


default search action
15th LISA 2001: San Diego, California, USA
- Mark Burgess:
Proceedings of the 15th Conference on Systems Administration (LISA 2001), San Diego, California, USA, December 2-7, 2001. USENIX 2001, ISBN 1-880446-05-7
Opening Remarks, Awards, and Keynote
- Greg Bear:
Keynote Address: Slime vs. Silicon. LISA 2001 - Ernest Prabhakar:
Keynote: Rebuilding the Digital Enterprise Around Internet Standards. LISA 2001 - William LeFebvre:
CNN.com: Facing a World Crisis. LISA 2001
Stirring the Matrix: Organizational System Administration
- Mark D. Roth:
Defining the Role of Service Manager: Sanity Through Organizational Evolution. 1-6 - Dejan Diklic, Venkatesh Velayutham, Steve Welch, Roger Williams:
Remote Outsourcing Services for Multiple Branch Offices and Small Businesses via the Internet. 7-14
Technologies Indistinguishable from Magic: Analytical System Administration
- Robert Apthorpe:
A Probabilistic Approach to Estimating Computer System Reliability (Awarded Best Theory Paper!). 31-46 - Frode Eika Sandnes:
Scheduling Partially Ordered Events in a Randomised Framework: Empirical Results and Implications for Automatic Configuration Management. 47-62 - Alva L. Couch, Noah M. Daniels:
The Maelstrom: Network Service Debugging via "Ineffective Procedures". 63-78
Monte LISA Overdrive: Empirical System Administration
- Patrick O'Rourke, Mike Keefe:
Performance Evaluation of Linux Virtual Server. 79-92 - Larry Lancaster, Alan Rowe:
Measuring Real-World Data Availability. 93-100 - Hårek Haugerud, Sigmund Straumsnes:
Simulation of User-Driven Computer Behaviour. 101-108
Seeing How the LAN Lies: Network Monitoring
- Jürgen Schönwälder:
Specific Simple Network Management Tools. 109-120 - Victor Götsch, Albert Wuersch, Tobias Oetiker:
Gossips: System and Service Monitor. 121-132 - David Moore, Ken Keys, Ryan Koga, Edouard Lagache, Kimberly C. Claffy:
The CoralReef Software Suite as a Tool for System and Network Administrators. 133-144
Level 1 Diagnostics: Short Topics on Host Management
- Yizhan Sun, Alva L. Couch:
Global Impact Analysis of Dynamic Library Dependencies. 145-150 - Serge E. Hallyn, Phil Kearns:
Tools to Administer Domain and Type Enforcement. 151-156 - Lee "Leonardo" Amatangelo, W. Curtis Preston:
Solaris Bare-Metal Recovery from a Specialized CD and Your Enterprise Backup Solution. 157-162 - Willem A. Schreüder:
Accessing Files on Unmounted Filesystems. 163-168
To Your Scattered PCs Go! Distributed Configuration Management
- Todd Poynor:
Automating Infrastructure Composition for Internet Services. 169-178 - Tobias Oetiker:
TemplateTree II: The Post-Installation Setup Tool. 179-186 - Matt Holgate, Will Partain:
The Arusha Project: A Framework for Collaborative UNIX System Administration. 187-198
Human Interface: Timely Solutions
- Mike Wyer, Susan Eisenbach:
LEXIS: An EXam Invigilation System (Awarded Best Applied Paper!). 199-210 - Ellen Spertus, Robin Jeffries, Kiem Sie:
Dynamic Sublists: Scaling Unmoderated Mailing Lists. 211-218 - Stephen J. Okay, Gale E. Pedowitz:
GEORDI: A Handheld Tool for Remote System Administration. 219-230
Adapting the Collective: Short Topics on Configuration Management
- Robin Garner:
Pelican DHCP Automated Self-Registration System: Distributed Registration and Centralized Management. 257-267 - R. P. Channing Rodgers, Ziying Sherwin:
A Management System for Network-Shareable Locally Installed Software: Merging RPM and the Depot Scheme Under Solaris. 267-273 - Andrew Mayhew:
File Distribution Efficiencies: cfengine Versus rsync. 273-276 - Charles Beadnall, Andrew Mayhew:
CfAdmin: A User Interface for cfengine. 277-281
Work-in-Progress Reports
Invited Talks
- Aviel D. Rubin:
Security for E-Voting in Public Elections. LISA 2001 - Peter H. Salus:
2001: A Communications Anniversary. LISA 2001 - Kimberly C. Claffy:
Internet Measurement: Myths About Internet Data. LISA 2001 - Daniel V. Klein:
150/5, 000 Years of (E-)Commerce: History Repeats Itself Again. LISA 2001 - Steve Simmons, Elizabeth D. Zwicky:
Rules of Thumb of System Administration. LISA 2001 - Lee Tien:
What Sysadmins Need to Know About the New Intellectual Property Laws. LISA 2001 - Jim Waldo:
JINI Networking Technology and Ad-Hoc Networks. LISA 2001 - Ruth Milner:
Reducing System Complexity: A Case Study in Converging Environments. LISA 2001 - W. Curtis Preston:
SANs and NAS. LISA 2001 - Michel Pelletier:
Zope. LISA 2001 - David N. Blank-Edelman:
If I Could Talk to the Animals--What Sysadmins Can Learn About Diagnostic Skills from Another Profession. LISA 2001 - Geoff Halprin:
The Problem with Developers. LISA 2001 - Shane Caraveo:
PHP for System Administration. LISA 2001 - Phil Cox:
Hardening Windows 2000. LISA 2001
To Teraflops and Beyond!
- Esther Filderman, Kevin Sullivan, Victor Hazlewood:
Panel: An Overview of Terascale Computing. LISA 2001 - Victor Hazlewood:
Invited Talk: San Diego Supercomputer Center's Blue Horizon. LISA 2001 - Esther Filderman, Kevin Sullivan:
Managing the Terascale: Lessons from a 750-Node Supercomputer. LISA 2001 - Esther Filderman, Kevin Sullivan, Victor Hazlewood:
Wrap-Up and Q & A. LISA 2001 - Panel: Written Any Good Books Lately? LISA 2001
- Panel: Scripting Languages Bake-Off. LISA 2001
Network/Security
Illuminating the Dark Side: Short Topics on Security Issues (1 Talk, 3 Papers)
- Gregory G. Rose:
Where Has All the Crypto Gone? Long Time Coming: A Speculative and Historical Talk. - Peter D. Gray:
SUS, an Object Reference Model for Distributing UNIX Super User Privileges. 15-18 - Reiner Sailer, Arup Acharya, Mandis Beigi, Raymond B. Jennings III, Dinesh C. Verma:
IPSECvalidate: A Tool to Validate IPSEC Configurations. 19-24 - Niels Provos, Peter Honeyman:
ScanSSH: Scanning the Internet for SSH Servers. 25-30 - Gordon Cook:
Whither End-to-End: Placing Bandwidth and Trust at the Edge. LISA 2001 - Steve Burnett:
Crypto Blunders. LISA 2001
Control Central: Three Talks on New Approaches to Security Management
- Mark Epstein:
A Non-Traditional Approach to Network Security Control. LISA 2001 - Æleen Frisch:
Beyond File Permissions: Controlling User Actions. - Hal Pomeranz:
Are Baseline Computer Security Standards the Answer? LISA 2001
The Packet Crackdown: Talks on TCP Performance Tuning and Packet Capture
- Thomas J. Hacker:
TCP Performance Tuning. LISA 2001 - Michael T. Stolarchuk:
BPF Meets UVM. - Avishai Wool:
How Not to Configure Your Firewall: A Field Guide to Common Firewall Configurations. LISA 2001
The Network from Orbit: A Global Perspective
- Marina Fomenkov, Kimberly C. Claffy, Bradley Huffaker, David Moore:
Macroscopic Internet Topology and Performance Measurements from the DNS Root Name Servers. 231-240 - Nevil Brownlee, Kimberly C. Claffy, Evi Nemeth:
DNS Root/g TLD Server Measurements. 241-256 - John S. Flowers:
Inspection, Detection & Deflection: Armoring the Next Wave of Security Technology. LISA 2001 - Panel: The Future of Computer Security. LISA 2001
Guru Sessions
- Gerald Carter:
LDAP. LISA 2001 - Esther Filderman, Garry Zacheiss:
AFS. LISA 2001 - Steve Traugott:
Infrastructure Architecture. LISA 2001 - Gregory G. Rose:
PKI/Cryptography. LISA 2001 - Thomas A. Limoncelli:
Writing Papers for Usenix Refereed Track. LISA 2001 - W. Curtis Preston:
Backups. LISA 2001 - Bill Labrie:
Sysadmin for Suits. LISA 2001 - Eric Allman:
Email MTAs. LISA 2001 - Adam Moskowitz:
Computer Room Design/Layout. LISA 2001

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.