Check out the new USENIX Web site.


 LISA '10 Home
 Conference Overview
 Important Dates/Contact Information
 Conference Organizers
 Need Help with Your Submission?
 Refereed Papers
 Practice and Experience Reports
 Web Submission Form for Papers and Reports
 Training Program
 Invited Talks and The Guru Is In
 Workshops, Posters, WiPs, and BoFs
 Possible Topics for Authors and Speakers
 Sponsorship and Exhibit Opportunities

Call for Participation in PDF

LISA '10 Call for Participation

Possible Topics for Authors and Speakers

Technical Challenges

  • Authentication and authorization: "Single sign-on" technologies, identity management
  • Autonomic computing: Self-repairing systems, zero administration systems, fail-safe design
  • Computer-human interaction
  • Configuration management: Specification languages, configuration deployment
  • Cloud computing: Managing and deploying your applications in the cloud
  • Data center design: Modern methods, upgrading old centers
  • Data management: DBMS management systems, deployment architectures and methods, real world performance
  • Email and messaging: Messaging protocols and infrastructures, spam prevention
  • Grid computing: Management of grid fabrics and infrastructure
  • Hardware: Multicore processor ramifications
  • Mobile computing: Supporting and managing laptops and remote communications
  • Multiple platforms: Integrating and supporting multiple platforms (e.g., Linux, Windows, Macintosh)
  • Networking: New technologies, network management
  • Security: Malware and virus prevention, security technologies and procedures, response to cyber attacks targeting individuals
  • Standards: Enabling interoperability of local and remote services and applications
  • Storage: New storage technologies, remote filesystems, backups, scaling
  • Web 2.0 technologies: Using, supporting, and managing wikis, blogs, and other (collaboration) tools in Web 2.0 space
  • Virtualization: Managing and configuring virtualized resources

Professional Challenges

  • Budgeting: Definitions and methods
  • Communication: Tools and procedures for improving communication between administrators and users, distribution organizations, or teams
  • Consolidation: Merging and standardizing infrastructures and procedures
  • Devolution: Managing dependence on devolved services (calendars, mail, Web 2.0, etc.) and users
  • Documenting: Tools and techniques to document your work
  • Ethics: Common dilemmas and outcomes
  • Flexibility: Responding effectively to changes in technology and business demands
  • In-house development: The (dis)advantages and pitfalls of in-house technology development
  • Legislation: Security, privacy
  • Management: The interface and transition between "technical" and "managerial"
  • Metrics: Measuring and analyzing the effectiveness of technologies and procedures
  • Outsourcing/offshoring system administration and system engineering: Is it possible?
  • Proactive administration: Transitioning from a reactive culture
  • Standardizing methodologies: Sharing best practice and lessons learned
  • Training and staff development: Developing and retaining good system administrators; certifications
  • User support: Systems and procedures for supporting users

This topic list should not be considered exhaustive. Good proposals related to any important aspect of system and network administration or engineering are always welcome. If you are unsure whether your topic is appropriate, contact the Program Chair.

Next page

? Need help?

Last changed: 12 Jan. 2010 ch
LISA '10 Home