years, including network programming and part of Evi Nemeth's first USENIX tutorial.
Marc Staveley (W6) recently took a position with Soma staveley_mark Networks, where he is applying his 18 years of experience with UNIX development and administration in leading their IT group. Previously Marc was an independent consultant and has also held positions at Sun Microsystems, NCR, Princeton University, and the University of Waterloo. He is a frequent speaker on the topics of standards-based development, multi-threaded programming, systems administration, and performance tuning. Lincoln Stein (W4) is a researcher at Cold Spring stein_lincoln Harbor Laboratory, where he works on information architecture related to the Human Genome Project. He is the author of How to Set Up and Maintain a Web Site, Web Security: A Step-by-Step Reference Guide, The Official Guide to Programming with CGI.pm, and, most recently, Network Programming with Perl.
Theodore Ts'o (W3) has been a Linux kernel developer ts'o_theodore since almost the very beginnings of Linux--he implemented POSIX job control in the 0.10 Linux kernel. He is the maintainer and author for the Linux COM serial port driver and the Comtrol Rocketport driver. He architected and implemented Linux's tty layer. Outside of the kernel, he is the maintainer of the e2fsck filesystem consistency checker. Ted is currently employed by VA Linux Systems. Dusty White (M9, T9) was an early employee of Adobe, White_Dusty where she served in various managerial positions. She now works in Silicon Valley as a trainer, coach, and troubleshooter for technical companies. She has presented tutorials at LISA and the USENIX Annual Technical Conference.


?Need help? Use our Contacts page.
Last changed: 15 Mar 2001 becca
USENIX '01 Home
Events calendar
USENIX home