USENIX 1997 Annual Technical Conference

January 6-10, 1997
Anaheim Marriott Hotel
Anaheim, California

The only conference by and for programmers, developers, and system administrators

Letter from the Program Chair

What's New At Anaheim 97

Program Committee

Conference Overview

Tutorial Program

Technical Program


USELINUX Program Committee

Conference Activities

Birds-Of-A-Feather Sessions

Vendor Exhibits

Registration Form

Letter from the Program Chair

Dear Conference Attendee:

1996 has been one of the most exciting years for those of us involved in advanced computing. The Web is attracting tremendous interest in the business world corporate America is rushing to embrace emerging technologies. New products are being developed and introduced at breakneck-speed. And you the programmers, developers, and system administrators are the ones being charged to make it happen and make sure it works.

How can you figure out which technologies and products are worth your time and money for 1997 and beyond? If its your job to know, plan to be in Anaheim in January!

You can choose from 20 tutorials. There will be new topics such as secure Java programming and applets, Windows NT and Windows 95, CGI and WWW programming in perl, Web security, setting up a Web server, Solaris system administration, and Linux device drivers. Or you can attend tried-and-true tutorials which have proven their worth on topics such as UNIX Network Programming, IPv6, UNIX security tools, and Perl.

You will hear talks on state-of-the-art practice in the refereed papers track on topics you can use in your daily work, such as Web tools, file system advances, distributed computing, and high-speed networking. Invited speakers share their experiences on topics such as cryptography, programming hints, and WWW server techniques. You can form a BoF (Birds-of-a-Feather) session with other attendees based on a topic of common interest. And you can talk seriously with the manufacturers at our informal trade show.

Co-located with the USENIX Technical Conference is USELINUX, the first Linux Applications Development and Deployment Conference. Co-sponsored by Linux International and USENIX, this conference will offer a technical track and a business track, as well as presentations and case studies. Anything you wanted to know about Linux, you can find out here. Your registration fee allows you to attend USENIX and USELINUX for the same price.

You need practical tools and information. We are gathering the best experts to present it. In one place. In one week.

We hope this program will help you to make the best use of your time at the Conference. I look forward to seeing you in Anaheim from January 6th to 10th.


John Kohl, Pure Atria Corporation
Program Chair

P.S.: Remember to sign up for tutorials early. Space is limited and demand is high. You'll get your first choice and you'll save money.

Important Dates to Remember:

Early Registration Savings Deadline: November 22, 1996
Hotel Discount Deadline: December 20, 1996


USELINUX, the Linux Applications Development and Deployment
Conference, co-sponsored by Linux International and USENIX.

If you are:
Plan to attend USELINUX. One fee covers the registration for both conference programs, and you can go freely back and forth between them. (Tutorials carry a separate fee for both USENIX and USELINUX).


Program Chair: John T. Kohl, Pure Atria Corporation

Program Committee:
Matt Blaze, AT&T Research
Bill Bolosky, Microsoft Research
Nathaniel Borenstein, First Virtual Holdings
Charlie Briggs, Digital Equipment Corp.
Clem Cole, Digital Equipment Corp.
Fred Douglis, AT&T Research
Rob Gingell, Sun Microsystems
Mike Karels, Berkeley Software Design, Inc.
John Schimmel, Silicon Graphics
Carl Staelin, Hewlett-Packard Labs

Invited Talks Coordinators:
Mary Baker, Stanford University
Berry Kercheval, Xerox PARC


Sunday, January 5
Registration 4:00pm - 9:00pm
Kickoff Reception 6:00pm - 9:00pm

Monday, January 6
Registration 7:30am - 5:00pm
Tutorials 9:00am - 5:00pm

Tuesday, January 7
Registration 7:30am - 5:00pm
Tutorials 9:00am - 5:00pm

Birds-of-a-Feather Sessions 6:00pm - 10:00pm

Wednesday, January 8
Registration 7:30am - 6:00pm
Keynote Address 9:00am - 10:30pm Technical Sessions 11:00am - 5:00pm
USELINUX Developers 9:00am - 5:30pm
Vendor Display Noon - 7:00pm
USELINUX Case Studies 7:30pm - 11:00pm
Birds-of-a-Feather Sessions 7:30pm - 11:00pm

Thursday, January 9
Registration 7:30am - 6:00pm
Technical Sessions 9:00am - 6:00pm
USELINUX Developers 9:00am - 5:30pm
Vendor Display 10:00am - 4:00pm
Birds-of-a-Feather Sessions 6:00pm - 10:00pm
USELINUX Case Studies 6:00pm - 10:00pm

Friday, January 10
Technical Sessions 9:00am - 5:45pm
USELINUX Business 9:00am - 4:00pm


Monday and Tuesday, January 6-7, 1997

Technology is changing more rapidly than ever before. Whether you are a programmer, developer or system administrator, you are expected to stay on top of the latest improvements and do your job. Sign up for tutorials and youll get an immediate payoff from gaining command of the newest developments and putting them to work in your organization.

USENIX tutorials aim to provide the critical information you need. Delivered by experts, tutorials are practical, intensive, and essential to your professional development.

Our guarantee: If youre not happy, were not happy. If you feel a tutorial does not meet the high standards you have come to expect from USENIX, let us know by the morning break and we will either change you to any available tutorial immediately or arrange for you to attend another tutorial at another USENIX event without paying another fee.

Register now to guarantee your first choice - seating is limited.

Tutorial fees include printed and bound tutorial materials from your sessions, lunch, CD-ROM with Tutorials, Referreed Papers, and Invited Talks, Admission to the Vendor Exhibits

Continuing Education Units

USENIX provides Continuing Education Units (CEUs) for a small additional administrative fee. The CEU is a nationally recognized standard unit of measure for continuing education and training, and is used by thousands of organizations across the United States. Each full-day USENIX tutorial qualifies for 0.6 CEUs. You can request CEU credit by completing the CEU section on the registration form. USENIX provides a certificate for each attendee taking a tutorial for CEU credit, and maintains transcripts for all CEU students.


Monday, January 6

M1: Beginning Perl Programming for UNIX Programmers (Updated for Perl 5)
M2: The Kerberos Approach to Network Security (Updated).
M3: An Introduction to Java
M4: Secure Java Programming
M5: Windows NT and Windows 95 - The Win32 API
M6: UNIX Network Programming
M7: Selected Topics in System Administration (New)
M8: How Networks Work - The Limits of Modern Internetworking (Updated)
M9: System and Network Performance Tuning (New)
M10: Inside the Linux 2.0 Kernel (New)

Tuesday, January 7

T1: UNIX Security Tools: Use and Comparison.
T2: CGI and WWW Programming in Perl (New)
T3: Security on the World Wide Web (New)
T4: Creating Effective User Interfaces (New)
T5: Java Applets and the AWT (New)
T6: Setting Up And Administering A Web Server (New)
T7: Security for Software Developers: How to Write Code that Withstands Hostile Environments (New)
T8: Solaris System Administration (New)
T9: IP version 6: An Introduction
T10: Writing Device Drivers Under Linux (New)

M1: Beginning Perl Programming for UNIX Programmers (Updated for Perl 5)
Tom Christiansen, Consultant

Who should attend: System administrators and toolsmiths, database managers, software test and support engineers, GUI and World Wide Web programmers unfamiliar with Perl or those with little programming experience. You should have a background in UNIX shell programming with a good working knowledge of regular expressions. A background in sed, awk, and/or C programming will prove useful.

What you will learn: Perl syntax and semantics. More importantly, you will learn how to read Perl (and thus learn from other peoples programming experiences).

Have you been spending a lot of time trying to solve problems in the shell or C? Perl is an extremely powerful and robust scripting language that can help you solve problems in less time. Now ten years old, Perl is the tool of choice because of its power, plus, it works on nearly every conceivable platform. Because it incorporates aspects of more than a dozen well-known UNIX tools, experienced UNIX users will come up to speed on Perl rapidly, and even programmers inexperienced at UNIX will learn UNIX through learning Perl.

You will learn about these topics: detailed descriptions and numerous examples of the syntax and semantics of the language; its data types and data structures; operators and control flow; regular expressions; I/O facilities; database access; user-defined functions; writing and using library modules; and an easy intro to Perls object-oriented programming mechanisms.

You will also hear about some of the new Perl 5 modules, including examples of full applications for Tk-based graphical programming, CGI programs, and client/server programming.

NOTE: This course is based on the current release of Perl (version 5.002,) but is not intended to be a detailed discourse on all advanced programming constructs of that release. It is a jump-start course on Perl for experienced UNIX programmers, not an advanced course for previous Perl programmers.

Tom Christiansen is a consultant specializing in Perl applications, optimizations, and training. He is a frequent instructor at USENIX and other conferences. He earned an MS degree in computer science from the University of Wisconsin at Madison.

M2: The Kerberos Approach to Network Security (Updated) Daniel Geer, Open Market, Inc., Jon A. Rochlis, BBN Planet

Who should attend:

What you will learn: the Kerberos network security system; how to start work on a computing environment that is both open and accountable, and be able to explain all this to your colleagues.

No matter what your position isdeveloper, system administrator, or managersecurity is one of the most urgent issues facing you today. In this course, you will learn how the Kerberos approach might solve the practical challenges of providing security for the cooperative electronic workplace, workplaces that aspire to location and scale independence in the client-server idiom or which need to provide the kind of security services that enable external access to enterprise data.

You will learn about these topics:

Above all, we will stress nuts-and-bolts of making this work in your environment, including administration and integration of this technology with your existing environments.

Daniel E. Geer, Jr. is director of engineering at Open Market, Inc. Formerly he was chief scientist, vice president of technology, and managing director of security consulting services for OpenVision Technologies. He is a consultant to major Wall Street financial institutions, and a frequent speaker at many technology conferences. He holds a Doctor of Science from Harvard.

Jon Rochlis is an engineering manager with BBN Planet where he leads groups developing managed connectivity and security services. Previously he was with OpenVision Technologies, responsible for systems and security management products.

M3: An Introduction to Java Ken Arnold, Sun Microsystems Labs.

Who should attend: Experienced programmers and technical contributors familiar with the C and C++ programming languages, the basics of object-oriented programming, and the basics of how the World Wide Web operates and is organized.

What you will learn: An understanding of the structure and features of the Java language.

No matter what your programming background is, programming in Java has become an important skill. Java is one of the most talked-about programming languages because it makes the Web interactive, rather than just a passive medium. Learn about Java and how it enables live content programming. This live content consists of full programs that can be placed into HTML documents. When such a document is loaded into a Java-enabled HTML viewer such as HotJava, the program is run, creating a page with active or even interactive elements.

You will also learn about Java features that allow you to write secure, robust programs that can be relied upon to run in a finite amount of space without crashing into a pile of bits. These features include garbage collection, exceptions, strong typing, and a clean separation between classes and interfaces. You will also examine the set of class and interface libraries which are defined as part of any compliant Java implementation.

You will find out how to create applets, programs that can be included as part of a standard HTML document, including how to write applets, what resources are available to them, and what features of the language and runtime environment allow these applets to be run securely by anyone on the Internet.

If time permits, the day will end in wild speculation and discussion of the possible technological and social impacts of the kind of computing that Java allows.

Ken Arnold is part of the team developing the JavaSoft Remote Messaging Interface for communication between Java code running on different machines. He is co-author, with James Gosling, ofThe Java Programming Language. He is a leading expert in object-oriented design and implementation, and has written extensively on C and C++ topics for UNIX Review, and is also co-author, with John Peyton, of A C Users Guide to ANSI C.

M4: Secure Java Programming (New)
Marianne Mueller and David Brownell, JavaSoft

Who should attend: Java developers who want to learn more about how Java security works.

What you will learn: The basics of Java security and the default applet security policy, as well as new features such as Java code signing and Java APIs for access control lists and certificate management.

Topics will include:

Marianne Mueller and David Brownell are staff engineers in JavaSoft at Sun Microsystems Inc. Before working on security for the Java project, Marianne worked on floating point, compiler optimizations, and tools for multithreaded programming.

M5: Windows NT and Windows 95 The Win32 API (New)

Joseph M. Newcomer, Consultant

Who should attend: Programmers who expect to be involved in the implementation of a Win32-based product, or the porting of a UNIX product to Win32. You should be versed in C. Knowledge of X11 or C++ is helpful, but not required. You do not need to have worked in a windowing system.

What you will learn: A basic understanding of the issues and paradigms of Windows programming techniques, in particular, Windows 32 (Windows 95 and Windows/NT).

Topics include:

Dr. Joseph M. Newcomer is a consultant specializing in Windows application development. He is a Microsoft MVP (Most Valued Professional), an award given for expertise and public service in supporting Microsoft products on public forums. He recently co-authored the book, Win32 GUI Programming. His recent publications include several articles on Windows programming in Dr. Dobbs Journal.

M6: UNIX Network Programming
Richard Stevens, Consultant

Who should attend: UNIX/C programmers interested in learning how to write programs that communicate across a network. You should have a basic familiarity with networking concepts and the TCP/IP protocols.

What you will learn: The knowledge required to write network programs and to develop and examine actual examples. Although the tutorial primarily focuses on the Berkeley sockets interface, the course covers UNIX network programming concepts using TCP/IP that are applicable to both sockets and TLI.

You will hear about these topics:

Richard Stevens is an independent consultant and author of the books TCP/IP Illustrated, Advanced Programming in the UNIX Environment and UNIX Network Programming.

M7: Selected Topics in System Administration (New)
Trent Hein, XOR Network Engineering
Evi Nemeth, University of Colorado, Boulder

Who should attend: System and network administrators

What you will learn: Insights into real-world, common network problems from all-new, crisis case studies.

Topics include:

Trent Hein is chief network architect at XOR Network Engineering. He worked on the 4.4 BSD port to the MIPS architecture at Berkeley, and is co-author of the UNIX System Administration Handbook.

Evi Nemeth, a faculty member in Computer Science at the University of Colorado, has managed UNIX systems for the past 19 years, both from the front lines and from the ivory tower. She is co-author of the best-sellingUNIX System Administration Handbook.

M8: How Networks Work - The Limits of Modern Internetworking (Updated)
Vincent C. Jones, PE

Who should attend: Technical individuals, regardless of title, who are responsible for the design and upkeep of extended LAN and LAN/WAN networks supporting multiple protocol architectures. A working knowledge of TCP/IP, Ethernet, and the OSI reference model is assumed.

What you will learn: Practical knowledge: how to benefit from emerging technologies without getting burnt and how to take advantage of mature technologies without getting locked in. You will gain an understanding of the theory behind the rules so you will know which rules must be strictly obeyed, which can be safely stretched, and under what conditions.

Technology is getting more complex every day, but how do you evaluate emerging technologies? In this course, you will gain an understanding of the theoretical underpinnings of modern network technology, probing the current limits of performance and distinguishing between those limits which are fundamental and those which are temporary. You will learn whats the hype and whats the reality on a wide range of critical technologies, from cell relay (ATM) and virtual LANs to IP version 6 and link state routing.

The bottom line is that every networking protocol and technology is a compromise among competing needs. The better you understand the underlying theory, the better able you are to make appropriate choices that best meet the needs of your users and their applications.

Topics include:

Vincent C. Jones is an independent consultant on network planning, design, and analysis of integrated local and wide area networks for cooperative, distributed processing in multivendor environments. Dr. Jones has over twenty five years of experience finding practical, cost-effective solutions to complex networking issues.

M9: System and Network Performance Tuning (New)
Hal Stern, Sun Microsystems

Who should attend: Novice and advanced UNIX system and network administrators, UNIX developers concerned about network performance impacts. You should have a basic understanding of the UNIX system facilities and network environments.

What you will learn: Procedures and techniques for tuning systems, networks, and application code.

More measurement and performance evaluation is being demanded of systems and networks than ever before. In this course you will learn about procedures and techniques for tuning systems, networks, and application code. Starting from the single system view, you will examine how the virtual memory system, the I/O system, and filesystem can be measured and optimized. The single host view will expand to include Network File System tuning and performance strategies.

A detailed treatment of networking performance problems, including network design and media choices, will lead to examples of network capacity planning. Youll learn about application issues, such as system call optimization, memory usage and monitoring, code profiling, real-time programming, and techniques for controlling response time. Many examples will be given, along with guidelines for capacity planning and customized monitoring, based on your workloads and traffic patterns.

Topics include:

Hal Stern is a Distinguished Systems Engineer with Sun Microsystems where he focuses on high-end server technology, operations management, networking, performance tuning, and information systems architecture. Hal has been a UNIX administrator for more than 10 years. He is the author of Managing NFS & NIS and several articles on application performance and network design.

M10: Inside the Linux 2.0 Kernel (New)
Stephen C. Tweedie, Digital Equipment Corporation

Who should attend: Application programmers and kernel developers. You should be reasonably familiar with C programming in the UNIX environment, but no prior experience of the UNIX or Linux kernel code will be assumed.

What you will learn: An introduction to the structure of the Linux kernel, the basic features it provides, and the most important algorithms it employs.

If you have always wanted to program in Linux or are considering switching to it because of its low cost, you will need to understand its kernel. The Linux kernel aims to achieve conformance with existing standards and compatibility with existing operating systems, however, it is not a reworking of existing UNIX kernel code. The Linux kernel was written from scratch to provide both standard and novel features, and take advantage of the best practice of existing UNIX kernel designs.

Topics will include:

Stephen Tweedie works for Digitals Operating Systems Software Group and did his doctoral research on parallel multicomputer network performance at the University of Edinburgh. He has been contributing to Linux for a number of years, in particular designing some of the high-performance algorithms central to the ext2fs filesystem and the virtual memory code.

Tuesday, January 7

T1: UNIX Security Tools: Use and Comparison
Matt Bishop, University of California at Davis

Who should attend: UNIX security administrators and other interested users.

What you will learn: How to use publicly-available programs to improve the security of your system. You will compare the uses and drawbacks of several different programs, with an emphasis on when to use which.

Topics will include:

Matt Bishops research and teaching areas at the University of California at Davis include computer and network security, along with operating systems and software engineering. He chaired the first two UNIX Security Workshops, and his column on computer security appears regularly in the Best Practises newsletter.

T2: CGI and WWW Programming in Perl (New)
Tom Christiansen, Consultant

Who should attend: Programmers with a light background in Perl and HTML. No previous CGI experience is required. If you dont have any Perl background, read the Llama book first or take the M1 tutorial on Monday. This is not a for non-programmers course nor a for guru programmers course. Its for accidental programmers, folks other than UNIX systems gurus who need to deal with CGI and WWW programming.

What you will learn: CGI and other WWW programming using Perl. Special attention is given to system security issues.

All aspects of writing and processing fill-out forms are covered using the standard module. Some attention is also given to parsing of HTML documents and writing spiderbots, automata that navigate the Web on their own.

Specific topics include:

Tom Christiansen is a consultant specializing in Perl applications, optimizations, and training. He is a frequent instructor at USENIX and other conferences. He earned an MS degree in computer science from the University of Wisconsin at Madison.

T3: Security on the World Wide Web (New)
Daniel Geer, OpenMarket, Inc., and Jon Rochlis, BBN Planet

Who should attend: Anyone responsible for running a Web site who wants to understand the tradeoffs in making it secure and how it is likely to be secured.

What you will learn: A comparison of available methods of Web security.

The World Wide Web is perhaps the most important enabler (so far) of electronic commerce. It has grabbed the popular imagination and the engineering and marketing efforts of a generation of on-line entrepreneurs and consumers. But it was initially designed with little thought to industrial strength security. Over the past several years numerous proposals have surfaced to secure the Web. This course will survey them with the goal of understanding the strengths and weaknesses of each.

The topics will include:

Daniel E. Geer, Jr. is director of engineering at Open Market, Inc. Formerly he was chief scientist, vice president of technology, and managing director of security consulting services for OpenVision Technologies. He is a consultant to major Wall Street financial institutions, and a frequent speaker at many technology conferences. He holds a Doctor of Science degree from Harvard.

Jon Rochlis is an engineering manager with BBN Planet where he leads groups developing managed connectivity and security services. Previously he was with OpenVision Technologies, responsible for systems and security management products.

T4: Creating Effective User Interfaces (New)
Joseph A. Konstan, University of Minnesota

Who should attend: People involved in the process of designing, implementing, evaluating, and managing the development of interactive graphical user interfaces. You need not have programming experience, but experience using interactive applications is required.

What you will learn: How to design a good user interface, and also how to constructively (and authoritatively) criticize a bad user interface.

With the advent of readily available, easy-to-use packages for building GUI-based systems, GUI-based systems have moved from the realm of specialty to almost mundane. But along with the widespread accessibility of GUI-builders has arisen a glut of poorly conceived user interfaces, which are hard to use, difficult to understand, or simply hard on the eyes.

You will get a broad introduction to user interface design and evaluation, introducing the task-centered interface design method, and covering principles behind UI design and techniques for UI evaluation. These techniques are pulled together at the end with a set of examples from visualization and Web page design.

Topics include:

You will learn why it is a very, very bad thing and how to criticize evil name-brand software effectively!

Joseph A. Konstan is an award-winning teacher and directs a research program in user interfaces and multimedia systems. He regularly teaches short courses on user interface design and evaluation at the University of Minnesota.

T5: Java Applets and the AWT (New)
Nataraj Nagaratnam, Syracuse Univ.

Who should attend: Developers interested in developing interactive, animated GUI Java applications by exploring the capabilities of the Java Abstract Window Toolkit (AWT). Participants should be familiar with Java. Tutorial M3 will provide a good introduction.

What you will learn: You will become familiar with applet construction using the classes in the Java Abstract Window Toolkit (AWT) package, and the techniques to build a GUI in Java.

Topics include:

This course will include in-depth treatment of:

Nataraj Nagaratnam is a PhD candidate in Computer Engineering at Syracuse University. He is the lead author of the upcoming book titled Waite Groups Java Networking and Windowing API SuperBible. He is a part of the Diamonds research group working in the areas of object-oriented languages and systems.

T6: Setting Up And Administering A Web Server (New)
Bryan Buus, XOR Network Engineering

Who should attend: Webmasters and administrators charged with creating a World Wide Web service for their company. You should have some knowledge of UNIX system administration.

What you will learn: An in-depth understanding of your server environment and the critical issues surrounding ongoing maintenance.

The World Wide Web is the most widely used Internet service. Companies are quickly discovering that they need to be on the Web to provide information to customers and to keep up with the competition. This course describes how to set up and maintain a World Wide Web server on a UNIX platform. The servers covered in the course include the popular and freely-available Apache and NCSA Web servers.

Setting up the Web server is only half of the battle. Understanding exactly how the protocol works, what performance issues are critical, what the security implications are, and other nuances are just some of the important issues that all webmasters need to thoroughly understand.

Topics include:

Bryan Buus is the manager of XOR Network Engineerings Web services group. Prior to joining XOR, Bryan kickstarted OReilly & Associates' online efforts in 1992. He is a co-author ofManaging Internet Information Services, and has given seminars on managing Web services for CERFnet, the LISA Conference, and Hewlett Packard.

T7: Security for Software Developers: How to Write Code that Withstands Hostile Environments (New)
Marcus J. Ranum, V-ONE Corp.

Who should attend: System managers and software engineers developing client/server applications to be used over the Internet. A strong background in UNIX and UNIX programming is recommended. Many examples will refer to C programming constructs though familiarity with C is not a prerequisite.

What you will learn: Increasingly, client/ server software is being deployed in hostile environments that it may not have been designed to withstand. You will learn how to spot and avoid making typical flaws in security programming, using examples and case studies from existing applications.

Topics will include:

Marcus J. Ranum is a network and computer security consultant. He is the principal author of several major Internet firewall products, including the DEC SEAL, the TIS Gauntlet, and the TIS Internet Firewall Toolkit. Marcus has been managing UNIX systems and network security for over 13 years, including configuring and Marcus is a popular lecturer and conference speaker on computer security topics.

T8: Solaris System Administration (New)
Marc Staveley, Consultant

Who should attend: System administrators who need to know the differences between SunOS 4.x and Solaris 2.x administration. Portions of this course will also be useful from a BSD to SysV.4 perspective. It will be most meaningful to system administrators who have some experience setting up and maintaining a network of SunOS 4.x workstations and servers.

What you will learn: New methods in Solaris to accomplish the same task as in SunOS (for example, the new NFS filesystem administration commands) and new features in Solaris (for example, the CacheFS filesystem). The course will concentrate on the Solaris 2.5 release.

Topics will include:

Marc Staveley has 14 years experience in UNIX application development and administration. An independent consultant, he is working with the Sun Microsystems Developer Support Centre assisting customers in migrating from SunOS to Solaris. He is a frequent speaker on the topics of standards-based development, multi-threaded programming, and system administration.

T9: IP version 6: An Introduction
Richard Stevens, Consultant

Who should attend: Network programmers and system administrators who will be converting applications and networks from IPv4 to IPv6, and implementors of IPv6. You should have a basic understanding of TCP/IP.

What you will learn: How to transition from IPv4 to IPv6 from the administration and programming standpoints.

Over the past few years, proposals have been made to replace IPv4 with a new version, mainly to overcome the addressing limitations of IPv4. In July 1994 the successor was chosen and named IPv6. Since that time numerous working groups have been busy completing the specifications for all facets of IPv6, and implementations are starting to appear. It is expected that vendor-supplied implementations of IPv6 will appear in the coming years and there will be a gradual transition of the Internet to IPv6.

You will get an overview of all aspects of IPv6, from the perspectives of a system administrator who needs to transition a network from pure-IPv4 hosts and routers to a mixture of IPv4 and IPv6 nodes and a programmer who needs to convert applications from IPv4 to IPv6 .

Topics include DNS support, new socket address structure, address conversion functions, transition mechanisms, automatic tunneling, header fields and extension headers, source routing, path MTU discovery, upper-layer issues, ICMPv6, multicasting, neighbor discovery, CIDR, anycasting, and mobility.

W. Richard Stevens is an independent consultant and author of the booksTCP/IP Illustrated, Advanced Programming in the UNIX Environment, andUNIX Network Programming.

T10: Writing Device Drivers Under Linux (New)
Theodore Tso, Massachusetts Institute of Technology

Who should attend: System programmers who need to write, modify, or maintain device drivers for the Linux operating system. You should know the C programming language. Some knowledge of general UNIX or Linux kernel design principals is desirable but not necessary.

Linux is becoming more and more popular, particularly because of the wide variety of device drivers which are available in the Linux kernel. You will learn about the several basic classes of Linux device drivers character devices, block devices, and network devices and the abstract device driver layers which simplify the task of writing tty devices and SCSI devices.

You will also hear about general kernel-level design and programming issues and the basic Linux kernel services needed by device drivers. Examples in the tutorial will be based on actual device drivers taken from the Linux 2.0 kernel and will include a tty-based device driver, a hard-disk device driver, and a Ethernet device driver.

Theodore Tso has been a Linux kernel developer since almost the very beginning of Linux. He implemented POSIX job control in the 0.10 Linux kernel. He is the maintainer and author for the Linux COM serial port driver, and the Comtrol Rocketport driver. He also architected and implemented Linuxs tty layer. Outside of the kernel, he is the maintainer of the e2fsck filesystem consistency checker. Theodore is the project manager for the Kerberos V5 development team at MIT. He participates in the Internet Engineering Task Force where he serves on the Security Area Directorate.

Wednesday-Friday, January 8-10, 1997



Opening Remarks: John Kohl, Pure Atria Corporation

Keynote Address: Developing on "Internet Time"
James Gosling, Sun Microsystems

The development of the WWW and its attendant phenomena have led to the notion of Internet Time in which things seem to just happen faster. To avoid running into the sorts of nonsense results expressed by people such as Fred Brooks in The Mythical Man Month, you cant simply work faster you have to change the way you work. One such change has been the development and deployment of the Java language and the write once, run anywhere applications it enables. Such technological developments are not usually, by themselves, sufficient to accomplish the necessary changes often the skills and knowledge of the people using the technology have to change as well. This talk will discuss the changes in practice and perspective that such technologies have required of those creating and using Java and its associated tools.

James Gosling is a vice president and Fellow at Sun Microsystems where he has been the lead engineer for the Java/HotJava system. He has built satellite data acquisition systems, a multiprocessor version of UNIX, several compilers, mail systems, and window managers. He has also built a WYSIWYG text editor, a constraint-based drawing editor, and a text editor called Emacs for UNIX systems. Early in his career at Sun, he was lead engineer of the NeWS window system. James Gosling received a PhD in Computer Science from Carnegie-Mellon University.


11:00-12:30: Performance I
Session Chair: Carl Staelin, Hewlett-Packard Laboratories

Embedded Inodes and Explicit Grouping: Exploiting Disk Bandwidth for Small Files
Gregory R. Ganger and M. Frans Kaashoek, Massachusetts Institute of Technology

Observing the Effects of Multi-Zone Disks
Rodney Van Meter, Information Sciences Institute, University of Southern California

A Revisitation of Kernel Synchronization Schemes
Christopher Small and Stephen Manley, Harvard University

2:00-3:30: Interface Tricks
Session Chair: Rob Gingell, Sun Microsystems

Porting UNIX to Windows NT
David G. Korn, AT&T Research

Protected Shared Libraries - A New Approach to Modularity and Sharing
Arindam Banerji, John M. Tracey, and David L. Cohn, University of Notre Dame

Extending the Operating System at the User-Level: the Ufo Global File System
Albert D. Alexandrov, Maximilian Ibel, Klaus E. Schauser, and Chris J. Scheiman, University of California, Santa Barbara

4:00-5:00: Client Tricks
Session Chair: Fred Douglis, AT&T Research

Network-aware Mobile Programs
Mudumbai Ranganathan, Anurag Acharya, Shamik Sharma, and Joel Saltz, University of Maryland

Using Smart Clients to Build Scalable Services
Chad Yoshikawa, Brent Chun, Paul Eastham, Amin Vahdat, Thomas Anderson, and David Culler, University of California, Berkeley


9:00-10:30: Clustering
Session Chair: Clem Cole, Digital Equipment Corporation

Building Distributed Process Management on an Object-Oriented Framework
Ken Shirriff, Sun Microsystems Laboratories

Adaptive and Reliable Parallel Computing on Networks of Workstations
Robert D. Blumofe, University of Texas, Austin
Philip A. Lisiecki, Massachusetts Institute of Technology

A Distributed Shared Memory Facility for FreeBSD
Pedro A. Souto and Eugene W. Stark, State University of New York, Stony Brook

11:00-12:30: Tools
Session Chair: Matt Blaze, AT&T Research

Libcdt: A General and Efficient Container Data Type Library
Kiem-Phong Vo, AT&T Research

A Simple and Extensible Graphical Debugger
David R. Hanson and Jeffrey L. Korn, Princeton University

Cget, Cput, and Stage Safe File Transport Tools for the Internet
Bill Cheswick, Bell Laboratories

2:00-3:30: Works in Progress

Short, pithy and fun, WIP reports introduce new and ongoing work. If you have interesting work to share or a cool idea not ready for publication, a Works-In-Progress Report is for you. Youll get feedback from your fellow attendees. We are especially interested in the presentation of student work. To reserve a slot, send email to the WIP coordinator at Topics are announced on-site.

4:00-5:30: Inferno
Rob Pike, Bell Labs

As telecommunications, entertainment, and computing networks merge, a wide variety of services will be offered on a diverse array of hardware, software, and networks. Inferno provides a uniform execution environment for applications and services in this chaotic world. Inferno comprises a networked operating system that can run native or above a commercial operating system, a virtual machine, a programming language, protocols, and standard interfaces for networks, graphics, and other system services. This architecture offers unprecendented portability for applications and services.


9:00-10:30: User Tools
Session Chair: Charlie Briggs Digital Equipment Corp.

WebGlimpse - Combining browsing and searching
Udi Manber, Michael Smith, and Burra Gopal, University of Arizona

Mailing List Archive Tools
Sam Leffler and Melange Tortuba, Silicon Graphics

Experience with GroupLens: Making Usenet Useful Again
Bradley N. Miller, John T. Riedl, and Joseph A. Konstan, University of Minnesota

11:00-12:30: Performance II
Session Chair: Mike Karels, Berkeley Software Design

Overcoming Workstation Scheduling Problems in a Real-Time Audio Tool
Isidor Kouvelas and Vicky Hardman, University College London

On Designing Lightweight Threads for Substrate Software
Matthew Haines, University of Wyoming

High-Performance Local-Area Communication With Fast Sockets
Steven H. Rodrigues, Thomas E. Anderson, and David E. Culler, University of California, Berkeley

2:00-3:30: Caching and Stashing
Session Chair: Bill Bolosky, Microsoft Research

An Analytical Approach to File Prefetching
Hui Lei and Dan Duchamp, Columbia University

Optimistic Deltas for WWW Latency Reduction
Gaurav Banga, Fred Douglis, and Michael Rabinovich, AT&T Research

A Toolkit Approach to Partially Connected Operation
Dan Duchamp, Columbia University

4:15-5:45: Joint Closing Session

Severe Tire Damage's Stupid Mbone Tricks - A Lecture/Demonstration

Severe Tire Damage is the first band on the Internet, the first band on the MBone, and hosts the first live video worldwide interactive multimedia show on the information superhighway. Members of STD will describe how it all works and show off their chops in a live show for USENIX.



11:00-12:30: Nomadicity and the IETF

Charles E. Perkins, IBM T.J. Watson Research Center

Laptop computers and the growth of wireless communications are driving a push towards nomadic computing and mobile networking. This talk will cover recent protocol developments at the IETF in areas that directly affect nomadic users, including mobile-IP, service location, IPv6, dynamic host configuration protocol for IPv4 and IPv6, dynamic updates to DNS, and ad-hoc networking. Ill attempt the dangerous task of describing these protocol developments as part of a coherent whole and offer some ideas about the future evolution of mobile networking.

2:00-3:30: If Cryptography Is So Great, Why Isnt It Used More?
Matt Blaze, AT&T Research

By separating the security of information from the security of the media over which it is transmitted and stored, cryptographic techniques seem ideal for protecting data on widely decentralized networks or data stored in files on insecure PCs and workstations. Thats the theory, but in practice, cryptography is almost never available where it would be most useful. This talk will focus on some of the technical (rather than political) problems in integrating secure cryptography into real applications, operating systems, and networks.

4:00-5:00: The Inktomi Web Search Engine
Eric Brewer, University of California, Berkeley

This talk will describe the technology behind the Inktomi Web search engine. The Inktomi technology exploits parallel computing technology to build a high-speed, scalable Web server using commodity workstations. The prototype technology was developed as part of the Network of Workstations (NOW) project at the University of California at Berkeley and has also been used to build a new commercial search engine, HotBot. With 54 million documents, HotBot is the most complete Web index online.


9:00-10:30: The AltaVista Web Search Engine
Louis Monier, Digital Equipment Corporation

AltaVista is the result of a research project started in the summer of 1995 at Digitals Research Laboratories in Palo Alto, California, that combined a fast Web crawler with scalable indexing software. Within three weeks of launch, the AltaVista site was handling over two million HTTP requests per day. By May 1996, the index had grown to more than 30,000,000 pages, and the site was receiving twelve million daily HTTP requests. This talk will describe the software and hardware technology behind this popular and successful Web search engine.

11:00-12:30: IPv6: The New Version of the Internet Protocol
Steve Deering, Xerox Palo Alto Research Center

A new version of the Internets core protocol, IP, has been developed by the Internet Engineering Task Force (IETF) and is now entering the IETF Standards track. The new IP, known as IPv6, is designed to meet the scaling requirements imposed by the explosive growth of the Internet, and to meet the demand for greater functionality at the Internet layer. This talk will include a brief review of the motivations and events that led to the development of IPv6, a description of how the new protocol differs from the current version, and a status report on the IPv6 specifications, implementations, and transition mechanisms.

2:00-3:30: Highlights from 1996 USENIX Conferences and Workshops

This session will present highlights from some of USENIXs 1996 events: Conference on Object-Oriented Technologies and Systems (COOTS); LISA, the 10th Systems Administration Conference; the Second Symposium on Operating Systems Design and Implementation (OSDI); Sixth USENIX Security Symposium; and the Second USENIX Workshop on Electronic Commerce.


9:00-10:30: Measuring Computer Systems: How to Tell the Truth with Numbers
Margo Seltzer and Aaron Brown, Harvard University

"Benchmarks shape a field (for better or worse); they are how we determine the value of change." -David Patterson, 1994.

If benchmarks shape a field, then computer science is in bad shape. Our field is characterized by a few examples of excellent benchmarks, and a large number of poorly conceived measurements. We will examine the current practice in computer system measurement, citing both surpisingly good and embarrassingly bad real-world examples that illustrate common benchmarking pitfalls. Through this we will offer some benchmarking tips and guidelines.

11:00-12:30: Stupid Net Tricks
Bill Cheswick, Bell Laboratories

The Net (born c. 1992) is a new Thing. Is it a highway? A library? The old analogies dont work very well.

This new Place is a rich source of new experiments, new tricks, and new troubles. It is subject to clever and annoying hacking tricks, an arms race that the hackers seem to be winning at the moment. They are even putting the network infrastructure at risk, though benign administrative problems may well beat them to the punch. Netnews has evolved horizontal and vertical spamming and cancelbots. The Web offers new publishing opportunities. Marketers can game search engines by, for example salting their pages with extra keywords, causing an arms spiral with the engine designers. Now Javas designers would have us execute safe programs in unsafe containers. When all the security stupid tricks are fixed, denial-of-service attacks will remain.

2:00-3:30: Finding Bugs in Concurrent Programs
Gerard J. Holzmann, Bell Laboratories

In a concurrent system, machines can maliciously conspire to find loopholes in our otherwise perfect code, causing irreproducible forms of deadlock or failure to perform the desired function. Since software now controls just about everything of significance, it is important to discover these types of bugs well before the software is used.

SPIN is a popular verification system for concurrent software. In this talk Ill show how SPIN works, and give some examples of some of the more remarkable applications.




9:00-10:30: Linux: What It Is and Why It Is Significant
Mark Bolzern, Work Group Solutions
Tom Miller, X Engineering Software Systems

Bill Gates said at its introduction that Windows NT will be a better UNIX than UNIX. We say, Why wait, Linux already is!. We will demonstrate that Linux is not only significant, but the next generation heir of UNIX and what Linux will be in the near future and why. There will be case histories from a user perspective on Why Linux.

11:00-12:30: The Sparc Port of Linux
David S. Miller, Rutgers CAIP
Miguel de Icaza, Instituto de Ciencias Nucleares, Ciudad Universitaria, Universidad Nacional Autonoma de Mexico

Regardless of the many barriers the port of Linux to Sparc-based workstations and servers had to overcome, it was very successful. This talk will emphasize performance, stability, and how Linux became more portable as a result of the port.

2:00-3:30: Advanced Device Drivers
Alessandro Rubini, Universita di Pavia

This presentation will go slightly deeper than the usual overview of the programming interface for Linux device drivers. Youll learn details of asynchronous events (select and fasync), as well as using kernel timers and task queues. Youll hear about kernel threads and how they can help you design unusual device driver features. The kmouse virtual device will be used as sample code showing how to take advantage of such software technologies.

4:00-5:00: Future of the Linux Kernel
Linus Torvalds, Helsinki University

The future of Linux! The lead developer of Linux talks about the future of Linux kernel development, including topics such as advanced memory management techniques, high-speed networking, and portability.


9:00-10:30: Real Time
Victor Yodaiken and Michael Barabanov, New Mexico Institute of Technology

Real-time Linux is a premptable version of the Linux kernel that can run tasks with hard real-time deadlines. Our primary goal is to make it convenient to use a PC to control lab equipment, robotics, or other devices that need precise timing and limited response times. This talk will focus on how to use real-time Linux, how to write tasks as loadable kernel modules, and how to adjust the scheduler to different problems.

11:00-12:30 (Shared Session): /proc
Stephen Tweedie, Digital Equipment Corporation

Linux provides several interfaces for programs to access system data. This talk explains how system administrators and integrators can use the two main interfacesthe /proc filesystem and the "sysctl" interfaceto tune system performance.

11:00-12:30 (Shared Session): The Pluggable Authentication Modules (PAM) Framework
Ted Tso, Massachusetts Institute of Technology

Authentication systems are constantly evolving, and it is important to shield the system administrator and application programmers from such changes. The Pluggable Authentication Module (PAM) framework allows a system administrator to dynamically change the authentication schemes used by programs such as login, ftpd and passwd. This talk will discuss how the PAM system uses dynamically linked shared libraries to provide plugability for the functions of system authentication and account, session, and password management.

2:00-3:30: Standards
Heiko Eissfeldt, Unifix Software

An introduction to POSIX.1-related standards, starting with a survey of the evolution of the most relevant related standardsANSI C, XPG4, and the POSIX.1* extensionsfollowed by a closer look at POSIX.1. A standard can be thought of as a protocol defining an interface between a system and applictions; I will primarily focus on the perspective of application programs, but also discuss some POSIX.1 implementation issues.

4:00-5:30: Connecting Legacy and Open Systems
Michael Callahan, Stelias Computing, Inc.

While Linuxs abilities as an Internet platform are well-known, it also makes a capable server for microcomputer LANs running legacy protocols. This talk will describe how to use Linux in Microsoft, Apple, and Novell networks in a way which complements its capabilities as a TCP/IP server.



9:00-9:30: Linux: What It Is and Why It Is Significant
Mark Bolzern, Work Group Solutions
Tom Miller, X Engineering Software Systems

Linux is a freely-distributable operating system being implemented by an international team of highly-skilled programmers over the Internet. The history and philosophy of on-going development used in Linux guarantee a platform on which you can grow your business.

This talk will demonstrate the philosophical and concrete reasons why Linux is becoming a force in the commercial marketplace.

9:30-10:30: Linux and Distribution Channels: Ways to Enter the Commercial Market
Don Rosenberg, Stromian Technologies

While the Linux operating system and improvements to it will remain free, a commercial marketplace is growing up around the distribution of the system with added-value installation aids, utilities, and help and maintenance. With the arrival of full-featured applications, Linux developers and vendors are entering a growing market with developing channels: direct sales, catalogs, OEM, integrators, resellers, distributors, and VARs. Learn the benefits and drawbacks of these channels, and how to enter them.

11:00-12:30: Using Linux in Your Business: A Business Justification
Presented by Linux International

How and why to justify to your or your customers management the use of Linux as an operating system. Pitfalls to avoid, arguments to use.

After this session, you will know where to go to get software and hardware support and applications. You will also see a price comparison between systems using Linux and systems using proprietary operating system code.

This talk is for the end user who is trying to convince their management to use Linux, or for the OEM, VAR, or reseller trying to convince their customer that Linux is the operating system to use.

2:00-4:00: The Linux Market: Who, What, Where, When and Why?
Presented by Linux International

Everything that a marketing manager needs to put together a marketing plan utilizing Linux as a base operating system. Whether you are the marketing manager for an ISV, a VAR, or a reseller, you will walk away with a skeleton marketing plan that can easily be adapted to fit your product or service. NOTE: This talk is not directed at the end user for Linux, but may contain useful information for them also.

Included in the plan will be: current status, market size and growth, market demographics and customer profiles; status of ports to different architectures; different distributions and their market focus; vertical vs. horizontal markets; differentiations between Linux and UNIX systems; applications currently available on Linux; pricing your Linux application or service for maximum revenue, and much, much more.


FIRST attend these evening sessions, THEN attend the business conferences on Friday to develop your business plan. Nothing gives you a better sense of how things really work than to hear about real-life experiences. Attend these evening sessions to learn about specific applications and uses.

WEDNESDAY, JANUARY 8, 7:30pm - 11:00pm

The Use of Linux for Dedicated Systems
Chel van Gennip, HISCOM BV

Using a distributed environment with dedicated servers for well-defined tasks enables us to reduce the costs of administration and maintenance if the task is well isolated. Find out how using an inexpensive OS such as Linux or inexpensive hardware will enable you to isolate tasks in a cost-effective manner.

Perceptions: A Strategic Deployment of Linux in the Health Care Environment
Greg Wettstein, Velocity LLC

Is your company one of the many seeking to leverage the power of internetworking tools and protocols through the deployment of corporate Intranets? The ability of Linux to effectively platform applications in this marketplace is the focus of this talk. You will hear about the issues involved when Linux is selected as a deployment base. You will learn about the advantages of selecting Linux and the corporate challenges experienced when freely distributable tool sets are chosen.

The Future of the Linux Desktop
Ken Apa, Governors State University; Jim Fetters, Chicago Mercantile Exchange; Joe Sloan, Toyota Motor Sales USA

An overview of present desktop and user-interface requirements for the 90s and beyond. Join a discussion of file managers, Motif, Tk and ease-of-use issues, as well as a comparison with other directions for desktops and how Linux can meet the challenge. Integrating Linux with other systems such as NT, the Web, and the 3D graphics capabilities of Linux will also be explored.

The Classroom of the Future
Karl Jeacle, Broadcom Eireann Research Ltd.

The Linux operating system has been used as the basis for a low cost computing solution connecting primary (K-12) and secondary (junior/senior high) schools in Ireland to the Internet. A pilot network has been set up between six schools in the Dublin area, three of which have been interconnected using ISDN. Each of these three schools have used Linux to provide services such as Email, Usenet, IRC and the World Wide Web to both students and staff.

Learn how this was done, and explore the possibilities of doing this in your own community.

THURSDAY, JANUARY 9, 6:00pm - 10:30pm

Using GNUstep to Deploy User Applications
Scott Christley, NET-Community

GNUstep is a set of free software libraries and applications that can be used to create portable, graphical user applications. GNUstep is known to run on many versions of UNIX and Windows NT/95. You will hear historical information, a technical overview, the current state of development, future development, and available third party software and support organizations.

Embedded, Turnkey and Real Time
Phil Hughes, Linux Journal

Linux is well established as a good development platform and is now coming into its own as a base system for business applications. Linux can also excel as an environment for embedded systems from small communications controllers and routers through Raster Image Processors and workgroup servers.

You will have a chance to hear how Linux is being used in these areas, possible problems and its potential.

Developing Linux-based Electronic Markets for Internet Trading Experiments
Paul J. Brewer, Georgia State University

Linux is currently playing a very important role in the development of Internet-accessible, world-wide, real-time electronic markets for use in laboratory research experiments. These markets are full-featured electronic markets without the high-tech security and encryption functions required for handling high value transactions. Learn how using Linux as a central server enabled us to make architectural decisions not possible under other operating systems.

Linux in the Radio Amateur and Electronic Engineering Market
Bruce Perens, Pixar

Linux is currently enjoying growing popularity in the electronic and radio amateur market. Technical organizations are centering on using Linux as well as the large market for electronic hobbyists. Learn the size of these markets, what their needs are, how to reach them.

USELINUX Program Committee

Conference Chair: Michael Johnson, Red Hat Software

Technical Track Committee:
Michael K. Johnson, Chair, Red Hat Software
Mark Bolzern, WorkGroup Solutions
Alan Cox, 3Com, Remote Access Products
Jon maddog Hall, Esq., Digital Equipment Corporation
Lorrie LeJeune, O'Reilly and Associates
Dr. Tom Miller, North Carolina State University
Erik Troan, Red Hat Software

Business Track Committee:
Jon maddog Hall, Esq., Chair, Digital Equipment Corporation
Jonathan Eunice, President, Founder, Research Director, Illuminata, Inc.
Michael K. Johnson, Red Hat Software
Lorrie LeJeune, Product Manager of Internet and Linux, OReilly and Associates
Bryan Sparks, President, Caldera, Inc.
Paul Winbauer, Director of Technical Programs, Avnet Computing
Bob Young, President, Red Hat Software


Linux International exists to promote the use of Linux. The volunteers who created Linux are now joined by volunteers who specialize in promoting it. We know how good Linux is, and want it to become an accepted alternative to products from even the largest computer companies. We are made up of individuals, member companies, and sponsoring member companies who all wish to help promote the use of Linux.

We are focused on these areas at the moment:

So now you know about Linux International. The rest is up to you. To volunteer some skill you have, make a cash donation, or even pass on some still-useful piece of hardware, please contact us at our website:

Linux International


Wednesday, January 8, Noon - 7:00pm
Thursday, January 9 10:00am - 4:00pm

"Two days of exposure to the cream of the UNIX User Community."
-Neil Groundwater, Enterprise Management Group, SunSoft, Inc.

The emphasis is on serious questions and feedback at the USENIX 97 Exhibition. In the relaxed environment, attendees have time for in-depth discussions with technical representatives. You will find the products and services of some 60 vendors on display.

If you cannot make it to the conference but would like to visit the exhibition, please contact Cynthia Deno, Exhibit Coordinator, at 408.335.9445 or


Schedule a BoF! Talk to an expert! Present new work!! Dont miss these special activities, designed to maximize your time at the conference.

Birds-of-a-Feather Sessions (BoFs)
Tuesday, Wednesday, and Thursday evenings

Do you have a topic that youd like to discuss with others? Birds-of-a-Feather sessions may be perfect for you. BoFs are interactive, informal gatherings for attendees interested in a particular topic. Schedule your BoF in advance. Call the Conference Office at 714.588.8649 or send email to Topics are announced at the conference. BoFs may also be scheduled on-site.

The Guru is IN

Have a question thats been bothering you? Try asking a USENIX guru! Noted experts from the USENIX community will be available to spark controversy and answer questions. Please contact the Invited Talks Coordinators via email to if you would like to volunteer your expertise.

Works-in-Progress Reports

Short, pithy, and fun, Works-in-Progress Reports (WIPs) introduce interesting new or ongoing work. If you have work to share or a cool idea not quite ready to be published, a WIP Report is for you! You will receive insightful feedback. We are particularly interested in presenting student work. WIPs are scheduled within the technical sessions program. To reserve a slot, send email to Topics are announced on-site.

Social Activities

Welcome Reception and Kickoff, Sunday, January 5, 6:00pm - 9:00pm

The Welcome Reception offers you a chance to say hello over soft drinks and snacks. The Kickoff introduces attendees to conference events and to Anaheim. The Kickoff follows the Welcome Reception at 8:00pm.

Soft Drinks and Snacks

Enjoy light food and beverages Tuesday Thursday evenings in the Foyer.


Terminal Room

Internet and dial-out access are provided in the Terminal Room. The Terminal Room will be open throughout the conference week. Look for details posted to

Attendee Message Service

Electronic message service will be available Monday, January 6 through Friday, January 10. Electronic messages to conference attendees should be addressed: Telephone messages may be left by telephoning the Marriott Hotel at 714.750.8000 and asking for the USENIX Message Desk extension. The Message Desk will be open Sunday, January 5, 4:00 pm 9:00 pm, and during conference hours until Friday, January 10 at 3:00 pm.

USENIX Membership Information


USENIX is the UNIX and Advanced Computing Systems Technical and Professional Association.

Since 1975 the USENIX Association has brought together the community of engineers, system administrators, scientists, and technicians working on the cutting edge of the computing world.

The USENIX Conferences have become the essential meeting grounds for the presentation and discussion of the most advanced information on new developments in all aspects of advanced computing systems.

The USENIX Association and its members are dedicated to:

SAGE, a Special Technical Group within the USENIX Association, is dedicated to the recognition and advancement of system administration as a profession. To join SAGE, you must be a member of USENIX.


You can join USENIX or renew your membership, and attend the conference for the same low price. Just check the box on the registration form. $70 of your fees will be allocated to membership, and you can take advantage of all our member benefits.

If you are a system administrator and would like to join SAGE or renew your membership, just check the box on the registration form. For only $25, you can be a part of the only organization devoted to system administrators.

For more information about USENIX and SAGE, please contact:

The USENIX Association
2560 Ninth St, Ste. 215
Berkeley, CA 94710
Phone: 510.528.8649
Fax: 510.548.5738


Hotel Discount Reservation Deadline:
Friday, December 20, 1996

USENIX has negotiated special rates for conference attendees at the Anaheim Marriott. Contact the hotel directly to make your reservation. You must mention USENIX to get the special rate. A one-night room deposit must be guaranteed to a major credit card. To cancel your reservation, you must notify the hotel at least 24 hours before your planned arrival date.

Anaheim Marriott
700 West Convention Way
Anaheim, CA 92802
Toll Free: 800.228.9290
Phone: 714.750.8000
Reservation Fax: 714.750.9100

Room Rates: $107/Single, $117/Double
(plus local taxes, currently at 15%)

Special Note: This conference places a heavy demand on meeting space. To get meeting space and other services free and keep your conference fees low, USENIX guarantees to use a number of sleeping rooms. Contracts are signed long in advance. The penalty for not meeting the guarantee may exceed $100,000. You must mention USENIX when reserving your room to ensure that it counts against our room guarantee. If you use a corporate rate, it will not count against our commitment.

Need a Roommate?

Usenet facilitates room sharing. If you wish to share a room, post to and check

Discount Airfares and Car Rentals

Special discounted air fares and car rentals are available only through JNR, Inc., a full service travel agency. All restrictions apply. Please call JNR for details. Call toll free 800.343.4546 in the USA and Canada or telephone 714.476.2788.

Transportation to the Hotel

The Anaheim Marriott is located 31 miles, about 50 minutes, from the Los Angeles International Airport and 16 miles or 25 minutes from the John Wayne Airport-Orange County.

Shuttle ServiceSuper

Shuttle offers transportation to and from both LAX and John Wayne Airports. Advanced reservations are required for John Wayne pick ups and to avoid delays at LAX. Call 714.517.6600. One way fare from LAX is $13 and $10 from John Wayne.

Taxis are available, and cost approximately $65 one way from LAX and $28 from John Wayne.

What To Do in Orange County

Anaheim may be best known as the home of Disneyland (just steps from the hotel), but it is also well located for exploring some of the hot spots of Southern California. Most of these are within an hours drive of Anaheim. Southern California is car country. You may want to rent a car since attractions and restaurants are spread out and public transportation is not convenient. When in Rome

Disneyland: The original Disneyland is just steps from the hotel. Besides Disneyland, theres Knotts Berry Farm and Universal Studios.

Beaches: Orange County has a 42 mile coastline, comprised of public and state beaches.

Museums/Galleries: Orange County has over 300 museums and galleries. LA offers the County Museum and the Getty.


Cancellation Policy If you must cancel, all refund requests must be in writing, and postmarked no later than December 27, 1996. Telephone cancellations cannot be accepted. You may substitute another in your place. For more information, contact:

USENIX Conference Office, 22672 Lambert St., Suite 613, Lake Forest, CA USA 92630 Phone: 714-588-8649 Fax: 714-588-9706 Email: Hours: M-F, 8:30am-5:00pm Pacific Time


Note: For Your Convenience--the registration form is provided separately for easier downloading and printing. Simply double click on "REGISTRATION FORM" above to access a PostScript form of the document.