LISA '10 Call for Participation
Practice and Experiences Reports
A good experience report proposal will describe a substantial system
administration project that has been completed. Many of these experiences will
have a basis in technical requirements, but will also have components that may
span planning and social issues as well. Insights on all of these topics are
welcome. Also, note that the project need not have been a success to make for a
successful experience report; sometimes spectacular failures are considerably
Submissions will consist of written proposals no more than 4 pages long and will be judged on the basis of three major criteria: technical scope, applicability
to a general audience, and the insights presented.
The scope of experience reports is as wide as the scope of the work
our attendees are called upon to perform, ranging from highly
technical to social processes, such as building consensus and planning.
Here are some examples:
- Organizing large-scale user migrations
- Building business cases for technology
- Benchmarking and performance evaluation
- Designing policies for shared systems
- Deploying new services
Need help with your submission? You're not alone or in the dark. Please see our page about getting assistance with your submission.
Authors must submit a 2–4 page written proposal. The
title and author name(s) and affiliation(s) should appear on the first
page of the submission. (LISA reviewing is single blind.) Authors
should make sure that their submission prints properly on U.S.-style
General submission rules:
- All submissions must be electronic, in PDF only, via the Web form. The Web
form will ask for contact information for the paper and allows for the submission
of your full paper file. Please do not email submissions.
- The first page of each submission must include the name, affiliation, and email address of the author(s).
- Submissions should include a list of appropriate topic keywords or tags above
the body text of the draft paper.
Suggested tags include security, research, case study, backups, configuration
management, database, Web, printing, filesystem, authentication, and VMs.
Authors may include additional tags as well.
- Tags: security, research, IPv6
- Submissions whose main purpose is to promote a commercial product or service
will not be accepted.
- Submissions may be submitted only by the author of the report. No third-party
submissions will be accepted.
- All accepted reports must be presented at the LISA conference by at least one
author. One author per report will receive a registration discount of $200.
USENIX will offer a complimentary registration for the technical program upon
- Authors of an accepted proposal must provide a final report in
advance of the conference. Final papers are limited to 4 pages, including
diagrams, figures, references, and appendices. Complete instructions will be
sent to the authors of accepted reports.
The accepted experience reports will not be included in the conference
proceedings; however, the reports will be published on the USENIX
Web site and will be available online to registered attendees before the conference. If your accepted report should not be published prior to the event, please notify email@example.com. The reports will be available online to everyone beginning on November 10, 2010.
- Reports accompanied by nondisclosure agreement forms will not be considered. Accepted submissions will be treated as confidential prior to publication on the LISA '10 Web site; rejected submissions will be permanently treated as confidential.
Reports are due by 11:59 p.m. PDT on May 17, 2010.
Authors will be notified by July 1, 2010, whether their proposals have been