Overview | By Day (Sunday,
Monday, Tuesday) |
By Instructor | All in One File
is the original author of sendmail. He is the
author of syslog, tset, the -me troff macros, and trek. He was the chief
programmer on the INGRES database management project, designed database user and
application interfaces at Britton Lee,and contributed to the Ring Array
Processor project at the International Computer Science Institute. He is a
former member of the USENIX Board of Directors.
||Bryan C. Andregg
works for Red Hat, Inc. In the past three years Bryan has worked
in or with almost every position at the company, sometimes to a good end. His
current projects include Coffee Making 101 and Linux for Land Rovers. Prior to
Red Hat, Bryan was the systems and network administrator for an ISP. His current title is "Smoke Jumper."
(S11, S15) is a lawyer with
a major Silicon Valley law firm. He has been practicing in the areas
of cyberspace and software law for over fifteen years. Dan is the attorney for
the USENIX Association and for many high-tech companies.
||David N. Blank-Edelman
is the Director of
Technology at the Northeastern University College of Computer Science and the
author of the new O'Reilly book Perl for System Administration. He has
spent the last 14 years as a system/network administrator in large
multi-platform environments including Brandeis University, Cambridge Technology
Group, and the MIT Media Laboratory. He has served as Senior Technical Editor
for the Perl Journal and has written many magazine articles on world
has been a member of the Samba Team since 1998 and is employed by VA Linux Systems. He is currently working with O'Reilly Publishing on a guide to LDAP for system administrators. He holds a master's degree in computer science from Auburn University, where he was also previously employed as a network and systems administrator. Gerald has published articles with various Web-based magazines such as Linuxworld and has authored instructional course for companies such as Linuxcare. He acted as the lead author of Teach Yourself Samba in 24 Hours (Sams Publishing.)
has been involved with Perl
since day zero of its initial public release in 1987. Lead author of The Perl Cookbook, co-author of the second editions of Programming Perl and Learning Perl, and co-author of Learning Perl on Win32 Systems, Tom is also the major caretaker of Perl's online documentation. He holds undergraduate degrees in computer science and Spanish and a master's in computer science. He now lives in Boulder, Colorado.
|Mike Ciavarella (S16) has
been producing and editing technical documentation since he naively agreed to
write application manuals for his first employer in the early 1980s. He has been
a technical editor for MacMillan Press and has been teaching system
administrators about documentation for the past four years. Mike has an Honours
Degree in Science from the University of Melbourne in Australia, and is
currently a Senior Partner with Cybersource Pty Ltd, where he heads
Cybersource's Security Practice. In his spare time, Mike is a caffeine addict
is a consultant for SystemExperts
Corporation, a consulting firm that specializes in system security and
management. Phil frequently writes and lectures on issues bridging the gap
between UNIX and Windows NT. He is a featured columnist in ;login;, the
USENIX Association Magazine and has served on numerous USENIX program
committees. Phil holds a B.S. in computer science from the College of
Charleston, South Carolina.
holds a B.S. in
speech communica tion from Oregon State University. He has been a UNIX system
administrator since 1985 and has been active in SAGE since its inception. He is
a member of the SAGE Ethics Working Group and was one of the commentators on the SAGE Ethics document. He has championed awareness of ethics in the systems
administration community, including writing it into policy documents.
is a former member of Carnegie Mellon University's CERT
Coordination Center, which he helped found in 1988. Ed has also owned an ISP,
Pittsburgh OnLine Inc., which operated several UNIX servers. Currently, Ed is
President of Prism Servers, Inc., a manufacturer of Internet firewalls and
UNIX-based Internet servers.
has been a system administra tor for over 15 years. She currently looks after
a very heterogeneous network of UNIX and Windows NT systems. She is the author
of several books, including Essential Windows NT System
||Peter Baer Galvin
is the chief technologist for Corporate Technologies, Inc., and was the systems manager for Brown University's
Computer Science Department. He has written articles for Byte and other
magazines, is systems admnistration columnist for SunWorld, and is
co-author of the Operating Systems Concepts and the Applied Operating
Systems Concepts textbooks. As a consultant and trainer, Peter has taught
tutorials on security and systems administration and has given talks at many
is the principal consultant at The
SysAdmin Group. He has been a system administrator for the past 15 years and a
consulting system administrator for over 10. Geoff specializes in data security
and systems management disciplines and in the evaluation and improvement of
systems management practices. He has acted as consultant to a wide variety of
organizations, including government, large corporations, and several major ISPs. Geoff is also the vice-president of the System Administrators Guild of Australia (SAGE-AU) and is a member of the SAGE Executive Committee.
provides Windows NT driver development, consulting, and training
services to leading companies. He is co-writing a book on Windows NT device
drivers, to be published by O'Reilly and Associates. He also has an extensive
background in VMS device drivers and internals. He is co-author of VMS
Advanced Driver Techniques and received the Instructor of the Year award
while teaching VMS device drivers and internals courses for Digital.
|David K. Z. Harris
has been a network plumber "for more than a decade," and he
likes many kinds of puzzles. He's been a member of the Technical Staff at GNAC for nearly three years. Connecting various devices together (like making networks work, or hooking up serial consoles) is just another interesting puzzle.
|Paul B. Hill
is a programmer/analyst at the Massachusetts Institute of Technology, working in Information Systems. He has been involved with the development of MIT's Kerberos
implementation since 1991. Paul has been working with Microsoft operating
systems since 1982 and has worked with all version of Windows NT. He is is the
senior programmer on MIT's Project Pismere, a project to provide an academic
computing environment on Windows 2000 that is integrated into MIT's existing
Athena computing environment. Paul also consults on system security.
is a vice president of SystemExperts
Corporation, a consulting firm that specializes in system security and
management. He is a well-known authority in the field of secure distributed
systems and has recently served as a technical advisor to both Dateline NBC and
CNN on network security matters. He has participated in seminal industry
initiatives, including the Open Software Foundation, X/Open, and the IETF, and
has often published about open systems.Brad was one of the original members of
the OSF DCE Evaluation Team. He has a B.A. in computer science from Rutgers
University and an M.S. from Lesley College.
(M11, M14, T11, T14)
has been a technical manager on and off for nearly two
decades, in both large and small companies. At AT&T, he is best known for
writing Yacc, Lint, and the Portable C Compiler. He served as the head of the
UNIX Languages Department at AT&T's Summit Labs. He has also been involved
in a number of Silicon Valley startup companies. He served for ten years on the
USENIX Board of Directors, four of them as president. He presented an invited
talk on management at LISA three years ago, he has taught USENIX tutorials on
technical subjects, and he has led management training seminars at LISA and the
USENIX Annual Conference, as well as at Transmeta.
|Vincent C. Jones
is the founder and principal con sultant of Networking
Unlimited, Inc., a network design consulting firm specializing in network
performance and reliability enhancement. Vince has been applying the theory of
networking to the solution of real-world problems for almost three decades and
is the author of High Availability Network Design, to be published later
this year by Addison-Wesley.
has performed hundreds
of firewall, network, and e-commercerelated security assessments
throughout his security consulting career. He is a regular speaker at many
security conferences and is frequently quoted in The Wall Street Journal,
InfoWorld, USA Today, and the Associated Press and is a co-author of the
widely acclaimed Hacking Exposed: Network Security Secrets &
has been using UNIX and
Internet technologies since 1983. He has written many articles on UNIX,
networking, and systems administration issues. Currently he writes the monthly
"Daemons & Dragons" column for UNIX Review. William is the editor of
the SAGE series "Short Topics in System Administration." He has taught tutorials since 1989 for such organizations as USENIX, the Sun User Group (SUG), MIS Training Institute, IT Forum, and Great Circle Associates, and he is a certified Cisco Systems Instructor. William is the primary programmer for the popular UNIX utility top and has contributed to several widely used UNIX packages, including Wietse Venema's logdaemon package. He can be reached at email@example.com or via https://www.groupsys.com/.
is a senior systems
engineer and high availability specialist with VERITAS Software
Corporation. Evan has more than 12 years of experience in UNIX systems
administration. While employed at Fusion Systems and OpenVision Software, Evan
worked to bring the first high availability software application for SunOS and
Solaris to market. Evan is the author of several articles and talks on the
design of high availability systems.
is a lead
engineer at XOR Network Engineering. He is currently helping with the 3rd
edition of the UNIX System Administration Handbook (by Nemeth, Snyder,
and Hein). He has a degree in computer science from Cornell University and has
done research with both the CS and Engineering Physics departments at Cornell.
president and CTO of Foundstone, has over ten
years of IT and security experience. He specializes in security assessments,
firewall reviews, e-commerce application testing, hosts reviews, PKI
technologies, intrusion detection, and incident response. For the past two
years, Stuart has co-authored a weekly column on security for InfoWorld
magazine. For the past four years, he has worked both with Big 5 security
consulting and the InfoWorld Test Center, where he tested dozens of network and
security hardware and software products. Before InfoWorld, Mr. McClure spent
over seven years managing and securing networks and systems, including Cisco,
Shiva, Novell, Solaris, AIX, AS/400, Window NT, and Linux, in corporate,
academic, and government environments.
is a network
engineer in the Network Operations Group at the Massachusetts Institute
of Technology. He and his colleagues manage the design, implementation, and
operation of a campuswide TCP/IP and Appletalk network of over 25,000 hosts and
18,000 users. He was responsible for the design and implementation of MIT's
dial-up PPP service, Tether. Currently he is involved with an evaluation of
wireless technologies in the MIT environment. Mr. Murphy is also a co-manager of MIT's Desktop Products team, which evaluates and recommends computing systems for use at the Institute.
a faculty member in
computer sci ence at the University of Colorado, has managed UNIX systems
for the past 20 years, both from the front lines and from the ivory tower. She
is co-author of the UNIX System Administration Handbook.|
was introduced to UNIX in 1988 and has been
a system administrator of one sort or another since 1990. He has worked in the
financial, government, and on-line service industries. For the past four years
he has been designing and implementing storage systems for database
applications. He currently resides at America Online Incorporated in Reston,
Virginia, where he is a Principal System Administrator.
||W. Curtis Preston
is a Practice Principal for Collective Technologies and
manages their Backup and Recovery Practice. He has been specializing in backup
and recovery for over seven years and has designed, implemented, and audited
enterprisewide backup and recovery systems for many Fortune 500 and e-commerce
companies. His O'Reilly & Associates book, UNIX Backup &
Recovery, has sold over 20,000 copies, and he writes a regular column for
UnixReview online and SysAdmin magazine. Curtis's Web address is
https://www.backupcentral.com, and he can be reached at firstname.lastname@example.org.
is a independent consultant, providing
high-level advice to large and small businesses in the areas of networking,
network security, distributed systems design and management, and electronic
commerce. He has been a senior consultant with SystemExperts Corp., an
engineering manager with BBN Planet (now GTE), Director of the Cambridge
Technology Center of OpenVision Technologies, and a technical supervisor for the
Development Group of MIT's Distributed Computing and Network Services (DCNS),
the follow-on to Project Athena. Jon has also served on the NEARnet Technical
Committee. He holds a B.S. degree in computer science and engineering from MIT.
is in charge of the Ohio State
University Incident Response Team, which provides incident response assistance,
training, consulting, and security auditing service for The Ohio State
University community. He is also working with a group of people from Central
Ohio businesses to improve Internet security response and practices. In years
past Steve has worked as lead UNIX system administrator at one site with 40,000
users and 12 hosts and another site with 3,000 users and over 500 hosts. Steve
received his B.S. in mathematics (computer science track) from Carnegie Mellon
University in 1983. You can reach him by phone at 1-614-688-3412 or by email at
|Gregory Neil Shapiro
began his professional career as a system administrator for Worcester
Polytechnic Institute (WPI) after graduating from WPI in 1992. During his tenure as senior UNIX system administrator, he became involved with beta testing the BIND name server, the sendmail mail transfer agent, and other UNIX utilities such as emacs and screen. He contributed the secure zones functionality included
in BIND 4.9.X. When presented with the opportunity to join Sendmail, Inc., he
packed his bags and headed west. As lead engineer at Sendmail, Inc., he has
continued to support the open source version while working on Sendmail Pro and
Sendmail Switch, the commercial versions.
was one of the first members of the GNAC staff and is the current keeper of the Conserver code tree, as an extension of his love of computers and
recently left Sun Microsystems
Enterprise Services to join a start-up, where he is applying his 16 years of
experience with UNIX development and administration. Previously Marc was an
independent consultant and has held positions at NCR, Princeton University, and
the University of Waterloo. He is a frequent speaker on the topics of
standards-based development, multi-threaded programming, systems administration,
and performance tuning.
was the maintainer of the BIND
software system through version 8. BIND, the Berkeley Internet Name Domain,
includes the name server ("named") used everywhere on the Internet. Paul is also a coauthor of Sendmail: Theory and Practice (Digital Press, 1995).
(M11, M14, T11, T14)
was an early employee of Adobe, where she
served in a variety of managerial positions. She now works as a management
consultant in Silicon Valley, where she acts as a trainer, coach, and
troubleshooter for technical companies. She has presented tutorials at LISA and
the Usenix Annual Technical Conference.