[comp.org.usenix] LISA IV CONFERENCe

ellie@usenix.ORG (Ellie Young) (09/20/90)

Large Installation Systems Administration IV
Conference and Tutorial Program
October 17-19, 1990
Colorado Springs, Colorado


Wednesday, October 17
TUTORIAL:	Topics in Large Installation Systems Administration

INSTRUCTORS:	Rob Kolstad, Jeff Polk, Sun Microsystems
		Evi Nemeth, Trent Hein, University of Colorado	

A two-track tutorial program will be held in conjunction
with the Conference.  This program allows attendees
to choose which sections of the tutorials most interest them.
Participants can change between the tracks at each topic change to the
session which appears most interesting to them.  The tutorial notes will
include viewgraphs from both tutorial tracks. A box lunch is included
in the registration fee.

 9:00  +---------------------------------------------------------+
       |                      PERL, part 1                       |
10:15  |- - - - - - - - - - - - - - - - - - - - - - - - - - - - -|
       |                       [break]                           |
10:40  |- - - - - - - - - - - - - - - - - - - - - - - - - - - - -|
       |                      PERL, part 2                       |
11:30  |---------------------------------------------------------|
       | Network Functionality      |                            |
       |       SNMP, BIND           |       sendmail 1           |
12:30  |---------------------------------------------------------|
       |                - - - - l u n c h - - - -                |
 1:30  |---------------------------------------------------------|
       | Dynamic Routing Strategies |                            |
       |      gated/egp/rip         |       sendmail 2           |
       |    NTP (time Protocol)     |                            |
 2:30  |----------------------------|----------------------------|
       | Case studies:              |                            |
       |   SLIP                     |   Ethics, patents,         |
       |   optimal NFS configs      |   privacy, security        |
 3:30  |----------------------------|----------------------------|
       |                         [break]                          |
 4:00  |----------------------------|----------------------------|
       | Security:                  |    question                |
       |   Kerberos IV              |          and               |
       |   COPS                     |             answer         |
 5:00  +---------------------------------------------------------+

*******************************************************************
TENTATIVE TECHNICAL PROGRAM - OCTOBER 18 - 19, 1990

Thursday, October 18

9:00 - 10:00	Welcome and Opening Remarks 
		 Steven C. Simmons, Industrial Technology Institute

		Keynote Address: Structural Revelation: Towards a
		 Mythology of the System 
		 Anne G. Leonard, IBM

10:00 - 10:30	Break

10:30 - 12:00	USERS, USERS, USERS

   		ACMAINT: An Account Creation and Maintenance System 
		For Distributed UNIX Systems
		 David Curry, SRI International
   		UDB - User Data Base System
		 Roland J. Stolfa and Mark J. Vasoll, Oklahoma State
		 University
   		Gaud: RAND's Group and User Database 
		 Michael Urban, The RAND Corporation
   		newu: Multihost User Setup 
		 Stephen P. Schaefer, MCNC
   		UNIQNAME Overview 
		 Bill Doster, University of Michigan

12:00 - 1:30	Lunch

1:30 - 2:30	PANEL:  WHY DO WE KEEP RE-INVENTING THE WHEEL (AND
		 WHAT CAN WE DO ABOUT IT?)

2:30 - 3:00	Break

3:00 - 4:30	MANAGING OUTSIDE SOFTWARE	

   		The Depot: A Framework for Sharing Software
		 Installation Across Organizational and UNIX
		 Platform Boundaries
		 Ken Manheimer, Barry Warsaw, Steve Clark, 
       		Walter Rowe, National Institute of Standards 
		and Technology
   		Guidelines and Tools for Software Maintenance in
		 a Productional Environment
		 Kevin C. Smallwood,  Purdue University Computing
		 Center
		Keeping up with the Manual System
		 Kevin Braunsdorf, Purdue University Computing Center
   		The Answer To All Man's Problems
		  Tom Christiansen, CONVEX Computer Corporation
   		Life Without Root 
		  Steven C. Simmons, Industrial Technology Institute

Friday, October 19

9:00 - 10:30	TOOLS FOR THE ADMINISTRATOR
   		Trouble-MH: A Work-Queue Management System For
		 A >3-ring Circus
		 Tinsley Galyean, Trent Hein, Evi Nemeth, 
		University of Colorado
		 A Console Server 
		 Thomas Fine, Ohio State University
   		Network Monitoring By Scripts
		 Katy Kislitzin, Computer Sciences Corporation
   		Using expect to Automate System Administration Tasks
		 Don Libes, National Institute of Standards and 
		Technology
   		Policy as a System Administration Tool
		 Elizabeth D. Zwicky, SRI International
		 Steven C. Simmons, Industrial Technology Institute
		 Ronald E. Dalton, Industrial Technology Institute

10:30 - 11:00	Break

11:00 - 12:00	PANEL: AUTOMATED SYSTEM ADMINISTRATION - HOW
		 DESIRABLE, HOW MUCH, HOW SOON

12:00 - 1:30	Lunch

1:30 - 3:00	MAIL AND BACKUPS - OLD PROBLEMS WITH NEW FACES

   		Integrating X.500 Directory Service into a Large 
		Campus Computing Environment
		 Timothy Howes, University of Michigan
   		A Domain Mail System on Dissimilar Computers - 
		Trials and Tribulations of SMTP
		 Helen E. Harrison, SAS Institute, Inc.
   		Backup At Ohio-State, Take 2
		 Steve Romig, Ohio State University
   		The AFS 3.0 Backup System 
		 Steve Lammert, Transarc Corporation
3:00 - 3:30	Break

3:30 - 5:00	WORKS IN PROGRESS, CLOSING REMARKS

The registration fees are $225 for the tutorial and $200 for 
USENIX members ($240 for non-members) for the technical sessions.
If you would like to obtain a brochure with full details regarding
the tutorial program, technical sessions, and hotel, please
contacts:
 
                  USENIX Conference Office
                    22672 Lambert Street
                         Suite 613
                     El Toro, CA 92630
                        TEL 714-588-8649
			FAX 714-588-9706
                     EMAIL: judy@usenix.org