http://streaming.linux-magazin.de/events/lisa08/talks/
November 9 - 14 from San Diego, CA
LISA '08 - Invited Talks
22nd Large Installation System Administration Conference
If
you follow the fortunes of large installation IT, tune in on November
12 for a front row ticket to the Invited Talks series of the USENIX
LISA conference.
Our Tech Session Package
includes a selection of the best invited talks, along with a bonus
collection of keynote, refereed, and plenary sessions. If you don't
have the time or airfare for a trip to San Diego, join us at your
desktop for the USENIX LISA Invited Talks collection. The whole series
is yours for only US$ 149 - less than a single night in a downtown
hotel.
 |
Videos
are played directly in your browser by a Java applet. Parallel to this,
the presentation slides are shown in sync with the video.
You can
use the time slider at the bottom edge of the window to fast forward or
reverse the video: the slides will stay in sync.
|
Tech Sessions Video
Archive
|
Keynote Address
Implementing Intellipedia
Within a "Need to Know" Culture
Speaker: Sean Dennehy, Chief of Intellipedia
Development, Directorate of Intelligence, U.S. Central Intelligence
Agency
Sean
will share the technical and cultural changes underway at the CIA
involving the adoption of wikis, blogs, and social bookmarking tools.
In 2005, Dr. Calvin Andrus published The Wiki and The Blog: Toward a
Complex Adaptive Intelligence Community. Three years later, a vibrant
and rapidly growing community has transformed how the CIA aggregates,
communicates, and organizes intelligence information. These tools are
being used to improve information sharing across the U.S. intelligence
community by moving information out of traditional channels.
|
 |
|
Integrating Linux (and UNIX and
Mac) Identity Management in Microsoft Active Directory
Speaker: Mike Patnode, Centrify
If you have a mixed environment, some of these might be on
your must-do
list: centralizing authentication, access control and policy management
in Microsoft AD, using the Group Policy features of Active Directory
for Linux management, delivering SSO to your users, and complying with
government regulations. How can you pull it all off? We'll discuss the
challenges, as well as explore the various options both in the public
domain and from commercial providers and discuss their requirements and
capabilities. The questions we'll answer include: Why would I want to
integrate Linux with Active Directory? What are the issues (e.g.,
compatibility and maintenance, capabilities, integration,
organizational impediments, cost)? What are the choices in terms of
technology requirements and components?
|
 |
|
How to Proceed When 1000 Call
Agents Tell You, "My Computer Is Slow": Creating a User Experience
Monitoring System
Speaker: Tobias Oetiker, OETIKER+PARTNER AG
Once users have figured out that their computers are slow,
there is an uphill battle to improve the performance and at the same
time lose that slowness image. In this talk I will report on the
development of a Perl-based system for passive application monitoring
for a large Swiss telecom company. The system keeps track of hundreds
of different performance metrics. Running on over 1,000 client
workstations, several gigabytes of performance data are gathered each
week and stored in a central PostgreSQL database. An Ajax-enabled Web
application allows users to explore, compare, and investigate
performance data. Hear how investigating performance problems has
turned from random guesswork into a clearly defined process, based on
objective measurements rather than rumors.
|
 |
|
Does Your House Have Lions?
Controlling for the Risk from Trusted Insiders
Speaker: Marcel Simon, Medco Health
Solutions
How do you control for risk from trusted insiders? The nature
of the
job that system/network/database administrators, application
developers, operations center staff, etc., do pretty much requires
them to have privileged access to your infrastructure. That very
privilege means rogues among such individuals can both do great damage
and cover their tracks, so how do you protect your information? This
talk proposes a practical, technology-neutral approach to trusted
insider controls that adapts readily to your business practices and has
proven itself over years of production usage
|
 |
|
Reconceptualizing Security
Speaker: Bruce Schneier, Chief Security
Technology Officer, BT
Security
is both a feeling and a reality. You can feel secure without actually
being secure and you can be secure even though you don't feel secure.
We tend to discount the feeling in favor of the reality, but they're
both important. The divergence between the two explains why we have so
much security theater, and why so many smart security solutions go
unimplemented. Several different fields—behavioral economics, the
psychology of decision-making, evolutionary biology—shed light on how
we perceive security, risk, and cost. It's only when the feeling and
the reality of security converge that we have real security.
|
 |
|
Session: Virtualization
Session Chair: Chris McEniry, Sony Computer
Entertainment America
Storm: Weathering Network and
Electrical Surges Using Virtualization
Speaker: Mark Dehus and Dirk Grunwald,
University of Colorado
IZO: Applications of
Large-Window Compression to Virtual Machine Management
Speaker: Mark A. Smith, Jan Pieper, Daniel
Gruhl, and Lucas Villa Real, IBM Almaden Research Center
Portable Desktop Applications
Based on P2P Transportation and Virtualization
Speaker: Youhui Zhang, Xiaoling Wang, and
Hong Liang, Tsinghua University
|
 |
|
Session: On the Wire
Session Chair: Brent Hoon Kang, University
of North Carolina at Charlotte
Topnet: A Network-aware top(1)
Speaker: Antonis Theocharides, Demetres
Antoniades, Michalis Polychronakis, Elias Athanasopoulos, and Evangelos
P. Markatos, Institute of Computer Science, Foundation for Research and
Technology (ICI-FORTH), Hellas, Greece
Fast Packet Classification for
Snort
Speaker: Alok Tongaonkar, Sreenaath
Vasudevan, and R. Sekar, Stony Brook University
|
 |
|
WTFM: Documentation and the
System Administrator
Speaker: Janice Gelb, Sun Microsystems
Most system administrators fear and hate documentation, both
writing and reading it. This presentation attempts to alleviate
that frustration by explaining why system administration
documentation is important, showing how to resolve common
documentation problem areas using real-world examples, and
describing how to improve product documentation from your
company and from companies that make products that you use.
|
 |
|
The State of Electronic Voting,
2008
Speaker: David Wagner, University of
California, Berkeley
As
electronic voting has seen a surge in growth in the U.S. in recent
years, controversy has swirled. Are these systems trustworthy? Can we
rely upon them to count our votes? In this talk, I will discuss what is
known and what isn't. I will survey some of the most important
developments and analyses of voting systems, including the
groundbreaking top-to-bottom review commissioned by California
Secretary of State Debra Bowen last year. I will take stock of where we
stand today, the outlook for the future, and the role that
technologists can play in improving elections.
|
 |
|
Deterministic System
Administration
Speaker: Andrew Hume, AT&T Labs-Research
The vision is clear and seductive: take a modest-sized
specification of
a computing environment and automatically derive all the stuff you
actually need, from DHCP configurations to ordering cables. Is it
possible to account for every box, every cable, every RAID box, every
volume mounted, every OS deployed? I describe an attempt to do so,
fighting the forces of Chaos and Nature, armed only with logical
positivism, Ruby, little languages, and sarcasm.
|
 |
|
System Administration and the
Economics of Plenty
Speaker: Tom Limoncelli, Google NYC
Over
the years IT resources (disk space, CPU, bandwidth) have gone from
being scarce to being nearly infinitely plentiful. Why do our IT
policies still reflect the days of scarcity? Seeing the world in terms
of "the economics of plenty" brings about a paradigm shift that changes
the way we treat our users, manage our systems, and take care of
ourselves. Tom will discuss how this change in thinking can improve IT
policies and practices and will present his thoughts on why the open
source movement depends on this paradigm shift.
|
|